Exchange 2016: Enable Extended Protection

In this tutorial, I will explain to you how to activate extended protection (Exchange Extended Protection) on Exchange 2016 (and 2019 if you do not have CU14 which automatically activates it) which will allow you to protect yourself from CVE-2024 -21410. Exchange Extended Protection is in fact an enhanced security configuration for Exchange 2016 / …

Read more



Nginx – GeoIP: configuration

In this new tutorial dedicated to Nginx, I will explain to you how to configure GeoIP in order to be able to set filters (restrictions) based on the country of your visitors. GeoIP will allow us to determine the country (see city) of a visitor based on their IP address, for this we will rely …

Read more



PowerShell: sign scripts

In this tutorial, I will explain how to sign your scripts. Before going into the subject, we will see why signing the scripts, the main reason is security. If your environment (computers + servers) is configured to run only signed scripts and a PowerShell script is launched in a malicious file, it will be neutralized …

Read more



Ubuntu: enable the firewall and manage it with UFW

In this tutorial, I will explain how to activate the firewall on a computer with Ubuntu and manage it with UFW. UFW for Uncomplicated Firewall is a simplified Netfilter command line utility, it is a simple alternative to iptables, which allows to manage firewall rules. If UFW is not installed, use the following command to …

Read more



Windows Server: disable a cipher suite

In this tutorial, I will walk you through how to disable a cipher suite also call cipher. If you arrive on this tutorial by a search engine, there is a good chance that it is due to a vulnerability test and that you have an alert that goes up because vulnerable cryptographic suites (cipher) are …

Read more



Crowdsec: protecting Windows servers

In a previous tutorial, I explained how to protect your Linux servers with Crowdsec in order to block “malicious” traffic. For almost 2 months now, the Crowdsec version has been available for Windows. If you are not yet familiar with Crowdsec, here is a brief presentation: Crowdsec will analyze different log files (Web, firewall, SSH, …

Read more



Active Directory: change the KrbTgt account password

In this tutorial, I will explain how to change the password of the KrbTgt account. Before explaining how to change the password of this account, I will give you some explanations. Who is krbtgt? The krbtgt account is a disabled service account in the Active Directory, which is used for the distribution of Kerberos Tickets, …

Read more



Active Directory: Secure Domain Join to Domain Admins

In this tutorial, we will address a security point on an Active Directory environment, which is the domain joining of computers. What you need to know (some administrators don’t know this), all domain users can join a computer to a domain, they can even join up to 10 computers. Domain administrators have no limit as …

Read more



GPO: block programs and prevent software installation – software restriction

In this tutorial, I will explain how by Group Policy (GPO) in an Active Directory environment, block the launch of programs and prevent the installation of certain software with the software restriction policy. By default, if the users are not administrator (local) of the computer, it is not normally possible to install programs, on the …

Read more



Active Directory: harden the security of your environment

In this tutorial dedicated to Active Directory and security, I will give you some tips to harden the level of security in order to be less vulnerable to attacks. The different configuration points, which will be discussed, simply allow attacks to be made more difficult and longer internally, in no way will they guarantee that …

Read more