How to Audit Certificate services

Follow the below steps to Audit Certification Services: 1. On the CA server, you have to open the CA Properties and check all the options or some options according to our needs. For reference check the below image: 2. After that on the DC (Domain Controller), open Default Domain Policy object and enable the below … Read more

How to Export Windows Event Logs with PowerShell Script

The below script creates a .evt file which can be used with the Windows Event log Viewer. # Config $logFileName = “Application” # Add Name of the Logfile (System, Application, etc) $path = “C:\temp\” # Add Path, needs to end with a backsplash # do not edit $exportFileName = $logFileName + (get-date -f yyyyMMdd) + … Read more

Security Policy and Best Practices for Working Remotely

Working from Home? Here’s Our Security Tips for Remote Work. Although, we know that either large, medium or small all sizes of companies are under attack. For the moment, working remotely has become an essential for modern companies looking to enlist talent and create business continuity plans. More and more companies are asking their employees … Read more

What to do When Your Office 365 Account Compromised

If you think your office 365 account is hacked. Due to reasons like below mentioned; You’re seeing changes in email setting i.e. ‘rules’ in Outlook that you didn’t create… or say Sent Items which you didn’t send… or asking to change account details… or hearing from your contact details that you are sending them messages … Read more

Multi-Factor and 2-Factor Authentication (2FA) and why you should use it.

In this article will explain about 2FA (two-factor authentication) and MFA (multi-factor authentication) and why you should care about and use it to secure yourself. As an Admin or IT Professional or an IT user few security steps you can obviously take like; installed antivirus software, set firewall rules, implement encryption technology, and regularly run … Read more

Message Trace in Exchange Online Office 365

In Office 365, permissions are required to trace messages like; – Security Admin – Security Reader – View-Only Recipients – Compliance Admin – Data Loss Prevention By default, role group Organization Management has all of the required permissions. There are TWO Methods to track messages in Office 365 – PowerShell and EAC. Office 365 message … Read more

10 Best Practices to Avoid Email Phishing Attacks

Phishing and Password attacks is one of the oldest scam on internet and growing day by day due to lack of awareness and training which becomes problem for both individuals and organizations. Phishing emails generally have a links and in a way they represent people usually click on it. After clicking the link it redirects … Read more

Using CMD & PowerShell to Find Last Boot Time Remotely

Here is a simple and short command that will help you tell the last boot time. CMD: SystemInfo /S $Server | find /i “Boot Time” Powershell Script: $Server = Read-Host -Prompt ‘Input the server name’ SystemInfo /S $Server | find /i “Boot Time” > C:\Users\$env:username\Desktop\Last_Boot-$Server.txt The above Powershell script will pop up and prompt you … Read more