Blogs

BitLocker Reporting in Intune

Introduction Reporting BitLocker metrics is crucial for both compliance and security purposes in an organization’s Information Technolgy (IT) infrastructure. BitLocker, as a disk encryption feature provided by Microsoft, plays a …

Employee Hire Date in Entra ID

In today’s world, automation is the key to ensuring success as human error does exist. In this blog post, I will break down the steps to incorporate employee hire dates …

Security Must Haves

In an increasingly interconnected world, security and privacy have become paramount concerns for individuals and businesses alike. With the ever-evolving landscape of cyber threats, it’s essential to stay ahead of …

ICE

In this room we will use the following tools to compromise a poorly secured media Windows server.  Tools Used: Nmap and Metasploit TryHackMe Link: https://tryhackme.com/room/ice To start doing some active …

Attacktive Directory

In this room we will be using the following tools to compromise a Domain Controller (DC) in order to gain access to the crown jewels of the environment: Tools Used: …