CalCom

Tel Aviv, Israel
2001
  |  By Ben Balkin
Repo_GPGcheck ensures linux verifies the authenticity of software packages downloaded from repositories, reinforcing overall system security and safeguarding against unauthorized software sources. A repository in Linux is a storage location where software packages are managed and organized. When installing or updating software, Redhat based Linux systems pull the required packages from these repositories using the YUM (Yellowdog Updater, Modified) package manager.
  |  By John Gates
Linux distributions come with Discretionary Access Control (DAC) preinstalled in them. A sudo user is usually created in a Linux system to work at root-level privileges. DAC system provides the sudo user with all the administrator rights which may be a security threat if the sudo user is not trustworthy. SELinux is a Mandatory Access Control (MAC) system that replaced traditional DAC systems in modern Linux OS. SELinux allows the system admins to have more control over who can access the system.
  |  By Ben Balkin
Multi-Category Security Translation Service (MCSTrans) daemon provides category label information to client processes requesting information. The label translations are defined in: /etc/selinux/targeted/setrans.conf Run the following command and verify mcstrans is not installed.
  |  By John Gates
Usually, the secure boot option is turned on by default with your Windows server PC, but there are some cases when it is already disabled. To confirm and to disable secure boot you need to open device settings from Windows Security Center and see that if the option exists. If you see this Secure Boot option there, it means that secure boot is enabled on your device otherwise disabled. Now we will talk about a step by step guide on how to disable secure boot: 2.
  |  By Ben Balkin
Address Space Layout Randomization (ASLR) is a Linux security feature that randomizes the location of key areas of a program's memory. This makes it harder for malicious actors to predict the specific areas to target in their attacks. Enabling ASLR can significantly reduce the risk of specific memory based exploits, common in buffer overflow attacks. Address Space Layout Randomization(ASLR) is a security technique that randomizes the memory locations of system and application processes each time they run.
  |  By John Gates
Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, providing the user access to remotely connect with another computer. Microsoft’s remote desktop protocol is one of the best currently available in the market, working efficiently with an effortless graphical user interface (GUI). It can be used between multiple Windows Operating Systems and Devices. This article discussed RDP protocol security and current RDP vulnerabilities.
  |  By John Gates
Domain Member: Digitally Encrypt or Sign Secure Channel Data is a Microsoft security setting, when enabled, ensures that all traffic to/from the secure channel is encrypted. It is a crucial component of Active Directory that's used by domain members and controllers for seamless communication. The secure channel is essentially a communication channel that allows users uninterrupted access to their user accounts in specific domains.
  |  By John Gates
Server compliance is critical to regulatory compliance, ensuring that organizations meet industry-specific standards for protecting sensitive data. Proper server configuration and continuous risk management are essential to avoid fines and maintain operational integrity. Server compliance is the adherence to specific regulations, standards, and best practices designed to safeguard sensitive information, maintain operational efficiency, and mitigate potential risks.
  |  By John Gates
OS hardening refers to the process of enhancing the security of an operating system by implementing various measures and practices to minimize vulnerabilities and strengthen its resistance against potential cyber threats and attacks. This involves configuring the OS settings, applying security patches, disabling unnecessary services, and implementing access controls to create a more robust and secure computing environment.
  |  By Keren Pollack
NTLM has three versions - NTLMv1, NTLMv2 and NTLMv2 Session Security. NTLMv2 is supposed to offer better security than its previous version, and to some extent it does provides better defense against relay and brute force attacks, but does not completely block them. NTLMv2 Session Security is a session security protocol that can be used in conjunction with NTLMv1 or NTLMv2 to provide additional security.
  |  By CalCom
In this video discussing server hardening, you’ll learn why server hardening is so important to your IT Enterprise. Whether you’re a seasoned CISO or IT professional, this video is a must-watch for anyone who wants to keep their servers secure.
  |  By CalCom
Explore the core principles behind these baselines, including risk management, threat identification, and control selection. Gain insights into the latest updates and revisions, ensuring you stay up-to-date with the best practices and industry standards.
  |  By CalCom
To safeguard the SQL layer against common SQL-based attacks, including Denial of Service, Brute Force, and SQL injections, and to prevent privilege escalations, hardening the SQL server is of utmost importance. Achieving compliance and satisfying auditors also necessitates SQL hardening. By implementing SQL hardening measures at both the application and operating system levels, the organization can significantly reduce its attack surface and eliminate critical vulnerabilities.
  |  By CalCom
When installing a new Linux server, you should be aware that its level of security is very low by default, to allow as much functionality as possible. Therefore, performing basic hardening actions before the server is installed in production is crucial. CalCom Software is hardening RedHat / Linux.
  |  By CalCom
The LAN Manager (LM) is a group of early Microsoft client/server software products that enable users to connect personal computers on a single network. Its features include transparent file and printer sharing, user security features, and network administration tools. In Active Directory domains, the default authentication protocol is the Kerberos protocol. However, if Kerberos is not available for any reason, LM, NTLM, or NTLMv2 can be used as an alternative.
  |  By CalCom
  |  By CalCom
Access this computer from the network - best practices for DC and Member Server
  |  By CalCom
This policy setting determines whether the LDAP server requires LDAP clients to negotiate data signing. Using the default configuration of this value allows LDAP clients to communicate with Active Directory in an insecure fashion.
  |  By CalCom
Server hardening is a bigger challenge today than ever before. When infrastructure becomes more and more complex, it is impossible to achieve compliance using manual tools to harden servers. CalCom offers an automated solution for server hardening for easy policy enforcement and maximum compliance.
  |  By CalCom
Auditing Kerberos service ticket operations is important for detecting hackers trying to use Kerberos as an attack vector. The default value of this configuration is to audit only successful events. This may eventually result in missing an attack or not having enough information to investigate it.

CalCom Hardening Solution (CHS) is the ideal choice for IT Ops & CISOs looking to create a secured configured infrastructure.

CHS is a flexible hardening tool, with the unique ability to ‘learn’ where desired hardening changes will adversely impact production activity. CHS determines the impact of baseline changes before they implemented, producing visible conclusions for decision-makers. CHS eliminates time-consuming lab testing, reduces the cost and impact of hardening, and centering infrastructure control, thereby stopping security breaches and operational mistakes.

How Can CalCom Hardening Suite Make a Huge Difference In Server Hardening:

  • Cost effective server hardening process: Save time and resources required for testing security policies in lab environments.
  • Zero server outages: Ensure that production services are not harmed during server hardening.
  • Prevent & monitor unauthorized policy changes: Stop security breaches and operational mistakes before they happen.

Make Your Hardening Project Effortless.