Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Devices: Allow Undock Without Having to Log On

The Devices: Allow undock without having to log on setting on laptops and computers is extensively used to provide people with the convenience of undocking their systems without having to log on repeatedly. This comes in handy for portable devices that need to be undocked from the docking station multiple times. You can just hit the eject button and safely get your laptop away from the docking station.

Create Permanent Shared Objects

A shared object refers to the code, which is shared across different programs instead of being replicated manually for each program. Here, the permanent shared objects are the codes that are bound to remain active in the system’s memory even after the program is over. The main purpose of creating the permanent shared objects is to ensure that these codes are stored in the memory and can be re-used multiple times as and when required.

Audit: Force audit policy subcategory settings

Audit: Force Audit Policy Subcategory is a security policy that allows users to leverage the most accurate and advanced policy settings in Windows Vista. The current version of the Active Directory does not have a feature for managing the audit policy settings, which is why the user has to manually apply Audit: Force Audit Policy Subcategory Settings and configure it to ensure everything works well.

Devices: Prevent Users From Installing Printer Drivers

Devices: Prevent Users From Installing Printer Drivers, as the name suggests, is a security setting that prohibits unauthorized printer usage on specific devices. Once the setting is configured, the types and number of printers used on specific devices will be confined to the approved ones. The main purpose of limiting printer drivers’ installation and usage on workstations is to prevent people from printing unnecessary stuff, which would increase the cost of business operations.

MITRE ATT&CK and Windows registry key

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive knowledge base of tactics, techniques and procedures that adversaries use to conduct cyber-attacks. The MITRE ATT&CK framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Audit Policy: Object Access: SAM

Audit Policy: Object Access: SAM is a setting in the Windows operating system that controls the auditing of security events related to access to the Security Accounts Manager (SAM) database. The SAM database is used to store user account information, including login credentials, on a Windows system. When the setting is enabled, the system will generate an audit event in the security log of the event viewer every time an attempt is made to access the SAM database.