SlideShare a Scribd company logo
The Night is Dark and full of
Hackers: Security Tips & Tricks
from Beyond the Wall
AKA: ”Security affordable – this is how I do it!”
2
Sami Laiho
Senior Technical Fellow
adminize.com
• IT Admin since 1996
• MVP in Windows OS since 2011
• Specializes in and trains:
• Troubleshooting
• Security
• Windows Internals
• Trophies:
• Best and 3rd session at MCT Summit 2018
• Best two Sessions at IGNITE 2018! (out of 1708 session in total)
• Best Session at AppManagEvent 2017 and 2018, Utrecht
• Best External Speaker at Ignite 2017
• Best Sessions (#1 and #2) at TechTalks 2017, Helsinki
• TechDays Sweden 2016 – Best Speaker
• NIC 2016, 2017 - Best Speaker
• Ignite 2015 – Best male presenter ;) (#2 out of 1000 speakers)
• TechEd Europe and North America 2014 - Best session, Best
speaker
I got Certs
1,2 kilos of
them
• Established in 1983
• Just Me, Myself and I
• We deliver:
• Training!
• Private classes anywhere in the World!
• Around 1000€/1200$ per head for 4 days
• Security Audit for Windows environments
• Two days onsite/online
• Two days of reporting/documenting offsite
• 10000€/12000$
• AppLocker/Whitelisting implementation
• 10000€/12000$ + t&e
• Takes around 4 days
• VoD Training
• https://win-fu.com/dojo
• Best at a very cheap price!
• I deliver training through PluralSight as well but not the
same content
Adminize.com
Windows XP Deep Dive in 2001
• sami@adminize.com
• Twitter: @samilaiho
• Blog: http://blog.win-fu.com/
• Free newsletter:
http://eepurl.com/F-GOj
Contact
@samilaiho
If you are not on Twitter – get on Twitter!
9
Security is a compromise
Secure
Most Important Rules in Windows Security
• You have no security in Windows unless
• You have Full Disk Encryption
• You follow the Principle of Least Privilege
Gartner, NIST and others
• Say that the most important security feature to implement in 2018 is
Whitelisting
• #2 is Principle of Least Privilege
• #3 is Hard Disk Encryption
12
Choosing the correct hardware
13
Choosing Harware
• 64-bit
• UEFI with SecureBoot
• Virtualization support: Intel VT or
AMD-V
• SLAT: Intel EPT or AMD RVI
• TPM
• 1.2 ok for Windows 7
• 2.0 for Windows 10 is better
• DMA-ports?
• No on Windows 7
• TB3 on Windows 10 is OK
• Nice to have:
• IO-MMU
• Intel VT-d or AMD-Vi
• I would require:
• PXE boot available and ON
• Virtualization and TPM ON
• For Windows 7 SecureBoot OFF
14
Operating System
• I would go for Windows 10 Enterprise if I can choose
• SecureKernel stuff like Credential Guard, Device Guard
• Windows Defender Application Guard
• AppLocker
• Windows 7 Enteprise is fine as well
• General rule: get the hell away from Windows 8 and 8.1
15
Network Infrastructure
• Managed network devices that are easy to manage and monitor
• Meraki (Awesome if money is no object)
• Unifi (I’m in love with these because of the price)
• I prefer my devices to connect to corporate network with Direct
Access
• BUT…
16
AD-infrastructure
• Domain names
• No company name
• TLD to be .local or .ds
• Always build two DFS-roots
• One for shares used by users
• One for IT’s needs and AD’s use
• If you have insecure remote locations use RODC
• Use Redircmp and Redirusr
17
Applying Principle of Least
Privilege
18
Admin Access
• No end user get admin access to their device
• Not the Boss, not the girlfriend and not the devs
• No IT-admin interactively logs on to their box with an administrative
account
• They use Runas-solutions like UAC
19
Avecto DefendPoint
• You can
• Auto elevate
• Auto elevate with a warning
• Auto elevate with a question for reason
• Elevate with a managers approval
• Elevate with a challenge code
20
Examples
• Applications that require admin rights
• Updating things you don’t have to time manage
• IP-addresses and Networking
• Joining the domain
• Hyper-V Management
• Visual Studio
21
Extra from Avecto
• Whitelisting is better than AppLocker
• Better pinpointing at a task
• Grey list
• Better messaging
• Sandboxing for browsers
• Neat but not without some problems
• No admin + good whitelisting = very little need for this…
22
Administering local admin
accounts
23
Randomizing Passwords
• LAPS is fine
• Randomizes passwords
• AD-Domains only
• Needs online access to AD
• Doesn’t change password based on usage
• This is a good thing for some people
• I use Adminizer ;)
• Randomizes passwords
• Workgroups, Azure AD, BYOD etc.
• Totally Offline and self-sufficient
• Changes password both based on usage and based on time
24
Other stuff
• I let the local Administrator be named Administrator as it will anyway
have the same SID
• I don’t intentionally disable them either
• Guest I disable but don’t rename
25
Using AD administrative accounts
