Active Directory: Setting up an authentication silo

In this tutorial, I will explain how to set up an authentication silo with Active Directory, but before going into detail, I will explain in a few words what an authentication silo is used for. In fact it is quite simple, it allows to control on which computers a user can connect, the authentication silos …

Read more



Active Directory: Change Object Owner in Bulk

Below you will find scripts that will allow you to mass change the owner of different Active Directory objects such as: In a “normal” situation, the owner of Active Directory objects is: When an object is created by a user who is not a member of one of the above groups through delegation or use …

Read more



Configure a reverse proxy with Apache on Ubuntu

Introducing the Reverse Proxy In this tutorial, I will explain how to configure a reverse proxy with Apache on Ubuntu (By adapting the Apache installation commands, this tutorial can easily be transposed to other distributions). Before getting into the technical part, let’s take a look at what a Reverse proxy is? A reverse proxy is …

Read more



Nginx: remove the Server header

In this tutorial, I will explain to you how to delete the header server on Nginx but not only… As you can see in the screenshot below, in the response, we can see the server: Microsoft-IIS/8.5 and the version of PHP and ASP with the X-Powered-By headers. To remove the server header, we will use …

Read more



ARR: Block PowerShell access to Exchange

In this tutorial, I will show you how to block PowerShell remote access to Exchange with ARR. As a security measure, if you use IIS ARR to publish Exchange servers to the Internet, you must block PowerShell remote access. By default, it is possible to remotely administer an Exchange server with PowerShell, we find all …

Read more



Proxmox: use the integrated Firewall to secure virtual machines

In this tutorial, we will see how to use the Firewall functionality integrated into Proxmox to secure virtual machines and manage network flows. Presentation of the firewall in Proxmox Proxmox allows you to manage a Firewall at the Hypervisor level which allows you to manage network flows at the levels: This configuration can be done …

Read more



Exchange 2016: Enable Extended Protection

In this tutorial, I will explain to you how to activate extended protection (Exchange Extended Protection) on Exchange 2016 (and 2019 if you do not have CU14 which automatically activates it) which will allow you to protect yourself from CVE-2024 -21410. Exchange Extended Protection is in fact an enhanced security configuration for Exchange 2016 / …

Read more



Nginx – GeoIP: configuration

In this new tutorial dedicated to Nginx, I will explain to you how to configure GeoIP in order to be able to set filters (restrictions) based on the country of your visitors. GeoIP will allow us to determine the country (see city) of a visitor based on their IP address, for this we will rely …

Read more



PowerShell: sign scripts

In this tutorial, I will explain how to sign your scripts. Before going into the subject, we will see why signing the scripts, the main reason is security. If your environment (computers + servers) is configured to run only signed scripts and a PowerShell script is launched in a malicious file, it will be neutralized …

Read more



Ubuntu: enable the firewall and manage it with UFW

In this tutorial, I will explain how to activate the firewall on a computer with Ubuntu and manage it with UFW. UFW for Uncomplicated Firewall is a simplified Netfilter command line utility, it is a simple alternative to iptables, which allows to manage firewall rules. If UFW is not installed, use the following command to …

Read more