• About Auditing Windows Experts

    About Us

    518dd90cd62cbf77f5a060964406ee6373807_640Hello and welcome to AuditingWindowsExpert.com. This site is specifically for the Windows auditor, security professional, network admin, or anyone else who wants to learn about how to correctly secure and audit a Windows Server or Windows Active Directory domain. The site contains articles, videos, blogs and information from over 10 years of auditing and securing Windows experience.

    The site is owned and run by Derek Melber, MVP. Derek provides consulting to all sizes of companies in the area of Windows Security. Derek can help any audit department with their upcoming or annual Windows Security Audit. Derek specializes in uncovering details.


    Group Policy

    518ddd67eaf3c9609b40c865a6616_640

    In non sagittis risus. Aenean ultrices, lorem sit amet cursus tincidunt, lectus erat pharetra libero, nec ullamcorper nisi elit vitae ipsum. Nulla ante ante, rutrum hendrerit pretium a, placerat vitae enim. Ut at orci convallis nibh auctor blandit quis at ante. Vivamus vehicula, nulla in vehicula ullamcorper, mauris quam tempus felis, vitae consequat ipsum dui sit amet magna.

    Service #1 Button

    Compliance Reporting

    518ddd9b6a6cdd03ec590263d4736de0fb21a_640

    Vestibulum placerat lobortis lacus, eget malesuada nisl placerat nec. Vivamus aliquet facilisis blandit. Pellentesque fermentum dictum eros ac ultricies. Vestibulum ultrices urna et nisl ultrices eu bibendum augue dictum. Aliquam erat volutpat. Donec hendrerit rutrum purus non gravida. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae.

    Service #2 Button

    User Management

    518ddecb0615e7e9c3b2464fa7f272359fe51_640

    Donec arcu mi, laoreet sed scelerisque nec, auctor sit amet nulla. Proin malesuada felis non neque sodales luctus. Fusce condimentum, leo et eleifend porttitor, leo arcu placerat felis, sed iaculis est libero eu ligula. Morbi et felis non urna facilisis volutpat. Suspendisse varius sagittis lectus, nec ullamcorper libero malesuada atleo arcu placerat felis, leo et eleifend porttitor, sed iaculis est libero eu ligula.

    Service #3 Button


    Mauris viverra purus ut dolor pharetra vulputate. In vestibulum nunc vel arcu bibendum et fermentum massa suscipit. Nullam id orci sapien, vel sollicitudin enim. Curabitur tempus libero luctus turpis malesuada cursus. Ut sodales accumsan suscipit. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Proin a dolor ac urna accumsan iaculis eget ac leo. Vestibulum tempor justo quis leo facilisis pulvinar. Praesent turpis enim, luctus in consequat a, sollicitudin vel justo. Nulla placerat lacinia tincidunt. Nam pharetra lacus quis magna rutrum consectetur. Cras in viverra mi.

  • Services We Provide

    Services

    Windows Active Directory Audits

    boardroomLorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque massa lorem, facilisis sit amet faucibus at, pulvinar feugiat purus. Nam risus felis, auctor non tempus eu, rutrum aliquam ante. Praesent urna elit, molestie id ornare ut, dictum in orci. Nullam accumsan ullamcorper ipsum ac dapibus. Curabitur dapibus fringilla orci, posuere pellentesque purus porttitor ut. Ut nunc lacus, molestie eget porttitor ut, bibendum nec est. Nunc condimentum leo non odio faucibus accumsan. Maecenas semper nibh eget massa porta mattis vulputate turpis gravida.

    Want to learn more about my Windows Active Directory Auditing Services? Contact Me For More Information

    Aenean blandit, metus at sollicitudin malesuada, sem orci fringilla lorem, vitae accumsan nisi ante vel metus. Quisque nibh massa, fringilla sed venenatis at, fermentum in dolor. Vivamus vestibulum commodo neque eu volutpat. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi in lacus lorem. Vivamus in mauris nibh. Pellentesque nec arcu id justo aliquet fermentum vitae a lectus. Morbi hendrerit mauris nec ligula aliquet et tincidunt odio placerat. Aliquam non volutpat diam. Pellentesque hendrerit aliquet massa, nec cursus elit laoreet eget. Nam consectetur volutpat ligula, in tristique enim interdum et. In tristique velit et nisl tempus sed consectetur purus fringilla. Nunc venenatis velit a nisl ultrices vitae luctus mi fermentum.

