Executive Summary
Most EDR solutions are good at detecting attacks, but many look for a sequence of events before alerting your security team a problem exists. If an attacker is smart, they will
Sticking with the blog title, random thoughts, I am finishing a post I have been working on for months and finally had time to finish. Since becoming a manager, one of the skills
Executive Summary
As part of our company's transition away from a legacy phone system in the past few years, we've encountered several challenges and limitations with Microsoft's
Introduction
If you are utilizing Windows Defender for Endpoint and Microsoft Sentinel and are in search of a query that can effectively display files copied to removable media, you've come to
Introduction
From a security perspective, disabling the ability to generate a Kerberos Ticket using RC4 encryption is crucial for preventing attackers from easily obtaining password hashes. This blog post explores the steps and