Blog

  • Deny Access to This Computer From the Network – Best Practices for DC and Member Server

    Setting which group of users will be denied from accessing the computer from the network is a fundamental step in a hardening project. Hardening can be a painful procedure when done

    Read More
  • Access and Deny Access to This Computer From the Network

    Controlling who can access your computers from the network and which users must be denied is a basic act in system hardening. Allowing users to access a computer from the network

    Read More
  • Access This Computer From the Network – Best Practices for DC and Member Servers

    Setting which group of users can access a computer from the network is a fundamental step in a hardening project. Hardening can be a painful procedure when done in complex environments.

    Read More
  • Hardening Tools 101 [updated:2021]

    System hardening refers to actions done to reduce the attack surface, by securing the configurations of the system’s components (servers, applications, etc.). As arrived from the manufacturer, system components are more

    Read More
  • LDAP Authentication and Security – Signing, Binding and Configuration

    Lightweight Directory Access Process (LDAP) is a user authentication process developed for directory services. This protocol is usually used by applications for searching resource information such as users and different system

    Read More
  • Audit Kerberos Service Ticket Operations should be set to ‘Success and Failure’

    Kerberos is an authentication protocol, designed for enhanced security. Kerberos authentication protocol designed with a ticket-granting mechanism. As part of the Kerberos authentication mechanism, an Authentication Server is granting a Ticket

    Read More
  • NTLM v1 and v2 vs Kerberos

    Kerberos, NTLMv1, and NTLMv2 are three authentication protocols. These protocols aim to enhance security, especially in the Active Directory environment. Authentication protocols are popular attack vectors. They can help attackers gain

    Read More
  • Kerberos Tickets and Authentication in Active Directory

    Kerberos is an authentication protocol. It is designed for client-server applications and requires mutual verification.   Kerberos is the default protocol used when logging into a Windows machine that is part

    Read More
  • Create Symbolic Link in Windows is set to ‘Administrators’ (DC only) – The Policy Expert:

    This Policy Expert post will discuss the recommended setting for Symbolic Links in your servers, since as much as they are useful, Symbolic Links can also be used maliciously to gain

    Read More
  • 23 NYCRR Part 500 Compliance Checklist

    Lately, we are approached by many insurance companies located in the state of New York asking for assistance with the 23 NYCRR Part 500 regulation compliance. Like in many other cases,

    Read More
  • NTLM Vulnerabilities Review

    This blog post will explain NTLM’s main security weaknesses. From common attack techniques to specific vulnerabilities.   NTLM is a rather veteran authentication protocol and quite vulnerable for relatively easy to

    Read More
  • Avoiding Obsolete Cipher Suites and Key Exchange

    The NSA recommends replacing obsolete protocol configurations with ones that provide better encryption and authentication.   Using only TLS 1.2 and above is old news. It has been known for a

    Read More