<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity - Fix The Exchange!</title>
	<atom:link href="https://www.fixtheexchange.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.fixtheexchange.com</link>
	<description>Official Blog of Josh M. Bryant</description>
	<lastBuildDate>Fri, 05 Dec 2025 15:54:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Reducing the Exchange and Active Directory Attack Surface</title>
		<link>https://www.fixtheexchange.com/2019/02/12/reducing-the-exchange-and-active-directory-attack-surface/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reducing-the-exchange-and-active-directory-attack-surface&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reducing-the-exchange-and-active-directory-attack-surface</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 22:16:04 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange 2010]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange 2016]]></category>
		<category><![CDATA[Exchange 2019]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=403</guid>

					<description><![CDATA[<p>Three years ago I wrote a document titled &#8220;Removing Exchange&#8217;s ability to impact Tier 0 and Tier 1&#8221; that was distributed internally at Microsoft as well as to dozens of Microsoft customers as part of Cybersecurity services delivered through Microsoft Consulting Services (MCS). I had always intended to get this document published publicly, but for [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/02/12/reducing-the-exchange-and-active-directory-attack-surface/">Reducing the Exchange and Active Directory Attack Surface</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Three years ago I wrote a document titled &#8220;Removing Exchange&#8217;s ability to impact Tier 0 and Tier 1&#8221; that was distributed internally at Microsoft as well as to dozens of Microsoft customers as part of Cybersecurity services delivered through Microsoft Consulting Services (MCS).</p>



<p>I had always intended to get this document published publicly, but for one reason or another, it never happened.   With <a href="https://support.microsoft.com/en-us/help/4490059/using-shared-permissions-model-to-run-exchange-server">KB4490059</a> being released in response to <a href="https://twitter.com/_dirkjan">@_dirkjan</a>&#8216;s <a href="https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/">#PriveExchange</a> vulnerability, I&#8217;ve decided it&#8217;s beyond time to just share it here on my blog.  <a href="https://support.microsoft.com/en-us/help/4490059/using-shared-permissions-model-to-run-exchange-server">KB4490059</a> is a step in the right direction. You can add these mitigations on top of it for even further protections, or perhaps find a more compelling reason to switch to the Active Directory Split Permissions model. </p>



<p><strong>Removing Exchange&#8217;s ability to impact Tier 0 and Tier 1</strong></p>



<p>Exchange is tightly integrated with Active Directory. When Exchange is installed, the Active Directory Schema is extended, and several highly privileged groups are created. These privileged groups are granted rights to a large number of objects within Active Directory.  A compromised Exchange Server can easily lead to complete control of Tier 1, and in many instances Tier 0. </p>



<p>For more information on the Tier model, see “<a href="https://technet.microsoft.com/en-us/library/mt631194.aspx">Securing Privileged Access</a>”.
</p>



<p>In Exchange 2010 and later, there are two options for
mitigating this risk. Both should be evaluated carefully before implementation.
It is only necessary to implement one of these two options. </p>



<p><strong>Mitigation Option 1 –
Implement the Active Directory Split Permissions Model</strong></p>



<p>Starting with Exchange 2010, there are <a href="https://technet.microsoft.com/en-us/library/dd638106(v=exchg.141).aspx">three Permissions Models available</a>.
Of the three, the <a href="https://technet.microsoft.com/en-us/library/dd638106(v=exchg.141).aspx#ADSplit">Active Directory Split Permissions Model</a>,
is the only one that can mitigate this risk without additional modifications to
Active Directory. Because this model does not allow Exchange to modify security
principles (i.e. create/delete/reset password) or group membership (i.e. add
members to security groups that may grant access to other systems), compromise
of an Exchange Server is contained to the Exchange environment when running
under this permissions model.</p>



<p>This permissions model isn’t for everyone. You should
carefully consider the impact switching to Active Directory Split Permissions
may have on your organization. It may require a significant change in user
provisioning, business practices, or workflows that revolve around Exchange. It
is also important to note that while this permissions model is fully supported
by the Exchange Product Group, it does not receive the same level of testing as
the default Shared Permissions model.</p>



<p>If you’ve determined that the Active Directory Split
Permissions Model is right for your organization, you can switch to it by
running the following setup command:</p>



<p>setup.com
/PrepareAD /ActiveDirectorySplitPermissions:true</p>



<p>For
more information on configuring split permissions, see “<a href="https://technet.microsoft.com/en-us/library/dd638155(v=exchg.141).aspx">Configure Exchange 2010 for Split Permissions</a>”.</p>