    Windows Active Directory Audit Program

    Aenean eleifend suscipit odio, in pellentesque metus fringilla lacinia. Morbi vitae dui et nisi adipiscing bibendum non ut diam. Mauris laoreet hendrerit viverra. Curabitur eu metus at lacus fermentum eleifend. Nullam tincidunt, ipsum id tincidunt porta, neque quam vestibulum velit, sed tempus velit libero in est. Proin pharetra, enim ut dapibus dictum, libero sapien tempor ligula, vel malesuada nisl risus id quam. Morbi tortor metus, semper eget porta eu, pharetra et magna. Curabitur a diam sed magna facilisis lobortis. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Nunc consequat erat elit. Morbi auctor iaculis urna eget semper. Maecenas semper porttitor fringilla. Quisque ipsum erat, condimentum ac blandit ac, pellentesque et orci.

    Want to learn more about my Windows Active Directory Audit Program? Contact Me For More Information

    Suspendisse velit erat, placerat a pretium ac, mollis nec nunc. Nulla facilisi. Ut nibh nisl, euismod eget convallis ac, facilisis a nunc. In quam odio, adipiscing quis blandit nec, aliquet eget nulla. Maecenas viverra est a est tristique euismod. Aliquam mollis, nulla sed varius luctus, ante enim mollis sem, eget imperdiet ligula nisi sit amet leo. Sed est mauris, dignissim non rutrum eget, rhoncus et diam. Cras molestie, elit sed hendrerit venenatis, tortor arcu adipiscing sapien, vitae mattis dui felis quis metus. Praesent augue lectus, hendrerit at convallis eu, condimentum ac urna. Phasellus sed lorem urna. Ut augue diam, consequat id bibendum non, vulputate sed nisl.

    Security and Audit Consulting

    Curabitur ac quam orci. Pellentesque et est nunc. Pellentesque tincidunt iaculis risus quis egestas. Etiam ultricies mollis nisi, vel faucibus risus egestas at. Sed fermentum posuere turpis sed porta. Ut aliquam blandit rutrum. Duis iaculis tincidunt neque, fermentum facilisis urna aliquet sed. Nunc porttitor semper urna, at pharetra risus convallis semper. Ut ornare euismod justo eget bibendum. Etiam imperdiet turpis porta metus commodo convallis aliquet nunc vehicula. Sed id leo elit, non dapibus orci. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Ut ac augue et risus euismod gravida. Curabitur vestibulum pulvinar ante. In pulvinar facilisis arcu, a rhoncus elit elementum id. Cras gravida ornare nisl, et tristique lectus lobortis non.

    Want to learn more about my Security and Audit Consultation services? Contact Me For More Information

    Vestibulum et mauris massa. Aliquam at ante sit amet nisl condimentum iaculis at id est. Phasellus quis nisi neque. Nullam pretium cursus arcu, eu faucibus elit mollis id. Nam sit amet neque mi. Praesent fringilla, odio sit amet euismod sagittis, nisi arcu sollicitudin risus, a placerat ligula neque sed sapien. Curabitur quis faucibus sem. Fusce dignissim volutpat nibh, et rutrum lorem ornare nec. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos.

    Security and Audit Training

    Curabitur ac quam orci. Pellentesque et est nunc. Pellentesque tincidunt iaculis risus quis egestas. Etiam ultricies mollis nisi, vel faucibus risus egestas at. Sed fermentum posuere turpis sed porta. Ut aliquam blandit rutrum. Duis iaculis tincidunt neque, fermentum facilisis urna aliquet sed. Nunc porttitor semper urna, at pharetra risus convallis semper. Ut ornare euismod justo eget bibendum. Etiam imperdiet turpis porta metus commodo convallis aliquet nunc vehicula. Sed id leo elit, non dapibus orci. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Ut ac augue et risus euismod gravida. Curabitur vestibulum pulvinar ante. In pulvinar facilisis arcu, a rhoncus elit elementum id. Cras gravida ornare nisl, et tristique lectus lobortis non.

