<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mike P</title>
    <description>The latest articles on DEV Community by Mike P (@mikeprivette).</description>
    <link>https://dev.to/mikeprivette</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F439123%2Fb699dc79-c345-43ad-b067-ab4eb7518acb.jpg</url>
      <title>DEV Community: Mike P</title>
      <link>https://dev.to/mikeprivette</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mikeprivette"/>
    <language>en</language>
    <item>
      <title>Excel Tricks</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Sun, 08 Aug 2021 00:17:18 +0000</pubDate>
      <link>https://dev.to/mikeprivette/excel-tricks-3e3j</link>
      <guid>https://dev.to/mikeprivette/excel-tricks-3e3j</guid>
      <description>&lt;p&gt;My commonly used Excel and Google Sheets formulas and tricks&lt;/p&gt;

&lt;p&gt;Here’s the GitHub:&lt;br&gt;
&lt;a href="https://github.com/mikeprivette/exceltricks"&gt;https://github.com/mikeprivette/exceltricks&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Content
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
Excel Tricks

&lt;ul&gt;
&lt;li&gt;Content&lt;/li&gt;
&lt;li&gt;
Time and Date Formulas

&lt;ul&gt;
&lt;li&gt;Convert the format "Thu Oct 02 12:03:39 GMT 2014" to "10/02/2014"&lt;/li&gt;
&lt;li&gt;Convert the format "2014-Dec-01 5:00:54 AM" to "12/01/2014"&lt;/li&gt;
&lt;li&gt;Convert EPOCH format (Unix time) to Gregorian format (mm/dd/yyyy hh:mm:ss)&lt;/li&gt;
&lt;li&gt;Convert a date and time field to ISO 8601 timestamp format&lt;/li&gt;
&lt;li&gt;Convert a ISO 8601 timestamp format field to date and time&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
Number Manipulation

&lt;ul&gt;
&lt;li&gt;Convert $20,000,000.00 to $20.0M&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
Text Manipulation

&lt;ul&gt;
&lt;li&gt;Find what is to the RIGHT of the last instances of a specific character&lt;/li&gt;
&lt;li&gt;Find if cell contains a space&lt;/li&gt;
&lt;li&gt;Extract text between two characters in a cell&lt;/li&gt;
&lt;li&gt;Trim All Whitespace Including Nonbreaking Space Characters (nbsp)&lt;/li&gt;
&lt;li&gt;VLookUp and Replace #N/A with some text&lt;/li&gt;
&lt;li&gt;Search for text within a cell and label it as X&lt;/li&gt;
&lt;li&gt;Lookup a Value in 2 Different Columns and return the one you want&lt;/li&gt;
&lt;li&gt;Get OS Short name from long Operating System name (Windows 10 Enterprise = Windows)&lt;/li&gt;
&lt;li&gt;Get system type from OS (Windows Serer 2012 = Server)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Time and Date Formulas
&lt;/h3&gt;
&lt;h4&gt;
  
  
  Convert the format "Thu Oct 02 12:03:39 GMT 2014" to "10/02/2014"
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;CONCATENATE&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"10/"&lt;/span&gt;,MID&lt;span class="o"&gt;(&lt;/span&gt;A2,9,2&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"/2014"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h4&gt;
  
  
  Convert the format "2014-Dec-01 5:00:54 AM" to "12/01/2014"
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Perform a Text-to-Columns on the cells to split the date from the time information (assuming you don't need time)&lt;/li&gt;
&lt;li&gt;You will be left with this:
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt; |__A1__|  |__B1__|
 2014-Dec-01  05:00:54 AM
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;On cell A1 rearrange the text and add in the date delimiters:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;CONCATENATE&lt;span class="o"&gt;(&lt;/span&gt;MID&lt;span class="o"&gt;(&lt;/span&gt;A2,6,3&lt;span class="o"&gt;)&lt;/span&gt;&amp;amp;&lt;span class="s2"&gt;"/"&lt;/span&gt;&amp;amp;RIGHT&lt;span class="o"&gt;(&lt;/span&gt;A2,2&lt;span class="o"&gt;)&lt;/span&gt;&amp;amp;&lt;span class="s2"&gt;"/"&lt;/span&gt;&amp;amp;LEFT&lt;span class="o"&gt;(&lt;/span&gt;A2,4&lt;span class="o"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Result = Dec/01/2014&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do a Find &amp;amp; Replace "Dec" with "12"&lt;/li&gt;
&lt;li&gt;Cells get automatically converted to Date/Time format&lt;/li&gt;
&lt;li&gt;Repeat for different months&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Convert EPOCH format (Unix time) to Gregorian format (mm/dd/yyyy hh:mm:ss)
&lt;/h4&gt;

