Secure Boot certificates are expiring

๐ Secure Bits ๐ก ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ฏ๐ผ๐ผ๐๐ ๐ฐ๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฐ๐ฎ๐๐ฒ๐ ๐ฎ๐ฟ๐ฒ ๐ฒ๐ ๐ฝ๐ถ๐ฟ๐ถ๐ป๐ด ๐ถ๐ป ๐๐๐ป๐ฒ ๐ฎ๐ฌ๐ฎ๐ฒย – ๐บ๐ฎ๐ป๐๐ฎ๐น ๐๐๐ฒ๐ฝ๐ ๐ฎ๐ฟ๐ฒ ๐ฟ๐ฒ๐พ๐๐ถ๐ฟ๐ฒ๐ฑ ๐ฑ๐ต. 1 Microsoft says many Windows client devices may update automatically, butย Windows Server requires manual action. I assumed this type of operation would be ๐๐๐ฟ๐ฎ๐ถ๐ด๐ต๐๐ณ๐ผ๐ฟ๐๐ฎ๐ฟ๐ฑ. โ It wasnโt. ๐๐ถ๐๐ฐ๐น๐ฎ๐ถ๐บ๐ฒ๐ฟ: This is just a record of how I proceeded step […]
Do you use RDP?

๐ Secure Bits ๐ก ๐๐ผ ๐๐ผ๐ ๐๐๐ฒ ๐ฅ๐๐ฃ? Thereโs a ๐๐๐ฟ๐ฝ๐ฟ๐ถ๐๐ถ๐ป๐ด ๐ฟ๐ถ๐๐ธ you might not be thinking about โ and itโs already on your machine. When you use Remote Desktop (๐ฅ๐๐ฃ) via the ๐ ๐ฆ๐ง๐ฆ๐ client, any credentials you enter can be retrieved in plaintext in the process ๐บ๐ฒ๐บ๐ผ๐ฟ๐. That means your domain admin password could […]
Disable NetBIOS, LLMNR, LMHOSTS and WINS

๐ Secure Bits ๐ก ๐๐ผ ๐๐ผ๐ ๐ฑ๐ถ๐๐ฎ๐ฏ๐น๐ฒ ๐ก๐ฒ๐๐๐๐ข๐ฆ, ๐๐๐ ๐ก๐ฅ & ๐๐ ๐๐ข๐ฆ๐ง๐ฆ (๐ฎ๐ป๐ฑ ๐ช๐๐ก๐ฆ)? You shouldโthis is basic Windows hardening for domain devices. ๐ช๐ต๐ฎ๐ ๐๐ผ ๐๐๐ฟ๐ป ๐ผ๐ณ๐ณ (๐ฎ๐ป๐ฑ ๐ต๐ผ๐): ๐น ๐ก๐ฒ๐๐๐๐ข๐ฆย โ legacy naming/session protocol. GPOs are hit-or-miss; set the registry per adapter (use a startup script to loop all adapters): ๐๐๐๐\๐๐ ๐๐๐๐\๐๐ถ๐ณ๐ณ๐ฆ๐ฏ๐ต๐๐ฐ๐ฏ๐ต๐ณ๐ฐ๐ญ๐๐ฆ๐ต\๐๐ฆ๐ณ๐ท๐ช๐ค๐ฆ๐ด\๐๐ฆ๐ต๐๐\๐๐ข๐ณ๐ข๐ฎ๐ฆ๐ต๐ฆ๐ณ๐ด\๐๐ฏ๐ต๐ฆ๐ณ๐ง๐ข๐ค๐ฆ๐ด\{๐๐๐๐}\๐๐ฆ๐ต๐ฃ๐ช๐ฐ๐ด๐๐ฑ๐ต๐ช๐ฐ๐ฏ๐ด=2 ๐น ๐ช๐๐ก๐ฆย โ only matters if […]
Windows Server Core

๐ Secure Bits ๐ก ๐๐ฎ๐๐ฒ ๐ช๐ถ๐ป๐ฑ๐ผ๐๐ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ ๐๐ผ๐ฟ๐ฒ? ๐๐ฒ๐ฟ๐ฒ’๐ ๐ช๐ต๐ ๐ฌ๐ผ๐ ๐ฆ๐ต๐ผ๐๐น๐ฑ ๐๐ฐ๐๐๐ฎ๐น๐น๐ ๐จ๐๐ฒ ๐๐ Windows Server Core is one of the ๐บ๐ผ๐๐ ๐บ๐ถ๐๐๐ป๐ฑ๐ฒ๐ฟ๐๐๐ผ๐ผ๐ฑ ๐ฎ๐ป๐ฑ ๐๐ป๐ฑ๐ฒ๐ฟ๐๐๐ฒ๐ฑ “tools” in the Windows ecosystem. ๐ฅ๏ธ ๐ช๐ต๐ฎ๐ ๐ถ๐ ๐ถ๐? Itโs Windows Server โ but ๐๐ถ๐๐ต๐ผ๐๐ ๐๐ต๐ฒ ๐๐จ๐. Just PowerShell, Command Line, and sconfig. And yes, it still supports critical […]
UAC – Prompt for consent for non-Windows binaries

๐ Secure Bits ๐ก ๐ง๐ฟ๐ ๐๐ต๐ถ๐ ๐ผ๐ป ๐๐ผ๐๐ฟ ๐บ๐ฎ๐ฐ๐ต๐ถ๐ป๐ฒ: Windows + R โ msconfig.exe โ ENTER If msconfig opens without a prompt, your UAC config is too weak. This is a common misstepโmany environments still run default Windows settings, leaving a gap attackers love to exploit via UAC bypass techniques. โ ๐๐ฒ๐ฟ๐ฒโ๐ ๐ต๐ผ๐ ๐๐ผ ๐ณ๐ถ๐ […]
UAC Recommended Settings

๐ Secure Bits ๐ก This is how your UAC configuration should look. Does it look different? If so, there should be a reason for it, as you might be allowing a potential attacker to bypass your UAC. There are usually over 300 items in security baselines, many of them crucial from a cybersecurity perspective. If […]
RDP Security Features

๐ย Secure Bits ๐ก ๐๐ผ ๐๐ผ๐ ๐๐๐ฒ ๐ฅ๐๐ฃ ๐ฟ๐ฒ๐ด๐๐น๐ฎ๐ฟ๐น๐ ๐ถ๐ป ๐๐ผ๐๐ฟ ๐ฒ๐ป๐๐ถ๐ฟ๐ผ๐ป๐บ๐ฒ๐ป๐? Then you should know there are more secure ways to do it. ๐๐ ๐ฑ๐ฒ๐ณ๐ฎ๐๐น๐, your credentials are sent to the remote host during an RDP session โ which means if the machine is compromised, attackers can steal and reuse them. ๐๐๐ ๐๐ต๐ฒ๐ฟ๐ฒโ๐ ๐ด๐ผ๐ผ๐ฑ ๐ป๐ฒ๐๐ […]
RDP Restricted Admin Mode

๐ Secure Bits ๐ก ๐๐ผ ๐ฌ๐ผ๐ ๐จ๐๐ฒ ๐ฅ๐ฒ๐๐๐ฟ๐ถ๐ฐ๐๐ฒ๐ฑ ๐๐ฑ๐บ๐ถ๐ป ๐ ๐ผ๐ฑ๐ฒ ๐ณ๐ผ๐ฟ ๐ฅ๐๐ฃ? If not, you shouldโit ๐ฝ๐ฟ๐ฒ๐๐ฒ๐ป๐๐ ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐ฒ๐ ๐ฝ๐ผ๐๐๐ฟ๐ฒ. ๐ช๐ต๐ ๐๐ ๐๐ ๐ถ๐๐๐: Restricted Admin Mode was designed to let administrators connect to a potentially compromised device without passing their credentials to it. You must already be an administrator on the target machine, but your credentials […]
RDP – MSTSC Plaintext Password

๐ย Secure Bits ๐ก ๐ง๐ต๐ถ๐ป๐ธ ๐ฅ๐๐ฃ + ๐๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐๐ฎ๐ฟ๐ฑ ๐ธ๐ฒ๐ฒ๐ฝ๐ ๐๐ผ๐๐ฟ ๐ฑ๐ผ๐บ๐ฎ๐ถ๐ป ๐ฎ๐ฑ๐บ๐ถ๐ป ๐ฐ๐ฟ๐ฒ๐ฑ๐ ๐๐ฎ๐ณ๐ฒ? ๐ก๐ผ๐ ๐ฟ๐ฒ๐ฎ๐น๐น๐. Even in 2025,ย many ๐ฎ๐ฑ๐บ๐ถ๐ป๐ ๐๐๐ถ๐น๐น ๐ฒ๐ ๐ฝ๐ผ๐๐ฒ ๐๐ต๐ฒ๐ถ๐ฟ ๐๐ผ๐บ๐ฎ๐ถ๐ป ๐๐ฑ๐บ๐ถ๐ป ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น๐ย without realizing it โ just by using RDP to access Domain Controllers from their regular workstation. ๐ง ย โBut Iโve got ๐๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐๐ฎ๐ฟ๐ฑ, Iโm protected!โ Not always. ๐๐ฒ๐ฟ๐ฒโ๐ ๐๐ต๐ฎ๐ ๐ฎ๐ฐ๐๐๐ฎ๐น๐น๐ ๐ต๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ย ๐ถ๐ป ๐ฐ๐ฎ๐๐ฒ […]
Privileged Access Workstations (PAWs)

๐ Secure Bits ๐ก Why should you use Privileged Access Workstations (PAWs)? Accessing your infrastructure through a basic user device leaves your privileged account credentials in the deviceโs memory, and it is making you susceptible to keyloggers (software or hardware) that can capture these credentials. To mitigate this risk, implement PAWs in your environment and […]