Skip to main content

STIG Compliance with SCAP and DCM in Con...

STIG Compliance with SCAP and DCM in Configmgr

In this post, I demonstrate how to use System Center Configuration Manager to evaluate clients for STIG compliance. The process at a high level is: Download the corresponding STIG compliance SCAP files. Convert the downloaded files into a CAB file for import. Import the CAB file into Configmgr Deploy the Configuration Baseline to the corresponding […]

Read More

Advanced Threat Analytics Now Included i...

Advanced Threat Analytics Now Included in EMS

ZDNet ran a story on this yesterday with an update today.  But this looks like it is confirmed at this point.  No additional cost to the EMS license for this, which is interested and not sure if I believe that part. http://www.zdnet.com/article/microsoft-adds-advanced-threat-analytics-to-its-enterprise-mobility-suite/ “Update (June 23): Microsoft has removed the blog post about EMS getting Advanced […]

Read More

Researcher Reveals: All iOS Devices Allo...

JONATHAN ZDZIARSKI presented how all iOS devices are running Apple created, undocumented, hidden services, that allow access to all data on your device, even encrypted data.  His slides are available here.  Below I have summarized some of the more interesting parts and tried to put them in less technical terms. Highlights  Apple has worked hard […]

Read More

Breach at Goodwill Industries

Breach at Goodwill Industries

Breach at Goodwill Industries Credit card and ATM card info stolen Financial institutions across the country report that they are tracking what appears to be a series of credit card breaches involving Goodwill locations nationwide. For its part, Goodwill Industries International Inc. says it is working with the U.S. Secret Service on an investigation into these reports. According […]

Read More