<p>Implementing the Active Directory Split Permissions model
both removes Exchange from Tier 0, placing it in Tier 1, and reduces potential
impact to Tier 1.</p>



<p><strong>Mitigation Option 2 –
Reduce privileges granted to Exchange in Active Directory</strong></p>



<p>If your organization needs to use the default Shared
Permissions Model, the RBAC Split Permissions Model, or still has legacy
versions of Exchange present, modifications to permissions in Active Directory
are required to mitigate this risk.</p>



<p>To remove Exchange’s potential to impact to Tier 0,
permissions granted to Exchange’s privileged groups must be removed from the Access
Control List (ACL) on the following groups and their members in all domains
within the Active Directory Forest Exchange has been installed in, to include
any nested groups and members of those nested groups.</p>



<ul class="wp-block-list"><li>Enterprise
Admins</li><li>Domain
Admins</li><li>Schema
Admin</li><li>BUILTIN\Administrators</li><li>Account
Operators</li><li>Backup
Operators</li><li>Print
Operators</li><li>Server
Operators</li><li>Domain
Controllers</li><li>Read-only
Domain Controllers</li><li>Group
Policy Creators Owners</li><li>Cryptographic
Operators</li><li>Other
Delegated Groups</li></ul>



<p>With the exception of the last 3 entries above, these groups
should already be protected by AdminSDHolder, which prevents them from
inheriting permissions that would allow Exchange’s privileged groups (Exchange
Trusted Subsystem, Exchange Windows Permissions, Organization Management, etc.)
to take control of them. Members of these groups should have the same
protection. However, since Account Operators, Backup Operators, Print
Operators, and Server Operators, can be excluded from AdminSDHolder protection,
it is worthwhile to take the extra step of removing Exchange’s permission to
all of the above groups (if present).</p>



<p>Because the permissions are inherited, the easiest way to
accomplish this, is to place all Tier 0 users and groups into the same OU,
block inheritance on that OU, and restrict permissions on the ACL for that OU.
Full Control (GenericAll), Write (GenericWrite), Modify Permissions
(WriteDacl), Write Member (WriteMember), and Change Password (note that Change
Password permissions should NOT be removed from “Everyone” or “SELF”), are the
permissions that should be removed from any object that should not have the
ability to manipulate Tier 0 OUs/users/groups. In most cases the entire
security principal can be removed from the Tier 0 OUs/users/groups.</p>



<p>To remove Exchange’s potential to impact Tier 1, a similar
approach to the above must be taken.&nbsp;
Exchange’s permissions on the ACLs of users and groups with privileged
access to Tier 1 assets.</p>



<p>Because the permissions are inherited, the easiest way to
accomplish this, is to place all Tier 1 privileged users and groups into the
same OU, block inheritance on that OU, and restrict permissions on the ACL for
that OU. Full Control (GenericAll), Write (GenericWrite), Modify Permissions
(WriteDACLl), and Write Member (WriteMember), are the permissions that should
be removed from any object that should not have the ability to manipulate Tier
1 privileged users/groups. In most cases the entire security principal can be
removed from the ACL on the Tier 1 OUs/users/groups.</p>



<p>For example, Exchange should not have permissions to an
account or group that grants privileged access to a SQL server.</p>



<p>Privileged accounts and groups should NOT be mail enabled.
Therefore removing Exchange’s permissions from them should have no negative
impact on operations.&nbsp; If an account
with, or a group used to grant privileged access to, any system, regardless of
what tier it resides in, has been mail enabled, privileges should either by
removed, or they should be mail disabled. Either way, it may be necessary to
create unprivileged accounts/groups for mail use, or non-mail enabled
accounts/groups for privileged access use, in order to avoid disruptions.</p>



<p>This approach is not tested by the Exchange Product Group. Failure to exercise caution when implementing this approach could result in damage to the Exchange environment. </p>



<p><strong>Additional
Considerations</strong></p>



<p>Service Packs and Cumulative Updates in Exchange often
include Schema updates to Active Directory. Because <a href="https://technet.microsoft.com/en-us/library/bb125224(v=exchg.160).aspx">Schema extensions and Active Directory
preparation</a> require Schema Admins and Enterprise
Admins privileges, this portion of updating Exchange is a Tier 0 operation.
Schema extensions and Active Directory preparation must be performed from a
Tier 0 Privileged Access Workstation (PAW).</p>



