IT Pro Tuesday #293

			<div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><p>Welcome back to IT Pro Tuesday!</p>

In the latest Security Swarm Podcast: “Insider Threats in Microsoft 365,” we focus on SharePoint Online and OneDrive for Business, shedding light on the nuances of insider threats and offering valuable insights on safeguarding against them.

We’re looking for your favorite tips and tools we can share with the community… those that help you do your job better and more easily. Please share your suggestions on the IT Pro Tuesday subreddit, and we’ll be featuring them in the coming weeks.

Now on to this week’s list!

		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>A Tutorial</h2></div>
		</div><div>
			
			
			
			
			<div><p><a href="https://blog.foxio.io/ja4%2B-network-fingerprinting" rel="noreferrer" target="_blank">JA4+ Network Fingerprinting</a> explains how to leverage the new modular network fingerprint methods that replaced the JA3 TLS standard, which can be useful in helping protect your network from threats. aygupt1822 explains, “These are TLS Fingerprinting tools which generate TLS Fingerprints from raw network packets.”</p></div>
		</div><div>
			
			
			
			
			<img alt="External Attack Surface Management Attack Surface Summary" height="211" src="https://www.hornetsecurity.com/wp-content/uploads/2024/03/JA4NetworkFingerprint-300x211.png" title="JA4+NetworkFingerprint" width="300" />
		</div>
		</div>
			
			
			
			
		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>Scripts</h2></div>
		</div><div>
			
			
			
			
			<div><p><a href="https://o365reports.com/2024/03/15/essential-powershell-scripts-for-sharepoint-online-security/" rel="noreferrer" target="_blank">9 Essential PowerShell Scripts for SharePoint Online Security</a> shares a set of curated, precision scripts for monitoring SharePoint online file activities, external user activities, and online permissions/access. Kindly suggested by Shan_1130.</p></div>
		</div><div>
			
			
			
			
			<img alt="External Attack Surface Management Attack Surface Summary" height="211" src="https://www.hornetsecurity.com/wp-content/uploads/2024/03/SharePointScripts-300x211.png" title="SharePointScripts" width="300" />
		</div>
		</div>
			
			
			
			
		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>Security News</h2></div>
		</div><div>
			
			
			
			
			<div><p><a href="https://salt.security/blog/security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-party-websites-and-sensitive-data" rel="noreferrer" target="_blank">Critical Security Flaws withing ChatGPT Ecosystem</a> delves into the attack vector introduced by generative AI that can be exploited to compromise user accounts. ElectroPanic0 explains, “While the whole GenAI trend is great and lets employees/teams incorporate external AI tools in their code or daily tasks, the security falls behind.”</p></div>
		</div><div>
			
			
			
			
			<img alt="" height="211" src="https://www.hornetsecurity.com/wp-content/uploads/2024/03/ChatGPTSecurity-300x211.png" title="" width="300" />
		</div>
		</div>
			
			
			
			
		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>A Tip</h2></div>
		</div><div>
			
			
			
			
			<div><p>jamesaepp shares a handy browser shortcut:&nbsp;</p>

CTRL + Shift + DEL in Chrome/Edge (maybe FF?) brings you to the clear cache dialog box

		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>A Tutorial</h2></div>
		</div><div>
			
			
			
			
			<div><p><a href="https://github.com/bluemoosegoose/Build-a-Custom-MacOS-Dock" rel="noreferrer" target="_blank">How to Build a Custom MacOS Dock</a> is a guide that walks you through how to create a purpose-built onboarding dock for your users. The method has been verified from Sonoma back through Catalina. Recommended by trikster_online, who says, “I have about 7 different docks I use depending on the lab.”</p></div>
		</div><div>
			
			
			
			
			<img alt="" height="211" src="https://www.hornetsecurity.com/wp-content/uploads/2024/03/CustomMacDock-300x211.png" title="" width="300" />
		</div>
		</div>
			
			
			
			
		</div><div>
			<div>
			
			
			
			
			<div>
			
			
			
			
			<div><h2>P.S. Bonus Free Tools</h2></div>
		</div><div>
			
			
			
			
			<div><p><a href="https://cheatography.com/itsellej/cheat-sheets/git-commands/" rel="noreferrer" target="_blank">Git Commands Cheat Sheet</a> is a nicely organized quick-reference guide where you can easily locate all the essentials for making the best use of Git. Appreciation for the suggestion goes to Extradiscipline_644.</p>

Mimir is an open-source multi-tenant time series database that is a blazingly fast, scalable, high-availability solution for long-term storage for Prometheus. Our thanks for the recommendation go to bilbo-baggins125.

		</div>
			
			
		</div><p>Der Beitrag <a href="https://www.hornetsecurity.com/en/it-pro-tuesday/it-pro-tuesday-293/" rel="noreferrer" target="_blank">IT Pro Tuesday #293</a> erschien zuerst auf <a href="https://www.hornetsecurity.com/en/" rel="noreferrer" target="_blank">Hornetsecurity</a>.</p>

Article Link: https://www.hornetsecurity.com/en/it-pro-tuesday/it-pro-tuesday-293/