Skip to main content

Recently Updated Pages

AnyCubic Photon Mono X 6K

3D printing

Firmware and RERF file

Updated 2 years ago by Clinton

Slicers

3D printing

Lychee Slicer

Updated 2 years ago by Clinton

RDPWrap - Windows Remote Desktop Wrapper

Technical Windows

Most active to date: https://github.com/sebaxakerhtc/rdpwrap Config file update: https://github.c...

Updated 2 years ago by Clinton

Netboot

Technical Linux

apt update; apt install ipxe; wget 'https://boot.netboot.xyz/ipxe/netboot.xyz.lkrn' -O /boot/ipxe...

Updated 2 years ago by Clinton

tun enabled for lxc

Technical Proxmox

/etc/pve/lxc/###.conf lxc.cgroup2.devices.allow: c 10:200 rwm lxc.hook.autodev: sh -c "modprobe t...

Updated 2 years ago by Clinton

aliases

Technical Docker

alias dcud="docker-compose up -d" alias dcd="docker-compose down" alias dcp="docker-compose pul...

Updated 2 years ago by Clinton

Microsoft Security

Security Microsoft Sentinel

Updated 2 years ago by Clinton

NTLM Brute Force

Security Cybersecurity Strategy

https://www.varonis.com/blog/investigate-ntlm-brute-force More specifically, you will need to us...

Updated 2 years ago by Clinton

Cybersecurity Mesh Architecture

Security Cybersecurity Strategy

Updated 2 years ago by Clinton

Splunk to Sentinel Logic

Security Microsoft Sentinel

bin time doc | summarize initial_time = min(TimeGenerated), end_time = max(datetime_add("Second"...

Updated 3 years ago by Clinton

Union Alert

Security Microsoft Sentinel

// The query_now parameter represents the time (in UTC) at which the scheduled analytics rule ran...

Updated 3 years ago by Clinton

Splunk Drill Down Events

Security Splunk

earliest=$initial_time$ latest=$end_time$ index=$index$ EventCode=4624 NOT Logon_Type IN ("5") ho...

Updated 3 years ago by Clinton

Splunk total run time

Security Splunk

(index=_audit host=* action=search sourcetype=audittrail search_id!="rsa_*") | eval user = if(us...

Updated 3 years ago by Clinton

Splunk Use Case tracker

Security Splunk

| rest splunk_server=local count=0 /services/saved/searches | where disabled=0 | rename action.co...

Updated 3 years ago by Clinton

Rule Sample

Security Microsoft Sentinel

Log Analytics: Logs Rules Analytics OfficeActivity | where ingestion_time() > ago(5m) | where...

Updated 3 years ago by Clinton

LogRhythm Or/And Previous

Security LogRhythm

OR PREVIOUS works like an OR statement in parenthesis. a AND b OR PREVIOUS c would look like a &&...

Updated 3 years ago by Clinton

Qradar global whitelist

Security Qradar

Use Routing Rules with forwarding > bypass correlation For IP ranges, use Network Hierarchy.

Updated 3 years ago by Clinton

Reference Maps

Security Qradar

[http://www.siem.su/docs/ibm/Technical_remarks/Reference_Data_Collections_Technical_Note.pdf]

Updated 3 years ago by Clinton

Qradar expiring whitelist

Security Qradar

Use AQL filter query username LIKE 'testUser' and LONG(DATEFORMAT(starttime, 'yyyyMMdd')) < 2...

Updated 3 years ago by Clinton

Ignore when another rule matches

Security Qradar

When a building block or rule matches it's specific fields, do not fire matched events and NOT w...

Updated 3 years ago by Clinton