(Domain, Enterprise, Schema)
26
Enterprise and Schema Admins
• These group are and stay empty
• Only added a domain admin user when needed
• If you doubt yourself or colleagues just create a scheduled task on a
DC to clear them
• Schema Admins are only needed when changing the schema
• Enterprise Admins are needed mainly for
• DHCP authorize
• Adding or removing domains
• Site applied GPOs
27
Domain Admins
• Only used for administering DC’s or AD
• Remember to administer from an administration Work Station or Server –
NOT BY LOGGING ON TO A DC!!
• Are denied from logging on to anywhere else but Domain Controllers
– By Policy!
28
Mitigating PtH?
• Split your environment into three layers
• Never allow higher layer admins to logon to lower layers
Power
(DCs)
Data (Servers and
Apps)
Access (Endpoints)
Domain Admins
Server Admins Workstation Admins
Recommended settings for
BitLocker
30
BitLocker
• BitLocker on all machines that are outside of the server rooms
• Unless you can’t trust your admins → Include Servers
• Aim for TPM only
• Make sure your recovery keys are stored in AD
• Increase encryption to 256 with a diffuser
31
BitLocker FlowChart by me
• http://win-fu.com/files/TPM-FlowchartV3.pdf
32
Recommended settings for UAC
33
Normal UAC
• No changes to security needed but I always disable UAC Virtualization
34
High Secure UAC
• Change the prompt for UAC to ask for credentials for admins
• Kills all BadUSB and Rubber Ducky –attacks
• Also disable UAC virtualization
35
Recommended settings for
AppLocker, SRP or other
whitelisting
36
My own device
• Relies on the knowledge of the user
37
My customer devices
• Basic rules + AccessChk revealed exceptions
• Use certificates if you can (and trust the company)
• Then add required network locations with
• UNC
• IP
• FQDN
• Then add local applications outside of the default folders with Certs,
Folders (if they can be blocked from writing to by limited users)
• Problematic ones
• Self-updating, not signed and stored in users profile
38
Recommended settings for Share
permissions
39
Share settings are easy
• Always change two things
1. Block Offline use by default
2. EVERYONE – FULL CONTROL
• NTFS-ACL’s are always more granular and better
• I won’t kill you if you want to set different for user redirected folders
• EVERYONE – CHANGE
• Blocks users from sharing their files with other as they will by default get Full
Control to these
40
Recommended settings for builtin
certificates
41
EFS
• Remember to replace the default Administrator certificate from your
CA
42
Recommended settings for AV
and Firewalls
43
Things to note about Defender
• Only things that Defender can’t do
• Centralized Reporting
• Centralized Management
• Talk to the Firewall
• We can say that the engine of Defender is just fine
• 1% more found malware in tests currently means 10000 malware samples that were
not detected → Basically useless!
• I choose by
• The size of the wallet
• Burden on the OS
• Honestly:
• If you have System Center use SCEP
• Take a look at ATP!
44
Recommended settings for IPsec
45
How I use IPsec
• Require Inbound, Request Outbound
• Kerberos for users and computers
• Exclude DC’s and hard cases – You don’t need to get to 100%!
• Buy printers (etc) that can have a certificate if possible
46
Common recommendations for
Windows Security
47
Group Policies and Security
Policies
48
My Policies
• Document with the Group Policy Settings Reference
• Many policies are not needed anymore for most, like:
• Always wait for the network on startup and logon
• Disable System Restore
• I nowadays try to avoid GPUPDATE /FORCE by changing group policy
CSE’s to process even if the policy has not changed
• For troubleshooting I always change a few things as well:
49
Detailed error messages
50
Ability to read RSOP data
51
Password Policies
52
End User Training on Good Passwords
• For everyone
• Minimum length of 8 characters (but don’t advertise this)
• Complexity required
• Numbers
• at the beginning and end
OR
• in the middle
• For important users like admins it’s
• Minimum length of 15 characters
53
End User Training on Good Passwords
• Show people http://haveibeenpwned.com/ and teach to use different
passwords on every site
• Like
• Flower10SkypeGrows!
• Flower10DropbGrows!
• Massively10HardIL
• Massively10HardPO
• Massively10HardBM
54
Implement PAWs
55
https://www.cisecurity.org/controls/
• Block 97% of threats
Contact
• sami@adminize.com
• Twitter: @samilaiho
• Blog: http://blog.win-fu.com/
• Free newsletter:
http://eepurl.com/F-GOj
• Video-based training:
• http://www.pluralsight.com/
• Want free codes? Email me!
• NOW: http://win-fu.com/dojo
•Trial2018

