-
Posts
-
By mcloum · Posted
AS data is written to 1 disk its also written to the other disk in the raid pool. RAID - Wikipedia -
By mcloum · Posted
Its still there, but annoyingly you have to left click the word now and not right click as many millions of peoples muscle memory are quickly finding out. -
By +Nik Louch · Posted
Their initial offerings (AV) were fine, but then there was just absolute stagnation and they had no idea what to do with themselves so they created solutions to problems that really didn't exist, convinced users they did but then realised nobody was buying into it, so bundled their bloated crap with OEM builds. Arguably, the whole AV market got a bad name with end consumers for a period because of companies such as Norton. -
By zikalify · Posted
Windows Server 2025 security baseline to get more frequent updates, streamlines settings by Paul Hill Microsoft has announced the release of the June 2025 revision of its security baseline package for Windows Server 2025 (v2506), it is now available to download from the Microsoft Security Compliance Toolkit. After downloading it, you can test the recommended configurations in your environment and customize or implement them as you see fit. To deal with the evolving threat landscape, new Windows features, and community feedback, Microsoft is planning to revise the Windows Server baseline more frequently in the future. Windows Server security baselines are a collection of Microsoft-recommended configuration settings that help administrators establish secure and consistent Windows Server environments. This is the first security baseline update for Windows Server 2025 since January, a summary of the changes is presented in this table: Security Policy Change Summary Deny log on through Remote Desktop Services Allow remote logon for non-admin local accounts on MS and add “BUILTIN\Guests” to both DC and MS. WDigest Authentication Remove from the baseline Allow Windows Ink Workspace Remove from the baseline Audit Authorization Policy Change Set to “Success” in both DC and MS Include command line in process creation events Enable in both DC and MS Control whether exclusions are visible to local users Moved to Not Configured as it is overridden by the parent setting. Of these changes, the removal of WDigest Authentication and the addition of Include command line in process creation events are significant. Microsoft said it removed WDigest Authentication from the security baseline because it is no longer necessary for Windows Server 2025. The policy was originally enforced so that WDigest couldn’t store plaintext passwords in memory, which was a significant theft risk. Since the 24H2 update in Windows Server 2022, the policy has been deprecated, so there’s no need to enforce this setting. The update also adds Include command line in process creation events to improve the visibility of how processes are executed across the system. By capturing the command-line arguments, it makes it easier to detect and investigate malicious activity that may otherwise seem legitimate. If you want to learn more about the other changes in a bit more depth, refer to Microsoft’s announcement of this security baseline update. -
By mcloum · Posted
Yeah, its still trash M$.
-
-
Recent Achievements
-
Leonard grant earned a badge
One Month Later
-
pcdoctorsnet earned a badge
Week One Done
-
Phillip0web went up a rank
Rising Star
-
Epaminombas earned a badge
One Month Later
-
Bert Fershner earned a badge
One Year In
-
-
Popular Contributors
-
Tell a friend
Recommended Posts