Implementation of Endpoint Security along with EDR/XDR, Server Security, Email Security Gateway with DLP & Digital Risk Management Solution

Reading Time: 2 minutesLet’s delve into the world of endpoint security and explore the various solutions available to fortify your organization’s defenses. Image Courtesy: What is EDR? EDR vs. MDR vs. EPP Security – Critical Start Consider a combination of EDR, XDR, and Read More …

Enhancing Cybersecurity: Systems Security Engineering with NIST 800-160

Reading Time: 2 minutesThe National Institute of Standards and Technology (NIST) plays a pivotal role in guiding cybersecurity practices, and one of its key publications, NIST 800-160, provides a comprehensive framework for Systems Security Engineering (SSE). In this blog post, we’ll delve into Read More …

Securing the Digital Perimeter: Navigating IAM Strategies for a Zero Trust World

Reading Time: 2 minutesIn the relentless landscape of cybersecurity threats, the traditional notion of a secure perimeter has become obsolete. Organizations are increasingly adopting a Zero Trust approach, redefining their Identity and Access Management (IAM) strategies to safeguard against evolving threats. This blog Read More …

SOC Services, Playbooks and Responsibilities

Reading Time: 3 minutesA Security Operations Center (SOC) plays a crucial role in an organization’s cybersecurity strategy by monitoring, detecting, responding to, and mitigating security incidents. The SOC provides various services, utilizes playbooks, and assigns specific responsibilities to ensure effective cybersecurity operations. Here’s Read More …

OS Feature Comparison: Windows, Linux, Mac

Reading Time: < 1 minuteThis document is prepared for official needs, and is proven to be vital where a new or growing company needs to standardize their internal laptop’s OS. We were to choose a standardized OS that needs to be put in, into Read More …

Complete Network Diagram for 500 Users Using Microsoft Solution

Reading Time: < 1 minuteBelow is the complete diagram for an organization for 500 users. This design includes the following Microsoft Services: Page-1: Complete Design Topology Page-2: Exchange Server 2013 Design Topology with DAG Page-3: Lync Server 2013 Design Topology with PSTN Page-4: Active Read More …

Microsoft System Center 2012 R2 Configuration Manager: List of Default Reports

Reading Time: < 1 minuteRecently an organization requested to perform a quick asset management (inventory) along with some reports from the SCCM 2012 R2 I’ve recently deployed. More than 2500 devices were enrolled in a period of a month. and by default: we have Read More …

Windows Search: Find Files Modified on a Specific Date

Reading Time: < 1 minuteIt’s a rather small & interesting post regarding searching files by it’s modified date. To some extent this knowledge became essential  when people are handling too many office files. So, on a specific date how do you search for modified Read More …

DNS Resource Record Types

Reading Time: < 1 minuteDNS resource records can be used to provide DNS-based data about computers on a TCP/IP network. Well I don’t know if there is a network other than TCP/IP network, other than the internal isolated lab network for engineering purposes. Anyway, Read More …

Configuring Two-Factor Authentication in Lync Server 2013

Reading Time: < 1 minuteA two factor authentication requires a domain username and then followed by a password, and afterwards a Certificate PIN or RSA PIN or similar or identical featured access types. Now in Windows Servers, implementing a Smart Card feature or a Read More …

Block E-Mail Attachments on Mobile Devices

Reading Time: < 1 minuteEver curious about blocking users attachments from their mails? In their handheld devices? Run the following command to check if the policy is set or not as a default option for all mail boxes under Exchange Server. Get-ActiveSyncMailboxPolicy And since Read More …

Prepare to Deploy Active Directory – Checklist

Reading Time: 2 minutesNumber One – Hardware: Is your hardware ready for the AD? How good are your sizing for this? Are they (PDC, BDC) going to be virtualized or not? Well in my opinion theres no need for deploying a stand alone Read More …