More Related Content

What's hot

DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
Men and Mice
 
Observabilidade: Será que você está fazendo do jeito certo?
Observabilidade: Será que você está fazendo do jeito certo?Observabilidade: Será que você está fazendo do jeito certo?
Observabilidade: Será que você está fazendo do jeito certo?
Janssen Lima
 
Docker Kubernetes Istio
Docker Kubernetes IstioDocker Kubernetes Istio
Docker Kubernetes Istio
Araf Karsh Hamid
 
Observability will not fix your Broken Monitoring ,Ignite
Observability will not fix your Broken Monitoring ,IgniteObservability will not fix your Broken Monitoring ,Ignite
Observability will not fix your Broken Monitoring ,Ignite
Kris Buytaert
 
MySQL Performance Schema in Action: the Complete Tutorial
MySQL Performance Schema in Action: the Complete TutorialMySQL Performance Schema in Action: the Complete Tutorial
MySQL Performance Schema in Action: the Complete Tutorial
Sveta Smirnova
 
Výhody a benefity nasazení Oracle Database Appliance
Výhody a benefity nasazení Oracle Database ApplianceVýhody a benefity nasazení Oracle Database Appliance
Výhody a benefity nasazení Oracle Database Appliance
MarketingArrowECS_CZ
 
MySQL 5.5 Guide to InnoDB Status
MySQL 5.5 Guide to InnoDB StatusMySQL 5.5 Guide to InnoDB Status
MySQL 5.5 Guide to InnoDB Status
Karwin Software Solutions LLC
 
What’s New with Flowable?
What’s New with Flowable?What’s New with Flowable?
What’s New with Flowable?
Flowable
 
Technical Introduction to PostgreSQL and PPAS
Technical Introduction to PostgreSQL and PPASTechnical Introduction to PostgreSQL and PPAS
Technical Introduction to PostgreSQL and PPAS
Ashnikbiz
 
Using the Terraform Enterprise GUI is perfect to start working with Terraform...
Using the Terraform Enterprise GUI is perfect to start working with Terraform...Using the Terraform Enterprise GUI is perfect to start working with Terraform...
Using the Terraform Enterprise GUI is perfect to start working with Terraform...
Mitchell Pronschinske
 
Demystifying MySQL Replication Crash Safety
Demystifying MySQL Replication Crash SafetyDemystifying MySQL Replication Crash Safety
Demystifying MySQL Replication Crash Safety
Jean-François Gagné
 
DevSecOps 101
DevSecOps 101DevSecOps 101
Deploy MySQL e Performance Tuning - 3º Zabbix Meetup do Interior
Deploy MySQL e Performance Tuning - 3º Zabbix Meetup do InteriorDeploy MySQL e Performance Tuning - 3º Zabbix Meetup do Interior
Deploy MySQL e Performance Tuning - 3º Zabbix Meetup do Interior
Zabbix BR
 
