Defender Control v2.1
Defender Control v2.1
Defender Control v2.1 is a portable freeware that allows users to disable Microsoft Defender in Windows 10 completely. It provides different blocking methods and can be useful for users experiencing conflicts between Defender and their antivirus application or those who want to disable Defender permanently. The program's interface displays the status of Microsoft Defender and allows users to enable or disable it with one click. It supports multiple languages and operating systems.
容器安全之镜像扫描 - 自由早晚乱余生 - 博客园
容器安全之镜像扫描 - 自由早晚乱余生 - 博客园
本文介绍了容器镜像扫描的两种工具:docker scan和Trivy。docker scan是docker官方推出的插件,需要登录dockerhub用户才能使用,免费扫描限制为10次/月。Trivy是一个全面且多功能的安全扫描仪,支持多种扫描场景和平台。文章还提到了镜像扫描的几种应用场景,并介绍了ImagePolicyWebhook容器镜像扫描的实现方式。
5 Best Open Source SIEM Tools | Mezmo
5 Best Open Source SIEM Tools | Mezmo
This post discusses the 5 best open-source SIEM tools for organizations looking to mitigate cybersecurity risks and detect threats. The featured SIEM solutions include AlienVault OSSIM, MozDef, Wazuh, Prelude OSS, and Sagan, each with its own unique features and advantages. The post emphasizes the importance of finding a SIEM that suits specific needs and offers effective threat detection capabilities.
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
This article provides a guide on using Azure to automate alerts for Azure (Entra ID) application secret expirations. It covers creating a new Azure application, assigning permissions, creating an app secret, connecting to the Microsoft Graph API, retrieving application information, handling pagination, getting application secret expiration, converting time to local time zone, dealing with multiple secrets per application, sending alerts via email and Microsoft Teams, and setting up automatic serverless automation using PowerShell runbooks and schedules.
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
This blog post discusses how to build a DMZ (Demilitarized Zone) in Azure Cloud. It explains the concept of a DMZ, the architecture with two or three layers of security, and workload placement. It also provides examples of address spacing and hybrid network workloads placement. The post concludes with best practices for Azure networking, including segmenting networks, controlling traffic with NSGs, and enforcing user-defined rules.
Best practices for network security - Microsoft Azure | Microsoft Learn
Best practices for network security - Microsoft Azure | Microsoft Learn
This document provides best practices for network security in Microsoft Azure. It emphasizes the importance of adopting Zero Trust architectures, implementing conditional access policies, enabling port access only after workflow approval, and granting temporary permissions for privileged tasks. The document also recommends controlling routing behavior, using virtual network appliances, deploying perimeter networks for security zones, avoiding exposure to the internet with dedicated WAN links, optimizing uptime and performance with load balancing, disabling RDP/SSH access to virtual machines, and securing critical Azure service resources with Azure Private Link. Additional information on control routing behavior, virtual network appliances, perimeter networks, WAN links, load balancing, RDP/SSH access, and Azure Private Link is provided. The document concludes with a reference to Azure security best practices and patterns.
Greenbone Community Containers 22.4 - Greenbone Community Documentation
Greenbone Community Containers 22.4 - Greenbone Community Documentation
This document provides instructions for using Greenbone Community Containers 22.4. It includes steps for starting the vulnerability management, setting up and starting the containers, updating the containers, performing a feed synchronization, accessing the web interface remotely, gaining terminal access to a container, using gvm-tools for CLI access, setting up a mail transport agent, performing a manual feed sync, troubleshooting common issues, and more.