Can I have a unique MFA for different Azure Subscriptions with one Tenant? [migrated]

Currently I am looking at a configuration of a single Azure Tenant with multiple Subscriptions. Prod and non-Prod resources are separated by Subscriptions.
I am looking to understand how I could implement MFA via Microsoft Authenticator in… Continue reading Can I have a unique MFA for different Azure Subscriptions with one Tenant? [migrated]

Why organizations should control Active Directory permissions

In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting Active Directory permissions.
The post Why organizations should control Active … Continue reading Why organizations should control Active Directory permissions

How to prevent a user retaining file access with an open handle on Windows?

Suppose a user is a member of a group, and they open (in the Windows API sense) a file whose DACL grants access to that group.
Then, the user stops being a member of the group.
Since access checks are performed at the time of opening the f… Continue reading How to prevent a user retaining file access with an open handle on Windows?

36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet

A significant percentage of organizations expose insecure or highly sensitive protocols, including SMB, SSH, and Telnet, to the public internet, the ExtraHop Benchmarking Cyber Risk and Readiness report has shown. Whether intentional or accidental, the… Continue reading 36% of orgs expose insecure FTP protocol to the internet, and some still use Telnet

Granting access to a Powershell script to read Windows Security event log (which approach is better?)

I want to be aware of any audit failure without installing any special service for some tiny network.
So, I created PowerShell script with Get-EventLog and Send-MailMessage and installed it as scheduled task.
But I do not want to run it as… Continue reading Granting access to a Powershell script to read Windows Security event log (which approach is better?)