[SANS ISC] Restricting PowerShell Capabilities with NetSh

I published the following diary on isc.sans.edu: “Restricting PowerShell Capabilities with NetSh:

The Christmas break is coming for most of us, let’s take some time to share some tips to better protect our computers. The Microsoft Windows OS has plenty of tools that, when properly used, can reduce risks to be infected by a malware. As best practices, we must have antivirus enabled, we can deploy AppLocker to allow only authorized applications to be launched, we can restrict applications to be executed from locations like %APPDATA% or %TEMP% but they are tools that are much more difficult to restrict on a regular host like… [Read more]

[The post [SANS ISC] Restricting PowerShell Capabilities with NetSh has been first published on /dev/random]

Article Link: https://blog.rootshell.be/2018/12/19/sans-isc-restricting-powershell-capabilities-with-netsh/