Security, et al

Randy's Blog on Infosec and Other Stuff

2019

02-13-2019   How to Detect Pass-the-Hash Attacks Blog Series

2018

09-12-2018   Come meet Randy in Orlando at Microsoft Ignite at Quest's Booth #1818

08-09-2018   Detecting Pass-the-Hash with Honeypots

06-25-2018   Catch Malware Hiding in WMI with Sysmon
06-12-2018   For of all sad words of tongue or pen, the saddest are these: 'We weren’t logging’

03-16-2018   Experimenting with Windows Security: Controls for Enforcing Policies

2017

12-18-2017   Sysmon Event IDs 1, 6, 7 Report All the Binary Code Executing on Your Network
12-18-2017   Yet Another Ransomware Can That Can be Immediately Detected with Process Tracking on Workstations

11-07-2017   Cracking AD Passwords with NTDSXtract, Dsusers.py and John the Ripper
11-07-2017   Cracking local windows passwords with Mimikatz, LSA dump and Hashcat

10-27-2017   Extracting Password Hashes from the Ntds.dit File
10-18-2017   Complete Domain Compromise with Golden Tickets
10-03-2017   Persistence Using AdminSDHolder And SDProp

09-20-2017   How Attackers Are Stealing Your Credentials With Mimikatz
09-07-2017   Extracting Service Account Passwords with Kerberoasting

07-26-2017   Today's webinar includes first-hand account of a company brought to its knees by NotPetya

06-21-2017   Two new "How-To" Videos on Event Monitoring
06-14-2017   Download Supercharger Free Edition for Easy Management of Windows Event Collection
06-02-2017   How to Monitor Active Directory Changes for Free: Using Splunk Free, Supercharger Free and My New Splunk App for LOGbinder

05-29-2017   Ransomware Is Only Getting Started
05-19-2017   Just released: Randy Franklin Smith whitepaper

03-07-2017   Work Smarter – Not Harder: Internal Honeynets Allow You to Detect Bad Guys Instead of Just Chasing False Positives

01-02-2017   Tracking removable storage with the Windows Security Log

2016

12-27-2016   Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
12-20-2016   Tracking Physical Presence with the Windows Security Log
12-02-2016   How to Audit Privileged Operations and Mailbox Access in Office 365 Exchange Online

11-11-2016   How to control and detect users logging onto unauthorized computers

10-12-2016   Severing the Horizontal Kill Chain: The Role of Micro-Segmentation in Your Virtualization Infrastructure

09-19-2016   5 Indicators of Endpoint Evil
09-05-2016   Detecting Ransomware: The Same as Detecting Any Kind of Malware?

08-30-2016   Cloud Security Starts at Home
08-18-2016   The Leftovers: A Data Recovery Study

06-06-2016   Keeping An Eye on Your Unix & Linux Privileged Accounts

05-23-2016   Secure, Fast and Efficient Password Management

04-25-2016   Get rid of QuickTime as Quickly and Efficiently – For FREE!
04-11-2016   Certificates and Digitally Signed Applications: A Double Edged Sword

2015

12-21-2015   Catching Hackers Living of the Land Requires More than Just Logs
12-16-2015   How to Detect Low Level Permission Changes in Active Directory

10-15-2015   Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond

09-29-2015   Strengthen your defenses where the battle is actually being fought – the endpoint
09-21-2015   Making SIEM better by focusing on the top 3 blind spots

08-04-2015   Are You Listening to Your Endpoints?

07-28-2015   Help me! Community Survey 2015

06-03-2015   Enriching Event Log Monitoring by Correlating Non Event Security Information

05-06-2015   Don’t Create a Different sudoers File for Each System
05-06-2015   Mirazon – Great Folks for Unraveling Microsoft Licensing

04-23-2015   Live with SecureAuth at RSA 2015
04-23-2015   Live at RSA: Visualize Your Network and Access Paths Correlated with Relevant Vulnerabilities
04-23-2015   Finally, a new and different way to mitigate the risk of compromised user endpoints
04-23-2015   Live with Dell at RSA 2015
04-23-2015   Live at RSA: Stopping Key Logging and Screen Scraping
04-23-2015   Live at RSA: FIDO authentication protocols and checking in real-time for user presence
04-23-2015   Live with Duo Security at RSA 2015
04-22-2015   Best Practices Primer for Managed File Transfer
04-21-2015   Live with LogRhythm at RSA

03-31-2015   At the End of Day You Can’t Control What Privileged Users Do: It about Detective/Deterrent Controls and Accountability
03-19-2015   How Randy and Company Do IT: Server and Application Monitoring
03-17-2015   Monitoring What Your Privileged Users are doing on Linux and UNIX

