Security How-To

Security How-To
15 min read
| November 22, 2022
Office 365 Audit Log Retention: Why It Matters and Best Practices
Read More
Security How-To
9 min read
| November 22, 2022
How To Detect Data Exfiltration
Read More
Security How-To
20 min read
| November 15, 2022
A Guide To Microsoft Azure Security Logging
Read More
Security How-To
13 min read
| November 8, 2022
5 Best Practices For Security Log Retention
Read More
Security How-To
17 min read
| October 26, 2022
Find a User with Their Security ID in Windows
Read More
Security How-To
16 min read
| October 18, 2022
Active Directory Password Auditing with NtdsAudit & NThashes
Read More
Security How-To
17 min read
| October 18, 2022
Event ID 4732: The Case of the Missing Username
Read More
Security How-To
11 min read
| October 13, 2022
Securing Exchange Server: 8 Best Practices
Read More
Security How-To
4 min read
| September 2, 2022
Proper SIEM Tuning for Better Security Outcomes
Read More
Security How-To
3 min read
| August 16, 2022
How to Use Your SIEM as a Business Enabler
Read More
Security How-To
6 min read
| August 9, 2022
Detecting Microsoft Legacy Authentication with Blumira
Read More
Security How-To
3 min read
| August 3, 2022
Is This Thing On? Microsoft 365 Security
Read More
Security How-To
4 min read
| July 13, 2022
What You Need To Know About Windows Event IDs
Read More
Security How-To
15 min read
| June 29, 2022
Best Free and Open Source SIEMs
Read More
Security How-To
7 min read
| June 3, 2022
Building a SOC: What Does It Actually Take?
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.