Nathan Blasac (@nblasac) 's Twitter Profile
Nathan Blasac

@nblasac

ID: 3253695411

linkhttp://nathanblasac.com calendar_today14-05-2015 12:08:53

7,7K Tweet

1,1K Followers

3,3K Following

Damien Van Robaeys [MVP] (@syst_and_deploy) 's Twitter Profile Photo

Manel Rodero In my case I use the awesome module runasuser from Kelvin Tegelaar - MVP. You can find an example in my systray tool About my device. A service is executed in SYSTEM and display a tray app in user context: systanddeploy.com/2021/03/about-…

Stephan Berger (@malmoeb) 's Twitter Profile Photo

#ThreatHunting: Check the following 🔑: "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon\SpecialAccounts\UserList" /v user 💡 If you got a hit, the user is "hidden" 🥷 from the login screen, and you might have a backdoor account on this system. 🔍 #CyberSecurity

David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

So, when Windows 11 marketing says "built on zero trust principles" What it actually means is "there's always going to be a TPM and VBS running that you can use for attestation" SO YOU DON'T HAVE TO TRUST SOFTWARE THE ADMIN CAN MODIFY. No cap, this is an insane capability.

Steve Thomas - I'm at @stevethomas.bsky.social (@madvirtualizer) 's Twitter Profile Photo

Roadmap update for drivers & firmware in #WUFB - In May 2022, management reporting in Update Compliance will join the private preview, and all will public preview in July 2022. It will be publicly available in #MSIntune later this year. techcommunity.microsoft.com/t5/windows-it-…

JOYMALYA BASU ROY | MVP (@jbasuroy369) 's Twitter Profile Photo

Configuring NDES for #MSIntune is often dreaded by many as it seems to be a daunting task, but IMHO, it's pretty simple if you can visualize all the components and structure actions in steps. Sharing snip of a slide that I am preparing for an upcoming workshop. #MEMPowered

Configuring NDES for #MSIntune is often dreaded by many as it seems to be a daunting task, but IMHO, it's pretty simple if you can visualize all the components and structure actions in steps. Sharing snip of a slide that I am preparing for an upcoming workshop. #MEMPowered
Pim Jacobs (@pimjacobs89) 's Twitter Profile Photo

[BLOG ALERT📣] #Windows Hello for Business Hybrid Cloud-Trust is here! Going #passwordless with #Windows Hello for Business has never been easier by using Cloud-Trust!📈 📣Start updating / implementing your deployment today!👇🏻 identity-man.eu/2022/02/17/imp… #mvpbuzz #security #AzureAD

Sophie Dimelow (@dimelow_sophie) 's Twitter Profile Photo

Have you ever just wanted a clear explanation of what’s included in the M365 Business licenses? All in one page you say… You are welcome!

Have you ever just wanted a clear explanation of what’s included in the M365 Business licenses?

All in one page you say…

You are welcome!
Merill Fernando (@merill) 's Twitter Profile Photo

Pro Tip: If you are on Windows 11, run this command to upgrade to the latest version of PowerShell. winget install microsoft.powershell

Pro Tip: If you are on Windows 11, run this command to upgrade to the latest version of PowerShell.

winget install microsoft.powershell
James Shields (@shieldsjames) 's Twitter Profile Photo

If you use your Xbox controller on a Windows 11 PC, check out this early preview of a new feature called controller bar. This is a new view of Xbox Game Bar that provides easy, controller-friendly access to recently played games and game launchers. More details below!

If you use your Xbox controller on a Windows 11 PC, check out this early preview of a new feature called controller bar. This is a new view of Xbox Game Bar that provides easy, controller-friendly access to recently played games and game launchers. More details below!
mpgn (@mpgn_x64) 's Twitter Profile Photo

Dumping LSASS is such a 2020 move, let me introduce a new CrackMapExec module called Masky developed by Zak 🎉 If you have admin privilege, the module will impersonate all users connected -> ask a certificate (ADCS) -> retrieve the NT hash using PKINIT 🚀 Crazy module 🪂

Dumping LSASS is such a 2020 move, let me introduce a new CrackMapExec module called Masky developed by <a href="/_ZakSec/">Zak</a> 🎉

If you have admin privilege, the module will impersonate all users connected -&gt; ask a certificate (ADCS) -&gt; retrieve the NT hash using PKINIT 🚀

Crazy module 🪂
ConfigMgrDogs (@configmgrdogs) 's Twitter Profile Photo

Introducing the new Microsoft Intune Suite: Today, Microsoft Intune is introducing the Microsoft Intune Suite which unifies mission-critical advanced endpoint management and security solutions into one simple bundle. The new Microsoft… bit.ly/3ELlQBD #MEM #MSIntune

@kevmjohnston@infosec.exchange (@kevmjohnston) 's Twitter Profile Photo

Adam Juelich This command might be an option (I stole with pride from Roger Zander 's Client Center): (quser) | ? { !$_.contains('USERNAME') } | % { logoff $_.substring(43,2).Trim() }