How To Install MATE GUI In Debian 9 Linux

Install MATE desktop manager in Debian 9 Stretch Linux

By default a full installation of Debian 9 Linux will have the graphical user interface (GUI) installed and it will load up after system boot, however if we have installed Debian without the GUI we can always install it later, or otherwise change it to one that is preferred.

This quick guide will cover how to install the MATE Desktop on Debian 9 Stretch, which will provide a GUI for working with the Linux system. While I don’t suggest using a GUI on a production server, it’s a good option if you’re using Debian as a desktop.

Read more »

How To Install KDE GUI In Debian 9 Linux

Install KDE desktop manager in Debian 9 Stretch Linux

By default a full installation of Debian 9 Linux will have the graphical user interface (GUI) installed and it will load up after system boot, however if we have installed Debian without the GUI we can always install it later, or otherwise change it to one that is preferred.

This quick guide will cover how to install the KDE Plasma Desktop on Debian 9 Stretch, which will provide a GUI for working with the Linux system. While I don’t suggest using a GUI on a production server, it’s a good option if you’re using Debian as a desktop.

Read more »

How To Install Cinnamon GUI In Debian 9 Linux

Install Cinnamon desktop manager in Debian 9 Stretch Linux

By default a full installation of Debian 9 Linux will have the graphical user interface (GUI) installed and it will load up after system boot, however if we have installed Debian without the GUI we can always install it later, or otherwise change it to one that is preferred.

This quick guide will cover how to install Cinnamon on Debian 9 Stretch, which will provide a GUI for working with the Linux system. While I don’t suggest using a GUI on a production server, it’s a good option if you’re using Debian as a desktop.

Read more »

Secure DNS Traffic Using DNSSEC and DNS Policies

Secure DNS Traffic Using DNSSEC and DNS Policies

In Windows Server 2016 we can secure DNS traffic using DNSSEC and DNS policies. DNSSEC allows a client to validate DNS responses, as by default DNS was not designed to be a secure protocol. DNSSEC allows a client to confirm that the information which has been returned from a DNS server has actually come from the correct and trusted DNS server without modification.

DNSSEC, which stands for Domain Name System Security Extensions, was added to help secure the existing DNS protocol. This guide will walk you through configuring DNSSEC in a Windows Server 2016 environment.

Read more »

Implement Auditing using Windows PowerShell

Implement Auditing using Windows PowerShell

We can implement auditing using Windows PowerShell with the Get-Acl and Set-Acl cmdlets. These allow us to view and modify the auditing options of a file or folder in Windows. While this can also be done through the graphical user interface, using PowerShell allows us to script such actions, as well as some extra functionality such as copying the auditing settings from one object to another.

Read more »

Enable and configure Module, Script Block, and Transcription logging in Windows PowerShell

Enable and configure Module, Script Block, and Transcription logging in Windows PowerShell

This post will show you how to enable and configure module, script block, and transcription logging in Windows PowerShell. Module logging allows you to specify the PowerShell modules that you want to log. Script block stores PowerShell commands that are run without the output, while transcription logging records the PowerShell commands that are run along with the full result of the command.

Read more »

Configure the Audit Group Membership Policy

Configure the Audit Group Membership Policy

We can configure the audit group membership policy using group policy, allowing us to record the group of a user in a login event log entry. This is used in addition to the Audit Logon policy to expand the information provided and include the group membership information of the user accessing the system.

Read more »

Configure the Audit PNP Activity Policy

Configure the Audit PNP Activity Policy

In this post we’ll show you how to configure the audit PNP activity policy in Windows Server 2016 via group policy.

PNP, or Plug and Play, is used so that the operating system automatically detects and configures an external device so that it’s ready to use. A common example is when you plugin a USB storage device and it “just works”. By auditing PNP activity, we can log events every time an external device is detected.

Read more »

Trend Micro CTF 2017 – Forensic 200 Write-up

Trend Micro CTF 2017 Forensic 200 challenge

The Trend Micro CTF 2017 was run again this year between the 24th and 25th of June 2017. This is my solution to the 200 point forensics challenge. I was only able to complete around 90% of the challenge during the actual CTF, I didn’t complete it until a week after it was over.

Read more »

Determine the differences and usage scenarios for using local audit policies and advanced auditing policies

Determine the differences and usage scenarios for using local audit policies and advanced auditing policies

We can enable auditing of various items in Windows Server 2016 by configuring both local audit policies and advanced audit policies with group policy. We will determine the differences and usage scenarios for using local audit policies and advanced auditing policies in this post.

Read more »