Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Diaries by Keyword Diaries by Keyword

Participate: Learn more about our honeypot network
https://isc.sans.edu/honeypot.html

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

GROUP POLICY

2019-01-14Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2016-06-18Rob VandenBrinkControlling JavaScript Malware Before it Runs
2013-12-23Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy

GROUP

2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2016-08-21/a>Rick WannerCisco ASA SNMP Remote Code Execution Vulnerability
2016-06-18/a>Rob VandenBrinkControlling JavaScript Malware Before it Runs
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy

POLICY

2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2017-05-17/a>Richard PorterWait What? We don?t have to change passwords every 90 days?
2016-07-23/a>Russell EubanksIt Is Our Policy
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-18/a>Rob VandenBrinkControlling JavaScript Malware Before it Runs
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-08-02/a>Russell EubanksYour Security Policy Is So Lame
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2012-02-05/a>Tony CarothersCybersecurity Legislation Components
2011-07-13/a>Guy BruneauAre Mobile Devices taking over your Corporate Network?
2011-06-22/a>Guy BruneauHow Good is your Employee Termination Policy?
2011-01-25/a>Chris MohanReviewing our preconceptions
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-01-23/a>Lorna HutchesonThe necessary evils: Policies, Processes and Procedures
2009-11-13/a>Adrien de BeaupreFlash Origin Policy Attack
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies