Detecting malicious elevation of privileges

Good security is often achieved through the use of several different layers of protection. One layer of protection is blocking or detecting when a lower level user (non-administrator) is trying to elevate their privileges. On Windows there are many different…

Read More

Friends Don’t Let Friends’ Servers Get Exploited

Brian Krebs reported yesterday on a service that he’s been researching that is selling access to exploited Microsoft Windows servers. Krebs says that the service is renting access to nearly 17,000 computers worldwide, although almost 300,000 compromised systems have passed…

Read More

Changing a cloud VM’s hostname

When you’re working with servers, you may run across cloud servers whose hostnames aren’t very descriptive. How about 30714-2-1290387 or domU-12-31-39-09-E5-E7 for a hostname of a server. Don’t they look like they could be a part number or a serial…

Read More

Secure Windows File Sharing With Halo

While there are many SaaS based file storage solutions on the market, sometimes it is preferable to stick with corporate approved file storage. But what if you need to deploy a standard Windows 2008 file server and still take advantage…

Read More

Seeing the whole firewall

While we’ve worked hard to make firewall creation simple and easy to use, we do realize that it’s sometimes helpful to see the raw firewall that will be applied to a system.  Doing this shows you the individual rules created…

Read More

Windows Firewall Change Alerts

When an attacker compromises a server, one of the first things they may go after is the host based firewall. Modifying the firewall can permit them to transfer a rootkit onto the local system, or open a backdoor through which…

Read More

Getting Started with Halo for Windows

Welcome to the CloudPassage guide to getting started with Halo for Windows.  This 3 min video will show you how to get you up and running in our Basic Edition from your first login, showing you how to install your…

Read More