    Want to learn more about my Security and Audit Training service? Contact Me For More Information

    Vestibulum et mauris massa. Aliquam at ante sit amet nisl condimentum iaculis at id est. Phasellus quis nisi neque. Nullam pretium cursus arcu, eu faucibus elit mollis id. Nam sit amet neque mi. Praesent fringilla, odio sit amet euismod sagittis, nisi arcu sollicitudin risus, a placerat ligula neque sed sapien. Curabitur quis faucibus sem. Fusce dignissim volutpat nibh, et rutrum lorem ornare nec. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos.

    Speaking and Presentations

    Curabitur ac quam orci. Pellentesque et est nunc. Pellentesque tincidunt iaculis risus quis egestas. Etiam ultricies mollis nisi, vel faucibus risus egestas at. Sed fermentum posuere turpis sed porta. Ut aliquam blandit rutrum. Duis iaculis tincidunt neque, fermentum facilisis urna aliquet sed. Nunc porttitor semper urna, at pharetra risus convallis semper. Ut ornare euismod justo eget bibendum. Etiam imperdiet turpis porta metus commodo convallis aliquet nunc vehicula. Sed id leo elit, non dapibus orci. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Ut ac augue et risus euismod gravida. Curabitur vestibulum pulvinar ante. In pulvinar facilisis arcu, a rhoncus elit elementum id. Cras gravida ornare nisl, et tristique lectus lobortis non.

    Want to learn more about my Speaking and Presentation Services? Contact Me For More Information

    Vestibulum et mauris massa. Aliquam at ante sit amet nisl condimentum iaculis at id est. Phasellus quis nisi neque. Nullam pretium cursus arcu, eu faucibus elit mollis id. Nam sit amet neque mi. Praesent fringilla, odio sit amet euismod sagittis, nisi arcu sollicitudin risus, a placerat ligula neque sed sapien. Curabitur quis faucibus sem. Fusce dignissim volutpat nibh, et rutrum lorem ornare nec. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos.

  • Published Articles

    Articles


    Showing the 50 most recent articles.
    Pass-The-Hash: Protect Your Windows Computers! (Part 3)

    Pass-The-Hash: Protect Your Windows Computers! (Part 3)

    08-20-2014

    Now that we are in the third installment of this article topic and series, I am sure you have been getting a bit anxious to learn all you can about Pass the Hash (PTH) an...

    Click Here To Read This Article

    View
    Verifying Active Directory Delegation is Accurate

    Verifying Active Directory Delegation is Accurate

    07-23-2014

    Microsoft built Active Directory such that non-Domain Admins could have the ability to perform administrative actions on certain objects within Active Directory. This con...

    Click Here To Read This Article

    View
    Securing and Auditing Windows Active Directory (Part 1

    Securing and Auditing Windows Active Directory (Part 1

    04-30-2014

    I have a mission! I want to ensure that all auditors, network admins, security professionals, and anyone related to a Windows network understand the importance, details, ...

    Click Here To Read This Article

    View
    Securing Active Directory with PowerShell

    Securing Active Directory with PowerShell

    03-19-2014

    Let’s start by looking at how we can keep an eye on delegation of Organizational Units (OUs). The ability to add objects to an OU, or to modify those objects within the...

    Click Here To Read This Article

    View
    Windows Compliance vs Security

    Windows Compliance vs Security

    02-19-2014

    For years I have been educating auditors, security professionals, and administrators how to correctly audit a Windows environment. Every time I enter a location I am bomb...

    Click Here To Read This Article

    View
    User and Group Accounts: What is in a Name?

