Uncategorized
CMD and PowerShell host-settings and how they are determined
Merry Christmas with Command Line Win-Fu!
AppLocker Workshop Video
Auditing if NTLM is Used (or can we go to Kerberos only?)
PageFile Usage Monitoring
Deep Inside Windows Security Day 2 – Part 2/2
DAY 2
Deep Inside Principle of Least Privilege
- How to make your company understand that admin rights are no good
- How to effectively remove admin rights easily
- How to remove admin rights without budget
- How this is done in real environments ranging from 10 to 350000 endpoints
Deep Inside Pass-the-Hash prevention
- How to build a layered management system and Active Directory in real life
- How to use PtH prevention techniques like protected LSASS, Credential Guard and Remote Credential Guard
- How to build Privilege Access Workstations (PAW) effectively
What you don’t know about the future of Windows “10” that might change everything
- Can’t tell you
- Can’t tell you
- Can’t tell you
Deep Inside Windows Security Day 2 – Part 1/2
DAY 2
Deep Inside Principle of Least Privilege
- How to make your company understand that admin rights are no good
- How to effectively remove admin rights easily
- How to remove admin rights without budget
- How this is done in real environments ranging from 10 to 350000 endpoints
Deep Inside Pass-the-Hash prevention
- How to build a layered management system and Active Directory in real life
- How to use PtH prevention techniques like protected LSASS, Credential Guard and Remote Credential Guard
- How to build Privilege Access Workstations (PAW) effectively
What you don’t know about the future of Windows “10” that might change everything
- Can’t tell you
- Can’t tell you
- Can’t tell you
Deep Inside Windows Security Day 1 – Part 1/2
DAY1
Deep Inside AppLocker
- How AppLocker works
- How to manage AppLocker
- How to monitor AppLocker
- AppLocker and PowerShell
- AppLocker with Windows 10
- AppLocker and MDM/Intune
- How to use AppLocker in real life
Deep Inside Device Guard
- How Device Guard really works
- Setting up Device Guard
- Monitoring Device Guard
- Device Guard vs AppLocker
- Device Guard’s present and future features and status
- How to use Device Guard in real life
Deep Inside BitLocker
- How BitLocker really works
- How to manage BitLocker in real life
- BitLocker in Windows 10
- How to hack/unhack BitLocker
Deep Inside Windows Security Day 1 – Part 2/2
DAY1
Deep Inside AppLocker
- How AppLocker works
- How to manage AppLocker
- How to monitor AppLocker
- AppLocker and PowerShell
- AppLocker with Windows 10
- AppLocker and MDM/Intune
- How to use AppLocker in real life
Deep Inside Device Guard
- How Device Guard really works
- Setting up Device Guard
- Monitoring Device Guard
- Device Guard vs AppLocker
- Device Guard’s present and future features and status
- How to use Device Guard in real life
Deep Inside BitLocker
- How BitLocker really works
- How to manage BitLocker in real life
- BitLocker in Windows 10
- How to hack/unhack BitLocker