Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
  • veeam
    Fix Failed to connect to Veeam Backup and Replication Server Backup
  • wsus logo e1653651564255
    How to configure Windows server update services Windows Server
  • PIN9 1
    How to increase Windows PIN complexity Windows
  • ddf
    How to configure Windows Deployment Services on Windows Server Windows Server
  • command prompt powershell 670x335 1
    How to Start, Stop and Restart Windows Server Update WSUS Services via PowerShell and CMD Windows
  • images 4
    How to set up WatchGuard Log Server Network | Monitoring
  • Install FileZilla Client
    FileZilla Client on Mac: How to Transfer Files to WordPress via SFTP Mac
  • Delete Expired Profiles on Mac
    Remove Expired Configuration Profiles on Mac Mac

Category: Security | Vulnerability Scans and Assessment

Comprehensive vulnerability scans and security assessments to identify and mitigate risks, protecting your network and systems from potential threats

Setup VirtualHost with SSL on WAMP Server

Posted on 09/05/202327/11/2024 Christian By Christian 2 Comments on Setup VirtualHost with SSL on WAMP Server
Setup VirtualHost with SSL on WAMP Server

In this article, you will learn how to setup VirtualHost with SSL on WAMP Server for your application. Secure Sockets Layer (SSL) is a security protocol that creates an encrypted link between a web server and a web browser. Literally speaking, an SSL Certificate is an X.509 certificate. The X.509 is the standard that defines…

Read More “Setup VirtualHost with SSL on WAMP Server” »

Linux, Security | Vulnerability Scans and Assessment, Windows

Windows Defender detects Endpoint Security HipHandlers.dll

Posted on 07/05/202331/07/2024 Christian By Christian No Comments on Windows Defender detects Endpoint Security HipHandlers.dll
Windows Defender detects Endpoint Security HipHandlers.dll

A brief history of Trellix will be vital before proceeding. McAfee Enterprise and FireEye merged as a new company under the name Trellix. Sometime in June 2021, FireEye sold its name and products business to Symphony Technology Group (STG). STG combined FireEye with its acquisition of McAfee’s enterprise business to launch Trellix, an extended detection and…

Read More “Windows Defender detects Endpoint Security HipHandlers.dll” »

Security | Vulnerability Scans and Assessment, Windows

Configure Windows LAPS Management with Microsoft Intune

Posted on 29/04/202324/02/2025 Imoh Etuk By Imoh Etuk No Comments on Configure Windows LAPS Management with Microsoft Intune
Configure Windows LAPS Management with Microsoft Intune

In this post, I will show you how to Configure Windows LAPS Management with Microsoft Intune. Windows LAPS management with Intune is simple and straightforward. You can also modify Windows 11 Taskbar via Intune and GPO. There are a lot you can do with Intune such as managing Windows Defender Antivirus Through Microsoft Endpoint Manager…

Read More “Configure Windows LAPS Management with Microsoft Intune” »

AWS/Azure/OpenShift, Security | Vulnerability Scans and Assessment, Windows

How to scan WordPress Websites With WPScan For Security Vulnerabilities

Posted on 31/03/202328/08/2024 Temitope Odemo By Temitope Odemo No Comments on How to scan WordPress Websites With WPScan For Security Vulnerabilities
How to scan WordPress Websites With WPScan For Security Vulnerabilities

WordPress is a free Content Management System that you can easily use to quickly develop world-class websites. Over 60% of websites online were built with WordPress. In this article, you will learn how to scan WordPress Websites With WPScan For Security Vulnerabilities. Please see these interesting guides: WordPress site on Azure: How to create a…

Read More “How to scan WordPress Websites With WPScan For Security Vulnerabilities” »

Security | Vulnerability Scans and Assessment

Disable Data Execution Prevention and determine that hardware DEP is available and configured

Posted on 27/01/202316/03/2023 Matthew By Matthew No Comments on Disable Data Execution Prevention and determine that hardware DEP is available and configured
Disable Data Execution Prevention and determine that hardware DEP is available and configured

Data Execution Prevention (DEP) is a security feature that helps protect a PC from certain types of security risks such as buffer overflow attacks and memory-based attacks. By exploiting a weakness in a program or system, these hacks may let malicious code execute on a computer. DEP works by designating some sections of memory as…

Read More “Disable Data Execution Prevention and determine that hardware DEP is available and configured” »

Security | Vulnerability Scans and Assessment, Windows

Enable BitLocker AES-XTX 256 Encryption

Posted on 20/01/202307/05/2024 Matthew By Matthew No Comments on Enable BitLocker AES-XTX 256 Encryption
Enable BitLocker AES-XTX 256 Encryption

BitLocker is a full disk encryption feature included with Windows Vista and later versions of the Windows operating system. It uses AES (Advanced Encryption Standard) encryption with a key length of 128-bits or 256-bits to encrypt the entire drive. BitLocker AES-XTX 256 encryption is used to secure data stored on a computer’s hard drive. In…

Read More “Enable BitLocker AES-XTX 256 Encryption” »

Security | Vulnerability Scans and Assessment, Windows

Install and use Burp Suite for Web Application Security Testing

Posted on 04/01/202318/09/2024 Temitope Odemo By Temitope Odemo No Comments on Install and use Burp Suite for Web Application Security Testing
Install and use Burp Suite for Web Application Security Testing