    User and Group Accounts: What is in a Name?

    01-29-2014

    When trying to track down a user or group, it can be very confusing as to what you are actually looking at. In a recent audit, there were numerous domains, customized gro...

    Click Here To Read This Article

    View
    Pass-The-Hash: Protect Your Windows Computers! (Part 2)

    Pass-The-Hash: Protect Your Windows Computers! (Part 2)

    10-27-2013

    In my first installment of this article, I pointed out the overall cause and effects of PTH, as well as going over some of the most important aspects of PTH with regard t...

    Click Here To Read This Article

    View
    Change Management for Active Directory

    Change Management for Active Directory

    10-09-2013

    Just about everyone wants to be able to take a look at the changes that occur to important objects that reside in Active Directory to ensure that the security of the obje...

    Click Here To Read This Article

    View
    Least Privilege Eases Whitelisting Requirements

    Least Privilege Eases Whitelisting Requirements

    09-11-2013

    I find that many companies think that whitelisting can be an amazing security technology for their enterprise. I agree with them… to a point. Where I disagree is in the...

    Click Here To Read This Article

    View
    Pass-The-Hash: Protect Your Windows Computers! (Part 1)

    Pass-The-Hash: Protect Your Windows Computers! (Part 1)

    07-31-2013

    There have been many Microsoft Windows vulnerabilities and exploits over the years. There has been worms, viruses, spyware, password crackers, and many other malicious ex...

    Click Here To Read This Article

    View
    Securing Windows Service Accounts (Part 2)

    Securing Windows Service Accounts (Part 2)

    Articles

    06-19-2013

    In our first installment of this article, we covered the facts that service accounts are high privileged accounts (usually), which need to be protected above other accoun...

    Click Here To Read This Article

    View
    Securing and Auditing High Risk Files on Windows Servers

    Securing and Auditing High Risk Files on Windows Servers

    Articles

    04-17-2013

    With all of the administrators, security professionals, and auditors that I come in contact with, I seem to get similar questions from each. One question I constantly get...

    Click Here To Read This Article

    View
    Windows Active Directory Role for Windows Servers

    Windows Active Directory Role for Windows Servers

    Articles

    03-20-2013

    When you install the Active Directory role on a Windows Server, what actually occurs? Well, it is key to know what occurs, as well as to have it documented. There are man...

    Click Here To Read This Article

    View
    Top 2012 Windows Security Settings Which Fail to Be Configured Correctly

    Top 2012 Windows Security Settings Which Fail to Be Configured Correctly

    Articles

    02-20-2013

    It has been a very busy year for me. I have had the opportunity to speak and consult to thousands of IT and security professionals in 2012. During my tour of the world I ...

    Click Here To Read This Article

    View
    Securing Windows Service Accounts (Part 1)

    Securing Windows Service Accounts (Part 1)

    Articles

    02-06-2013

    Everyone related to Windows security is fully aware of service accounts. As administrators, service accounts are a pain to set up and ensure they are running for each in...

    Click Here To Read This Article

    View
    IT Admins and Security Auditors

    IT Admins and Security Auditors

    Articles

    01-23-2013

    Recently, I was working with a company to perform their annual Windows server and Active Directory audit. This company is not unique to the companies I do work with, rath...

    Click Here To Read This Article

    View
    Auditing Windows Active Directory Trust Relationships

    Auditing Windows Active Directory Trust Relationships

    Articles

    01-02-2013

    The concept of Windows trust relationships have been around for a long time. They started back in the Windows NT era and have continued to be an important aspect of any W...

    Click Here To Read This Article

    View
    Firewall is Enabled and Configured on Windows Server 2008/R2 Domain Controllers

    Firewall is Enabled and Configured on Windows Server 2008/R2 Domain Controllers

    Articles

    11-21-2012

    Microsoft has provided a Firewall for nearly a decade now. The firewall is designed to help protect the local computer against attacks, plus to limit the inbound and outb...

    Click Here To Read This Article

    View
    Endpoint Security: Isn’t It Obvious!?