Turn Any Panel PC Into an Ignition HMI
Turn Any Panel PC Into an Ignition HMITurn Any Panel PC Into an Ignition HMI
Turn Any Panel PC Into an Ignition HMI
Inductive Automation
 
DevOps & SRE at Google Scale
DevOps & SRE at Google ScaleDevOps & SRE at Google Scale
DevOps & SRE at Google Scale
Kaushik Bhattacharya
 
Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360
Carlos Sierra
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Spv Reddy
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container Security
Ksenia Peguero
 
GitOps Toolkit (Cloud Native Nordics Tech Talk)
GitOps Toolkit (Cloud Native Nordics Tech Talk)GitOps Toolkit (Cloud Native Nordics Tech Talk)
GitOps Toolkit (Cloud Native Nordics Tech Talk)
Weaveworks
 

What's hot (20)

DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
 
Observabilidade: Será que você está fazendo do jeito certo?
Observabilidade: Será que você está fazendo do jeito certo?Observabilidade: Será que você está fazendo do jeito certo?
Observabilidade: Será que você está fazendo do jeito certo?
 
Docker Kubernetes Istio
Docker Kubernetes IstioDocker Kubernetes Istio
Docker Kubernetes Istio
 
Observability will not fix your Broken Monitoring ,Ignite
Observability will not fix your Broken Monitoring ,IgniteObservability will not fix your Broken Monitoring ,Ignite
Observability will not fix your Broken Monitoring ,Ignite
 
MySQL Performance Schema in Action: the Complete Tutorial
MySQL Performance Schema in Action: the Complete TutorialMySQL Performance Schema in Action: the Complete Tutorial
MySQL Performance Schema in Action: the Complete Tutorial
 
Výhody a benefity nasazení Oracle Database Appliance
Výhody a benefity nasazení Oracle Database ApplianceVýhody a benefity nasazení Oracle Database Appliance
Výhody a benefity nasazení Oracle Database Appliance
 
MySQL 5.5 Guide to InnoDB Status
MySQL 5.5 Guide to InnoDB StatusMySQL 5.5 Guide to InnoDB Status
MySQL 5.5 Guide to InnoDB Status
 
What’s New with Flowable?
What’s New with Flowable?What’s New with Flowable?
What’s New with Flowable?
 
Technical Introduction to PostgreSQL and PPAS
Technical Introduction to PostgreSQL and PPASTechnical Introduction to PostgreSQL and PPAS
Technical Introduction to PostgreSQL and PPAS
 
Using the Terraform Enterprise GUI is perfect to start working with Terraform...
Using the Terraform Enterprise GUI is perfect to start working with Terraform...Using the Terraform Enterprise GUI is perfect to start working with Terraform...
Using the Terraform Enterprise GUI is perfect to start working with Terraform...
 
Anti Patterns
Anti PatternsAnti Patterns
Anti Patterns
 
Demystifying MySQL Replication Crash Safety
Demystifying MySQL Replication Crash SafetyDemystifying MySQL Replication Crash Safety
Demystifying MySQL Replication Crash Safety
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Deploy MySQL e Performance Tuning - 3º Zabbix Meetup do Interior
Deploy MySQL e Performance Tuning - 3º Zabbix Meetup do InteriorDeploy MySQL e Performance Tuning - 3º Zabbix Meetup do Interior
Deploy MySQL e Performance Tuning - 3º Zabbix Meetup do Interior
 
Turn Any Panel PC Into an Ignition HMI
Turn Any Panel PC Into an Ignition HMITurn Any Panel PC Into an Ignition HMI
Turn Any Panel PC Into an Ignition HMI
 
DevOps & SRE at Google Scale
DevOps & SRE at Google ScaleDevOps & SRE at Google Scale
DevOps & SRE at Google Scale
 
Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Finding Your Way in Container Security
Finding Your Way in Container SecurityFinding Your Way in Container Security
Finding Your Way in Container Security
 
GitOps Toolkit (Cloud Native Nordics Tech Talk)
GitOps Toolkit (Cloud Native Nordics Tech Talk)GitOps Toolkit (Cloud Native Nordics Tech Talk)
GitOps Toolkit (Cloud Native Nordics Tech Talk)
 

