Home

Attack Simulator for Office 365 Threat Intelligence – Spear Phishing attack

Pirate,

in the first part we had a look into attack simulator and the included scenarios. We discussed which scenario does what in detail and what you need to set up as a preparation. In this blog post we will check out the spear phishing attack that is meant to harvest credentials. Spear phishing is a very common e-mail spoofing attack scenario that targets a specific individual or organization with the goal to get access to sensitive information. Furthermore I have seen this attack method with the intend to install malware on a targeted user’s computer.

 

Continue reading

Windows 10 AppLocker Policies still affect after disabling the service

Pirate,

from time to time I consult customers in the configuration of Windows 10 AppLocker. I really love AppLocker because it’s super simple, reliable and enterprise ready in terms of administrative overhead. Furthermore it’s the recommended tool for the configuration of unwanted / not needed apps within Windows 10. But sometimes AppLocker kind of “breaks” my Windows 10 start menu and stops Apps from strarting up. Although the AppLocker enforcement is disabled.

 

Continue reading

The People’s History of ConfigMgr – Happy 25th Birthday ConfigMgr

Pirate,

I’m super happy to be part of the “The People’s History of ConfigMgr”. It’s  the second half of the “ConfigMgr @ 25” documentary series, and this story is told solely by the ConfigMgr community. For the first time on camera and on the record, a wide variety of ConfigMgr fellows talk openly as they reflect on their good (and terrible) experiences, how it changed the way they work, and what ConfigMgr has meant to their careers — and the industry.

 

 

Continue reading

Microsoft Ignite 2017 – Recap

Pirate,

I finally found the time to wrap up Microsoft Ignite 2017 in Orlando / Florida. I had the great honor to have three different stage experiences. But for sure the breakout session in a fully packed room was the absolute highlight.

Continue reading

Windows 10 – Configure Windows Defender Application Guard for Microsoft Edge

Pirate,

The current Windows 10 Insider Build 16257 includes upcoming features of Redstone 3 and Windows 10 1709. Also included are all the features of the Windows Defender Application Guard (WDAG). The feature will work like a sandbox. The feature is intended to prevent malicious content and downloaded files from harming the system.  After surfing, the isolated tab closes and clears all malicious code together with the temporary container. Admins can already create Whitelists from harmless pages that start in conventional Edge windows. Pages not listed then open in an application guard container within Edge.

 

Continue reading

Windows10 – Configure Windows Settings Menu

Pirate,

With the Windows 10 Creators Update (1703) we have received a possibility to configure the “Windows Settings”. The Windows settings are the new, unified system control menu that was introduced with Windows 10. This menu is particularly critical because many of the Enterprise’s unsuitable features can be configured through this menu. This created the need to remove or hide specific settings.

 

Continue reading

© 2017 IT-Pirate