    Endpoint Security: Isn’t It Obvious!?

    Articles

    10-24-2012

    I know we all deal with computers on a daily basis. With so much computer use, why is security so complex? Well, I have an answer, which might not ring a perfect tone in ...

    Click Here To Read This Article

    View
    Accessing Active Directory Information with LDP

    Accessing Active Directory Information with LDP

    Articles

    09-19-2012

    Active Directory is the most popular network directory used by corporations throughout the world. This does not mean that there are no other popular network directories, ...

    Click Here To Read This Article

    View
    User Accounts, Group Accounts, and Access Control Lists

    User Accounts, Group Accounts, and Access Control Lists

    Articles

    08-15-2012

    A wise man once taught me how to properly configure access control lists (ACLs), which I still preach today. However, I find that after so many years of network administr...

    Click Here To Read This Article

    View
    Who Am I? Understanding Credentials

    Who Am I? Understanding Credentials

    Articles

    07-18-2012

    As a consultant, I often get strange emails asking for my input on a situation. Often, the situations that I get occur on many networks without a root cause or final sol...

    Click Here To Read This Article

    View
    Bring Your Own Device To Work: Security Nightmare?

    Bring Your Own Device To Work: Security Nightmare?

    Articles

    05-23-2012

    Has your company been forced into a debate whether or not employees can use their own personal devices for business related activities? If not, the day is coming that you...

    Click Here To Read This Article

    View
    What You Don’t Know Can Hurt You: LAN Manager Might Be Supported

    What You Don’t Know Can Hurt You: LAN Manager Might Be Supported

    Articles

    05-11-2012

    I have been preaching and teaching about the finer points of authentication protocols, anonymous, group membership, etc. for years. I have been talking about how these si...

    Click Here To Read This Article

    View
    To Whitelist or To Not Whitelist

    To Whitelist or To Not Whitelist

    Articles

    05-09-2012

    There are some key concerns about using whitelisting in your organization to control which applications users can use. In my opinion, whitelisting can be a very powerful ...

    Click Here To Read This Article

    View
    Myths of Securing Windows Desktops (Part 2)

    Myths of Securing Windows Desktops (Part 2)

    Articles

    03-28-2012

    In part one of this article, we reviewed the most basic elements of security for your desktop, which is anti-virus. We also tackled the myths regarding least privilege ma...

    Click Here To Read This Article

    View
    Myths of Securing Windows Desktops (Part 1)

    Myths of Securing Windows Desktops (Part 1)

    Articles

    03-14-2012

    I have spent the better part of the past 6 years focusing on securing Windows desktops (in addition to the entire Windows enterprise). I have been trying to educate, evan...

    Click Here To Read This Article

    View
    Saving Credentials on Windows Computers

    Saving Credentials on Windows Computers

    Articles

    02-08-2012

    For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in the operat...

    Click Here To Read This Article

    View
    Enhancing Endpoint Security for Windows Desktops

    Enhancing Endpoint Security for Windows Desktops

    Articles

    01-25-2012

    This is the second of two article series describing the methods and options available to enhance your endpoint security for your Windows devices. In our first article we ...

    Click Here To Read This Article

    View
    Enhancing Endpoint Security for Windows Desktops

    Enhancing Endpoint Security for Windows Desktops

    Articles

    01-11-2012

    When I say the phrase “Windows desktop endpoint security”, what vision snaps into your mind? I am sure that for most the vision is rather similar. However, for some, ...

    Click Here To Read This Article

    View
    Accessing Security Logs Remotely and Efficiently

    Accessing Security Logs Remotely and Efficiently

    Articles

    12-14-2011

    There is an ongoing need and desire to utilize the security logs that are generated on Windows servers and desktops. The security logs can be used to help troubleshoo...

    Click Here To Read This Article

    View
    Windows Firewall Documentation

    Windows Firewall Documentation

    Articles

    11-30-2011

    There is a lot of confusion around the Windows Firewall and its settings in Windows Server 2008 R2 and Windows 7. This may be due to the history of Windows Firewall which...

