How-Tos

secure system / network security policy management

youtube thumbnails template 021020
video

How securing the cloud differs from security on-premises servers

Keep these key points regarding cloud vs. on-premises security as you move to the cloud.

youtube thumbnails template 021020
video

How to investigate a Windows network breach

These are the most important actions to take once your Windows network is breached.

Ransomware  >  A masked criminal ransoms data for payment.

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.

youtube thumbnails template 021020
video

How to prevent attackers from exploiting Windows privileges

Ransomware and other attackers will often try to escalate privileges once inside Windows systems. These tips can make that harder to do.

youtube thumbnails template 021020
video

Most common cyberattack techniques of 2020

Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.

A large 'X' marks a conceptual image of a password amid encrypted data.

Tips to improve domain password security in Active Directory

Follow this advice to better secure domain passwords in a Microsoft environment.

youtube thumbnails template 021020
video

How to better manage your domain passwords

Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.

Conceptual image of a password amid hexadecimal code.

How to reset Kerberos account passwords in an Active Directory environment

A regular reset of the KRBTGT account password will help prevent golden ticket attacks that allow wide unauthorized access to your network.

youtube thumbnails template 021020
video

How to reset the Kerberos password in Active Directory

Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.

youtube thumbnails template 021020
video

Microsoft 365 Defender’s new features | What you need to know

M365 Defender has new protections against credential theft and a new threat analytics portal.

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

How to patch Exchange Server for the Hafnium zero-day attack

Admins in many businesses report indicators of compromise from an Exchange zero-day vulnerability. Don't assume you're not a target. Investigate for signs of the attack and patch now.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to protect Windows Remote Desktop deployments

Attackers gain access to your Windows network just as work-from-home employees do: remotely. Following these simple steps will send them looking for easier targets.

youtube thumbnails template 021020 2
video

What you need to know about Microsoft’s Advanced Auditing

Advanced Auditing is a powerful new tool that will help track down attacker activities in Microsoft Windows environments—if you have the right license.

Admission tickets in an digital network / access / admittance / authorization / authentication

How to defend against OAuth-enabled cloud-based attacks

Use these settings in Microsoft Azure Active Directory to take control of user-requested OAuth access permissions.

youtube thumbnails template 021020
video

How to protect your network from OAuth-enabled cloud-based attacks

Check your OAuth third-party authentication privileges in Microsoft 365 and Azure to prevent unauthorized access.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

keyboard laptop microsoft edge logo web browser by urupong getty images 1200x800

How to harden Microsoft Edge against cyberattacks

Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.

youtube thumbnails template 021020
video

How to harden your web browser against cloud-based threats

The web browser is now the portal that most employees use to access data and apps. These tips will help prevent attackers from exploiting it.

Load More