Top 20 Open Source Vulnerability Scanner Tools in 2023 - Virtualization HowtoThis article discusses the importance of vulnerability scanning and the areas that need to be covered, including operating systems, network infrastructure, web applications, databases, source code, containers and microservices, and third-party and open-source libraries. It also highlights the benefits of using open-source vulnerability scanners and lists the top 20 open-source vulnerability scanners in 2023, categorized by web application scanners, network scanners, Docker and Kubernetes scanners, code scanners, and infrastructure scanners. The article concludes by emphasizing the importance of continuous scanning and monitoring and complementing vulnerability scanning with other security practices.
Using Azure Functions for Exchange Online | Practical365This post discusses using Azure Functions for Exchange Online operations, which can be triggered by different events such as queue, timer, event grid, and HTTP. It explains why Azure Functions can be a better option than Exchange Online PowerShell for certain scenarios, and provides a walkthrough of creating a function to retrieve mailbox permissions. The post also covers limitations of Azure Functions and provides information on upcoming conferences where the topic will be discussed in more detail.
Popular PowerShell Tips and Tricks in 2023This post compiles 10 popular PowerShell tips and tricks, including generating PowerShell code with ChatGPT, navigating the Windows file system, importing the Active Directory module, splitting strings, signing PowerShell scripts, encrypting sensitive information, accessing Azure AD, exporting command history, scanning networks for connected devices, and tracking group policy drift.
Enable network authentication with Azure AD only joined devices & IntuneThis post discusses the challenges of establishing network connections on Intune managed devices, particularly those joined only to Azure AD, and recommends using certificate authentication as the most secure solution. The post also outlines the technical prerequisites for achieving this, including certificate deployment, network profile configuration, and trusted root certificate deployment. The post also highlights the importance of configuring the Subject (Alternative) Name attribute correctly in the Intune profile and outlines the various validation techniques available for network components to verify authentication requests.