    Click Here To Read This Article

    View
    Windows Firewall: Domain Networks, Private Networks, and Public Networks

    Windows Firewall: Domain Networks, Private Networks, and Public Networks

    Articles

    11-16-2011

    Ever since Microsoft has released the latest versions of their Windows Firewall, there has been confusion as to “which network” should I configure and when? To ma...

    Click Here To Read This Article

    View
    Managing Active Directory with Forefront Identity Manager (FIM) 2010

    Managing Active Directory with Forefront Identity Manager (FIM) 2010

    Articles

    10-26-2011

    It’s hard to find a Windows environment that doesn’t rely heavily on Active Directory these days. Indeed, since the inception of AD in the late 90s and early 2000s it...

    Click Here To Read This Article

    View
    Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response

    Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response

    Articles

    10-12-2011

    While building a security program, one of the most important elements to include is what to do when things go wrong. Being able to plan for and implement preventative...

    Click Here To Read This Article

    View
    Troubleshooting Event Log Entries

    Troubleshooting Event Log Entries

    Articles

    09-28-2011

    I know the feeling of reviewing logs on servers and domain controllers, even the most impressive network administrator beg for a job being a greeter at the nearest conven...

    Click Here To Read This Article

    View
    Windows Security Tools

    Windows Security Tools

    Articles

    09-07-2011

    Microsoft has been putting more effort into security, which Windows Server 2008 R2 and Windows 7 proves. They have been hardening the “out of the box” experience for ...

    Click Here To Read This Article

    View
    Disk Encryption – The Next Generation (Bitlocker Administration and Monitoring)

    Disk Encryption – The Next Generation (Bitlocker Administration and Monitoring)

    Articles

    07-27-2011

    Throughout the years, certain elements of IT have evolved from a ‘nice to have’ to ‘an absolute requirement’. If one thinks back 10 years ago, the IT landscape lo...

    Click Here To Read This Article

    View
    Applocker: Scenarios for Use and Deployment

    Applocker: Scenarios for Use and Deployment

    Articles

    07-13-2011

    As many enterprises evaluate their plans for the ‘next generation’ endpoint device in their organization, large challenges loom and large opportunities abound. Is now...

    Click Here To Read This Article

    View
    Well-Known SIDs for Windows Server 2008 R2 Active Directory

    Well-Known SIDs for Windows Server 2008 R2 Active Directory

    Articles

    06-22-2011

    It has come to my attention that many admins are not aware that Active Directory, as well as Windows servers and desktop operating systems, produce users and groups that ...

    Click Here To Read This Article

    View
    The Advanced Persistent Threat – What Is It and How Does It Affect Me?

    The Advanced Persistent Threat – What Is It and How Does It Affect Me?

    Articles

    06-08-2011

    Over the past several years, a term has steadily crept into the minds of IT Security analysts and into the presentations of vendors everywhere: Advanced Persistent Threat...

    Click Here To Read This Article

    View
    Microsoft Forefront Endpoint Protection 2010 – Is Microsoft Anti-virus Good Enough

    Microsoft Forefront Endpoint Protection 2010 – Is Microsoft Anti-virus Good Enough

    Articles

    05-18-2011

    Microsoft released Forefront Endpoint Protection (FEP) 2010 in December 2010. This is Microsoft’s sophomore offering in the anti-virus space, but the first to be seriou...

    Click Here To Read This Article

    View
    Why Applications Don’t work for standard users

    Why Applications Don’t work for standard users

    Articles

    05-04-2011

    We have all seen it. You know what I mean! You have a computer where you have configured the user to be a standard user, instead of a local Administrator. Then, you insta...

    Click Here To Read This Article

    View
    Continuous Auditing of Active Directory with Scheduled Tasks

    Continuous Auditing of Active Directory with Scheduled Tasks

    Articles

    03-09-2011

    In my last two installments of “continuous auditing of Windows Active Directory”, we have covered some powerful ways for you, the auditor or security professional, to...

