Popular Stories

Using File Monitoring to Limit Admin Rights
Over the past few weeks we have been posting blogs about the importance of limiting user account rights to only what is necessary for someone to do their job. Users

The Danger of Local Windows Administrator Rights
A couple weeks ago I wrote a blog post about limiting local Windows administrator rights – the importance of it and some of the things organizations can do to allow

Limiting Windows Local Administrator Rights
One of the common issues we run into during security assessments and incident response cases is the issue of users being assigned too many permissions on their local computer. For

The Digital Security Poverty Line
Like many information security practitioners, this week marks the return to the office and reflection after attending the annual RSA Conference in San Francisco. Every year there are interesting speakers,
Community PowerShell Security Audit Scripts
Back in December we posted a couple scripts that fellow auditors had pointed out to us that helped auditors dump Microsoft Windows file permissions to a CSV file for easier
Extracting Windows Passwords with PowerShell
Happy New Year! I hope everyone has had a great holiday season so far and is excited and ready for a new year full of auditing excitement! For the first
Community PowerShell File Permission Audit Scripts
Often times as we talk with auditors or students in our classes audit scripts are brought to our attention that might be useful to people performing audits of various technical
Travel & Explore the world

Using File Monitoring to Limit Admin Rights
Over the past few weeks we have been posting blogs about the importance of limiting user account rights to only what is necessary for someone to do their job. Users

The Danger of Local Windows Administrator Rights
A couple weeks ago I wrote a blog post about limiting local Windows administrator rights – the importance of it and some of the things organizations can do to allow

Limiting Windows Local Administrator Rights
One of the common issues we run into during security assessments and incident response cases is the issue of users being assigned too many permissions on their local computer. For

The Digital Security Poverty Line
Like many information security practitioners, this week marks the return to the office and reflection after attending the annual RSA Conference in San Francisco. Every year there are interesting speakers,
Glorious Fashion

Sensors for the Critical Security Controls
Most people in information security have heard of the Critical Security Controls these days. The idea of a community risk assessment project that helps all prioritize our information security efforts

Critical Security Controls Maturity Model
One of the projects that we have been thoroughly engaged on at AuditScripts.com has been to work with the Council on Cybersecurity on the Critical Security Controls project. If you

Critical Security Control Whitepapers
In some of our training we’ve mentioned to people that we’ve published a number a whitepapers on the Critical Security Controls in conjunction with the SANS Institute and various other