GetSecureScore

How to Fix “Incomplete Certificate Chains” on Palo Alto Firewalls

Find websites that cause incomplete certificate chain errors. Filter the Decryption log to identify Decryption sessions that failed because of an incomplete certificate chain.In the filter field, type the query (err_index eq Certificate) and (error contains ‘http’). This query filters the logs for Certificate errors that contain the string “http”, which finds all of the error Read More

GetSecureScore

How to Assign the Windows Company Portal Via Intune To manage devices and install apps, your users can optionally use the Company Portal app. You can assign the Windows Company Portal app directly from Intune using Microsoft Store app (new) apps. Prerequisites You can choose to install the Company Portal app using the steps below. The Company Portal app Read More

GetSecureScore

How to Redirect a Subdomain to a URL with Cloudflare

As a data scientist or software engineer, you may need to redirect a subdomain to a URL for various reasons. One of the easiest ways to achieve this is by using Cloudflare, a popular content delivery network (CDN) and DNS provider. In this article, we will go through the steps involved in redirecting a subdomain Read More

GetSecureScore

How to Add Web Apps to Microsoft Intune

Intune supports a variety of app types, including web apps. A web app is a client-server application. The server provides the web app, which includes the UI, content, and functionality. Additionally, modern web-hosting platforms commonly offer security, load balancing, and other benefits. A web app is separately maintained on the web. You use Microsoft Intune Read More

GetSecureScore

How to Fix Microsoft IIS Tilde Character Short File/Folder Name Disclosure

Description Microsoft Internet Information Server (IIS) suffers from a vulnerability which allows the detection of short names of files and directories which have en equivalent in the 8.3 version of the file naming scheme. By crafting specific requests containing the tilde ‘~‘ character, an attacker could leverage this vulnerability to find files or directories that Read More

GetSecureScore

How to Uninstall Software Using PowerShell

Most of us have uninstalled programs from our PCs. How have you done it? Can you recollect? We’ve done it mostly using the Control Panel or in some cases, if dealing with more complex suites, their own uninstall process.  These options are convenient to remove a single program, they’re not scalable. Imagine for a moment Read More