02-23-2015   4 Fundamentals of Good Security Log Monitoring
02-23-2015   NEW Free & Easy to Use Tool, Event Log Forwarder for Windows
02-09-2015   Mobile and Remote Endpoints – Don’t Leave Them Out of Your Monitoring
02-02-2015   How to sudo it right for security, manageability, compliance and accountability

01-29-2015   Randy's Review of a Fast, Easy and Affordable SIEM and Log Management

2014

12-17-2014   Beyond Root: Securing Privileged Access in Linux

10-15-2014   Vulnerability Scanning Done Right
10-08-2014   Seven Steps to Designating Owners of Unstructured Data
10-07-2014   Comparison: SQL Server Audit vs. SQL Trace Audit for security analysts

07-07-2014   SolarWinds Makes It Easy to Detect SharePoint Breaches with Integration to LOGbinder SP

05-05-2014   Monitoring File Permission Changes with the Windows Security Log

03-13-2014   Cool Stuff at RSA
03-03-2014   Elephants and Irony at #RSAC

02-26-2014   In search of great technology at #RSAC among all the noise #filtering

01-02-2014   Auditing File Shares with the Windows Security Log

2013

11-19-2013   Pay Attention to System Security Access Events

10-15-2013   Using Dynamic Audit Policy to Detect Unauthorized File Access
10-14-2013   New Technical Brief by Randy Franklin Smith
10-02-2013   Audit Myth Busters: SharePoint, SQL Server, Exchange

09-17-2013   Following a User’s Logon Tracks throughout the Windows Domain

08-22-2013   Come to my session at HP Protect: Setting Traps for Malicious Outsiders and APTs on Your Network

07-26-2013   Take adavantage of an upcoming MS MVP conference

06-30-2013   New White Paper: Top 5 Truths about Big Data Hype and Security Intelligence
06-18-2013   Anatomy of Reflective Memory Attacks
06-12-2013   Whitepaper: APT Confidential: 14 Lessons Learned from Real Attacks

05-13-2013   How to Use Process Tracking Events in the Windows Security Log
05-13-2013   9 Mistakes APT Victims Make

02-18-2013   My new LOGbinder EX for Exchange Released: Bridge the Gap between Exchange and Your SIEM

01-25-2013   Security Log Secrets On-Demand Interactive… Is Now Here!

2012

12-25-2012   Security Log Step-by-Step: Avoiding Audit Policy Configuration Pitfalls
12-15-2012   The Growing Threat of Friendly Fire from Vendors

11-24-2012   New Whitepaper by Randy Franklin Smith "Comparing SharePoint's 4 Audit Logs for Security and SIEM Integration"
11-16-2012   Whitepaper: Comparing Exchange Server's™ 3 Audit Logs for Security and SIEM Integration
11-06-2012   New Whitepaper: SharePoint Audit Logging with HP ArcSight and LOGbinder SP

10-21-2012   Output-ADUsersAsCSV Script to go with 10 Steps to Cleaning Up Active Directory User Accounts
10-15-2012   New Whitepaper: "Exchange Audit Logging with HP ArcSight and LOGbinder"
10-08-2012   Protecting Unstructured Data on File Servers, NetApp, EMC and SharePoint
10-02-2012   Many Questions and Few Answers Regarding Latest Adobe Hack

09-26-2012   Podcast: Inside an Anti-Malware Engine and the Lab Behind It
09-21-2012   New SIEM Synergy Partners over at LOGbinder.com

08-27-2012   Everything Matters
08-17-2012   SecuritySCAPE 2012 - Be there!
08-06-2012   Are you going to HP Protect 2012? Stay for my Audit Quadrathlon

07-16-2012   Crazy Ideas for Combatting Zombies and APTs

06-29-2012   SolarWinds Log & Event Manager Includes My Favorite Feature in a SIEM…
06-13-2012   UltimateWindowsSecurity.com 2.0: New Coverage for SQL Server and SharePoint audit logging
06-07-2012   New Security Log and Audit Functionality in Windows Server 2012
06-07-2012   Epic Fail on Intuitive User Interface

05-01-2012   LOGbinder SQL Released!
05-01-2012   Chances are Someone is Trying to Steal Your Organization’s Information

04-18-2012   Recommended Alerts and Reports for SharePoint (LOGbinder SP) Updated

03-19-2012   Always Enable Auditing - Even for Logs and Systems You Don’t Actively Review
03-12-2012   The Year I Started Being Afraid

02-16-2012   Why Workstation Security Logs Are So Important

01-17-2012   Understanding the Difference between “Account Logon” and “Logon/Logoff” Events in the Windows Security Log
01-05-2012   Non Security: CRM Dynamics Add-Ons I Can't Live Without

2011

12-21-2011   BitLocker Notes on Backing Up Recovery Keys to Active Directory (AD)
12-19-2011   Virtualization Security: What Are the Real World Risks?

