How to disable SMB 1 on Windows 7 via Group Policy

In case you have not got the message yet SMB 1 protocol Bad and that according to Microsoft you should “Stop using SMB1”. Not that I should have to explain, but in case you need a refresher it is old (30 years old); it is slow (especially over high-latency links); and its was superseded over …

Continue reading ‘How to disable SMB 1 on Windows 7 via Group Policy’ »

How to disable SSL v2 and SSL v3 on Windows Server via Group Policy

In this article I will show you how to disable the SSL v2 and SSL v3 protocols on the Windows Server so that it no longer offers the depreciated (a.k.a. Broken) SSL v2 and v3 security protocols. It also does not hurt if you apply this policy settings to your Windows client computers in case any of them have …

Continue reading ‘How to disable SSL v2 and SSL v3 on Windows Server via Group Policy’ »

How to synchronise Internet Explorer Favourites with Edge

In the latest release of Windows 10 insider preview (Build 15002) there is a new policy setting added that allows you to sync the IE Favourites with Edge. This policy setting allow you as an IT administrator to not have to setup the browser favourites in multiple locations thus reducing duplication of effort. Previously you …

Continue reading ‘How to synchronise Internet Explorer Favourites with Edge’ »

Updated Group Policy Health Reporter

The post Updated Group Policy Health Reporter appeared first on SDM Software | Configuration Experts. Happy New Year Everyone! I hope everyone made it safely through the holidays. To start off 2017, we’ve been working to update some of our existing freeware tools. The first beneficiary of that work is our Group Policy Health Reporter …

Continue reading ‘Updated Group Policy Health Reporter’ »

Securing Credentials for Privileged Access

  Hello, Paul Bergson back again. I have been on the road a bit more than normal doing security training/POC deliveries (POP-SLAM *1) for our customers related to Pass-the-Hash and credential protection. I have noticed an alarming trend in how credential protection is thought to resolve a customer’s credentials from being compromised. Enterprises that are …

Continue reading ‘Securing Credentials for Privileged Access’ »