&lt;p&gt;Unix time is the number of seconds since January 1, 1970.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;CELL/&lt;span class="o"&gt;(&lt;/span&gt;60&lt;span class="k"&gt;*&lt;/span&gt;60&lt;span class="k"&gt;*&lt;/span&gt;24&lt;span class="o"&gt;)&lt;/span&gt;+&lt;span class="s2"&gt;"1/1/1970"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Turns 1424783916.796051000 = 02/24/2015 13:18:37&lt;/p&gt;

&lt;h4&gt;
  
  
  Convert a date and time field to &lt;a href="https://en.wikipedia.org/wiki/ISO_8601"&gt;ISO 8601&lt;/a&gt; timestamp format
&lt;/h4&gt;

&lt;p&gt;Example: 8/3/21 12:12:12 PM to 2021-08-03T12:12:12&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;TEXT&lt;span class="o"&gt;(&lt;/span&gt;A1,&lt;span class="s2"&gt;"yyyy-mm-ddThh:MM:ss"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Convert a &lt;a href="https://en.wikipedia.org/wiki/ISO_8601"&gt;ISO 8601&lt;/a&gt; timestamp format field to date and time
&lt;/h4&gt;

&lt;p&gt;Example: 2021-08-03T12:12:12 to 8/3/21 12:12:12 PM&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;DATEVALUE&lt;span class="o"&gt;(&lt;/span&gt;MID&lt;span class="o"&gt;(&lt;/span&gt;A1,1,10&lt;span class="o"&gt;))&lt;/span&gt;+TIMEVALUE&lt;span class="o"&gt;(&lt;/span&gt;MID&lt;span class="o"&gt;(&lt;/span&gt;A1,12,8&lt;span class="o"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Number Manipulation
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Convert $20,000,000.00 to $20.0M
&lt;/h4&gt;

&lt;p&gt;Select the cell you want to convert and add the following custom number format&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$[&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;=&lt;/span&gt;999950]0.0,,&lt;span class="s2"&gt;"M"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;&amp;lt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nt"&gt;-999950&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt;0.0,,&lt;span class="s2"&gt;"M"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;0.0,&lt;span class="s2"&gt;"K"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Text Manipulation
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Find what is to the RIGHT of the last instances of a specific character
&lt;/h4&gt;

&lt;p&gt;Example = Drive:\Folder\SubFolder\Filename.ext (where you just want to find Filename.ext)&lt;/p&gt;

&lt;p&gt;Find to the right of the last "\" character&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;REGEXEXTRACT&lt;span class="o"&gt;(&lt;/span&gt;A1,&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="se"&gt;\\&lt;/span&gt;&lt;span class="s2"&gt;([^&lt;/span&gt;&lt;span class="se"&gt;\\&lt;/span&gt;&lt;span class="s2"&gt;]*&lt;/span&gt;&lt;span class="nv"&gt;$)&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To find what's to the LEFT, just replace "RIGHT" with "LEFT" in the formula&lt;/p&gt;

&lt;p&gt;Example = "First_Name Last_Name" (where you just want "First_Name")&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;REGEXEXTRACT&lt;span class="o"&gt;(&lt;/span&gt;A1,&lt;span class="s2"&gt;"(^[^ ]*) "&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Find if cell contains a space
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;IF&lt;span class="o"&gt;(&lt;/span&gt;COUNTIF&lt;span class="o"&gt;(&lt;/span&gt;H2,&lt;span class="s2"&gt;"* *"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"No"&lt;/span&gt;,&lt;span class="s2"&gt;"Yes"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Extract text between two characters in a cell
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;REGEXEXTRACT&lt;span class="o"&gt;(&lt;/span&gt;A1,&lt;span class="s2"&gt;"vip&lt;/span&gt;&lt;span class="se"&gt;\.&lt;/span&gt;&lt;span class="s2"&gt;ce&lt;/span&gt;&lt;span class="se"&gt;\.&lt;/span&gt;&lt;span class="s2"&gt;(.*)&lt;/span&gt;&lt;span class="se"&gt;\.&lt;/span&gt;&lt;span class="s2"&gt;http"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Original = vip.ce.api-prd.website.com.http&lt;/p&gt;

