A Guide To Microsoft Azure Security Logging
Azure generates logs that provide comprehensive visibility into your environment. Learn what logs to monitor and how in this Azure security logging guide.
Read More5 Best Practices For Security Log Retention
When a cybersecurity incident occurs, logs are the key to understanding what happened. That's why it's important to learn log retention best practices.
Read MoreHow To Find a User With Their Security ID in Windows
Go over several different options for finding users with just their Windows Security IDs, since everyone’s environment and situation is different.
Read MorePerforming Active Directory Password Audits With nthashes and NtdsAudit
Learn how you can perform Active Directory password auditing by using the NtdsAudit and NThashes tools.
Read MoreEvent ID 4732: The Case of the Missing Username
Learn all about Event ID 4732, including its small quirk: the security log itself does not contain the username of who got added to the local group.
Read MoreSecuring Microsoft Exchange Server: 8 Best Practices
Microsoft Exchange Server can be extremely vulnerable. Familiarize yourself with Exchange Server best practices to secure them against attacks.
Read More