Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
This article provides a guide on using Azure to automate alerts for Azure (Entra ID) application secret expirations. It covers creating a new Azure application, assigning permissions, creating an app secret, connecting to the Microsoft Graph API, retrieving application information, handling pagination, getting application secret expiration, converting time to local time zone, dealing with multiple secrets per application, sending alerts via email and Microsoft Teams, and setting up automatic serverless automation using PowerShell runbooks and schedules.
微软免费开发隧道(内网穿透),支持Linux/Windows/macOS - 如有乐享
微软免费开发隧道(内网穿透),支持Linux/Windows/macOS - 如有乐享
本文介绍了微软免费开发隧道(内网穿透)的使用教程和命令说明。通过该工具,可以在Linux、Windows和macOS上实现内网穿透,并提供了详细的命令示例和高级用法说明。文章还介绍了使用限制和管理开发隧道的方法。
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
This blog post discusses how to build a DMZ (Demilitarized Zone) in Azure Cloud. It explains the concept of a DMZ, the architecture with two or three layers of security, and workload placement. It also provides examples of address spacing and hybrid network workloads placement. The post concludes with best practices for Azure networking, including segmenting networks, controlling traffic with NSGs, and enforcing user-defined rules.
Best practices for network security - Microsoft Azure | Microsoft Learn
Best practices for network security - Microsoft Azure | Microsoft Learn
This document provides best practices for network security in Microsoft Azure. It emphasizes the importance of adopting Zero Trust architectures, implementing conditional access policies, enabling port access only after workflow approval, and granting temporary permissions for privileged tasks. The document also recommends controlling routing behavior, using virtual network appliances, deploying perimeter networks for security zones, avoiding exposure to the internet with dedicated WAN links, optimizing uptime and performance with load balancing, disabling RDP/SSH access to virtual machines, and securing critical Azure service resources with Azure Private Link. Additional information on control routing behavior, virtual network appliances, perimeter networks, WAN links, load balancing, RDP/SSH access, and Azure Private Link is provided. The document concludes with a reference to Azure security best practices and patterns.
Greenbone Community Containers 22.4 - Greenbone Community Documentation
Greenbone Community Containers 22.4 - Greenbone Community Documentation
This document provides instructions for using Greenbone Community Containers 22.4. It includes steps for starting the vulnerability management, setting up and starting the containers, updating the containers, performing a feed synchronization, accessing the web interface remotely, gaining terminal access to a container, using gvm-tools for CLI access, setting up a mail transport agent, performing a manual feed sync, troubleshooting common issues, and more.
How To Setup A L2TP/SSTP Client Access RRaS Server In Azure ~ Bauer-Power Media
How To Setup A L2TP/SSTP Client Access RRaS Server In Azure ~ Bauer-Power Media
This post explains how to set up a L2TP/SSTP client access RRaS server in Azure. Although RRaS is not officially supported in Azure, it can still be configured by enabling IP forwarding on the VM and adding a routing table to the vnet. The post provides step-by-step instructions on installing the Remote Access role, configuring and enabling RRaS, and setting up NAT for the VPN tunnel. It also mentions the need to assign IP addresses from a static pool and configure SSL certificate and authentication. The post concludes by inviting readers to share their experiences and alternative methods in the comments.
Let's Configure Azure Site-to-Site VPN with RRAS in Azure Resource Manager! | Microsoft Learn
Let's Configure Azure Site-to-Site VPN with RRAS in Azure Resource Manager! | Microsoft Learn
This article provides a step-by-step guide on how to configure an Azure site-to-site VPN with RRAS in Azure Resource Manager. It covers configuring the RRAS server's NICs, installing the RRAS roles and features, setting up and configuring the VPN in Azure, and configuring the RRAS server. The article also includes troubleshooting tips.
4 budget-savvy strategies for building an effective purple team | CSO Online
4 budget-savvy strategies for building an effective purple team | CSO Online
Building an effective purple team doesn't require a generous budget. From a one-person operation using open-source tools to a dedicated team with specialized tools, organizations of all sizes can create a collaborative security approach. The article outlines four budget-savvy strategies for building a purple team, including the bootstrap approach with open-source tools, the cost-effective duo with one paid tool, the dedicated team with multiple tools, and the comprehensive force with an extensive toolkit. Each strategy offers different levels of capabilities and resources to enhance security posture and resilience.
TheMediocreCoder/Sync-CyberArk-Password-Azure-KeyVault-Secret: Push / Update CyberArk Passwords to Azure Key Vault
TheMediocreCoder/Sync-CyberArk-Password-Azure-KeyVault-Secret: Push / Update CyberArk Passwords to Azure Key Vault
This document provides information about the Sync-CyberArk-Password-Azure-KeyVault-Secret plugin, which allows for pushing, updating, and syncing passwords from CyberArk Vault to Azure Key Vault. It includes prerequisites, configuration steps, and instructions for adding Azure Key Vault usage. The document also explains how to add KeyVaultName and SecretName File Categories in Vault Server and create a new service account platform. Additionally, it covers the process of adding Azure Key Vault usage and testing the push/update operation.
Guidelines for secure AI system development - NCSC.GOV.UK
Guidelines for secure AI system development - NCSC.GOV.UK
These guidelines provide recommendations for secure AI system development, covering secure design, development, deployment, and operation. They emphasize the importance of security throughout the system's life cycle and align with established practices from the NCSC, NIST, and CISA. Key priorities include taking ownership of security outcomes, transparency, accountability, and making secure design a top business priority.
Incident Response Plan: Frameworks and Steps - CrowdStrike
Incident Response Plan: Frameworks and Steps - CrowdStrike
This document discusses incident response frameworks and steps, specifically focusing on the frameworks developed by NIST and SANS. It compares the two frameworks and highlights the importance of preparation in incident response. The document also emphasizes the need for defining the CSIRT, developing and updating a plan, acquiring and maintaining the proper infrastructure and tools, improving skills and supporting training, and possessing up-to-date threat intelligence capabilities. It further explains the steps of detection and analysis, containment, eradication, and recovery, as well as post-incident activities. The document concludes by mentioning CrowdStrike's incident response services and providing information about the author.
redcanaryco/invoke-atomicredteam: Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder] of Red Canary's Atomic Red Team project.
redcanaryco/invoke-atomicredteam: Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder] of Red Canary's Atomic Red Team project.
Invoke-AtomicRedTeam is a PowerShell module that allows you to execute tests defined in the atomics folder of Red Canary's Atomic Red Team project. It is important to understand the tests before executing them and ensure you have permission to test. It is recommended to set up a test machine similar to your environment and have your collection/EDR solution in place. Complete installation and usage instructions can be found in the Wiki.