Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Blog

PowerShell

PowerShell Obfuscation: Stealth Through Confusion, Part II

Michael Buckbee

Michael Buckbee

Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...

How To Use PowerShell for Privilege Escalation with Local Computer Accounts

Michael Buckbee

Michael Buckbee

Privilege escalation is when an attacker is able to exploit the current rights of an account to gain additional, unexpected access. While this can be caused by zero-day vulnerabilities, state-level...

What is Endpoint Security? A Complete Guide

Michael Buckbee

Michael Buckbee

Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.

Practical PowerShell for IT Security, Part V: Security Scripting Platform Gets a Makeover

Michael Buckbee

Michael Buckbee

A few months ago, I began a mission to prove that PowerShell can be used as a security monitoring tool. I left off with this post, which had PowerShell code...

Disabling PowerShell and Other Malware Nuisances, Part III

Michael Buckbee

Michael Buckbee

One of the advantages of AppLocker over Software Restriction Policies is that it can selectively enable PowerShell for Active Directory groups. I showed how this can be done in the...

Disabling PowerShell and Other Malware Nuisances, Part II

Michael Buckbee

Michael Buckbee

Whitelisting apps is nobody’s idea of fun. You need to start with a blank slate, and then carefully add back apps you know to be essential and non-threatening. That’s the...

How to use PowerShell for WannaCry / WannaCrypt cleanup and prevention

Michael Buckbee

Michael Buckbee

Use PowerShell to help test and resolve issues from WannaCry / WannaCrypt variants and other ransomware attacks.

Practical PowerShell for IT Security, Part IV:  Security Scripting Platform (SSP)

Michael Buckbee

Michael Buckbee

In the previous post in this series, I suggested that it may be possible to unify my separate scripts — one for event handling, the other for classification — into...

Practical PowerShell for IT Security, Part II: File Access Analytics (FAA)

Michael Buckbee

Michael Buckbee

In working on this series, I almost feel that with PowerShell we have technology that somehow time-traveled back from the future. Remember on Star Trek – the original of course...

The Difference Between Bash and Powershell

Michael Buckbee

Michael Buckbee

You don’t normally talk philosophy and IT when considering Bash and Powershell, but if it’s one thing I’ve learned over the past 20 years of sysadmin work it’s that whether...

The Complete PowerShell Tool Roundup

Michael Buckbee

Michael Buckbee

A hand-curated list of 70 tools to power up your workflow.

Using PowerShell to Combat CryptoLocker

Michael Buckbee

Michael Buckbee

On the Varonis blog, we recently wrote about how CryptoLocker—the malware that encrypts your local files and holds them for a Bitcoin ransom—has better marketing than many companies. However, we...

1 2 3

Next

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.