asteroza + auditing   66

Script Get-USBHistory
powershell script, useful for grabbing USB history from all PC's in a domain, useful for creating a baseline/history of USB use.
windows  USB  history  log  PowerShell  script  sysadmin  tips  tricks  logging  baseline  security  audit  auditing 
may 2018 by asteroza
Command line process auditing
This will leave at least some breadcrumbs on obscure script execution...
windows  command  line  execution  parameter  flag  logging  auditing  security  hacking  pentesting  Delicious 
may 2016 by asteroza
Certificate Transparency Watch
Busting bad actor CA's (cough,cough,Symantec,cough,cough) since yesterday...
RFC  6962  certificate  transparency  monitoring  logging  auditing  RSS  feed  SSL  TLS  security  Delicious 
september 2015 by asteroza
These guys caught the OPM hack during a product demo, similar to how a NetScreen demo exposed the RSA hack...
network  forensics  incident  response  DFIR  security  audit  auditing  software  Delicious 
june 2015 by asteroza
for Data Breach Management | Guardtime
Apparently KSI can somehow be leveraged to secure a streamed build file for a 3D printable object as it is streamed to a printer, to protect intellectual property in the build file from leaking.
KSI  security  keyless  digital  asset  tagging  management  signature  software  3D  printing  fabbing  build  file  DRM  IP  copyright  auditing  Delicious 
may 2014 by asteroza
Unix Root Access Control - Linux Sudo Access - Unix Privilege Management | PowerBroker Servers
Once invoked this records EVERYTHING root does, every keystroke. Which means if anyone manages to look at the logs they'll see passwords too. If you are cool with that (only look if something bad happened stance), this may not be a bad thing for a system accountability and logging solution. Beats manual change control entry...
Powerbroker  linux  sysadmin  administration  least  priviledge  account  keystroke  logging  monitoring  security  trust  accountability  server  audit  auditing  software  Delicious 
january 2011 by asteroza
Mobile Monitor
A secondary monitor for laptops, oriented for accountants/auditors (hence the number pad). Fail for requiring a separate AC power supply, but considering the use profile, not wholly unrealistic.
secondary  portable  mobile  display  DIsplayLink  USB  monitor  HID  numberpad  accountant  accounting  finance  audit  auditing  Delicious 
december 2010 by asteroza
Verisae Energy Management, Carbon Footprint, Asset Tracking, and Refrigerant Tracking Solutions - Verisae
Apparently these guys got a US business process patent on enterprise carbon tracking and accounting. I wonder when the patent trolling will begin?
Verisae  corporate  enterprise  carbon  tracking  accounting  software  service  hosted  SaaS  vendor  green  energy  sustainability  CSR  reporting  auditing  Delicious 
june 2009 by asteroza

related tags

3D  3DSEQ  academic  access  account  accountability  accountant  accounting  accreditation  active  AD  administration  AEPnetworks  agent  aircrack-ng  airodump-ng  alternative  analysis  analytics  analyzer  antivirus  appliance  application  archiving  ARGUS  assessment  asset  assurance  ATK  Attack  audit  auditing  Auditor  AWS  backup  based  baseline  bitcoin  block  blockchain  blocker  blocking  build  business  C  CAD  carbon  CCN  certificate  certification  change  cheating  check  client  cloud  CMDB  CMDBuild  CO2  coding  command  company  complaince  compliance  computer  configuration  configure  connection  console  control  controls  copyright  corporate  CoSoSys  cracking  credential  cryptocurrency  CSR  Cyber-Ark  dashboard  data  database  DDoS  delete  Delicious  detection  development  device  devices  devops  DFIR  digital  directory  disaster  discovery  display  DIsplayLink  DLP  documentation  domain  DoS  drive  DRM  electronics  emissions  encryption  endpoint  energy  engine  Enomalism  enterprise  environment  EPS  event  exception  execution  explanation  exploit  exploration  extrusion  fabbing  FDR  feed  file  filetype:pdf  filter  filtering  finance  financial  finanical  finder  firewall  flag  flash  flight  forensics  Foundstone  fraud  frontend  FullArmor  fuzzer  GAAP  gaming  gateway  GFI  git  github  green  GUI  guide  hacking  hardware  heatmap  HID  history  hosted  hotfix  howto  IAM  ID  identity  IDS  IM  incident  information  infosec  infrastructure  inspection  instant  Institute  intensity  international  inventory  IP  IPS  IRS  ISAE3402  ISECOM  ISO  issue  IT  ITIL  japan  java  JSOX  keyless  keystroke  Kit  KSI  LAN  languard  layer  leakage  least  line  linux  list  liveCD  log  logging  logon  MAC  machine  managed  management  map  mapping  Marubeni  math  MBSA  media:document  memory  message  methodology  metrics  microsoft  mitre  mobile  mode  monitor  monitoring  MSP  MSSP  mSystems  mTrust  MyBooks  NAC  NAT  netflow  network  networking  Nmap  number  numberpad  office  omnipod  open  OpenAudIT  opengl  opensource  optimization  OSWA  OSX  outsourcing  OVAL  overview  p2p  packet  parameter  password  patch  patching  PC  penetration  pentest  pentesting  permissions  personal  platform  policy  PolicyPortal  port  portable  Postini  posture  Powerbroker  PowerShell  prevention  printing  private  priviledge  privileged  process  processing  productivity  profiling  programming  protection  Protiviti  protocol  protocols  provider  proxy  python  quarantine  quickbooks  quicken  RDP  recorder  recording  reference  registry  remediation  removable  reporting  research  response  RFC  risk  router  RSS  SaaS  Safend  SAS70  scanner  scanning  ScanSafe  script  scripts  search  secondary  SecureItEasy  security  Senf  sensitive  server  service  session  setup  sflow  sharing  shell  signal  signature  SIP  Skype  SLA  sll  SMART  SMB  sniffing  snoopy  software  solution  SOX  splitting  SSA  SSAE16  SSL  SSN  standard  standards  standars  statistical  statistics  storage  strength  suite  sustainability  sysadmin  syscall  syslog  system  tagging  tax  templates  testing  theft  theory  tips  TLS  Tool  toolkit  tools  tracking  traffic  transmission  transparency  tricks  troubleshooting  trust  tutorial  tweaking  U3  UI  USB  utilities  vendor  Verisae  violation  virtual  vista  visualisation  visualization  VoIP  vpn  vulnerability  wardriving  web  webfilter  website  wifi  windows  wireless  workflow  Xen  XP  Zecurion  Zlock 

Copy this bookmark: