I wish to use OpenDNS for filtering out certain websites like Facebook and Twitter for my child, who has their own user on Windows 10, however I do not want these DNS settings to apply to my account.
Currently, when the DNS is setup on one user, it is applied across the device. Is there a way...
How can we access shared data folders on a Windows 2012 server without joining the domain. I am using a windows 7 PC to access the shared data folders but I dont want to join the domain since I am the admin.
Dear all,
Before you can help me here you must understand fundamentally what Bitlocker is about.
Bitlocker:
-------------------------------------------------------------------
The idea with Bitlocker is that you do not enter a bitlocker password when you boot up. Your TPM does this for you. As...
accesscontrol
backup
bitlocker
cybersecurity
data loss
data protection
encryption
hard drive
login
os security
password
protect
recovery key
seamless boot
security
tech support
third-party software
tpm
user authentication
windows 10
I'm trying to deny permissions for a file for a specific user.
The system we use is that each user has a folder structure on their C drive and they are all synced using Sugarsync. If changes are made on any PC they are propagated to the other PCs.
I have the computer name of the one I want to...
Hello Windows Insiders, today we’re releasing 20H2 Build 19042.572 (KB4579311) to the Beta and Release Preview Channels for those Insiders who are on 20H2 (Windows 10 October 2020 Update). This update includes the following fixes and improvements:
We fixed an issue with a possible elevation of...
20h2
accesscontrol
beta channel
boot failures
build 19042
fixes
graphics component
group policy
insider preview
media framework
october update
privileges
release preview
security updates
system files
user interface
virtualization
windows 10
windows app platform
windows kernel
Original release date: September 1, 2020
Summary
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[Link Removed] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[Link Removed] It...
Original release date: July 23, 2020
Summary
Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor techniques and mitigations.
Over recent...
Original release date: July 16, 2020
Summary
This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) and Pre-ATT&CK frameworks. See the MITRE ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
Attributing...
I am using mac address to recogonize my network wi fi devices instead of passwords.
I tried at one time to add a wi fi booster but it did not work with mac restrictions.
Any suggestion as how to do it or which wifi booster will work
Original release date: March 13, 2020 | Last revised: April 15, 2020
Summary
As organizations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees. Remote work options—or telework—require an enterprise virtual...
Original release date: February 18, 2020 | Last revised: June 30, 2020
Summary
Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor...
accesscontrol
cisa
control systems
cybersecurity
data backup
data security
emergency planning
incident response
it networks
mitigation strategies
multipoint authentication
network segmentation
operational technology
ot networks
pipeline operations
productivity loss
ransomware
spearphishing
threat actor techniques
user training
Hello,
In an infrastructure I have two domain controllers Windows 2016 and other servers used for example for business accounting, rather than for the document storage or human resources or various services such backup, antivirus, etc.
I would to know if it is possible to create an AD user...
accesscontrol
active directory
administrative privileges
domain controllers
hr server
infrastructure
security
server management
user management
windows server
Hi!
AFAIK Hyper-V is bare virtualization without using OS like host. This is difference between VMware or VirtualBox.
I need for testing physical hardware for several purposes like hardware driver doesn't work in new update and in previous was working.
Instead installing secondary OS I want to...
accesscontrol
bare metal
configuration
device detection
direct disk
drivers
guest os
hardware
hyper-v
pcie
performance
system compatibility
testing
update issues
virtualbox
virtualization
vmware
In Settings, I am under "Allow desktop apps to access your camera" and I have it switched to On. Beneath that, I have three apps, beginning with Chrome, Skype and Zoom.
My question is, how do I disable any of them, such as Chrome & Skype?
Under "Choose which Microsoft Store Apps can access...
Hi all,
Is there a tool available that can schedule the revoking of file share access permissions?
Example: Two members need read access to the Sales folder for one week. We get approval and add them to the required security group, but are too busy to remember dozens of these each week.
I know...
I have a NAS drive (a Zyxel NSA310) on my network which I am trying to use for backup. Whenever I try to access this drive from a Windows computer connected to the same LAN (e.g. to create a new folder on the NAS) it says "you need authorisation to do that". How do I get authorisation? The Zyxel...
Vulnerability is detected on "Kerberos Information Disclosure" . According to vulnerability scanning tool below vulnerability is detected on windows 2012 R2. We have to fix it.
Explanation of Issue:
The remote Kerberos service discloses an accurate timestamp as well as the name of its...
I wonder if is it possible to create a tool where when usb drive is inserted in the port, user need to login first. If not, they cannot open the usb folder (for example the usb drive folder in Computer is Drive ( E: ) ). Like the usb folder will not appear in Computer until user can login
I copied a folder tree from another computer in LAN onto my local computer.
After some work I want to delete this folder tree on my local computer.
When I right-click in File Explorer on the top node and select "delete" then a popup tells me:
"You need to provide administrator permissions"...
accesscontrol
admin rights
administrator
computer management
context menu
delete
file explorer
file management
folder
lan
local computer
ownership
permissions
quick deletion
system settings
tree structure
uac
user account control
user permissions
windows