File Report

File Name
0365 - OUTLOOK - Not Receiving or Sending emails
10 Hands-On AWS Labs to land a high-paying job
2023 Cloud Risk Report - by CrowdStrike
6 Sentences That Will Change Your Life And Midset
About Linux File Permissions
Account_Lockout_Best_Practices
Account_Lockout_Troubleshooting_Guide
ACSC - Home User Guide - FIRST STEPS
Active - Passive and Active - Active HA
Active Directory Basics!
Active Directory Cached Credentials Overview
Active Directory replication Repadmin
Active Directory Snapshots using NTDSUTIL
Active-Directory-Hardening.Delinea-Whitepaper
Active_Directory_Auditing_Quick_Reference_Guide
Active_Directory_Group_Management_Best_Practices
Active_Directory_Security_Best_Practices
AD Health & Security Check List
Administrative Tools in Windows
Advanced Security technology Difenda's Microsoft Security Copilot Checklist!
Advanced Security technology is only as good as the information you provide it. Make sure you're prepared with Difenda's Microsoft Security Copilot Checklist!
AD_Delegation_Best_Practices
AD_Security_Solution_Datasheet
Amazing file Thick client pentesting checklist
Aruba SD-WAN
Audit_Policy_Best_Practices
Awesome Hacker Search Engines
AZ-900-cheatsheet
AZ900-Summary
Azure Firewall And Azure DNS
Backup Active Directory (Full and Incremental Backup)
Best_Practice_Guide_to_Implementing_the_Least_Privilege_Principle
Break Into CyberSecurity
CCNA Test Exam
Certificates_SSL
Changing RDP port from 3389 to
Cheat Sheet of Cheat Sheets
Cisco Catalyst SD-WAN
Cisco_Commands_Cheat_Sheet
Cloud_Security_Best_Practices
Cloud_security_policy_template
Comparitech-Powershell-cheatsheet
Computer is Slow - HelpDesk
Connect to Exchange Online with PowerShell (MFA Support)
CrowdStrike Incident Report
Data Classification Policy Template
Data_Access_Governance_Best_Practices
Data_Security_and_Protection_Policy_Template
Data_Security_Best_Practices
Deploy Azure AD Pass-through Authentication
Deploy Printers With Group Policy
Determine the Last Shutdown or Restart Date & Time in Windows1
Determine the Last Shutdown or Restart Date & Time in Windows2
DHCP and Inter VLAN
DHCP_Auditing_Quick_Reference_Guide
Differences Between Share and NTFS Permissions
DNS Incident Response
DNS_Server_Auditing_Quick_Reference_Guide
E-book_Office_365_Administrators_Guide
eBook-Windows-Server-2022-New Roadmap-fewer-editions-more-security
EMC_Storage_Auditing_Quick_Reference_Guide
Enable or Disable Administrator Account On Login Screen in Windows
Everything you need to know about the SSL-certificates and security of sites
ExchangeMaintenance Mode
Exchange_Mailbox_Auditing_Quick_Reference_Guide
Exchange_Online_Auditing_Quick_Reference_Guide
Exchange_Online_Mailbox_Auditing_Quick_Reference_Guide
Exchange_Server_Auditing_Quick_Reference_Guide
File_Analysis_Best_Practices
Find Last Logon Time
Firewall
Folder and File Management PowerShell
GDPR_Compliance_Checklist
Get started with your Microsoft Intune deployment
Get-WinEvent PowerShell cmdlet Cheat Sheet
Google Hacking Dorks
Group Managed Service Accounts (gMSA) (PowerShell Guide)
Group Policy Best Practices
Group_Policy_Auditing_Quick_Reference_Guide
Hack the Box 3 Tips for Windows Fundamentals
Hack the Box
hackeddd
Hacking101 LDAP doesn't stand for Let's Decrypt All Passwords
HackTheBox Cheat Sheet NMAP
HackTheBox
HIPAA-Risk-Assessment-Template-BP
How to check the health of your Active Directory
How to create a Group Managed Service Accounts (gMSA)
How to Deploy Software using Group Policy
How to Get Microsoft Edge ADMX Group Policy Templates
How-to-Stop-Ransomware-Spreading-via-AD
HTB HackersBootcamp
HTB Windows Network Analysis
IEEE_802.11_WLAN
IIS – Cannot Download File From Website (With Extension .xyz)
IIS10 Redirect HTTP to HTTPS with Windows
IIS_Auditing_Quick_Reference_Guide
index
Insider_Threat_Prevention_Best_Practices
Install-packageprovider no match was found for the specified search criteria nuget
Intune Enrollment Option
Intune Enrollment Options