    Click Here To Read This Article

    View
    Using ADUC Saved Queries to Continuously Audit Windows Active Directory

    Using ADUC Saved Queries to Continuously Audit Windows Active Directory

    Articles

    01-26-2011

    As the world of security and auditing moves from an annual or bi-annual audit schedule to a continuous audit scenario, there will be the need to create more efficient pro...

    Click Here To Read This Article

    View
    Using PowerShell to Continuously Audit Security of Active Directory

    Using PowerShell to Continuously Audit Security of Active Directory

    Articles

    12-15-2010

    The phrase I most often hear in the auditing world today is "continuous auditing." The term itself brings something totally different to mind, compared to what it actuall...

    Click Here To Read This Article

    View
    Click Here To View All Articles
  • Our Videos

    Videos


    Video: Windows Server 2008 R2 Dcpromo “Local Administrator Password” error message

    Video: Windows Server 2008 R2 Dcpromo “Local Administrator Password” error message

    Videos

    This video explains Windows Server 2008 R2 Dcpromo "Local Administrator Password" error message.

    View The Video
    Video 3

    Video 3

    Videos

    Video 3 description

    View The Video
    Video 2

    Video 2

    Videos

    Video 2 Description

    View The Video
    Video 1

    Video 1

    Videos

    This is a video

    View The Video
    Click Here To View All Videos
  • Articles Archive


  • Welcome To Our Blog

    Blog

  • Contacting The Auditing Windows Expert

    Contact Us

    Contact Auditing Windows Experts

    Auditing Windows Expert Contact Form

    We would love to hear from you. Please fill out this form and we will get in touch with you shortly.

     
    logo-w600

    emailEmail

    derek@derekmelber.com

    Telephone IconPhone

    (707) 555-1234

  • Pass-The-Hash: Protect Your Windows Computers! (Part 3)

    Pass-The-Hash: Protect Your Windows Computers! (Part 3)

    08-20-2014

    Now that we are in the third installment of this article topic and series, I am sure you have been getting a bit anxious to learn all you can about Pass the Hash (PTH) an...

    Click Here To Read This Article

    View
    Verifying Active Directory Delegation is Accurate

    Verifying Active Directory Delegation is Accurate

    07-23-2014

    Microsoft built Active Directory such that non-Domain Admins could have the ability to perform administrative actions on certain objects within Active Directory. This con...

    Click Here To Read This Article

    View
    Securing and Auditing Windows Active Directory (Part 1

    Securing and Auditing Windows Active Directory (Part 1

    04-30-2014

    I have a mission! I want to ensure that all auditors, network admins, security professionals, and anyone related to a Windows network understand the importance, details, ...

    Click Here To Read This Article

    View
    Securing Active Directory with PowerShell

    Securing Active Directory with PowerShell

    03-19-2014

    Let’s start by looking at how we can keep an eye on delegation of Organizational Units (OUs). The ability to add objects to an OU, or to modify those objects within the...

    Click Here To Read This Article

    View
    Windows Compliance vs Security

    Windows Compliance vs Security

    02-19-2014

    For years I have been educating auditors, security professionals, and administrators how to correctly audit a Windows environment. Every time I enter a location I am bomb...

    Click Here To Read This Article

    View
    User and Group Accounts: What is in a Name?

    User and Group Accounts: What is in a Name?

    01-29-2014

    When trying to track down a user or group, it can be very confusing as to what you are actually looking at. In a recent audit, there were numerous domains, customized gro...

    Click Here To Read This Article

    View
    Pass-The-Hash: Protect Your Windows Computers! (Part 2)

    Pass-The-Hash: Protect Your Windows Computers! (Part 2)

    10-27-2013

    In my first installment of this article, I pointed out the overall cause and effects of PTH, as well as going over some of the most important aspects of PTH with regard t...

    Click Here To Read This Article

    View
    Change Management for Active Directory

    Change Management for Active Directory

    10-09-2013

    Just about everyone wants to be able to take a look at the changes that occur to important objects that reside in Active Directory to ensure that the security of the obje...

