
Category: Security | Vulnerability Scans and Assessment


PetitPotam attack on Active Directory Certificate Services: How to mitigate NTLM Relay PetitPotam attack on AD CS

Mitigate SAM Database vulnerability: Workaround for “SeriousSAM or HiveNightmare” registry vulnerability for Windows 10 and 11

PrintNightmare security update for Windows Server and Windows 10

Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability

How to secure the Windows 10 boot process

How to mitigate Print Spooler Vulnerability “PrintNightmare”: Disable Print Spooler Service or disable inbound remote printing through Group Policy

802.1x and EAP Authentication Types

What is Pass the Hash Attack and how to mitigate the attack

Self-hosted translator: How to install and uninstall SYSTRAN 6 translator on Windows

Enable BitLocker without Compatible TPM

Enable or disable BitLocker Drive Encryption on Windows

Full Disk Encryption with PBA or without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption and Container Encryption

What are the differences between Role-based, Rule-based, Discretionary, Mandatory and Attribute-based Access Control

How to uninstall the DriveLock Agent from your device

DriveLock Error: The push installation of the agent failed for the computer – Error message (67) The network cannot be found

DriveLock Error: The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool




The following server could not be reached or validated: The DriveLock server returned an invalid or unrecognized response


How to perform DriveLock quick setup




How to install a standalone DriveLock Encryption software on Windows




How to install Standalone Installation DriveLock Encryption software


How to download and install DriveLock on Windows



Concept of DriveLock with a focus on Encryption


NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers


Rolling out Multi-factor Authentication – Recommendations


How to perform vulnerability scan on Microsoft SQL Server

