logo
April 5, 2024 | Ethan Israel

How to Use OpenSSH to Move Files in Windows Server

Linux and Unix admins are accustomed to using Open Secure Shell (OpenSSH) to connect to servers because it has been included in those systems for decades. Windows users, on the other hand, have traditionally had to download third-party tools like Putty or WinSCP to utilize SSH...
August 29, 2023 | Dirk Schrader

How to Perform Windows Registry Repair: Registry Repair Windows 10

The Windows registry is a database that contains important information about your computer — users, preferences, applications, attached devices and much more. The Windows operating system constantly refers to the registry; for example, to open a program, install new software or change your...
August 14, 2023 | Joe Dibley

Windows Remote WMI Security Primer for the Faint-Hearted

Local WMI querying is straightforward to implement and troubleshoot — but remote WMI querying is another story. Indeed, setting up secure remote WMI querying for a user with no admin rights is a daunting task.  This blog can help. I’ll walk you through the steps I used to enable a...
December 9, 2022 | Joe Dibley

Windows File Access Monitoring

In this post, we will dive into how to configure file access auditing on a Windows file server and explore the challenges with interpreting critical access events.   Background The first step in developing an effective audit strategy is to gain a good understanding of your systems,...
October 21, 2022 | Joe Dibley

How To Secure Default IIS Site & Enable Windows Authentication

By default, when you create a new Internet Information Services (IIS) website, it’s open to everyone with anonymous access enabled — anyone can access and view the data being hosted by that site. Obviously, this is a security concern for most organizations. Indeed, I’m often asked by clients...
January 11, 2022 | Kevin Joyce

Understanding LSA Protection

Securing your Windows servers and Windows 10 running is vital, especially given today’s sophisticated threat landscape. These are usually the first machines to be compromised in an attack through exploitation of the weakest link in the chain — the user. Through trickery and social engineering,...
November 3, 2021 | Dirk Schrader

Server Hardening Policy: Examples and Tips

Various researches reveal that a staggering 80% of reported breaches involve exploiting vulnerabilities in the configurations of IT systems. To proactively block attacks and thereby prevent costly downtime and data breaches, experts recommend implementing a server hardening policy, which is a...
November 3, 2021 | Dirk Schrader

What is Windows File Integrity Monitoring?

Malicious actors can cause a lot of damage to your business, employees, and clients if they gain access to your systems. Besides stealing and leaking data, they can also change your configurations, applications, and system files — and delete logs to cover their tracks. File integrity...
February 3, 2021 | Dirk Schrader

A Brief Overview of Available Server Monitoring Tools Today

Organizations today are deeply dependent on their IT infrastructure, so system downtime translates directly to costly business disruptions. Accordingly, it’s critical to have server monitoring tools that provide the insight into your on-premises and cloud systems you need to prevent and detect...
September 27, 2018 | Ryan Brooks

Windows Server 2016 Containers

You can improve the security of your application development infrastructure by reducing the size and scope of application and compute resources. One way to do this is to containerize workloads. Windows Server and Microsoft Hyper-V containers enable you to isolate workloads from each other and the...
Show more articles
...