Similar to CSF18 - The Night is Dark and Full of Hackers - Sami Laiho

Dakotacon 2017
Dakotacon 2017Dakotacon 2017
Dakotacon 2017
Blue Teamer
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the networkWiliam Ferraciolli
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
Positive Hack Days
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)
Blue Teamer
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group Policy
Josh Rickard
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
Sumit Tambe
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 Edition
Beau Bullock
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise247infotech
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
Marcus Dempsey
 
Soccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM ConnectionsSoccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM Connections
panagenda
 
IBM Lotus Notes Client Management Done Right – Beginning to End
IBM Lotus Notes Client Management Done Right – Beginning to EndIBM Lotus Notes Client Management Done Right – Beginning to End
IBM Lotus Notes Client Management Done Right – Beginning to End
panagenda
 
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good ServerIBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
Serdar Basegmez
 
Domain Controller.pptx
Domain Controller.pptxDomain Controller.pptx
Domain Controller.pptx
ENTERTAINMENTHASNOEN
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013Olav Tvedt
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
Dhruv Sharma
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Ricoh India Limited
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
Rocket Software
 

Similar to CSF18 - The Night is Dark and Full of Hackers - Sami Laiho (20)

Dakotacon 2017
Dakotacon 2017Dakotacon 2017
Dakotacon 2017
 
1 - Introduction.ppt
1 - Introduction.ppt1 - Introduction.ppt
1 - Introduction.ppt
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group Policy
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 Edition
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Securing the cloud and your assets
Securing the cloud and your assetsSecuring the cloud and your assets
Securing the cloud and your assets
 
Soccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM ConnectionsSoccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM Connections
 
IBM Lotus Notes Client Management Done Right – Beginning to End
IBM Lotus Notes Client Management Done Right – Beginning to EndIBM Lotus Notes Client Management Done Right – Beginning to End
IBM Lotus Notes Client Management Done Right – Beginning to End
 
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good ServerIBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
 
Domain Controller.pptx
Domain Controller.pptxDomain Controller.pptx
Domain Controller.pptx
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 

More from NCCOMMS

O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
NCCOMMS
 
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerO365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
NCCOMMS
 
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldO365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
NCCOMMS
 
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoO365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
NCCOMMS
 
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoO365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
NCCOMMS
 
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntO365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
NCCOMMS
 
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
NCCOMMS
 
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
NCCOMMS
 
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
NCCOMMS
 
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineO365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
NCCOMMS
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi Roine
NCCOMMS
 
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsO365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
NCCOMMS
 
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsO365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
NCCOMMS
 
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
NCCOMMS
 
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfO365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
NCCOMMS
 
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
NCCOMMS
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
NCCOMMS
 
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltO365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
NCCOMMS
 
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseO365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
NCCOMMS
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
NCCOMMS
 

More from NCCOMMS (20)

O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
 
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerO365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
 
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldO365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
 
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoO365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
 
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoO365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
 
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntO365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
 
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
 
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
 
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
 
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineO365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi Roine
 
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsO365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
 
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsO365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
 
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
 
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfO365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
 
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
 
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltO365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
 
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseO365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