<p>Schema extension and Active Directory preparation performed
during an update to Exchange may overwrite some Exchange related settings in
Active Directory. It is recommended that permissions on Tier 0 and Tier 1 set
according to the guidance above are validated after every Exchange update install.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://www.fixtheexchange.com/wp-content/uploads/2025/12/4000px_transparent-scaled.png" width="100"  height="100" alt="" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.fixtheexchange.com/author/josh/" class="vcard author" rel="author"><span class="fn">Josh Bryant</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Cybersecurity Product Leader and internationally recognized Speaker at several Information Security conferences and events with over 26 years of experience as a proven leader in Cybersecurity, Product Management, Threat Hunting, Incident Response, IT Management, IT Architecture, IT Operations, IT Engineering, and Messaging Systems, on a global scale, across a diverse set of industries in both the Public and Private sectors.</p>
</div></div><div class="saboxplugin-web "><a href="http://192.168.2.21:30040" target="_self" >192.168.2.21:30040</a></div><div class="clearfix"></div><div class="saboxplugin-socials sabox-colored"><a title="Linkedin" target="_self" href="https://www.linkedin.com/in/josh-m-bryant/" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-linkedin" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 7.6-0.4 15.2-1 22.6-0.2 2.2-0.4 4.4-0.7 6.6-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7 0 0.3-0.1 0.6-0.2 0.9-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-1.5 5.3-3.2 10.5-5 15.6-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2c-0.2 0-0.3 0.1-0.5 0.1l-3 0.6c-1.8 0.3-3.6 0.6-5.4 0.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#0077b5" /><path class="st1" d="m485 335.5c-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2l-148.3-148.1 35.3-142.9-32-37.6 38.1-38.7 68 68.4h11.9l9.5 9.3 70.5-3.9 135 133.3z" /><path class="st2" d="m195.6 347.6h-46.9v-150.8h46.9v150.8zm-23.5-171.4c-15 0-27.1-12.4-27.1-27.4s12.2-27.1 27.1-27.1c15 0 27.1 12.2 27.1 27.1s-12.1 27.4-27.1 27.4zm198.9 171.4h-46.8v-73.4c0-17.5-0.4-39.9-24.4-39.9-24.4 0-28.1 19-28.1 38.7v74.7h-46.8v-150.9h44.9v20.6h0.7c6.3-11.9 21.5-24.4 44.3-24.4 47.4 0 56.1 31.2 56.1 71.8l0.1 82.8z" /></svg></span></a><a title="Twitter" target="_self" href="https://x.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-twitter" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 148 148">
  <path d="M 63.907 0.948 C 37.893 3.663 14.65 20.788 4.083 45.024 C -2.727 60.67 -3.86 78.686 0.975 95.272 C 6.947 115.953 22.396 133.424 42.387 142.162 C 58.034 148.972 76.05 150.106 92.636 145.27 C 117.461 138.113 137.009 117.731 143.424 92.408 C 153.443 52.724 128.862 12.148 89.079 2.675 C 80.342 0.602 72.646 0.058 63.907 0.948 Z M 64.893 46.801 C 71.21 55.192 76.544 62.103 76.741 62.103 C 76.938 62.103 83.504 55.192 91.252 46.801 L 105.419 31.5 L 113.463 31.5 L 111.735 33.328 C 110.749 34.361 104.332 41.322 97.47 48.775 C 90.61 56.229 83.898 63.483 82.563 64.817 L 80.194 67.334 L 98.705 91.965 C 108.874 105.538 117.215 116.789 117.215 116.99 C 117.215 117.238 111.145 117.383 103.787 117.383 L 90.314 117.334 L 77.777 100.553 C 69.14 88.954 65.092 83.965 64.697 84.265 C 64.401 84.512 57.39 92.065 49.1 101.046 L 34.045 117.383 L 30.242 117.383 C 28.122 117.383 26.395 117.283 26.395 117.138 C 26.395 116.99 34.243 108.398 43.816 98.084 C 53.345 87.768 61.243 79.131 61.339 78.984 C 61.391 78.784 53.542 68.074 43.918 55.192 C 34.293 42.359 26.395 31.747 26.395 31.646 C 26.395 31.55 32.465 31.5 39.919 31.5 L 53.442 31.5 L 64.893 46.801 Z M 64.893 46.801" />