&lt;p&gt;After = api-prd.website.com&lt;/p&gt;

&lt;h4&gt;
  
  
  Trim All Whitespace Including Nonbreaking Space Characters (nbsp)
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;TRIM&lt;span class="o"&gt;(&lt;/span&gt;SUBSTITUTE&lt;span class="o"&gt;(&lt;/span&gt;A1, CHAR&lt;span class="o"&gt;(&lt;/span&gt;160&lt;span class="o"&gt;)&lt;/span&gt;, &lt;span class="s2"&gt;" "&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  VLookUp and Replace #N/A with some text
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;IF&lt;span class="o"&gt;(&lt;/span&gt;ISNA&lt;span class="o"&gt;(&lt;/span&gt;VLOOKUP&lt;span class="o"&gt;(&lt;/span&gt;A2,&amp;lt;Table Range&amp;gt;,1,FALSE&lt;span class="o"&gt;))&lt;/span&gt;,&lt;span class="s2"&gt;"Thing not found"&lt;/span&gt;,VLOOKUP&lt;span class="o"&gt;(&lt;/span&gt;A2,&amp;lt;Table Range&amp;gt;,1,FALSE&lt;span class="o"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Search for text within a cell and label it as X
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;word&amp;gt;"&lt;/span&gt;,A2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Cleaned"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;other word&amp;gt;"&lt;/span&gt;,A2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Unknown"&lt;/span&gt;,&lt;span class="s2"&gt;"Not Cleaned"&lt;/span&gt;&lt;span class="o"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Lookup a Value in 2 Different Columns and return the one you want
&lt;/h4&gt;

&lt;p&gt;=Index(array, Match(value_to_lookup, lookup_array, match_type))&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;INDEX&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s1"&gt;'TabName'&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="nv"&gt;$A$1&lt;/span&gt;:&lt;span class="nv"&gt;$C$1000&lt;/span&gt;, MATCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s1"&gt;'TabName'&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;A2,&lt;span class="s1"&gt;'TabName'&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="nv"&gt;$A$1&lt;/span&gt;:&lt;span class="nv"&gt;$C$1000&lt;/span&gt;,0&lt;span class="o"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Get OS Short name from long Operating System name (Windows 10 Enterprise = Windows)
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Windows"&lt;/span&gt;,C2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Windows"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"AIX"&lt;/span&gt;,C2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"AIX"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Linux"&lt;/span&gt;,C2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Linux"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"SunOS"&lt;/span&gt;,C2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"SunOS"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"OS X"&lt;/span&gt;,C2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Mac"&lt;/span&gt;,&lt;span class="s2"&gt;"Unknown"&lt;/span&gt;&lt;span class="o"&gt;)))))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Get system type from OS (Windows Serer 2012 = Server)
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;=&lt;/span&gt;IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Server"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Server"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"AIX"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Server"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Linux"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Server"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"SunOS"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Server"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Enterprise"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Desktop"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Pro"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Desktop"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Embedded"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Desktop"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Windows 7"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Desktop"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"Windows 10"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Desktop"&lt;/span&gt;,IF&lt;span class="o"&gt;(&lt;/span&gt;IFERROR&lt;span class="o"&gt;(&lt;/span&gt;SEARCH&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"OS X"&lt;/span&gt;,E2&lt;span class="o"&gt;)&lt;/span&gt;,0&lt;span class="o"&gt;)&lt;/span&gt;,&lt;span class="s2"&gt;"Desktop"&lt;/span&gt;,&lt;span class="s2"&gt;"Unknown"&lt;/span&gt;&lt;span class="o"&gt;))))))))))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>productivity</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Useful PowerShell One-Liners (and a few two-liners)</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Thu, 17 Dec 2020 17:14:58 +0000</pubDate>
      <link>https://dev.to/mikeprivette/useful-powershell-one-liners-and-a-few-two-liners-329k</link>
      <guid>https://dev.to/mikeprivette/useful-powershell-one-liners-and-a-few-two-liners-329k</guid>
      <description>&lt;h1&gt;
  
