Netwrix Blog | Insights for Cybersecurity and IT Pros
Test – Parent
5 months ago
Ani Grigoryan
Mastering PowerShell Regex: Syntax, Examples and Best Practices
5 months ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Introduction to PowerShell Regex A regular expression (regex) is a sequence of characters that defines a pattern or template, such as the format of email addresses or Social Security numbers. Regular expressions are useful for pattern matching and text manipulation. For example, regex can help you quickly find all failed login attempts in a server … Continued
Introduction to PowerShell Regex A regular expression (regex) is a sequence of characters that defines a pattern or template, such as the format of email addresses or Social Security numbers. Regular expressions are useful for pattern matching and text manipulation. For example, regex can help you quickly find all failed login attempts in a server … Continued
Jonathan Blackwell
A Comprehensive Guide to Healthcare Cybersecurity
5 months 1 week ago
This post first appeared on blog.netwrix.com and was written by Dirk Schrader.
The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data. Safeguarding healthcare’s digital infrastructure, including electronic health records, networked medical … Continued
The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data. Safeguarding healthcare’s digital infrastructure, including electronic health records, networked medical … Continued
Dirk Schrader
Cyber Attacks in 2023: Key Incidents and the Lessons Learned for 2025
5 months 1 week ago
This post first appeared on blog.netwrix.com and was written by Dirk Schrader.
2023 saw a huge number of devastating cyberattacks, from crippling ransomware campaigns to breaches targeting critical infrastructure. As threat actors employ increasingly innovative tactics, understanding the most significant attacks and their implications is essential for building robust defenses. This article analyzes the top cyberattacks of 2023 and their impacts, reveals emerging trends, and provides actionable … Continued
2023 saw a huge number of devastating cyberattacks, from crippling ransomware campaigns to breaches targeting critical infrastructure. As threat actors employ increasingly innovative tactics, understanding the most significant attacks and their implications is essential for building robust defenses. This article analyzes the top cyberattacks of 2023 and their impacts, reveals emerging trends, and provides actionable … Continued
Dirk Schrader
The Complete Guide to NTFS vs Share Permissions
5 months 2 weeks ago
This post first appeared on blog.netwrix.com and was written by Dirk Schrader.
The foundation of Windows security is simple — if you want access to a network resource such as a file or folder, you need the appropriate permissions. But implementation is more complex because the Windows operating system has two types of permissions: NTFS permissions, which operate at the file system level, and share permissions, which … Continued
The foundation of Windows security is simple — if you want access to a network resource such as a file or folder, you need the appropriate permissions. But implementation is more complex because the Windows operating system has two types of permissions: NTFS permissions, which operate at the file system level, and share permissions, which … Continued
Dirk Schrader
Essential PowerShell Commands: A Cheat Sheet for Beginners
5 months 3 weeks ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Introduction to PowerShell What Is PowerShell? PowerShell is a powerful command-line shell that supports scripting languages and provides tools for managing computer resources locally and remotely. Benefits of PowerShell for Windows Administration Windows PowerShell commands enable automation of repetitive tasks such as managing users, services, files, or scripts. PowerShell can also be used for managing … Continued
Introduction to PowerShell What Is PowerShell? PowerShell is a powerful command-line shell that supports scripting languages and provides tools for managing computer resources locally and remotely. Benefits of PowerShell for Windows Administration Windows PowerShell commands enable automation of repetitive tasks such as managing users, services, files, or scripts. PowerShell can also be used for managing … Continued
Jonathan Blackwell
Introduction to PowerShell Invoke-Command
5 months 3 weeks ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
The Invoke-Command cmdlet in PowerShell enables IT admins to execute commands and scripts on remote machines, and even to redirect the output of those remote scripts to their own console. As a result, they can manage multiple machines from a central location. Key use cases include: Invoke-Command offers all of the following valuable capabilities: Benefits … Continued
The Invoke-Command cmdlet in PowerShell enables IT admins to execute commands and scripts on remote machines, and even to redirect the output of those remote scripts to their own console. As a result, they can manage multiple machines from a central location. Key use cases include: Invoke-Command offers all of the following valuable capabilities: Benefits … Continued
Jonathan Blackwell
PowerShell Environment Variables
5 months 3 weeks ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Introduction to PowerShell Environment Variables Environment variables are predefined variables in an operating system, they are available in the form of key-value pairs which store important system-level or user-specific information, such as paths, user configurations, and system settings. These variables are accessible in PowerShell scripts and sessions, playing a significant role in tasks like configuring … Continued
Introduction to PowerShell Environment Variables Environment variables are predefined variables in an operating system, they are available in the form of key-value pairs which store important system-level or user-specific information, such as paths, user configurations, and system settings. These variables are accessible in PowerShell scripts and sessions, playing a significant role in tasks like configuring … Continued
Jonathan Blackwell
How to Run a PowerShell Script
5 months 3 weeks ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
PowerShell is a scripting language and command-line shell designed for task automation and configuration management, primarily used by system administrators and advanced users. Built on the .NET framework (.Net Core for PowerShell 7), it supports Windows, Linux and macOS. It enables automation of administrative tasks such as managing user accounts, configuring networks and performing backups, … Continued
PowerShell is a scripting language and command-line shell designed for task automation and configuration management, primarily used by system administrators and advanced users. Built on the .NET framework (.Net Core for PowerShell 7), it supports Windows, Linux and macOS. It enables automation of administrative tasks such as managing user accounts, configuring networks and performing backups, … Continued
Jonathan Blackwell
What is Credential Stuffing?
