NSA shares tips on securing Windows devices with PowerShell


4 points | by Stratoscope 12 days ago


  • Stratoscope 12 days ago
    I realize that the HN guidelines recommend submitting original sources instead of secondary sources. In this case I chose to submit the bleepingcomputer article because it gives a nice overview of the topic and is much easier to read on a mobile device than the original NSA/CISA/NCSC PDF file.

    The article links to the original PDF, which can be found here for anyone who prefers to go directly to it: