BitLocker Reporting in Intune
Introduction Reporting BitLocker metrics is crucial for both compliance and security purposes in an organization’s Information Technolgy (IT) infrastructure. BitLocker, as a disk encryption featur...
Introduction Reporting BitLocker metrics is crucial for both compliance and security purposes in an organization’s Information Technolgy (IT) infrastructure. BitLocker, as a disk encryption featur...
Introduction In today’s world, automation is the key to ensuring success as human error does exist. In this blog post, I will break down the steps to incorporate employee hire dates into Azures En...
Introduction In an increasingly interconnected world, security and privacy have become paramount concerns for individuals and businesses alike. With the ever-evolving landscape of cyber threats, i...
Introduction Whether you are a security engineer, architect, or even an analyst, it will be an organizational requirement that USB ports on endpoints be locked down. This will allow for better con...
Attacktive Directory In this room we will be using the following tools to compromise a Domain Controller (DC) in order to gain access to the crown jewels of the environment: Tools Used: Nmap, Ker...
Attacktive Directory In this room we will be using the following tools to compromise a Domain Controller (DC) in order to gain access to the crown jewels of the environment: Tools Used: Nmap, Ker...