Hardening your network from locally logged on users
Posted by jpluimers on 2021/09/10
SwiftOnSecurity is a great account to follow.
One tweet was the base of my post [WayBack] On Windows, having an empty password can improve security.
Another tweet the base of this one.
- [WayBack] SwiftOnSecurity on Twitter : “Group Policy > Computer > Policies > Windows > Security > Local > Rights > Deny access from network > Add “Local account” Apply to clients.”
Doug is great!
- [WayBack] defendthehoneypot (Doug Richmond) · GitHub
- [WayBack] GitHub – defendthehoneypot/NamingConvention: Naming convention for Active Directory objects
- [WayBack] GitHub – defendthehoneypot/DomainController-GPOs: Domain Controller GPOs
- [WayBack] GitHub – defendthehoneypot/Client-GPOs: GPOs for client systems
- [WayBack] GitHub – defendthehoneypot/Server-GPOs: Member Server GPOs
Swift has some great github resources too:
- [WayBack] SwiftOnSecurity · GitHub
- [WayBack] GitHub – SwiftOnSecurity/OrgKit: Provision a brand-new company with proper defaults in Windows, Offic365, and Azure
- [WayBack] GitHub – SwiftOnSecurity/sysmon-config: Sysmon configuration file template with default high-quality event tracing
- [WayBack] GitHub – SwiftOnSecurity/SwiftFilter: Exchange Transport rules to detect and enable response to phishing
- and some secondary repositories:
- [WayBack] GitHub – SwiftOnSecurity/windows-event-forwarding: A repository for using windows event forwarding for incident detection and response
- [WayBack] GitHub – SwiftOnSecurity/OfficeDeployFramework: A batch script to demonstrate complex Microsoft Office deployments
- [WayBack] GitHub – SwiftOnSecurity/PhishingRegex: Backup of my phishing regular expression testing bench
–jeroen
Leave a Reply