Shared posts

23 May 09:11

Windows Server Change Reporter – Windows Server Auditing

by External author

Windows Servers are the most frequently changed resources within the entire IT infrastructure. Daily modifications present enormous risk to critical IT systems’ stability and availability. Unauthorized and erroneous changes made to Windows Server configurations can potentially result in serious disruption of the IT infrastructure.

This post was sponsored by Netwrix.

Enterprises must be notified of any changes made to Windows servers – no matter when modifications are made or by whom. Even trusted administrators are prone to human error – errors that could result in server downtime and potential loss of business productivity. That’s why implementing Windows Server configuration change auditing is a must and the only trusted way to track all changes across the Windows environment.

Windows Server Change Reporter

Windows Server Change Reporter

… read more of Windows Server Change Reporter – Windows Server Auditing

Copyright © 2006-2013, 4sysops, Digital fingerprint: 3db371642e7c3f4fe3ee9d5cf7666eb0


Related
23 May 05:58

How can I prevent users from connecting to a USB storage device?

21 May 06:37

Five Common Corporate Pitfalls in Cyber Security Management

by Advanced Cyber Defense/ Incident Response Chatter

By Mike McGrew, Advisory Practice Consultant, RSA Advanced Cyber Defense Services

This blog discusses five of the high level missteps common to organizations that have experienced needlessly prolonged negative effects of cyber security incidents.

1) No security team

A fair percentage of clients that I have provided incident response services to over the last 12 months are operating without security or oversight on the Internet, meaning not a single person employed at that organization is solely dedicated to working on security issues. While this is common for small companies and startups, these clients matured over the years to the point where they had hundreds or thousands of employees and even more computing devices on the network. What had not occurred, however, was the investment in security commensurate with the growth of the company.

When a company consists of 10 people operating on a shoestring budget and an idea, realistically it’s hard to justify spending money on anything that doesn’t have a tangible ROI. When those companies grow, however, the potential losses in intellectual property or corporate reputation began to justify expenditure towards a comprehensive security program. Add to that potential regulatory compliance requirements and most successful companies should have no problems demonstrating a true business need for security implementation.

2) No budget for enterprise level security tools

These companies are slightly better off than the organizations with no security team at all. What I typically observe at these clients is a dedicated though undersized staff that spends a lot of time trying to convince management of the necessity of enterprise security tools. At least that’s how they start out on the job. By the time I am called in to consult, I typically find that the IT managers accept as fact that executive leadership will not dedicate funds towards the purchase of enterprise security tools. Often these managers hope that the single biggest result of a breach is that executive leadership will finally see the true value of implementing these tools.

3) No management support for an information security program

Both of the previously mentioned conditions can be summed up by this one condition. That being said, I have still occasionally seen organizations that are reasonably staffed and tooled, but end up not implementing security properly because of the perceived negative impact to the business. For example, take a company that has an intelligent web proxy up and running on the network. Since executive management does not champion network security, creating exceptions to the policy is relatively easy. Before long, that company will have entire pockets of personnel whose web traffic bypasses the proxy. If a company has adequate security in place, but lacks management support, users will often find a way to bypass that security.

4) Over-reliance on tools; under-reliance on skills training

At these organizations, what I have found to be the common denominator is that tools and security staff are both implemented, but the weak link in the chain is the capability of the personnel that are hired to deal with incidents. Consider a case where a critical client system was compromised via targeted email attack. Two users clicked on a URL in similar LinkedIn phishing emails, starting the chain of infection that ultimately led to an attempted payroll theft months after the initial infection. Multiple opportunities existed for this client to detect and remove the threat from the network prior to the attacker trying to steal money; original emails were still present in the gateway storage, both compromised systems were beaconing to a known bad IP address, both hosts had AV alerts that fed into a central server, both users created help desk tickets as a result of their computers acting strangely, and this exact attack had been sufficiently blogged about for a security analyst to gather information and perform discovery in their own network. On the surface, this organization appeared ready to be able to efficiently handle any network security issues that came up. The reality, however, was that though there was an extensive trail of evidence that could have easily been queried and analyzed, there were no truly qualified personnel on staff that could put the pieces of the puzzle together.

5) Sysadmins assigned to remediate AV alerts, end up running scan tools that don’t wipe out the threat

I understand the motivation of the sysadmin who sees an AV alert and responds by running eradication tools like Malwarebytes. More often than not I find that in targeted attacks, at best these tools only kill the portion of the malware that was causing the AV alerts. For the motivated but untrained sysadmin, no more AV alerts means no more compromise, situation resolved. Incomplete remediation is a dangerous situation, since the possibility now exists that the host is still compromised but no longer alerting anybody about it. In a corporate environment, AV alerts should be treated as a notification to rebuild the system in any case where a thorough forensic examination cannot rule out persistent compromise.

 Mike McGrew is an Advisory Practice Consultant within RSA’s Incident Response practice. Mike provides network and host-based incident response services for intrusions involving sophisticated adversaries that target intellectual property and other critically sensitive data. Mike has been a CISSP for over 10 years and was previously a Navy cryptologist supporting the National Security Agency (NSA).

