Ensure ‘Audit Kerberos Service Ticket Operations’ is set to ‘Success and Failure’

  • Ensure ‘Audit Kerberos Service Ticket Operations’ is set to ‘Success and Failure’

    Kerberos is an authentication protocol, designed for enhanced security. Kerberos authentication protocol designed with a ticket-granting mechanism. As part of the Kerberos authentication mechanism, an Authentication Server is granting a Ticket

    Read More
  • NTLM v1 and v2 vs Kerberos

    Kerberos, NTLMv1, and NTLMv2 are three authentication protocols. These protocols aim to enhance security, especially in the Active Directory environment. Authentication protocols are popular attack vectors. They can help attackers gain

    Read More
  • Kerberos Tickets and Authentication in Active Directory

    Kerberos is an authentication protocol. It is designed for client-server applications and requires mutual verification.   Kerberos is the default protocol used when logging into a Windows machine that is part

    Read More
  • Ensure ‘Create Symbolic Link’ in Windows is set to ‘Administrators’ (DC only) – The Policy Expert:

    This Policy Expert post will discuss the recommended setting for Symbolic Links in your servers, since as much as they are useful, Symbolic Links can also be used maliciously to gain

    Read More
  • 23 NYCRR Part 500 Compliance Checklist

    Lately, we are approached by many insurance companies located in the state of New York asking for assistance with the 23 NYCRR Part 500 regulation compliance. Like in many other cases,

    Read More
  • NTLM Vulnerabilities Review

    This blog post will explain NTLM’s main security weaknesses. From common attack techniques to specific vulnerabilities.   NTLM is a rather veteran authentication protocol and quite vulnerable for relatively easy to

    Read More
  • Avoiding Obsolete Cipher Suites and Key Exchange

    The NSA recommends replacing obsolete protocol configurations with ones that provide better encryption and authentication.   Using only TLS 1.2 and above is old news. It has been known for a

    Read More
  • 5 Razones por las que un Proyecto de Hardening Debe Ser Su Máxima Prioridad Este Año

    Si aún no ha establecido una rutina de hardening[1] a nivel organizacional, ahora es un buen momento para iniciar un proyecto de hardening. Un buen lugar para comenzar es construir su

    Read More
  • 5 reasons why system hardening should be your top priority this year

    If you haven’t yet established an organizational system hardening routine, now is a good time to start a hardening project. A good place to start is building your policy, usually according

    Read More
  • CalCom launches new CHS console for 2021

      CalCom is launching an updated CHS policy center console. The new, web-based UI was designed from scratch to meet enterprise server hardening challenges in a user friendly and intuitive way.

    Read More
  • CalCom Hardening Solution 2021 innovative capabilities

      CalCom is launching an updated CHS policy center console. The new, web-based UI was designed from scratch to meet enterprise server hardening challenges in a user friendly and intuitive way.

    Read More
  • Microsoft’s Print Spooler Vulnerability

    Two zero-day vulnerabilities were discovered in Microsoft’s Print Spooler service. These new vulnerabilities accompany an old DoS vulnerability that Microsoft declared won’t be patched. The first vulnerability CVE-2020-1048, a privilege escalation

    Read More