Security How-To

How To Manage Windows Firewall with GPOs
Read More
Top 18 Tips to Secure SSH on Linux
Read More
How To Use Nmap To Scan For Open Ports
Read More
7 Remote Work Security Risks and How To Protect Against Them
Read More
Office 365 Audit Log Retention: Why It Matters and Best Practices
Read More
How To Detect Data Exfiltration
Read More
A Guide To Microsoft Azure Security Logging
Read More
5 Best Practices For Security Log Retention
Read More
Find a User with Their Security ID in Windows
Read More
Active Directory Password Auditing with NtdsAudit & NThashes
Read More
Event ID 4732: The Case of the Missing Username
Read More
Securing Exchange Server: 8 Best Practices
Read More
Proper SIEM Tuning for Better Security Outcomes
Read More
How to Use Your SIEM as a Business Enabler
Read More
Detecting Microsoft Legacy Authentication with Blumira
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.