CSF18 - The Night is Dark and Full of Hackers - Sami Laiho

  • 1.
  • 2. The Night is Dark and full of Hackers: Security Tips & Tricks from Beyond the Wall AKA: ”Security affordable – this is how I do it!” 2
  • 3. Sami Laiho Senior Technical Fellow adminize.com • IT Admin since 1996 • MVP in Windows OS since 2011 • Specializes in and trains: • Troubleshooting • Security • Windows Internals • Trophies: • Best and 3rd session at MCT Summit 2018 • Best two Sessions at IGNITE 2018! (out of 1708 session in total) • Best Session at AppManagEvent 2017 and 2018, Utrecht • Best External Speaker at Ignite 2017 • Best Sessions (#1 and #2) at TechTalks 2017, Helsinki • TechDays Sweden 2016 – Best Speaker • NIC 2016, 2017 - Best Speaker • Ignite 2015 – Best male presenter ;) (#2 out of 1000 speakers) • TechEd Europe and North America 2014 - Best session, Best speaker
  • 6. • Established in 1983 • Just Me, Myself and I • We deliver: • Training! • Private classes anywhere in the World! • Around 1000€/1200$ per head for 4 days • Security Audit for Windows environments • Two days onsite/online • Two days of reporting/documenting offsite • 10000€/12000$ • AppLocker/Whitelisting implementation • 10000€/12000$ + t&e • Takes around 4 days • VoD Training • https://win-fu.com/dojo • Best at a very cheap price! • I deliver training through PluralSight as well but not the same content Adminize.com
  • 7. Windows XP Deep Dive in 2001
  • 8. • sami@adminize.com • Twitter: @samilaiho • Blog: http://blog.win-fu.com/ • Free newsletter: http://eepurl.com/F-GOj Contact
  • 9. @samilaiho If you are not on Twitter – get on Twitter! 9
  • 10. Security is a compromise Secure
  • 11. Most Important Rules in Windows Security • You have no security in Windows unless • You have Full Disk Encryption • You follow the Principle of Least Privilege
  • 12. Gartner, NIST and others • Say that the most important security feature to implement in 2018 is Whitelisting • #2 is Principle of Least Privilege • #3 is Hard Disk Encryption 12
  • 13. Choosing the correct hardware 13
  • 14. Choosing Harware • 64-bit • UEFI with SecureBoot • Virtualization support: Intel VT or AMD-V • SLAT: Intel EPT or AMD RVI • TPM • 1.2 ok for Windows 7 • 2.0 for Windows 10 is better • DMA-ports? • No on Windows 7 • TB3 on Windows 10 is OK • Nice to have: • IO-MMU • Intel VT-d or AMD-Vi • I would require: • PXE boot available and ON • Virtualization and TPM ON • For Windows 7 SecureBoot OFF 14
  • 15. Operating System • I would go for Windows 10 Enterprise if I can choose • SecureKernel stuff like Credential Guard, Device Guard • Windows Defender Application Guard • AppLocker • Windows 7 Enteprise is fine as well • General rule: get the hell away from Windows 8 and 8.1 15
  • 16. Network Infrastructure • Managed network devices that are easy to manage and monitor • Meraki (Awesome if money is no object) • Unifi (I’m in love with these because of the price) • I prefer my devices to connect to corporate network with Direct Access • BUT… 16
  • 17. AD-infrastructure • Domain names • No company name • TLD to be .local or .ds • Always build two DFS-roots • One for shares used by users • One for IT’s needs and AD’s use • If you have insecure remote locations use RODC • Use Redircmp and Redirusr 17
  • 18. Applying Principle of Least Privilege 18
  • 19. Admin Access • No end user get admin access to their device • Not the Boss, not the girlfriend and not the devs • No IT-admin interactively logs on to their box with an administrative account • They use Runas-solutions like UAC 19
  • 20. Avecto DefendPoint • You can • Auto elevate • Auto elevate with a warning • Auto elevate with a question for reason • Elevate with a managers approval • Elevate with a challenge code 20
  • 21. Examples • Applications that require admin rights • Updating things you don’t have to time manage • IP-addresses and Networking • Joining the domain • Hyper-V Management • Visual Studio 21
  • 22. Extra from Avecto • Whitelisting is better than AppLocker • Better pinpointing at a task • Grey list • Better messaging • Sandboxing for browsers • Neat but not without some problems • No admin + good whitelisting = very little need for this… 22
  • 24. Randomizing Passwords • LAPS is fine • Randomizes passwords • AD-Domains only • Needs online access to AD • Doesn’t change password based on usage • This is a good thing for some people • I use Adminizer ;) • Randomizes passwords • Workgroups, Azure AD, BYOD etc. • Totally Offline and self-sufficient • Changes password both based on usage and based on time 24
  • 25. Other stuff • I let the local Administrator be named Administrator as it will anyway have the same SID • I don’t intentionally disable them either • Guest I disable but don’t rename 25