21 May 06:12

Microsoft Outlook 2013 Plain & Simple

Learn the simplest ways to get things done with Microsoft Outlook 2013

Get the full-color, visual guide that makes learning Microsoft Outlook 2013 plain and simple! Follow the book?s easy steps and screenshots and clear, concise language to learn how to stay productive and keep in touch with all of your personal, business, and social media networks.



Here?s WHAT you?ll learn:

  • Format and send messages, files, and photos
  • Set up mobile alerts for important messages
  • Manage your inbox and limit junk mail
  • Update and share your calendar
  • Add social media network accounts and collaborate
  • Connect with and meet contacts online using Lync?

Here?s HOW you?ll learn it:

  • Jump in wherever you need answers
  • Follow easy STEPS and SCREENSHOTS to see exactly what to do
  • Get handy TIPS for new techniques and shortcuts
  • Use TRY THIS! exercises to apply what you learn right away
21 May 06:07

TXDNS, an aggressive multithreaded DNS digger.

18 May 08:27

Skype Backdoor Confirmed

15 May 06:14

PowerShell in Depth: An administrator's guide

Summary

PowerShell in Depth is the kind of book you'll want open on your desk most of the time. With 40 short chapters, each focused on a specific area of PowerShell, you'll be able to find the answers you need quickly. Each chapter is concise and to-the-point, so you can spend less time reading and more time getting down to the business at hand. It was written by three seasoned PowerShell experts, and every technique has been thoroughly tested. With this book in hand, you'll be able to consistently and quickly produce production quality, maintainable scripts that will save you countless hours of time and effort.

About this Book

Organized into 40 concise chapters, PowerShell in Depth is the go-to reference for administrators working with Windows PowerShell. Every major shell technique, technology, and tactic is explained and demonstrated, providing a comprehensive reference to almost everything an admin would do in the shell. Written by three experienced authors and PowerShell MVPs, this is the PowerShell book you'll keep next to your monitor?not on your bookshelf!

This book requires basic familiarity with PowerShell.

What's Inside

  • Covers PowerShell 3.0
  • Automating time-consuming tasks
  • Managing HTML and XML data
  • Background jobs and scheduling
  • PowerShell security
  • Packaging and deploying scripts
  • Standard scripting conventions
  • Using the .NET Framework in PowerShell scripts
  • Much more

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Authors

Don Jones, Jeffery Hicks, and Richard Siddaway are Microsoft MVPs who have collectively authored nearly three dozen books on PowerShell and Windows administration.

Table of Contents

    PART 1: POWERSHELL FUNDAMENTALS
  1. Introduction
  2. PowerShell hosts
  3. Using the PowerShell help system
  4. The basics of PowerShell syntax
  5. Working with PSSnapins and modules
  6. Operators
  7. Working with objects
  8. The PowerShell pipeline
  9. Formatting
  10. PART 2: POWERSHELL MANAGEMENT
  11. PowerShell Remoting
  12. Background jobs and scheduling
  13. Working with credentials
  14. Regular expressions
  15. Working with HTML and XML data
  16. PSDrives and PSProviders
  17. Variables, arrays, hash tables, and scriptblocks
  18. PowerShell security
  19. Advanced PowerShell syntax
  20. PART 3: POWERSHELL SCRIPTING AND AUTOMATION
  21. PowerShell's scripting language
  22. Basic scripts and functions
  23. Creating objects for output
  24. Scope
  25. PowerShell workflows
  26. Advanced syntax for scripts and functions
  27. Script modules and manifest modules
  28. Custom formatting views
  29. Custom type extensions
  30. Data language and internationalization
  31. Writing help
  32. Error handling techniques
  33. Debugging tools and techniques
  34. Functions that work like cmdlets
  35. Tips and tricks for creating reports
  36. PART 4: ADVANCED POWERSHELL
  37. Working with the Component Object Model (COM)
  38. Working with .NET Framework objects
  39. Accessing databases
  40. Proxy functions
  41. Building a GUI
  42. WMI and CIM
  43. Best practices
17 Apr 10:36

Популярният торент тракер Zamunda е бил хакнат

by Дневник

Популярният български торент тракер Zamunda е станал жертва на хакерска атака. Група хакери са успели да свалят бекъп с базата данни на тракера, съобщават от Zamunda.

Представителите на тракера допълват, че паролите на потребителите са криптирани и няма опасност за тяхното разгадаване от хакерите. Но това не означава, че липсва риск за потребителите.

Причната за това е, че чрез този бекъп хакерите могат да направят сайтове-копия на Zamunda, които да прилъжат потребителите...

15 Apr 06:39

[bosia] ТЪПОТАТА МОЖЕ ДА СЕ ИЗМЕРВА ПО БРОЯ НА КСЕРОКСИТЕ НА ГЛАВА ОТ НАСЕЛЕНИЕТО

by bosia.blog.bg
 ЕЛЕМЕНТАРНО, УОТСЪН   Простотията и алчността нямат граници. Също като наглостта на нашите политици.
15 Apr 06:39

[bosia] ОБУХА НИ МАМАТА

by bosia.blog.bg
 ДО ПРЕДСЕДАТЕЛЯ НА ЦИК   ГОСПОЖО ПРЕДСЕДАТЕЛ,