    Click Here To Read This Article

    View
    Least Privilege Eases Whitelisting Requirements

    Least Privilege Eases Whitelisting Requirements

    09-11-2013

    I find that many companies think that whitelisting can be an amazing security technology for their enterprise. I agree with them… to a point. Where I disagree is in the...

    Click Here To Read This Article

    View

    Summary of Services

    About Auditing Windows Experts

    Fusce pulvinar mauris id metus venenatis, eget sollicitudin nibh faucibus. Quisque adipiscing augue sit amet posuere tempus. Nam a lacus arcu. Donec vel pellentesque risus. Sed tincidunt accumsan imperdiet. Etiam imperdiet semper lectus, vel vestibulum lacus molestie non. Duis ante eros, faucibus a cursus vitae, tincidunt quis nunc. Duis id varius lacus, feugiat vulputate ante. Nam accumsan turpis vel sagittis egestas. Donec at purus erat. Vestibulum et massa id sem condimentum interdum id nec erat. Proin id mi non tellus faucibus tincidunt lacinia vel elit. Donec fringilla condimentum volutpat. Aliquam porta nulla a nisi placerat ultricies. Aenean viverra libero et odio ultricies sagittis. Donec convallis libero ut leo euismod, ut pulvinar lorem auctor.
    Read More About Us

    Windows Active Directory Audits

    Content Placeholder: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam mattis tortor id orci tristique, sit amet auctor velit dictum. Proin ac iaculis velit, quis dignissim magna. Nulla facilisi. Morbi dignissim nulla sem, eget vestibulum massa bibendum sed. Aliquam semper dui et porta ullamcorper. Ut congue tortor et commodo laoreet. Nunc a metus vel tortor condimentum convallis. Curabitur in diam vitae velit porta pretium.

    Windows Active Directory Audit Program

    Content Placeholder: Ut vel dolor sit amet libero dignissim dapibus ac vitae enim. Integer iaculis egestas nibh, id mollis mi egestas a. Pellentesque ipsum dolor, iaculis vel metus non, tincidunt pretium ante. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Suspendisse a euismod est, ut vehicula massa.

    Security and Audit Consulting

    Content Placeholder: Aliquam eros tellus, bibendum a luctus eu, tincidunt non dolor. Vestibulum porttitor lacinia metus. Donec egestas massa et mauris consequat, a malesuada leo bibendum.

    Security and Audit Training

    Content Placeholder: Nullam eu leo ultrices, aliquet felis quis, suscipit mi. Fusce congue ullamcorper interdum. Nulla lorem erat, scelerisque vel porta quis, blandit ut enim. Praesent ut suscipit nulla, nec auctor quam. Nam luctus nibh non rutrum vehicula. Quisque sit amet convallis arcu.

    Speaking and Presentations

    Content Placeholder: Nullam eu leo ultrices, aliquet felis quis, suscipit mi. Fusce congue ullamcorper interdum. Nulla lorem erat, scelerisque vel porta quis, blandit ut enim. Praesent ut suscipit nulla, nec auctor quam. Nam luctus nibh non rutrum vehicula. Quisque sit amet convallis arcu.

    Who is Derek Melber?

    DSC_0221_small Phasellus tempor dolor ut nibh interdum ultrices. Nulla molestie faucibus auctor. Etiam eros erat, eleifend tempus elementum a, auctor elementum tortor. Pellentesque pharetra neque ut sapien mattis et adipiscing lectus gravida. Aliquam sem magna, dignissim eu luctus ut, gravida quis ante. Mauris eu orci lorem. Sed vulputate, ante a hendrerit commodo, lectus enim vehicula nulla, a commodo magna nulla eu dolor. Vivamus laoreet tempor orci, a lobortis tortor consequat sed. Proin sodales viverra ante, sit amet tincidunt urna laoreet ut. Suspendisse volutpat, neque in laoreet sagittis, erat odio feugiat nulla, non porta nisi nisi eget neque. Nam eu lacus nulla.
    Visit Derek Melber's Website