Auditing NTLM Traffic on Domain Controllers. Visibility Without Risk

NTLM still appears inside many Active Directory environments. Even when Kerberos handles normal authentication, NTLM often surfaces through legacy applications, services, or fallback behavior. Before blocking anything, visibility matters. The safest place to monitor NTLM usage is the domain controller. Read More …

Disabling NTLM v1 on Windows Workstations

NTLM stands for NT LAN Manager. Windows uses this protocol for authentication when Kerberos fails or legacy systems exist. Modern Active Directory relies on Kerberos for normal domain logon and access. NTLM remains mainly for backward compatibility. NTLM exists in Read More …

Which Group Policies Are Applied and How to Understand Precedence in Windows

Group Policies are an essential tool for managing and controlling the configuration of Windows-based computers in an organization. They allow you to define settings, restrictions, and preferences that are applied to users and computers, which helps to ensure consistency, security, Read More …

Group Policies Enable Remote Desktop

When administrating a remote site one of the biggest problems is not being able to connect to a Remote Server or Workstation because Remote Desktop Services have not been setup. To ensure that all workstations are compliant with this we Read More …

Uninstall TeamViewer Using Group Policies

When looking at GPO to uninstall software the answer is really simple. Group Policies can only uninstall software that was installed via Group Policies. Well even though this statement remains true we can still use Group Policies to run PowerShell Read More …