filmov
tv
PowerShell: Part 2: Audit and Compliance Data Acquisition with PowerShell
Показать описание
Overview
Equipped with a knowledge of how to use PowerShell, the audit/compliance/security professional can start gathering measurements of systems and networks. In this session, we use PowerShell to extract data from Windows systems, Active Directory domains, VMWare infrastructure and even Linux systems. We will also explore how to extract data from APIs provided by our security tools. Demonstrations will be used to reinforce the concepts.
Objectives
- PowerShell commands to extract data from our systems and infrastructure
- Helpful built-in and third-party modules for audit, compliance and information security
- Useful external tools for gathering data
- Acquiring data from APIs and other systems
Speaker Bio
Clay Risenhoover
Equipped with a knowledge of how to use PowerShell, the audit/compliance/security professional can start gathering measurements of systems and networks. In this session, we use PowerShell to extract data from Windows systems, Active Directory domains, VMWare infrastructure and even Linux systems. We will also explore how to extract data from APIs provided by our security tools. Demonstrations will be used to reinforce the concepts.
Objectives
- PowerShell commands to extract data from our systems and infrastructure
- Helpful built-in and third-party modules for audit, compliance and information security
- Useful external tools for gathering data
- Acquiring data from APIs and other systems
Speaker Bio
Clay Risenhoover
PowerShell: Part 2: Audit and Compliance Data Acquisition with PowerShell
PowerShell Command Part 2
Building a Solution for MSPs to Protect their Clients' Data (Part 2)
The Detection Series: Windows Management Instrumentation (Part 2) | Red Canary
PowerShell 24 Using secedit to configure the Local Security Policy, part II
Solving Problems with PowerShell : Auditing Active Directory Users - Part 1
Quick and Easy way to Turn on PowerShell Audit using Intune Policy
32 How to Create Active Directory user accounts with PowerShell part 2 #powershell #microsoft
Attack Tactics: Part 2
Active Directory Penetration Testing on Windows Server - Part 2
mini lab 2 create and use file shares using powershell part 2
PowerShell for Audit, Compliance, and Security Automation & Visualization: Part 1
2 Create Site Storage Report Using PowerShell
Cybersecurity Unveiled: Part 2
PowerShell &Powercat -2 By XploitXperts
Azure AD Sign In Audit with PowerShell Script
Microsoft PowerShell for Beginners Part 5, User Profile File User Functions and Prompt Function
SANS Webcast: Pen Testing with PowerShell - Automating the Boring so You Can Focus on the FUN!
Use PowerShell to Audit and Track Group Policy Changes with Devin Rich
Powershell and SCOM, do it efficient by Serge and Ruud - Part 1
Microsoft 365 Identity and Services - MS-100 - Example Questions Guide Part 2
AWS Systems Manager Incident Manager - Part-2 | AWS Incident Manager Demo Part-2
Learn AAD PIM: Overview and Quick Demo (Part 2)
008 Power Platform Security and Governance Part 2 of 3
Комментарии