  <path d="M 38.588 38.114 C 38.784 38.459 51.22 55.142 66.128 75.082 L 93.276 111.411 L 99.344 111.461 C 103.098 111.461 105.368 111.263 105.267 110.966 C 105.222 110.721 92.832 94.04 77.827 73.949 L 50.48 37.423 L 44.361 37.423 C 39.279 37.423 38.242 37.524 38.589 38.114 L 38.588 38.114 Z M 38.588 38.114" />
</svg></span></a><a title="Github" target="_self" href="https://github.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-github" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 9.9-0.6 19.7-1.7 29.2-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#4078c0" /><path class="st1" d="m495.6 296.3c-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9l-140.4-141.1-14.9-35.9-7.8-71 32.6-89.2 79.9-17.7 111.5 7.2 146.6 146.7z" /><path class="st2" d="m204 339c0 1.2-1.3 2.1-3 2.1-1.9 0.2-3.3-0.8-3.3-2.1 0-1.2 1.3-2.1 3-2.1 1.8-0.1 3.3 0.8 3.3 2.1zm-18.1-2.6c-0.4 1.2 0.8 2.5 2.5 2.8 1.5 0.6 3.3 0 3.6-1.2s-0.8-2.5-2.5-3c-1.5-0.3-3.2 0.3-3.6 1.4zm25.7-1c-1.7 0.4-2.8 1.5-2.7 2.8 0.2 1.2 1.7 1.9 3.4 1.5s2.8-1.5 2.7-2.7c-0.2-1-1.7-1.7-3.4-1.6zm38.2-222.8c-80.6 0-142.3 61.2-142.3 141.9 0 64.5 40.6 119.7 98.5 139.1 7.4 1.3 10.1-3.3 10.1-7 0-3.6-0.2-23.5-0.2-35.7 0 0-40.7 8.7-49.2-17.3 0 0-6.6-16.9-16.2-21.3 0 0-13.3-9.1 0.9-9 0 0 14.5 1.2 22.4 15 12.7 22.4 34.1 16 42.4 12.2 1.3-9.3 5.1-15.8 9.3-19.6-32.5-3.6-65.3-8.3-65.3-64.2 0-16 4.4-24 13.7-34.2-1.5-3.8-6.5-19.4 1.5-39.5 12.2-3.8 40.1 15.7 40.1 15.7 11.6-3.3 24.1-4.9 36.5-4.9s24.9 1.7 36.5 4.9c0 0 28-19.5 40.1-15.7 8 20.2 3 35.7 1.5 39.5 9.3 10.3 15 18.3 15 34.2 0 56.1-34.2 60.6-66.7 64.2 5.3 4.6 9.9 13.3 9.9 27 0 19.6-0.2 43.8-0.2 48.6 0 3.8 2.7 8.4 10.1 7 58.1-19.3 97.6-74.5 97.6-139 0.1-80.6-65.3-141.9-146-141.9zm-85.8 200.6c-0.8 0.6-0.6 1.9 0.4 3 0.9 0.9 2.3 1.3 3 0.6 0.8-0.6 0.6-1.9-0.4-3-0.9-1-2.2-1.4-3-0.6zm-6.3-4.7c-0.4 0.8 0.2 1.7 1.3 2.3 0.9 0.6 2.1 0.4 2.5-0.4s-0.2-1.7-1.3-2.3c-1.1-0.4-2-0.2-2.5 0.4zm18.9 20.7c-0.9 0.8-0.6 2.5 0.8 3.6 1.3 1.3 3 1.5 3.8 0.6 0.8-0.8 0.4-2.5-0.8-3.6-1.3-1.4-3.1-1.6-3.8-0.6zm-6.6-8.6c-0.9 0.6-0.9 2.1 0 3.4s2.5 1.9 3.3 1.3c0.9-0.8 0.9-2.3 0-3.6s-2.4-1.8-3.3-1.1z" /></svg></span></a></div></div></div><p>The post <a href="https://www.fixtheexchange.com/2019/02/12/reducing-the-exchange-and-active-directory-attack-surface/">Reducing the Exchange and Active Directory Attack Surface</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hunting Webshells on Microsoft Exchange Server</title>
		<link>https://www.fixtheexchange.com/2017/05/08/hunting-webshells-on-microsoft-exchange-server/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hunting-webshells-on-microsoft-exchange-server&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hunting-webshells-on-microsoft-exchange-server</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Mon, 08 May 2017 14:15:40 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange 2016]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/hunting-webshells-on-microsoft-exchange-server/</guid>

