PinnedDefender For Endpoint Firewall Policies: From Design to DeploymentI am warning you this blog post can be long so you can find guide for the locaiton of your search.Sep 23Sep 23
PinnedBuild a Azure Cloud Lab for Cyber Security TrainingYou may not have a server or a good computer for cyber security practice with virtual machines. Today we will create an Azure Lab for cyber…Mar 5, 2024Mar 5, 2024
PinnedSEP Create Exception PolicyAs an SEP admin sometimes you need exclude some legit applications from your environment. Server owners can demand MSSQL or Cisco Jabber…Feb 25, 2024Feb 25, 2024
PinnedWhat is going on at background when connect to any website ?That’s right. You saw right. I’m gonna explain what is going on at background when connect this Medium website. If you eager about Cyber…Mar 6, 2023Mar 6, 2023
Create Symantec Endpoint Protection Custom IPS RuleIf you use Symantec Endpoint Protection you may need custom IPS rule for prevent your endpoints from attackers. SEP client has default IPS…Oct 15, 2023Oct 15, 2023
Invisible Intruders: The Rise of Fileless MalwareFileless Malware: The Stealthy Threat That’s Hard to DetectMay 5, 2023May 5, 2023
Mr. Gamer Write Up (Cyberdefenders.org)We are solving Mr. Gamer room today. This room include linux forensic and little bit gaming. Let’s dive to Mr. Gamer room. I used autopsy…Aug 8, 2022Aug 8, 2022
Golden Ticket Attack Explaining ( From The Blue Team Perspective)If you want to be a king, you must wear a crown. If you want to be the king of a network, then you need a Golden Ticket.Jul 19, 2022A response icon2Jul 19, 2022A response icon2