Intune-Implementation-TMINUS
iSCSI Initiator on Windows Server 2019
iSCSI
Kerberos that encrypts passwords
Knowbe4 ADI Sync
KnowItBe4 Ransomware Hostage Rescue Manual
LDAP doesn't stand for Let's Decrypt All Passwords,
Linux Networking Commands
lock, unlock, enable and disable AD accounts with PowerShell
Login_Logoff_Auditing_Quick_Reference_Guide
Malware Analysis
Malware Lab
Malware
Managed Service Accounts (MSA) (PowerShell Guide)
MCP-MSFT-CertPoster-Digital
Meraki Dashboard
Microsoft 365
Microsoft Forensic Commands
Microsoft Intune documentation
Microsoft Intune planning guide
Microsoft Office 365 Enterprise
Microsoft-365-security-checklist
Migrating On-Prem Active Directory Computer Accounts to Azure AD
msft-intune-enrollment-options
NetApp_Storage_Auditing_Quick_Reference_Guide
Network Security Best Practices
Netwrix_Data_Access_Governance_Datasheet
Netwrix_Ransomware_Protection_Datasheet
NEW eBook report The World's Cyber Security Powerhouses
NTFS Permissions Management Best Practices
O365 Not receiving or Sending Emails
O365 Handy PowerShell commands for Admins
Oracle_Auditing_Quick_Reference_Guide
OSCP NOTES ACTIVE DIRECTORY 1
OSCP NOTES
Over thinking
Owasp Based Pentesting Checklist
OWASP TOP 10 VULNERABILITIES WITH SIMPLE WAY
PAM_Whitepaper_Protecting_Local_and_Domain_Admin_Rights
Password_Policy_Best_Practices
Penetration Testing
PrepLogic - LPIC1
Prevent_Ransomware_Infections_Best_Practices
Privileged-Access-Management-Best-Practices
Purging emails with Powershell
Python Cheat Sheet-
Python Cheat Sheet
Python Interview and learning
Records_Management_Policy_Example
Redirect HTTP to HTTPS in IIS
Remote_Access_Security_Best_Practices
Risk_Assessment_Checklist
RootCA CRL Renewal Guide
SANS PowerShell Cheat Sheet
ScriptRunner-PowerShell-Poster-2020_EN
Secure your API with these 16 Practices
Security Plus Review Questions and Answers Cheat Sheet
SharePoint-M365-Migration-Checklist
SharePoint_and_SharePoint_Online_Best_Practices
SharePoint_Server_Auditing_Quick_Reference_Guide
SOC Cheat Sheet
SQL_Server_Auditing_Quick_Reference_Guide
SQL_Server_Security_Best_Practices
SSL LetsEncrypt - Instructions
Starting the IIS-related services
Startup Programs
Steps to Troubleshooting Share in Windows-
Steps to Troubleshooting Share in Windows
Stop Winging It in Job Interviews
sysadmin_magazine_december_2021
Sysadmin_magazine_july_2021
sysadmin_magazine_september_2020
System Restore
systemd-vs-sysVinit-cheatsheet
Tech-Alert-Windows-crashes-related-to-Falcon-Sensor-2024-07-19
Test-NetConnection Port
The Best SOC Analyst Tools
These CIS 18 critical security controls
Top 50 Cybersecurity Interview Questions
Top 50 Linux Commands
Transparent Taskbar – How to Make a Task Bar Transparent in Windows 10 PC
Troubleshoot Windows 8.1, Windows 8 or Windows 7 hangs or freezes
Troubleshooting Active Directory and DNS Replication FSMO
Try Hack Me Cyber Security Training
UCD Windows Server Security Checklist
Unlock the secrets of cyber challenges lurking in the dark web in 2023!
UPN Suffix
user_behavior_analytics_best_practices
User_Termination_Best_Practices
VMware_Auditing_Quick_Reference_Guide
What is a pem file and how do you use it
What is BEAST - Browser Exploit Against SSL
WiFi Penetration Testing Guide
Windows 10 AutoPilot Deployment Process
Windows Event Log Analysis
Windows forensic Commands
Windows Security Log Quick Reference
Windows Server Security Checklist
Windows – Setting Up Split DNS
WindowsAdminCenter1910Poster
Windows_File_Server_Auditing_Quick_Reference_Guide
Windows_PowerShell_Tutorial_for_Beginners
windows_server_auditing_quick_reference_guide
Windows_Server_Hardening_Checklist
Wsus Repair Instructions and cleanup
Your Azure Migration Checklist
Zerto Virtual Replication Quick Start with vSphere
𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 𝐰𝐢𝐭𝐡 𝐊𝐚𝐥𝐢 𝐋𝐢𝐧𝐮𝐱
𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞 𝐭𝐨 𝐒𝐞𝐭𝐭𝐢𝐧𝐠 𝐔𝐩 𝐚 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐇𝐨𝐦𝐞 𝐋𝐚𝐛