Security, et al

Randy's Blog on Infosec and Other Stuff

2014

01-02-2014   Auditing File Shares with the Windows Security Log

2013

11-19-2013   Pay Attention to System Security Access Events

10-15-2013   Using Dynamic Audit Policy to Detect Unauthorized File Access
10-14-2013   New Technical Brief by Randy Franklin Smith

09-17-2013   Following a User’s Logon Tracks throughout the Windows Domain

08-22-2013   Come to my session at HP Protect: Setting Traps for Malicious Outsiders and APTs on Your Network

06-18-2013   Anatomy of Reflective Memory Attacks
06-12-2013   Whitepaper: APT Confidential: 14 Lessons Learned from Real Attacks

05-13-2013   How to Use Process Tracking Events in the Windows Security Log
05-13-2013   9 Mistakes APT Victims Make

01-25-2013   Security Log Secrets On-Demand Interactive… Is Now Here!

2012

12-25-2012   Security Log Step-by-Step: Avoiding Audit Policy Configuration Pitfalls
12-15-2012   The Growing Threat of Friendly Fire from Vendors

11-16-2012   Whitepaper: Comparing Exchange Server's™ 3 Audit Logs for Security and SIEM Integration

10-21-2012   Output-ADUsersAsCSV Script to go with 10 Steps to Cleaning Up Active Directory User Accounts
10-15-2012   New Whitepaper: "Exchange Audit Logging with HP ArcSight and LOGbinder"
10-08-2012   Protecting Unstructured Data on File Servers, NetApp, EMC and SharePoint
10-02-2012   Many Questions and Few Answers Regarding Latest Adobe Hack

09-26-2012   Podcast: Inside an Anti-Malware Engine and the Lab Behind It

08-27-2012   Everything Matters
08-17-2012   SecuritySCAPE 2012 - Be there!
08-06-2012   Are you going to HP Protect 2012? Stay for my Audit Quadrathlon

07-16-2012   Crazy Ideas for Combatting Zombies and APTs

06-29-2012   SolarWinds Log & Event Manager Includes My Favorite Feature in a SIEM…

05-01-2012   Chances are Someone is Trying to Steal Your Organization’s Information

03-19-2012   Always Enable Auditing - Even for Logs and Systems You Don’t Actively Review
03-12-2012   The Year I Started Being Afraid

02-16-2012   Why Workstation Security Logs Are So Important

2011

12-19-2011   Virtualization Security: What Are the Real World Risks?

11-23-2011   Automating Review and Response to Security Events
11-15-2011   Need help configuring SQL Server 2008 Audit Policy?
11-03-2011   Bridging the Gaps in Native Windows Auditing

10-19-2011   Security Logging as a Detective/Deterrent Control Against Rogue Admins

09-22-2011   Come On Feel the Noise

08-21-2011   The Art of Detecting Malicious Activity with Logs
08-02-2011   Back Door Bypasses AppLocker and Software Restriction Policies

06-22-2011   How to Audit an Individual Library or List in SharePoint
06-08-2011   Don't Miss the Real Point about the RSA SecurID Debacle
06-07-2011   Intelligent Whitelisting - A Fundamentally Different Approach to Combating End-point Malware

2010

11-04-2010   Keeping up with the changing landscape of patch management

07-08-2010   New Rosetta Audit Logging Kits

06-18-2010   My New Windows Security PowerPack Solves 3 Security Headaches and It's Free

2009

10-06-2009   Where did "Replace auditing entries on all child objects" check box go in Active Directory Users and Computers?

09-24-2009   New Software that Unlocks the SharePoint Audit Log

08-28-2009   Recommendation Withdrawn: Applicure's dotDefender

07-27-2009   10 Reasons You Absolutely Need an Active Directory Reporting Solution to Pass Audits, Improve Security and Reduce Costs

2006

04-27-2006   Windows and Security in the same sentence?

powered by Bloget™