Burp Suite is a security tool designed to save time spent by every organization’s Application security team in trying to secure their application by providing a fast approach to software security through automated scanning. In this article, you will learn how to install and use Burp Suite for Web Application Security Testing. Please see How…

Read More “Install and use Burp Suite for Web Application Security Testing” »

Security | Vulnerability Scans and Assessment

Enable or disable Windows Defender Credential Guard

Posted on 15/12/202226/05/2025 Christian By Christian No Comments on Enable or disable Windows Defender Credential Guard
Enable or disable Windows Defender Credential Guard

Windows Defender Credential Guard can be enabled either by using Group Policy (GPO), Windows registry, the Hypervisor-Protected Code Integrity (HVCI), or the Windows Defender Credential Guard hardware readiness tool. Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine. In this article, we shall discuss how…

Read More “Enable or disable Windows Defender Credential Guard” »

Security | Vulnerability Scans and Assessment, Windows

Protect Microsoft Defender Settings with Tamper Protection

Posted on 15/12/202201/10/2023 Christian By Christian No Comments on Protect Microsoft Defender Settings with Tamper Protection
Protect Microsoft Defender Settings with Tamper Protection

Tamper protection effectively locks Microsoft Defender Antivirus to its safe, default settings and prevents your security settings from being modified via programs and techniques such as using Registry Editor or PowerShell cmdlets to alter settings on your Windows device, modifying settings with PowerShell cmdlets, and changing or deleting security settings using Group Policy. Please see…

Read More “Protect Microsoft Defender Settings with Tamper Protection” »

Security | Vulnerability Scans and Assessment, Windows, Windows Server

How to enable Smart App Control on Windows 11

Posted on 15/12/202222/03/2023 Christian By Christian No Comments on How to enable Smart App Control on Windows 11
How to enable Smart App Control on Windows 11

Smart App Control (SAC) adds significant protection from new and emerging threats by blocking apps that are malicious or untrusted. Smart App Control also helps to block potentially unwanted apps. These are apps that may cause your device to run slowly, display unexpected ads, and offer extra software you didn’t want. Or do other things you don’t expect. SAC…

Read More “How to enable Smart App Control on Windows 11” »

Security | Vulnerability Scans and Assessment, Windows

An account with the same name exists in Active Directory: Re-using the account was blocked by a security policy

Posted on 23/11/202229/08/2025 Christian By Christian 10 Comments on An account with the same name exists in Active Directory: Re-using the account was blocked by a security policy
An account with the same name exists in Active Directory: Re-using the account was blocked by a security policy

In this article, you learn how to add an account with the same name exists in Active Directory: Re-using the account was blocked by a security policy. When attempting to add a pre-created PC to a domain or reuse an existing computer account. Please see Active Directory Ports: Service and network port requirements for Windows,…

Read More “An account with the same name exists in Active Directory: Re-using the account was blocked by a security policy” »

Security | Vulnerability Scans and Assessment, Windows, Windows Server

How to clear Cache and Manually Update Microsoft Defender

Posted on 29/10/202231/07/2024 Matthew By Matthew No Comments on How to clear Cache and Manually Update Microsoft Defender
How to clear Cache and Manually Update Microsoft Defender

In this article, I will show you how to clear Cache and Manually Update Microsoft Defender. Windows Security intelligence updates are the latest antivirus updates for Microsoft Defender’s antimalware defence. These updates improve the capacity of Microsoft Defender Antivirus and other Microsoft antimalware products to precisely identify threats by covering the most recent threats and…

Read More “How to clear Cache and Manually Update Microsoft Defender” »

Anti-Virus Solution, Security | Vulnerability Scans and Assessment, Windows

Configure and validate Exclusions for Microsoft Defender Antivirus scans

Posted on 18/10/202216/12/2023 Matthew By Matthew No Comments on Configure and validate Exclusions for Microsoft Defender Antivirus scans
Configure and validate Exclusions for Microsoft Defender Antivirus scans

Windows Defender Antivirus is the default anti-malware engine on Windows, and it protects your device and data against viruses, rootkits, ransomware, and other security threats. Please see Microsoft Endpoint Manager: How to manage Microsoft Defender Antivirus with Group Policy and Microsoft Malware Protection via the Command Line Utility, and Smart App Control and how to enable Phishing…

Read More “Configure and validate Exclusions for Microsoft Defender Antivirus scans” »

Anti-Virus Solution, Security | Vulnerability Scans and Assessment, Windows

Posts pagination

Previous 1 … 3 4 5 … 8 Next

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • veeam
    Fix Failed to connect to Veeam Backup and Replication Server Backup
  • wsus logo e1653651564255
    How to configure Windows server update services Windows Server
  • PIN9 1
    How to increase Windows PIN complexity Windows
  • ddf
    How to configure Windows Deployment Services on Windows Server Windows Server
  • command prompt powershell 670x335 1
    How to Start, Stop and Restart Windows Server Update WSUS Services via PowerShell and CMD Windows
  • images 4
    How to set up WatchGuard Log Server Network | Monitoring
  • Install FileZilla Client
    FileZilla Client on Mac: How to Transfer Files to WordPress via SFTP Mac
  • Delete Expired Profiles on Mac
    Remove Expired Configuration Profiles on Mac Mac

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive