|
You are here |
www.systanddeploy.com | ||
| | | | |
jannikreinhard.com
|
|
| | | | | There is often the need to create an AAD group based on a local registry key or another attribute to make more specific accesses, to use this group for access rights to an application or many other usecases. How you can do this with the help of endpoint analytics and azure automation I will show... | |
| | | | |
kasperjohansen.net
|
|
| | | | | Following my article Getting started with Global Secure Access - Private Access, I want to share how to deploy the Global Secure Access (GSA) client and elaborate on the various registry modifications currently available for the client. In this article I'll use the Powershell AppDeploy Toolkit a | |
| | | | |
eskonr.com
|
|
| | | | | Managing Windows endpoints with SCCM (System Center Configuration Manager) and co-management enabled can be challenging, especially when dealing with co-management issues. In this post, I'll share insights and troubleshooting steps to help you resolve issues with devices that are supposed to be co-managed by Intune but aren't appearing as expected. Background I recently worked on... | |
| | | | |
blog.ikuamike.io
|
|
| | | Summary Over the weekend I participated in Metasploit Community December CTF by Rapid7 with team fr334aks . We ended up getting position 57/413. The CTF was meant to be beginner-friendly. Intro Teams are provided with their own instance of a kali box which is public facing to act as a jump host to reach an ubuntu VM which hosts the challenges. On the ubuntu VM there are 20 open ports for each challenge. | ||