Using SCCM DCM Feature to monitor GPO application in the environment

The Issue A Common issue that keeps being experienced across customer sites, is the application of Group Policies on machines By default when a GPO is created and linked, it should apply to all the machines that the policy was linked to, and in most cases this works pretty perfectly, however, how do you know … Continue reading Using SCCM DCM Feature to monitor GPO application in the environment

Security – Transport Layer Security(TLS) 1.2 Calculation

Enabling TLS and SSL on Windows machines requires you to set registry keys. https://support.microsoft.com/en-us/help/3140245/update-to-enable-tls-1-1-and-tls-1-2-as-default-secure-protocols-in-wi 2. If you want to enable more than one (In case you are scared not using TLS 1.1 or 1.0 will break your websites), you need to add up the values in Calculator in Programmer mode and choosing HEX (800+200+20) = … Continue reading Security – Transport Layer Security(TLS) 1.2 Calculation

Step by Step: Enforce Require LDAP Signing on domain controllers. Part 1

Introduction: One of the security settings that Microsoft recommend applying on domain controllers is to Require LDAP Signing. Requiring LDAP signing is one policy setting that can be applied on a few seconds using group policy, but what is the impact of applying this setting in your production environment? In most customer environments I visited, … Continue reading Step by Step: Enforce Require LDAP Signing on domain controllers. Part 1

Field Notes: The case of buried Active Directory Account Management Security Audit Policy events

Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system.  As part of your overall security strategy, you should determine the level of auditing that is appropriate for your environment.  Auditing should identify attacks (successful or not) that pose a threat to your network, and … Continue reading Field Notes: The case of buried Active Directory Account Management Security Audit Policy events

Step by Step: Safely disabling SMB v1 from your production environment.

Introduction: In this blog I will not cover why we have to remove SMB v1 from production network, this have been already covered, probably one of the best articles covering this is https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/ I will cover how you can audit the usage of SMB v1 in your network, so you can disable it safely without … Continue reading Step by Step: Safely disabling SMB v1 from your production environment.