5 months 4 weeks ago
This post first appeared on blog.netwrix.com and was written by Dirk Schrader.
Credential stuffing is a type of cyberattack where attackers use stolen username and password combinations, often obtained from previous data breaches, to gain unauthorized access to multiple online accounts. The attacker automates the process of trying these combinations across various websites, hoping that users have reused the same login details. Credential Stuffing vs. Password Stuffing: … Continued
Credential stuffing is a type of cyberattack where attackers use stolen username and password combinations, often obtained from previous data breaches, to gain unauthorized access to multiple online accounts. The attacker automates the process of trying these combinations across various websites, hoping that users have reused the same login details. Credential Stuffing vs. Password Stuffing: … Continued
Dirk Schrader
How to Update PowerShell
6 months 1 week ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Each new PowerShell version introduces new features, performance enhancements, and security improvements. Upgrading empowers you to take advantage of these advancements. It also ensures compatibility with updated APIs, libraries, and frameworks and provides access to contributions from a vibrant community committed to knowledge sharing and best practices. This article explains the differences between the traditional … Continued
Each new PowerShell version introduces new features, performance enhancements, and security improvements. Upgrading empowers you to take advantage of these advancements. It also ensures compatibility with updated APIs, libraries, and frameworks and provides access to contributions from a vibrant community committed to knowledge sharing and best practices. This article explains the differences between the traditional … Continued
Jonathan Blackwell
Rainbow Table Attacks: How They Work and How to Defend Against Them
6 months 1 week ago
This post first appeared on blog.netwrix.com and was written by Dirk Schrader.
Many common password attack methods are quite straightforward — much like trying various physical keys to open the lock on a door. For example, in brute force attacks, adversaries systematically guess passwords until they find the correct one. Or instead of simply guessing, they can use a list of username/password combinations leaked from other breaches … Continued
Many common password attack methods are quite straightforward — much like trying various physical keys to open the lock on a door. For example, in brute force attacks, adversaries systematically guess passwords until they find the correct one. Or instead of simply guessing, they can use a list of username/password combinations leaked from other breaches … Continued
Dirk Schrader
Why PowerShell Send-MailMessage Is Deprecated and What to Use Instead
6 months 1 week ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Introduction to Sending Emails with PowerShell PowerShell is an indispensable tool for task automation, configuration management, system monitoring and querying data. But you can also send email with PowerShell. For instance, PowerShell scripts can monitor systems and post email alerts for specific events, resource constraints or completed tasks. However, it’s critical to ensure that emails … Continued
Introduction to Sending Emails with PowerShell PowerShell is an indispensable tool for task automation, configuration management, system monitoring and querying data. But you can also send email with PowerShell. For instance, PowerShell scripts can monitor systems and post email alerts for specific events, resource constraints or completed tasks. However, it’s critical to ensure that emails … Continued
Jonathan Blackwell
PowerShell vs CMD: The Ultimate Guide for Windows Professionals
6 months 2 weeks ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Windows PowerShell and command prompt (CMD) are both essential command-line interface tools for Windows administrators, allowing them to execute commands, manage system processes and automate administrative tasks. While CMD has been a foundational component of Windows since the MS-DOS era, PowerShell has emerged as a more advanced and powerful scripting language, enhancing system management and … Continued
Windows PowerShell and command prompt (CMD) are both essential command-line interface tools for Windows administrators, allowing them to execute commands, manage system processes and automate administrative tasks. While CMD has been a foundational component of Windows since the MS-DOS era, PowerShell has emerged as a more advanced and powerful scripting language, enhancing system management and … Continued
Jonathan Blackwell
What is OAuth (Open Authorization)?
