Tag: Security

Converting output from a NoSql database to joined and structured CSV in Powershell

I was tasked to export data from Microsoft Graph about users to CSV in order to build reports in Qlickview. The problem I had was that the user object in Microsoft Graph are polymorphic, meaning that the output we get are not required to have the same properties for each of the user object we…



Running Linux inside Windows 10 with Visual Studio Code

Like most of the users in the world, I’m running a Managed Window 10 client, we enforce many polices such as applocker and more to enforce policies. This can sometimes be an problem when working with developer tools. Due to this problem businesses often look the other way when it comes to developers and their…



Invoking commands on remote machines – FAST

Invoking commands remotely on machines is something we must do from time to time, in many scenarios speed is a critical factor as the remote command could be in response to anything from a incident to security breach. Speed combined with large environments in the cloud with many clients/servers deallocated often makes this a difficult…



Securing Onedrive – Cleaning up unwanted sharing permissions

OneDrive for Business is great! The administration tools provided is not! If you’re still reading you might agree with me when I say that Sharepoint Online admin center is far from the best experience when administrating anything related to OneDrive. Luckily we have access to everything we might need using the OneDrive REST API, a…



Great new feature for O365 – reduce the amount of successful phishing attempts

As I wrote in my blogpost back in March, phishing is an attack concept where an attacker usually contacts a victim pretending to be from a trustworthy source to get information that they shouldn’t have gotten if they used their real identity. When an attacker targets specific individuals or groups within an organization the phishing method…



Netscaler – Customizing messages when using ”Enhanced authentication feedback” with RfWebUI Theme

Some customers want to be able to provide more feedback to users when, for some reason, their logon to Netscaler fails or if the new password they specify during password change does not meet the AD’s password complexity requirements. Citrix has published the article https://support.citrix.com/article/CTX223404 that specifies how you can customize the message strings. However,…



Powershell in the Cloud – Part 1 – Azure Automation – Managing your Infrastructure from the Cloud

I recently held a talk about Powershell in the Cloud in Powershell User Group Sweden, this 3 part series is an attempt to refine and expand on that talk. The series will focus on the functionality rather than the code behind it as I want the content to be accessible for not anyone, whether you…



Java SE license change – How does it affect me and my organization?

Under 2018 Oracle released some big and important news regarding the future of Java SE. The big news is that Java SE requires a payed subscription in order to update the software, this change came into effect on the first on January 2019. In this article I’ll try to explain this new subscription change and…



Are you able to spot phishing emails?

Phishing is an attack concept where an attacker usually contacts a victim pretending to be from a trustworthy source to get information that they shouldn’t have gotten if they used their real identity. When an attacker targets specific individuals or groups within an organization the phishing method is called spear phishing. According to Symantec ISTR…



Mapped network printers unavailable due to SMB1 being obsolete

INTRODUCTION As we all might be familiar with, printers are one of those little peculiar matters within IT. Implementing these in an IT-environment is self-explanatory oftentimes, but when they do not cooperate the issue itself can stem from one single obscure root cause, if not a string of these having to be checked upon. Recently,…