My colleague Dan has finally started his own blog about VMWare virtualisation products, and area he holds a lot of expertise in.
Check it out – PenguinPunk.net
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
My colleague Dan has finally started his own blog about VMWare virtualisation products, and area he holds a lot of expertise in.
Check it out – PenguinPunk.net
The new Purview eDiscovery implementation supports a Graph API. Where there's a Graph API, there are PowerShell cmdlets based on the API. This article explains how to use PowerShell to automate different aspects of eDiscovery cases. PowerShell can't review the items found by searches, but it can handle most of the other processing.
In this episode of Practical Protection, we dive into the basics of Threat Hunting, tools you can use, and even some DIY hunting advice.
In this episode, Steve Goodman and Bastiaan Verdonk interview Victor King from Quest Software, on best practices for Active Directory security. They discuss identifying misconfigurations, managing privileged access, and continuous environmental monitoring.