					<description><![CDATA[<p>Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? What should you look for? Backdoor implants in the form of webshells hiding in OWA are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2017/05/08/hunting-webshells-on-microsoft-exchange-server/">Hunting Webshells on Microsoft Exchange Server</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? What should you look for? Backdoor implants in the form of webshells hiding in OWA are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using default logging available on every Exchange Server, through real world examples. It’s easier than you might think, and these techniques can help up your DFIR game in environments containing Exchange Servers!</p>



<p>This talk was originally presented at the 2017 SANS Threat Hunting and Incident Response Summit.  A recording of this talk and the slide deck from it are available below.  If you would like an updated version of this talk presented at your event or conference, please contact me on  <a href="https://twitter.com/fixtheexchange">Twitter</a> or <a href="http://www.linkedin.com/in/josh-m-bryant">LinkedIn</a>.</p>



<figure><iframe width="560" height="315" src="https://www.youtube.com/embed/AbQ_4R5Z5Fg" allowfullscreen=""></iframe></figure>



<figure><iframe src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21435197&amp;authkey=AMxykzdQ12vPU4g&amp;em=2" width="402" height="327"></iframe></figure>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.fixtheexchange.com/wp-content/uploads/2025/12/4000px_transparent-scaled.png" width="100"  height="100" alt="" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.fixtheexchange.com/author/josh/" class="vcard author" rel="author"><span class="fn">Josh Bryant</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Cybersecurity Product Leader and internationally recognized Speaker at several Information Security conferences and events with over 26 years of experience as a proven leader in Cybersecurity, Product Management, Threat Hunting, Incident Response, IT Management, IT Architecture, IT Operations, IT Engineering, and Messaging Systems, on a global scale, across a diverse set of industries in both the Public and Private sectors.</p>
</div></div><div class="saboxplugin-web "><a href="http://192.168.2.21:30040" target="_self" >192.168.2.21:30040</a></div><div class="clearfix"></div><div class="saboxplugin-socials sabox-colored"><a title="Linkedin" target="_self" href="https://www.linkedin.com/in/josh-m-bryant/" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-linkedin" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 7.6-0.4 15.2-1 22.6-0.2 2.2-0.4 4.4-0.7 6.6-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7 0 0.3-0.1 0.6-0.2 0.9-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-1.5 5.3-3.2 10.5-5 15.6-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2c-0.2 0-0.3 0.1-0.5 0.1l-3 0.6c-1.8 0.3-3.6 0.6-5.4 0.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#0077b5" /><path class="st1" d="m485 335.5c-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2l-148.3-148.1 35.3-142.9-32-37.6 38.1-38.7 68 68.4h11.9l9.5 9.3 70.5-3.9 135 133.3z" /><path class="st2" d="m195.6 347.6h-46.9v-150.8h46.9v150.8zm-23.5-171.4c-15 0-27.1-12.4-27.1-27.4s12.2-27.1 27.1-27.1c15 0 27.1 12.2 27.1 27.1s-12.1 27.4-27.1 27.4zm198.9 171.4h-46.8v-73.4c0-17.5-0.4-39.9-24.4-39.9-24.4 0-28.1 19-28.1 38.7v74.7h-46.8v-150.9h44.9v20.6h0.7c6.3-11.9 21.5-24.4 44.3-24.4 47.4 0 56.1 31.2 56.1 71.8l0.1 82.8z" /></svg></span></a><a title="Twitter" target="_self" href="https://x.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-twitter" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 148 148">