6 months 2 weeks ago
This post first appeared on blog.netwrix.com and was written by David Metzgar.
OAuth is an authorization protocol that grants third-party websites or applications limited access to a user’s information (like their email or photos) — without sharing their logon credentials. For example, suppose you want to sign up for an app to help you track your fitness goals. Through the power of OAuth, you may have the … Continued
OAuth is an authorization protocol that grants third-party websites or applications limited access to a user’s information (like their email or photos) — without sharing their logon credentials. For example, suppose you want to sign up for an app to help you track your fitness goals. Through the power of OAuth, you may have the … Continued
David Metzgar
Change Control for Inhouse Applications and Platforms
6 months 2 weeks ago
This post first appeared on blog.netwrix.com and was written by James Anderson.
Managing change for in-house applications and platforms is crucial for maintaining stability, security, and accountability. Unlike managing changes at the device level, working with applications requires a more comprehensive strategy. Let’s break it down. Why Change Control Matters Imagine trying to manage an application that spans multiple environments, each with its unique configurations. Things can … Continued
Managing change for in-house applications and platforms is crucial for maintaining stability, security, and accountability. Unlike managing changes at the device level, working with applications requires a more comprehensive strategy. Let’s break it down. Why Change Control Matters Imagine trying to manage an application that spans multiple environments, each with its unique configurations. Things can … Continued
James Anderson
The Largest and Most Notorious Cyber Attacks in History
6 months 2 weeks ago
This post first appeared on blog.netwrix.com and was written by Dirk Schrader.
Cyber attacks are deliberate attempts to steal, alter, or destroy data or to disrupt operations and to damage the digital parts of a critical infrastructure. This blog post explores the most destructive major cyber attacks in history, detailing the underlying motives and impact, and then offers prevention and detection best practices. Types of Cyber Attacks … Continued
Cyber attacks are deliberate attempts to steal, alter, or destroy data or to disrupt operations and to damage the digital parts of a critical infrastructure. This blog post explores the most destructive major cyber attacks in history, detailing the underlying motives and impact, and then offers prevention and detection best practices. Types of Cyber Attacks … Continued
Dirk Schrader
How to Run PowerShell on Remote Computers
6 months 3 weeks ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Overview of PowerShell Remoting PowerShell is a great scripting and automation tool — and it also enables administrators to execute commands and scripts on remote computers remotely, as if they were sitting in front of them. Indeed, early in the history of PowerShell, Microsoft added support for cmdlets to run on remote systems with the -ComputerName parameter. … Continued
Overview of PowerShell Remoting PowerShell is a great scripting and automation tool — and it also enables administrators to execute commands and scripts on remote computers remotely, as if they were sitting in front of them. Indeed, early in the history of PowerShell, Microsoft added support for cmdlets to run on remote systems with the -ComputerName parameter. … Continued
Jonathan Blackwell
A Comprehensive Look at Automated User Account Options and Practices
7 months ago
This post first appeared on blog.netwrix.com and was written by Jonathan Blackwell.
Each individual in your organization needs a user account to access data, applications, servers, cloud services and other resources. If you have just a few accounts, you may be able to create, secure and govern them throughout their lifecycle using manual processes. However, manual processes are highly prone to human errors and do not scale … Continued
Each individual in your organization needs a user account to access data, applications, servers, cloud services and other resources. If you have just a few accounts, you may be able to create, secure and govern them throughout their lifecycle using manual processes. However, manual processes are highly prone to human errors and do not scale … Continued
Jonathan Blackwell
Checked
3 hours 55 minutes ago

The Netwrix blog is a free source of best practices, trends and expert advice for cybersecurity and IT pros.
Netwrix Blog | Insights for Cybersecurity and IT Pros feed