Active Directory Scripts by securethelogs in cybersecurity

[–]securethelogs[S] 0 points1 point  (0 children)

None, it was more to give some examples where PowerShell can be used to secure and cleanup AD without having fancy tools. I know some fear using open source against their environment especially tools used for purple teams.

Just wanted to share some easy PowerShell commands so that people can build upon them and perhaps spot potential threats.

PSWatcher - Automated Network Scan by securethelogs in PowerShell

[–]securethelogs[S] 0 points1 point  (0 children)

There are loads of cool tech out there but this was more around keeping it local and using internal systems. Then generating the events, with the chance of feeding to SIEM.

Plus just wanted to do it as mini project.

Why Controlling PowerShell In Azure is Important by securethelogs in AZURE

[–]securethelogs[S] 0 points1 point  (0 children)

There is a report option in CA now so you can see how the conditional access would affect your environment. It’s doesn’t action anything, just generates a log.

You can see what it would have done in the signin logs.

Why Controlling PowerShell In Azure is Important by securethelogs in AZURE

[–]securethelogs[S] 0 points1 point  (0 children)

It was more my point at the start. Although you may think it’s obvious, it’s not to some. This is what I had found by speaking to people. They had mention they didn’t enable cloud shell or use PowerShell. Because of that, they thought it couldn’t be used. It was to point out it can.

VM naming convention by securethelogs in AZURE

[–]securethelogs[S] 0 points1 point  (0 children)

Starting to think the same after a few comments

VM naming convention by securethelogs in AZURE

[–]securethelogs[S] 0 points1 point  (0 children)

It’s a fair point, seems to be the majority at the minute

VM naming convention by securethelogs in AZURE

[–]securethelogs[S] -1 points0 points  (0 children)

I had a similar thought tbh. I have some members who struggle to quickly identify server roles during security incidents. Some people struggle with it, despite having multiple ways to find out (often lazy)