Tag: Windows Server security
November 1, 2024 |
Navigating User Account Management for Enhanced Windows Security
Importance of User Account Management for Windows Computers
Your network is comprised of devices and users, and both require proper management. For a user to access a device and its hosted assets, that user requires a user account that has access to the computer. The allocation and management...
September 27, 2024 |
The Top Windows Server Monitoring Tools Available Today
Introduction to Windows Server Monitoring
Today's organizations are deeply dependent on their IT infrastructure, so system downtime translates directly to costly business disruptions. Accordingly, it’s critical to have server monitoring tools that provide the insight into your on-premises and...
April 5, 2024 |
How to Use OpenSSH to Move Files in Windows Server
Linux and Unix admins are accustomed to using Open Secure Shell (OpenSSH) to connect to servers because it has been included in those systems for decades. Windows users, on the other hand, have traditionally had to download third-party tools like Putty or WinSCP to utilize SSH...
August 29, 2023 |
How to Perform Windows Registry Repair: Registry Repair Windows 10
The Windows registry is a database that contains important information about your computer — users, preferences, applications, attached devices and much more. The Windows operating system constantly refers to the registry; for example, to open a program, install new software or change your...
August 14, 2023 |
Windows Remote WMI Security Primer for the Faint-Hearted
Local WMI querying is straightforward to implement and troubleshoot — but remote WMI querying is another story. Indeed, setting up secure remote WMI querying for a user with no admin rights is a daunting task.
This blog can help. I’ll walk you through the steps I used to enable a...
December 9, 2022 |
Windows File Access Monitoring
In this post, we will dive into how to configure file access auditing on a Windows file server and explore the challenges with interpreting critical access events.
Background
The first step in developing an effective audit strategy is to gain a good understanding of your systems,...
October 21, 2022 |
How To Secure Default IIS Site & Enable Windows Authentication
By default, when you create a new Internet Information Services (IIS) website, it’s open to everyone with anonymous access enabled — anyone can access and view the data being hosted by that site. Obviously, this is a security concern for most organizations. Indeed, I’m often asked by clients...
January 11, 2022 |
Understanding LSA Protection
Securing your Windows servers and Windows 10 running is vital, especially given today’s sophisticated threat landscape. These are usually the first machines to be compromised in an attack through exploitation of the weakest link in the chain — the user. Through trickery and social engineering,...
November 3, 2021 |
Server Hardening Policy: Examples and Tips
Various researches reveal that a staggering 80% of reported breaches involve exploiting vulnerabilities in the configurations of IT systems. To proactively block attacks and thereby prevent costly downtime and data breaches, experts recommend implementing a server hardening policy, which is a...
November 3, 2021 |
What is Windows File Integrity Monitoring?
Malicious actors can cause a lot of damage to your business, employees, and clients if they gain access to your systems. Besides stealing and leaking data, they can also change your configurations, applications, and system files — and delete logs to cover their tracks.
File integrity...