Top 18 Tips to Secure SSH on Linux
Linux admins cannot rely on the default configuration of SSH being inherently secure. Learn best practices on how to secure SSH in Linux.
Read MoreHow To Use Nmap To Scan For Open Ports
Scanning with Nmap is an easy way to peek into your network. Learn how to use Nmap to scan all ports and find vulnerabilities in your environment.
Read MoreOffice 365 Audit Log Retention: Why It Matters and Best Practices
Retaining Microsoft 365 audit logs provides a variety of security benefits. Learn how to enable audit logging and retention options.
Read MoreA Guide To Microsoft Azure Security Logging
Azure generates logs that provide comprehensive visibility into your environment. Learn what logs to monitor and how in this Azure security logging guide.
Read More5 Best Practices For Security Log Retention
When a cybersecurity incident occurs, logs are the key to understanding what happened. That's why it's important to learn log retention best practices.
Read MoreFind a User with Their Security ID in Windows
Go over several different options for finding users with just their Windows Security IDs, since everyone’s environment and situation is different.
Read MoreActive Directory Password Auditing with NtdsAudit & NThashes
Active Directory password auditing using NtdsAudit and NThashes tools will help you locate passwords that have been compromised in breaches.
Read MoreEvent ID 4732: The Case of the Missing Username
Learn all about Event ID 4732, including its small quirk: the security log itself does not contain the username of who got added to the local group.
Read MoreSecuring Exchange Server: 8 Best Practices
Microsoft Exchange Server can be extremely vulnerable. Familiarize yourself with Exchange Server best practices to secure them against attacks.
Read MoreDetecting Microsoft Legacy Authentication with Blumira
Blumira customers can quickly and easily detect instances of legacy authentication being used in their Microsoft environments.
Read More