x

Master the Splunk Web Interface and Preferences!!!

Master the Splunk Web Interface and Preferences!!!

Exploring the Splunk Web Interface | Major Features and Preferences Welcome to this in-depth guide to the Splunk Web interface! In this video, we explore all the major features that make navigating and using Splunk intuitive and powerful. We’ll walk you through the various tools and menus available, helping you maximize your Splunk experience. We … Read more

SOC1 Controls Notes in SG – 51 Security

SOC1 Controls Notes in SG – 51 Security

Agreed Upon ObjectivesSOC1.A Agreed Upon ObjectivesSOC1.A.1 Objectives should be reviewed and agreed upon by company leadership and CPA partner. Internal Controls over Financial ReportingSOC1.ICFR ReconciliationsSOC1.ICFR.1 Controls provide reasonable assurance that cash and security positions are completely and accurately reconciled between the application and the depositories in a timely manner. Transactions and Events During a Period … Read more

[5 Mins Docker] Deploy Free Drupal CMS System – 51 Security

[5 Mins Docker] Deploy Free Drupal CMS System – 51 Security

1 make sure you have docker service pre-installed on your VPS The following example is using https://labs.play-with-docker.com/ to show all the commands you will needed. 2 install MySQL DB Before deploying Drupal with Docker, you need to install a database. You can choose MySQL as the database. If you have already installed MySQL locally, you can skip this … Read more

[5 Mins Docker] Install Open Source System and Network Monitoring Application – Nagios Core – 51 Security

[5 Mins Docker] Install Open Source System and Network Monitoring Application – Nagios Core – 51 Security

Self Hosted Docker Installation Pre-requirements Free resources you might need to complete this docker project: Pre-installed services: Docker,  apt update apt install docker.io apt install docker-compose apt upgrade docker.io mkdir /root/data/docker_data/<docker_name> Docker-Compose (Using Ubuntu OS for the commands) Docker-compose down Optional command : use following command to backup your Docker data. You might need to change … Read more

1.1.1.1 – Free, Safe, Fast DNS & VPN Service (Enable WARP+ with MASQUE Protocol) – 51 Security

1.1.1.1 – Free, Safe, Fast DNS & VPN Service (Enable WARP+ with MASQUE Protocol) – 51 Security

Cloudflare introduced free WARP service to provide faster and safer internet connection solution to all consumers since 2019. It is based on WireGuard tunnel protocol to create a secure tunnel between user’s device and one of global Cloudflare data centers near to the user.  In this blog post, I am gonna show you how to … Read more

Sentinel Lab Notes – 51 Security

Sentinel Lab Notes – 51 Security

This post is to record some key points to set up a Sentinel Lab   Data Sources Virtual Network (VNet) Network Security Group (NSG) Virtual Machines (2 windows with 1 MS SQL DB, 1 linux) Log Analytics Workspace Azure Key Vault Azure Storage Account Microsoft Sentinel Create Log Analytics Workspace and Sentinel Create Log Analytics … Read more

Defender Lab Notes 1 (Mgmt & Config, RBAC, Prevention, ASR&NGP, Detection, Invesitigation, Response) – 51 Security

Defender Lab Notes 1 (Mgmt & Config, RBAC, Prevention, ASR&NGP, Detection, Invesitigation, Response) – 51 Security

 This is the post to collect some Notes from a lab practice. Management Endpoint Security Stack:  Antivirus Disk Encryption Firewall Endpoint Detection & Response Attack Surface Reduction Device Control Web Protection Network Protection Management Architecture Microsoft Endpoint Manager (MDM) = Microsoft Intune admin Center Antivirus Disk Encryption Firewall Endpoint  Detection and Response Endpoint Privilege Management Account … Read more

Defender Lab Notes 2 (License, Hunting, Vulnerability Management, API, Cross Platform) – 51 Security

Defender Lab Notes 2 (License, Hunting, Vulnerability Management, API, Cross Platform) – 51 Security

Endpoint Detection & Response 1 Proactive hunting Not all threat scenarios begin with an alert Proactive and iterative search for threats The power of knowing the network 2 Enrich existing information Understand the impact of existing alerts Get more information on entities and IOCs 3 Datasets Emails (Defender for Office) Email transactions, including post-delivery Emails attachments and URLs … Read more

Fortigate NGFW Solution – 51 Security

Fortigate NGFW Solution – 51 Security

AcmeCorp uses a Windows Server for Remote Desktop access to their network. While this is not considered a best practice, it is vital to their business and needs to be open from the Internet. Using the Malware Server, located on the internet, a hacker performs a random port scan and discovers port TCP/3389 is open … Read more

Config Fortigate Traffic Shaping – 51 Security

Config Fortigate Traffic Shaping – 51 Security

This post is to record Traffic Shaping related notes for Fortigate   Creating Traffic Shaper for Specific Purpose Create a traffic shaper entry under Policies & Objects  -> Traffic Shaping  -> Traffic Shapers -> Create new. Enable Traffic Shaper for Certain SSL-VPN Firewall Rule Basically, we will be able to enable traffic shaping policy over a … Read more