  <path d="M 63.907 0.948 C 37.893 3.663 14.65 20.788 4.083 45.024 C -2.727 60.67 -3.86 78.686 0.975 95.272 C 6.947 115.953 22.396 133.424 42.387 142.162 C 58.034 148.972 76.05 150.106 92.636 145.27 C 117.461 138.113 137.009 117.731 143.424 92.408 C 153.443 52.724 128.862 12.148 89.079 2.675 C 80.342 0.602 72.646 0.058 63.907 0.948 Z M 64.893 46.801 C 71.21 55.192 76.544 62.103 76.741 62.103 C 76.938 62.103 83.504 55.192 91.252 46.801 L 105.419 31.5 L 113.463 31.5 L 111.735 33.328 C 110.749 34.361 104.332 41.322 97.47 48.775 C 90.61 56.229 83.898 63.483 82.563 64.817 L 80.194 67.334 L 98.705 91.965 C 108.874 105.538 117.215 116.789 117.215 116.99 C 117.215 117.238 111.145 117.383 103.787 117.383 L 90.314 117.334 L 77.777 100.553 C 69.14 88.954 65.092 83.965 64.697 84.265 C 64.401 84.512 57.39 92.065 49.1 101.046 L 34.045 117.383 L 30.242 117.383 C 28.122 117.383 26.395 117.283 26.395 117.138 C 26.395 116.99 34.243 108.398 43.816 98.084 C 53.345 87.768 61.243 79.131 61.339 78.984 C 61.391 78.784 53.542 68.074 43.918 55.192 C 34.293 42.359 26.395 31.747 26.395 31.646 C 26.395 31.55 32.465 31.5 39.919 31.5 L 53.442 31.5 L 64.893 46.801 Z M 64.893 46.801" />
  <path d="M 38.588 38.114 C 38.784 38.459 51.22 55.142 66.128 75.082 L 93.276 111.411 L 99.344 111.461 C 103.098 111.461 105.368 111.263 105.267 110.966 C 105.222 110.721 92.832 94.04 77.827 73.949 L 50.48 37.423 L 44.361 37.423 C 39.279 37.423 38.242 37.524 38.589 38.114 L 38.588 38.114 Z M 38.588 38.114" />
</svg></span></a><a title="Github" target="_self" href="https://github.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-github" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 9.9-0.6 19.7-1.7 29.2-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#4078c0" /><path class="st1" d="m495.6 296.3c-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9l-140.4-141.1-14.9-35.9-7.8-71 32.6-89.2 79.9-17.7 111.5 7.2 146.6 146.7z" /><path class="st2" d="m204 339c0 1.2-1.3 2.1-3 2.1-1.9 0.2-3.3-0.8-3.3-2.1 0-1.2 1.3-2.1 3-2.1 1.8-0.1 3.3 0.8 3.3 2.1zm-18.1-2.6c-0.4 1.2 0.8 2.5 2.5 2.8 1.5 0.6 3.3 0 3.6-1.2s-0.8-2.5-2.5-3c-1.5-0.3-3.2 0.3-3.6 1.4zm25.7-1c-1.7 0.4-2.8 1.5-2.7 2.8 0.2 1.2 1.7 1.9 3.4 1.5s2.8-1.5 2.7-2.7c-0.2-1-1.7-1.7-3.4-1.6zm38.2-222.8c-80.6 0-142.3 61.2-142.3 141.9 0 64.5 40.6 119.7 98.5 139.1 7.4 1.3 10.1-3.3 10.1-7 0-3.6-0.2-23.5-0.2-35.7 0 0-40.7 8.7-49.2-17.3 0 0-6.6-16.9-16.2-21.3 0 0-13.3-9.1 0.9-9 0 0 14.5 1.2 22.4 15 12.7 22.4 34.1 16 42.4 12.2 1.3-9.3 5.1-15.8 9.3-19.6-32.5-3.6-65.3-8.3-65.3-64.2 0-16 4.4-24 13.7-34.2-1.5-3.8-6.5-19.4 1.5-39.5 12.2-3.8 40.1 15.7 40.1 15.7 11.6-3.3 24.1-4.9 36.5-4.9s24.9 1.7 36.5 4.9c0 0 28-19.5 40.1-15.7 8 20.2 3 35.7 1.5 39.5 9.3 10.3 15 18.3 15 34.2 0 56.1-34.2 60.6-66.7 64.2 5.3 4.6 9.9 13.3 9.9 27 0 19.6-0.2 43.8-0.2 48.6 0 3.8 2.7 8.4 10.1 7 58.1-19.3 97.6-74.5 97.6-139 0.1-80.6-65.3-141.9-146-141.9zm-85.8 200.6c-0.8 0.6-0.6 1.9 0.4 3 0.9 0.9 2.3 1.3 3 0.6 0.8-0.6 0.6-1.9-0.4-3-0.9-1-2.2-1.4-3-0.6zm-6.3-4.7c-0.4 0.8 0.2 1.7 1.3 2.3 0.9 0.6 2.1 0.4 2.5-0.4s-0.2-1.7-1.3-2.3c-1.1-0.4-2-0.2-2.5 0.4zm18.9 20.7c-0.9 0.8-0.6 2.5 0.8 3.6 1.3 1.3 3 1.5 3.8 0.6 0.8-0.8 0.4-2.5-0.8-3.6-1.3-1.4-3.1-1.6-3.8-0.6zm-6.6-8.6c-0.9 0.6-0.9 2.1 0 3.4s2.5 1.9 3.3 1.3c0.9-0.8 0.9-2.3 0-3.6s-2.4-1.8-3.3-1.1z" /></svg></span></a></div></div></div><p>The post <a href="https://www.fixtheexchange.com/2017/05/08/hunting-webshells-on-microsoft-exchange-server/">Hunting Webshells on Microsoft Exchange Server</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Join me at the 2017 SANS Threat Hunting and Incident Response Summit &#8211; April 18th and 19th</title>
		<link>https://www.fixtheexchange.com/2016/12/13/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Tue, 13 Dec 2016 11:13:14 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Exchange 2010]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange 2016]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/</guid>