  
  PowerShell Commands
&lt;/h1&gt;

&lt;p&gt;Useful PowerShell one-liner (and some two-liner) commands. These are commands I have collected over the years in various IT/Cybersecurity capacities and have been helpful in troubleshooting and doing security investigations alike.&lt;/p&gt;

&lt;p&gt;Fork/Clone the repo here: &lt;a href="https://github.com/mikeprivette/PowerShell"&gt;https://github.com/mikeprivette/PowerShell&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Table of Contents
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
Active Directory User Commands

&lt;ul&gt;
&lt;li&gt;Getting Started&lt;/li&gt;
&lt;li&gt;Specific User Scenarios&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Computer Object Commands&lt;/li&gt;
&lt;li&gt;File Level Commands&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Active Directory User Commands
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Getting Started
&lt;/h3&gt;

&lt;p&gt;Before running any Active Directory commands, you need to import the correct module.&lt;/p&gt;

&lt;p&gt;Import Active Directory Module&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Import-Module&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;ActiveDirectory&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All Active Directory Module Commands&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;get-command&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-module&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;ActiveDirectory&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Specific User Scenarios
&lt;/h3&gt;

&lt;p&gt;Get All AD Information on a User in the Current Domain (the one you are running this from)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADUser&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;username&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All AD Information on a User in a Different Domain (assumes you have trust and permissions to access)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADUser&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;username&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All Members of a Group by name and ID&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADGroupMember&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;group_name&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Recursive&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;SamAccountName&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find All Groups a User is a Member of&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADPrincipalGroupMembership&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;username&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Get-ADPrincipalGroupMembership&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;username&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Sort-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Property&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Add Member to an AD Group&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Add-ADGroupMember&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;group_name&amp;gt;"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Member&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;user_id&amp;gt;"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Remove Member from an AD Group&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Remove-ADGroupMember&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;group_name&amp;gt;"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Member&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;user_id&amp;gt;"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find all users that are disabled&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Search-ADAccount&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-AccountDisabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-UsersOnly&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Format-Table&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;SamAccountName&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;ObjectClass&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-A&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find the Date/Time for When an Account Expires&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;datetime&lt;/span&gt;&lt;span class="p"&gt;](&lt;/span&gt;&lt;span class="n"&gt;Get-ADuser&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;userid&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;accountExpires&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;accountExpires&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find all Users with Locked Out Accounts&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Search-ADAccount&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-LockedOut&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;samAccountName&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Search-ADAccount&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-LockedOut&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Where-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="bp"&gt;$_&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;DistinguishedName&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-like&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"*DC=domain,DC=com"&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LockedOut&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LastLogonDate&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;PasswordExpired&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Format-Table&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-AutoSize&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get AD User Information for List of Users and Output to CSV&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-Content&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\users.txt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;%&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Get-ADUser&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="bp"&gt;$_&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CN&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;samAccountName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;EmployeeID&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Description&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Department&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;mlSubLobDescr&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OfficePhone&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Manager&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;StreetAddress&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LastLogonDate&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LastBadPasswordAttempt&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;PasswordExpired&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-Csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\user_lookup.csv&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get AD User Group Membership Information for List of Users and Output to CSV&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-Content&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\users.txt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;%&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Get-ADPrincipalGroupMembership&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="bp"&gt;$_&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-Csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\user_group_membership_lookup.csv&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All Users of AD Groups for List of Groups and Output to CSV&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$groups&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Get-Content&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\groups.txt&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="kr"&gt;foreach&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kr"&gt;in&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;$groups&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Get-ADGroupMember&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;$Group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;@{&lt;/span&gt;&lt;span class="nx"&gt;Expression&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="nv"&gt;$Group&lt;/span&gt;&lt;span class="p"&gt;};&lt;/span&gt;&lt;span class="nx"&gt;Label&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"Group Name"&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;SamAccountName&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-CSV&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\user_groups.csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-NoTypeInformation&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-append&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All Users of AD Groups Matching a Certain Name Format (i.e group name is like Local Admin)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$groups&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Get-ADGroup&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;name&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-like&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"*Admin*"&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;