  • 26. Using AD administrative accounts (Domain, Enterprise, Schema) 26
  • 27. Enterprise and Schema Admins • These group are and stay empty • Only added a domain admin user when needed • If you doubt yourself or colleagues just create a scheduled task on a DC to clear them • Schema Admins are only needed when changing the schema • Enterprise Admins are needed mainly for • DHCP authorize • Adding or removing domains • Site applied GPOs 27
  • 28. Domain Admins • Only used for administering DC’s or AD • Remember to administer from an administration Work Station or Server – NOT BY LOGGING ON TO A DC!! • Are denied from logging on to anywhere else but Domain Controllers – By Policy! 28
  • 29. Mitigating PtH? • Split your environment into three layers • Never allow higher layer admins to logon to lower layers Power (DCs) Data (Servers and Apps) Access (Endpoints) Domain Admins Server Admins Workstation Admins
  • 31. BitLocker • BitLocker on all machines that are outside of the server rooms • Unless you can’t trust your admins → Include Servers • Aim for TPM only • Make sure your recovery keys are stored in AD • Increase encryption to 256 with a diffuser 31
  • 32. BitLocker FlowChart by me • http://win-fu.com/files/TPM-FlowchartV3.pdf 32
  • 34. Normal UAC • No changes to security needed but I always disable UAC Virtualization 34
  • 35. High Secure UAC • Change the prompt for UAC to ask for credentials for admins • Kills all BadUSB and Rubber Ducky –attacks • Also disable UAC virtualization 35
  • 36. Recommended settings for AppLocker, SRP or other whitelisting 36
  • 37. My own device • Relies on the knowledge of the user 37
  • 38. My customer devices • Basic rules + AccessChk revealed exceptions • Use certificates if you can (and trust the company) • Then add required network locations with • UNC • IP • FQDN • Then add local applications outside of the default folders with Certs, Folders (if they can be blocked from writing to by limited users) • Problematic ones • Self-updating, not signed and stored in users profile 38
  • 39. Recommended settings for Share permissions 39
  • 40. Share settings are easy • Always change two things 1. Block Offline use by default 2. EVERYONE – FULL CONTROL • NTFS-ACL’s are always more granular and better • I won’t kill you if you want to set different for user redirected folders • EVERYONE – CHANGE • Blocks users from sharing their files with other as they will by default get Full Control to these 40
  • 41. Recommended settings for builtin certificates 41
  • 42. EFS • Remember to replace the default Administrator certificate from your CA 42
  • 43. Recommended settings for AV and Firewalls 43
  • 44. Things to note about Defender • Only things that Defender can’t do • Centralized Reporting • Centralized Management • Talk to the Firewall • We can say that the engine of Defender is just fine • 1% more found malware in tests currently means 10000 malware samples that were not detected → Basically useless! • I choose by • The size of the wallet • Burden on the OS • Honestly: • If you have System Center use SCEP • Take a look at ATP! 44
  • 46. How I use IPsec • Require Inbound, Request Outbound • Kerberos for users and computers • Exclude DC’s and hard cases – You don’t need to get to 100%! • Buy printers (etc) that can have a certificate if possible 46
  • 48. Group Policies and Security Policies 48
  • 49. My Policies • Document with the Group Policy Settings Reference • Many policies are not needed anymore for most, like: • Always wait for the network on startup and logon • Disable System Restore • I nowadays try to avoid GPUPDATE /FORCE by changing group policy CSE’s to process even if the policy has not changed • For troubleshooting I always change a few things as well: 49
  • 51. Ability to read RSOP data 51
  • 53. End User Training on Good Passwords • For everyone • Minimum length of 8 characters (but don’t advertise this) • Complexity required • Numbers • at the beginning and end OR • in the middle • For important users like admins it’s • Minimum length of 15 characters 53
  • 54. End User Training on Good Passwords • Show people http://haveibeenpwned.com/ and teach to use different passwords on every site • Like • Flower10SkypeGrows! • Flower10DropbGrows! • Massively10HardIL • Massively10HardPO • Massively10HardBM 54
  • 57. Contact • sami@adminize.com • Twitter: @samilaiho • Blog: http://blog.win-fu.com/ • Free newsletter: http://eepurl.com/F-GOj • Video-based training: • http://www.pluralsight.com/ • Want free codes? Email me! • NOW: http://win-fu.com/dojo •Trial2018