11-23-2011   Automating Review and Response to Security Events
11-15-2011   Need help configuring SQL Server 2008 Audit Policy?
11-03-2011   Bridging the Gaps in Native Windows Auditing
11-01-2011   LOGbinder SQL Beta is released! Join beta testers now

10-19-2011   Security Logging as a Detective/Deterrent Control Against Rogue Admins

09-22-2011   Come On Feel the Noise

08-21-2011   The Art of Detecting Malicious Activity with Logs
08-02-2011   Back Door Bypasses AppLocker and Software Restriction Policies

07-08-2011   Eliminate Windows Firewall Chatter (Noise) from the Security Log

06-24-2011   Say What? Deleting old logs isn’t the responsibility of the SIEM?!??
06-22-2011   How to Audit an Individual Library or List in SharePoint
06-08-2011   Don't Miss the Real Point about the RSA SecurID Debacle
06-07-2011   Intelligent Whitelisting - A Fundamentally Different Approach to Combating End-point Malware

01-11-2011   Be the first to take Audit and Assessment of Active Directory – On Demand Interactive and take it no charge

2010

11-04-2010   Keeping up with the changing landscape of patch management

10-01-2010   Does Microsoft care about the Security log?

07-08-2010   New Rosetta Audit Logging Kits

06-18-2010   My New Windows Security PowerPack Solves 3 Security Headaches and It's Free

05-13-2010   I love Tilana Reserve Continuous Data Protection
05-13-2010   I like Camtasia but...

02-09-2010   Making the SharePoint Audit Log Usable

01-12-2010   Understanding Audit Logging in SQL Server 2008 - 2/18/10 12PM US Eastern Time

2009

12-28-2009   Venue Announced for Security Log Secrets - Los Angeles - January 25-27
12-03-2009   My next webinar is a comprehensive look at reducing the problems and risks associated with passwords using the latest technologies

11-03-2009   New way to delegate view access to the security log in Windows Server 2008

10-06-2009   Where did "Replace auditing entries on all child objects" check box go in Active Directory Users and Computers?

09-24-2009   New Software that Unlocks the SharePoint Audit Log
09-21-2009   Register Now: Security Log Secrets Training Seminar - Los Angeles - 1/25-27/2010
09-15-2009   LogRhythm 5.0 Opens New Frontier in Log Management with Active Directory Integration
09-11-2009   New Audit Features in Windows 7 and Windows Server 2008 R2

08-28-2009   Recommendation Withdrawn: Applicure's dotDefender

07-27-2009   10 Reasons You Absolutely Need an Active Directory Reporting Solution to Pass Audits, Improve Security and Reduce Costs

06-12-2009   Enhanced help for managing access control in Windows environments

04-28-2009   Free Log Consolidation and Search Tool That Really Works!

2006

04-27-2006   Windows and Security in the same sentence?

05-05-2006   Patch management is mostly a workstation issue right now
05-13-2006   Why I don’t like Authenticated Users
05-19-2006   SANS Log Management 2006 Summit
05-19-2006   Zero information on zero day vulnerability in Word
05-20-2006   Update on zero day Word vulnerability
05-23-2006   Microsoft publishes advisory on zero-day Word vulnerability
05-23-2006   NIST Publishes Recommendations on Computer Security Log Management
05-30-2006   Critique of NIST Guide to Computer Security Log Management (800-92)

06-13-2006   Commentary and analysis posted for todays 12 MS security bulletins
06-14-2006   You’ve got 2 weeks to patch Outlook Web Access
06-16-2006   Zero Day Vulnerability in Excel
06-20-2006   Better workaround information needed for Excel zero-day exploit

07-11-2006   Patches finally released for nasty zero-day exploits and more
07-15-2006   Take Aways from SANS Log Management Summit

11-01-2006   Custom Administrative Template for Setting the Kill Bit on ActiveX Controls

2007

01-15-2007   New doc from MS for storing BitLocker recovery information in Active Directory

03-14-2007   New tool for BitLocker help desk calls

05-17-2007   Recommended Audit Policy

2008

01-17-2008   WinSecWiki is Live!

06-04-2008   New Features in LogRhythm 4.0 Deserve a Place on Your Short List

07-29-2008   Log monitoring and the Terry Childs/City of San Francisco debacle

powered by Bloget™

Search


Categories
Recent Blogs
Archive


 

Additional Resources