					<description><![CDATA[<p>I&#8217;ll be presenting a brand new session titled &#8220;Hunting Webshells on Microsoft Exchange Server&#8221; at the 2017 SANS Threat Hunting and Incident Response Summit in New Orleans on April 18th and 19th! My session abstract:&#8220;Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2016/12/13/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/">Join me at the 2017 SANS Threat Hunting and Incident Response Summit – April 18th and 19th</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ll be presenting a brand new session titled &#8220;Hunting Webshells on Microsoft Exchange Server&#8221; at the 2017 SANS Threat Hunting and Incident Response Summit in New Orleans on April 18th and 19th!</p>
<p><strong>My session abstract:</strong><br />&#8220;Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? What should you look for? Backdoor implants in the form of webshells hiding in OWA are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using default logging available on every Exchange Server, through real world examples. It’s easier than you might think, and these techniques can help up your DFIR game in environments containing Exchange Servers!&#8221;</p>
<p><strong>Full agenda: </strong><a href="https://www.sans.org/event-downloads/45247/agenda.pdf">https://www.sans.org/event-downloads/45247/agenda.pdf</a></p>
<p><strong>More details: </strong><a href="https://www.sans.org/event/threat-hunting-and-incident-response-summit-2017">https://www.sans.org/event/threat-hunting-and-incident-response-summit-2017</a></p>
<p>If you can&#8217;t make the summit, a recording should be available afterwards.&nbsp; I&#8217;ll post a link to the recording and a detailed blog on this subject when available.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.fixtheexchange.com/wp-content/uploads/2025/12/4000px_transparent-scaled.png" width="100"  height="100" alt="" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.fixtheexchange.com/author/josh/" class="vcard author" rel="author"><span class="fn">Josh Bryant</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Cybersecurity Product Leader and internationally recognized Speaker at several Information Security conferences and events with over 26 years of experience as a proven leader in Cybersecurity, Product Management, Threat Hunting, Incident Response, IT Management, IT Architecture, IT Operations, IT Engineering, and Messaging Systems, on a global scale, across a diverse set of industries in both the Public and Private sectors.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="http://192.168.2.21:30040" target="_self" >192.168.2.21:30040</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials sabox-colored"><a title="Linkedin" target="_self" href="https://www.linkedin.com/in/josh-m-bryant/" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-linkedin" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 7.6-0.4 15.2-1 22.6-0.2 2.2-0.4 4.4-0.7 6.6-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7 0 0.3-0.1 0.6-0.2 0.9-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-1.5 5.3-3.2 10.5-5 15.6-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2c-0.2 0-0.3 0.1-0.5 0.1l-3 0.6c-1.8 0.3-3.6 0.6-5.4 0.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#0077b5" /><path class="st1" d="m485 335.5c-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2l-148.3-148.1 35.3-142.9-32-37.6 38.1-38.7 68 68.4h11.9l9.5 9.3 70.5-3.9 135 133.3z" /><path class="st2" d="m195.6 347.6h-46.9v-150.8h46.9v150.8zm-23.5-171.4c-15 0-27.1-12.4-27.1-27.4s12.2-27.1 27.1-27.1c15 0 27.1 12.2 27.1 27.1s-12.1 27.4-27.1 27.4zm198.9 171.4h-46.8v-73.4c0-17.5-0.4-39.9-24.4-39.9-24.4 0-28.1 19-28.1 38.7v74.7h-46.8v-150.9h44.9v20.6h0.7c6.3-11.9 21.5-24.4 44.3-24.4 47.4 0 56.1 31.2 56.1 71.8l0.1 82.8z" /></svg></span></a><a title="Twitter" target="_self" href="https://x.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-twitter" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 148 148">
