Disabling NTLM Authentication Guide is a blog series on how to navigate the complexities of moving from NTLM authentication to Kerberos—something strongly recommended by both security experts and Microsoft. Provides technical details on how to audit the use of NTLM as well as strategies for how to work with a team to get the job done. crazyadm1n explains, "I just finished leading a 15 month
Get this in your inbox each week. Welcome back to IT Pro Tuesday! On the latest episode of the Security Swarm Podcast: "Monthly Threat Report – September 2023,” we analyze data from August and discuss the latest M365 security trends, email-based threats, and noteworthy happenings in the cybersecurity space. We're also looking for your favorite tips and tools we can share with the community
Techworld with Nana features an impressive library of informative tutorials on various useful DevOps topics, with a new video added every other week. monkeyknifefight8 explains, "[it] has alot of great tutorials on important devops tools explaining what they are and how to use them."
Get this in your inbox each week. Welcome back to IT Pro Tuesday! The latest episode of the Security Swarm Podcast: "What’s Going on With Azure AD?,” we discuss the recent rebranding of Azure AD to Azure Entra. You'll also hear about some new identity features in the Microsoft Cloud and a brief overview of what Azure AD is/was and its crucial role in the Microsoft Cloud ecosystem. We're also
Create an Inactive M365 User Report with Microsoft Graph PowerShell explains how you can assess the accuracy of your M365 user list so you can identify dormant accounts that might expose your tenant to unnecessary risks. Covers how to extract a comprehensive list, including the LastSignInDateTime property and the LastNonInteractiveSignInDateTime property. Author notapplemaxwindows explains, it
Get this in your inbox each week. Welcome back to IT Pro Tuesday! The latest episode of the Security Swarm Podcast: "Generative AI in Defensive Tools,” unravels the transformative impact of AI in cybersecurity defense. Discover how AI empowers defenders with enhanced knowledge of setting up robust defense mechanisms, from firewalls to anomaly detection systems. Amidst the prevailing focus on AI’s
Stone Cold Professor is a YouTube channel that can help you learn more about some foundational programming concepts. These screencasts delve into database programming with a focus on MySQL; web programming for PHP, JS, CSS, and HTML; and discrete math/structures. Emphasis-Hungry appreciates this "Math n Data Man."
Fast-Terraform is a repository with a hands-on exploration of Terraform, focusing on IoC techniques in the context of AWS. A series of practical LABs and AWS sample projects covers concepts such as resources, variables, meta arguments, provisioners, dynamic blocks, and modules. It not only simplifies Terraform understanding but also showcases real-world AWS application scenarios. Author obsezer
Get this in your inbox each week. Welcome back to IT Pro Tuesday! On this week’s episode of the Security Swarm Podcast: "Monthly Threat Report—August 2023,” we discuss the latest insights in M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. We're also looking for your favorite tips and tools we can share with the community... those that help
Tech Pub, hosted by Professor Robert McMillen, offers concise and insightful solutions for tech enthusiasts seeking quick resolutions. This Microsoft Certified Trainer, with extensive credentials including an MBA and over 50 technical certifications, delivers efficient tutorials that effectively address complex problems in a few minutes. Emphasis-Hungry appreciates it for "system admin stuff