In 2011, Lockheed Martin introduced a concept called Cyber Kill Chain. It outlines the following 7 steps of a cyber attack: 1) Reconnaissance 2) Weaponization
In today’s industry, being in compliance doesn’t make a company secured. Being in compliance means a company met the minimum requirement or have workarounds for
We ran into an issue with Windows Update where it failed to detect new updates. Below is a Msft article which I copied and pasted
Query: select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType, SMS_R_SYSTEM.Name, SMS_R_SYSTEM.SMSUniqueIdentifier, SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.SystemOUName = “DOMAIN.LOCAL/OU1” If you have sub-OUs, and would like to exclude those sub-OUs from your
Server Side Software Update Logs: SUPsetup.log – Installation of SUP Site Role. WCM.log, WSUSCtrl.log – Configuration of WSUS Server/SUP. WSyncMgr.log – SMS/WSUS Updates Synchronization Issues.
I found this blog from the technet site. Just copied and pasted here in case the blog won’t be available for future use. Link to