  <path d="M 63.907 0.948 C 37.893 3.663 14.65 20.788 4.083 45.024 C -2.727 60.67 -3.86 78.686 0.975 95.272 C 6.947 115.953 22.396 133.424 42.387 142.162 C 58.034 148.972 76.05 150.106 92.636 145.27 C 117.461 138.113 137.009 117.731 143.424 92.408 C 153.443 52.724 128.862 12.148 89.079 2.675 C 80.342 0.602 72.646 0.058 63.907 0.948 Z M 64.893 46.801 C 71.21 55.192 76.544 62.103 76.741 62.103 C 76.938 62.103 83.504 55.192 91.252 46.801 L 105.419 31.5 L 113.463 31.5 L 111.735 33.328 C 110.749 34.361 104.332 41.322 97.47 48.775 C 90.61 56.229 83.898 63.483 82.563 64.817 L 80.194 67.334 L 98.705 91.965 C 108.874 105.538 117.215 116.789 117.215 116.99 C 117.215 117.238 111.145 117.383 103.787 117.383 L 90.314 117.334 L 77.777 100.553 C 69.14 88.954 65.092 83.965 64.697 84.265 C 64.401 84.512 57.39 92.065 49.1 101.046 L 34.045 117.383 L 30.242 117.383 C 28.122 117.383 26.395 117.283 26.395 117.138 C 26.395 116.99 34.243 108.398 43.816 98.084 C 53.345 87.768 61.243 79.131 61.339 78.984 C 61.391 78.784 53.542 68.074 43.918 55.192 C 34.293 42.359 26.395 31.747 26.395 31.646 C 26.395 31.55 32.465 31.5 39.919 31.5 L 53.442 31.5 L 64.893 46.801 Z M 64.893 46.801" />
  <path d="M 38.588 38.114 C 38.784 38.459 51.22 55.142 66.128 75.082 L 93.276 111.411 L 99.344 111.461 C 103.098 111.461 105.368 111.263 105.267 110.966 C 105.222 110.721 92.832 94.04 77.827 73.949 L 50.48 37.423 L 44.361 37.423 C 39.279 37.423 38.242 37.524 38.589 38.114 L 38.588 38.114 Z M 38.588 38.114" />
</svg></span></a><a title="Github" target="_self" href="https://github.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-github" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 9.9-0.6 19.7-1.7 29.2-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#4078c0" /><path class="st1" d="m495.6 296.3c-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9l-140.4-141.1-14.9-35.9-7.8-71 32.6-89.2 79.9-17.7 111.5 7.2 146.6 146.7z" /><path class="st2" d="m204 339c0 1.2-1.3 2.1-3 2.1-1.9 0.2-3.3-0.8-3.3-2.1 0-1.2 1.3-2.1 3-2.1 1.8-0.1 3.3 0.8 3.3 2.1zm-18.1-2.6c-0.4 1.2 0.8 2.5 2.5 2.8 1.5 0.6 3.3 0 3.6-1.2s-0.8-2.5-2.5-3c-1.5-0.3-3.2 0.3-3.6 1.4zm25.7-1c-1.7 0.4-2.8 1.5-2.7 2.8 0.2 1.2 1.7 1.9 3.4 1.5s2.8-1.5 2.7-2.7c-0.2-1-1.7-1.7-3.4-1.6zm38.2-222.8c-80.6 0-142.3 61.2-142.3 141.9 0 64.5 40.6 119.7 98.5 139.1 7.4 1.3 10.1-3.3 10.1-7 0-3.6-0.2-23.5-0.2-35.7 0 0-40.7 8.7-49.2-17.3 0 0-6.6-16.9-16.2-21.3 0 0-13.3-9.1 0.9-9 0 0 14.5 1.2 22.4 15 12.7 22.4 34.1 16 42.4 12.2 1.3-9.3 5.1-15.8 9.3-19.6-32.5-3.6-65.3-8.3-65.3-64.2 0-16 4.4-24 13.7-34.2-1.5-3.8-6.5-19.4 1.5-39.5 12.2-3.8 40.1 15.7 40.1 15.7 11.6-3.3 24.1-4.9 36.5-4.9s24.9 1.7 36.5 4.9c0 0 28-19.5 40.1-15.7 8 20.2 3 35.7 1.5 39.5 9.3 10.3 15 18.3 15 34.2 0 56.1-34.2 60.6-66.7 64.2 5.3 4.6 9.9 13.3 9.9 27 0 19.6-0.2 43.8-0.2 48.6 0 3.8 2.7 8.4 10.1 7 58.1-19.3 97.6-74.5 97.6-139 0.1-80.6-65.3-141.9-146-141.9zm-85.8 200.6c-0.8 0.6-0.6 1.9 0.4 3 0.9 0.9 2.3 1.3 3 0.6 0.8-0.6 0.6-1.9-0.4-3-0.9-1-2.2-1.4-3-0.6zm-6.3-4.7c-0.4 0.8 0.2 1.7 1.3 2.3 0.9 0.6 2.1 0.4 2.5-0.4s-0.2-1.7-1.3-2.3c-1.1-0.4-2-0.2-2.5 0.4zm18.9 20.7c-0.9 0.8-0.6 2.5 0.8 3.6 1.3 1.3 3 1.5 3.8 0.6 0.8-0.8 0.4-2.5-0.8-3.6-1.3-1.4-3.1-1.6-3.8-0.6zm-6.6-8.6c-0.9 0.6-0.9 2.1 0 3.4s2.5 1.9 3.3 1.3c0.9-0.8 0.9-2.3 0-3.6s-2.4-1.8-3.3-1.1z" /></svg></span></a></div>
</div>
</div><p>The post <a href="https://www.fixtheexchange.com/2016/12/13/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/">Join me at the 2017 SANS Threat Hunting and Incident Response Summit – April 18th and 19th</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
