Skip to content

    Security How-To

    Security How-To
    20 min read | November 15, 2022

    A Guide To Microsoft Azure Security Logging

    Read More
    Security How-To
    13 min read | November 8, 2022

    5 Best Practices For Security Log Retention

    Read More
    Security How-To
    17 min read | October 26, 2022

    Find a User with Their Security ID in Windows

    Read More
    Security How-To
    16 min read | October 18, 2022

    Active Directory Password Auditing with NtdsAudit & NThashes

    Read More
    Security How-To
    17 min read | October 18, 2022

    Event ID 4732: The Case of the Missing Username

    Read More
    Security How-To
    11 min read | October 13, 2022

    Securing Exchange Server: 8 Best Practices

    Read More
    Security How-To
    4 min read | September 2, 2022

    Proper SIEM Tuning for Better Security Outcomes

    Read More
    Security How-To
    3 min read | August 16, 2022

    How to Use Your SIEM as a Business Enabler

    Read More
    Security How-To
    6 min read | August 9, 2022

    Detecting Microsoft Legacy Authentication with Blumira

    Read More
    Security How-To
    3 min read | August 3, 2022

    Is This Thing On? Microsoft 365 Security

    Read More
    Security How-To
    4 min read | July 13, 2022

    What You Need To Know About Windows Event IDs

    Read More
    Security How-To
    15 min read | June 29, 2022

    Best Free and Open Source SIEMs

    Read More
    Security How-To
    7 min read | June 3, 2022

    Building a SOC: What Does It Actually Take?

    Read More
    Security How-To
    38 min read | May 5, 2022

    How to Build a SOC on a Budget

    Read More
    Security How-To
    7 min read | April 27, 2022

    Understand Microsoft 365 Impossible Travel Rules

    Read More