Author Archives: Jarrod Farncomb - Page 8

Install and Configure Security Compliance Manager (SCM)

Install and Configure Security Compliance Manager (SCM)

Microsoft’s Security Compliance Manager (SCM) is used to access and automate Windows security baselines from a central location. We’ll show you how to install and configure Security Compliance Manager 4.0 which adds support for Windows 10 and Windows Server 2016.

SCM will allow you to plan, create, manage, analyze and customize security baselines for all Windows systems within your environment quickly and efficiently.

Read more »

Implement AppLocker rules using Windows PowerShell

Implement AppLocker rules using Windows PowerShell

We can implement AppLocker rules using Windows PowerShell in addition to group policy. AppLocker PowerShell cmdlets are used to make, test and troubleshoot AppLocker policy, however the cmdlets are designed to complement the AppLocker user interface that is configured through either local or group policy.

Read more »

13 du (Disk Usage) Command Examples In Linux

DU Disk Usage Command Examples In Linux

Here we’re going to cover how to find out what is using disk space in Linux with the ‘du’ disk usage command.

This command is extremely useful for tracking down large files, allowing you to find large files and free up precious disk space.

Read more »

Implement AppLocker Rules in Windows Server 2016

Implement AppLocker Rules

We can implement AppLocker rules using group policy in a Windows domain to limit the execution of arbitrary executable files. AppLocker takes the approach of denying all executables from running unless they have specifically been whitelisted and allowed.

Read more »

Implement Control Flow Guard in Visual Studio 2015

Implement Control Flow Guard (CFG)

Control Flow Guard (CFG) is used to help protect against memory corruption vulnerabilities in .NET software. We can implement Control Flow Guard in Visual Studio 2015 to help protect against these problems in Windows.

Read more »

The Difference Between su and sudo Commands In Linux

Differences Between su and sudo Commands In Linux

“What is the difference between the su and sudo commands?” Is a question commonly asked to those new to *nix based operating systems that we’ll explain and answer here.

In order to discuss the differences, let’s first establish what each command actually does with some examples.

Read more »

Determine usage scenarios for Encrypting File System (EFS)

Determine Usage Scenarios for Encrypting File System

This post will help you determine usage scenarios for encrypting file system (EFS) in Windows Server 2016 as per the 70-744 objectives. We’ll cover how you can use EFS to encrypt files in Windows.

Read more »

Configure Windows Defender scans using Windows PowerShell

We can configure Windows Defender scans using Windows PowerShell as an alternative to configuring them through the graphical user interface. This allows us to integrate Windows Defender features into PowerShell scripts, and configure settings that are not available through the graphical user interface.

Read more »

How To Disable Specific Package Updates In RHEL/CentOS Linux

How To Disable Package Updates In Linux

We can exclude a list of packages from being installed or updating from all repositories by specifying that we want to exclude them in the yum.conf file.

This will prevent yum from updating these packages and all future updates will be ignored as we will see here.

Read more »

Configure Windows Defender using Group Policy

While Windows Defender can be configured at a high level through the graphical user interface, we can instead configure Windows Defender using group policy which gives us more control and allows us to roll out the settings to the whole domain from a central location.

Read more »