Data Security
DNS Security Guide
Jul 28, 2020
DNS security should be considered an essential part of any business's security plan. Our goal in this piece is to help provide information to best inform you of all options around securing your DNS.
Active Directory Account Lockout: Tools and Diagnosis Guide
Jul 14, 2020
AD Account Lockouts are perhaps the biggest source of frustration for IT admins. In this guide, we’ll explain how they happen, and how to prevent them.
Malware Protection: Basics and Best Practices
Jun 23, 2020
Our malware protection guide covers malicious software, utilizing the outlined controls and best practices to achieve a higher level of security.
What is a Domain Controller, When is it Needed + Set Up
Jun 23, 2020
Domain controllers are common targets of attackers. Learn how to protect and secure your domain controllers to prevent data breaches.
Working With Windows Local Administrator Accounts, Part II
Jun 19, 2020
Before we delve into Restricted Groups, I thought it might be worthwhile to take a closer look at how hackers take advantage of Administrator passwords. For Pass-the-Hash fans, this post...
Finding EU Personal Data With Regular Expressions (Regexes)
Jun 19, 2020
If there is one very important but under-appreciated point to make about complying with tough data security regulations such as the General Data Protection Regulation (GDPR), it’s the importance of finding...
How To Get Started with PowerShell and Active Directory Scripting
Jun 19, 2020
This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...
Detecting Malware Payloads in Office Document Metadata
Jun 19, 2020
Ever consider document properties like “Company,” “Title,” and “Comments” a vehicle for a malicious payload? Checkout this nifty PowerShell payload in the company metadata: #powershell payload stored in office metadataDocument...
Working With Windows Local Administrator Accounts, Part I
Jun 19, 2020
In writing about hackers and their techniques, the issue of Windows local Administrator accounts often comes up. Prior to Windows 7, the Administrator account was created by default with no...
Defining Deviancy With User Behavior Analytics
Jun 19, 2020
For over the last 10 years, security operations centers and analysts have been trading indicators of compromise (IoC), signatures or threshold-based signs of intrusion or attempted intrusion, to try to...
PowerShell Obfuscation: Stealth Through Confusion, Part I
Jun 19, 2020
To get into the spirit of this post, you should probably skim through the first few slides of this presentation by Daniel Bohannon and Le Holmes given at Black Hat...
How to use PowerShell Objects and Data Piping
Jun 19, 2020
This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...
Try Varonis free.
Deploys in minutes.