Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Windows

Functions in PowerShell Scripts

A PowerShell function is a block of code designed to perform a specific task. Once a function is created and tested, it can be used in multiple scripts, reducing coding effort and risk of errors. Using well-named functions also makes scripts easier to read and maintain. And since functions can return values that can be used as input to other functions or code blocks, they facilitate building complex operations.

CIS Benchmarks Checklist: Is Your Windows Server 2025 Secure? A Guide for Immediate Protection

Windows Server 2025, the latest iteration of Microsoft's flagship server operating system, introducing new features, enhanced performance, and improved security capabilities. However, with these updates come new potential vulnerabilities, bringing with it the need for robust security configurations to protect against evolving threats. This is where benchmarks and hardening practices come into play.

Key Features of Windows Server 2022 for Optimized IT Performance

Windows Server 2022, Microsoft's latest server operating system, offers numerous improvements and innovations. This OS is designed to help organizations optimize their IT infrastructure, enhance security, improve performance, and increase efficiency in hybrid environments. Let's examine the key features of Windows Server 2022 in detail.

Acronis: The leader in EDR detection on Windows

In September 2024, SE Labs tested Acronis Extended Detection and Response (XDR) against targeted attacks based on APT29 and Scattered Spider. The test was done in parallel with SE Labs’ Q3 2024 comparative EDR test. Both tests were done using the same methodology and targeted attacks from APT29 and Scattered Spider, but the comparative test added DPRK (Democratic People’s Republic of Korea) ransomware to the evaluation.

PowerShell vs CMD: The Ultimate Guide for Windows Professionals

Windows PowerShell and command prompt (CMD) are both essential command-line interface tools for Windows administrators, allowing them to execute commands, manage system processes and automate administrative tasks. While CMD has been a foundational component of Windows since the MS-DOS era, PowerShell has emerged as a more advanced and powerful scripting language, enhancing system management and automation capabilities.

Windows Zero-Day Threat: Protect Your NTLM Credentials

A newly discovered zero-day vulnerability in Windows potentially exposes users across multiple Windows versions to credential theft. Discovered by 0patch researchers, this critical security flaw allows attackers to steal NTLM credentials through a deceptively simple method. The vulnerability affects a wide range of Windows systems, including: Technical details of the vulnerability are withheld to minimize exploitation risk until Microsoft issues a fix to minimize any further risk of exploitation.

How to Install BDRSuite Offsite DR Server on Windows

Welcome to the BDRSuite How-To Series! In this video, we'll guide you through the process of installing the BDRSuite Offsite DR Server on a Windows machine. Whether you're setting up for the first time or reinstalling, this tutorial covers everything you need to get BDRSuite Offsite DR Server up and running smoothly on your Windows system.

Disable Secure Boot in Windows: A Step-by-Step Guide

Usually, the secure boot option is turned on by default with your Windows server PC, but there are some cases when it is already disabled. To confirm and to disable secure boot you need to open device settings from Windows Security Center and see that if the option exists. If you see this Secure Boot option there, it means that secure boot is enabled on your device otherwise disabled. Now we will talk about a step by step guide on how to disable secure boot: 2.

Delete Registry Keys Using PowerShell

In Windows system administration, one of the more advanced yet important tasks that can be accomplished using PowerShell is deleting registry keys and values. This operation requires careful handling to avoid unintended consequences. Registry keys and values in Windows are critical components that store configuration settings for the operating system and installed applications. Modifying the registry can lead to system instability or even failure if not done correctly.