&lt;/span&gt;&lt;span class="kr"&gt;foreach&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kr"&gt;in&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;$groups&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="n"&gt;Get-ADGroupMember&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;$Group&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Get-ADUser&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;@{&lt;/span&gt;&lt;span class="nx"&gt;Expression&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="nv"&gt;$Group&lt;/span&gt;&lt;span class="p"&gt;};&lt;/span&gt;&lt;span class="nx"&gt;Label&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"Common Name"&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;LastLogonDate&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;GivenName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;Surname&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;EmailAddress&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;title&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;department&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;mlSubLobDescr&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-Csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\local_admin_group.csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-NoTypeInformation&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find user information by AD attribute (i.e. DisplayName)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADUser&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;DisplayName&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-like&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"*Bobby Administrator*"&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;DisplayName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;EmailAddress&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LastLogonDate&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;title&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;department&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;mlSubLobDescr&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Format-Table&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-AutoSize&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Computer Object Commands
&lt;/h2&gt;

&lt;p&gt;Find a Specific Service on a Computer using WMI&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;get-wmiobject&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-query&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"SELECT * FROM Win32_Process where Name = '&amp;lt;service_name.exe&amp;gt;'"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select-object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;CommandLine&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Sort-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Descending&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find Computers by Operating System Type&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OperatingSystem&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OperatingSystem&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-unique&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Sort&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;OperatingSystem&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;List all Servers in a Domain&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain.com"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;operatingsystem&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-like&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"*server*"&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;operatingsystem&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;canonicalname&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;lastlogondate&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-Csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\computer_list.csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-NoClobber&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;List all Servers in a Domain, but only return Enabled Computer Objects, and only return those logged into within the last 60 days from the current date, and only show the top 10 rows&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain.com"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{(&lt;/span&gt;&lt;span class="n"&gt;operatingsystem&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-like&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"*server*"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-and&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;enabled&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-eq&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"TRUE"&lt;/span&gt;&lt;span class="p"&gt;)}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;where&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="bp"&gt;$_&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;LastLogonDate&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-ge&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Get-Date&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;AddDays&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nt"&gt;-60&lt;/span&gt;&lt;span class="p"&gt;)}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;operatingsystem&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;canonicalname&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;lastlogondate&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Format-Table&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-AutoSize&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-First&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;10&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find All Domain Controllers in a Specific Domain&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADDomainController&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;domain&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;domain&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find Out Information About a Specific Computer by Hostname&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Name&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-Like&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"&amp;lt;hostname&amp;gt;"&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Property&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Format-Table&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;Name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;ipv4address&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;OperatingSystem&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;OperatingSystemServicePack&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;LastLogonDate&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Wrap&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Auto&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find Host Information from TXT File of Hosts&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-Content&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\file.txt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;%&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Identity&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="bp"&gt;$_&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;domain&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;ipv4address&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;operatingsystem&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;distinguishedname&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-Csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\output.csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-NoClobber&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get the CN and DN for each Organizational Unit in a Specific Domain&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADOrganizationalUnit&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain.com"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CanonicalName&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Property&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CanonicalName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;DistinguishedName&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Sort-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CanonicalName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;ascending&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All Computer Objects in a Particular OU in a Particular Domain&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain.com"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-SearchBase&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s1"&gt;'OU=NA,OU=USA,OU=HQ,DC=domain,DC=com'&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s1"&gt;'*'&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;ipv4address&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;operatingsystem&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CanonicalName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;distinguishedname&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Format-Table&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-AutoSize&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Get All Computer Objects from a TXT File of OUs&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-Content&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\computer_ous.txt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;%&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="n"&gt;Get-ADComputer&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Server&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"domain.com"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-SearchBase&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="bp"&gt;$_&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Filter&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s1"&gt;'*'&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Properties&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Select&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;name&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;ipv4address&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;operatingsystem&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;CanonicalName&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;distinguishedname&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="nx"&gt;enabled&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Export-Csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;C:\&lt;/span&gt;&lt;span class="err"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="err"&gt;&amp;gt;&lt;/span&gt;&lt;span class="nx"&gt;\computers_in_ous.csv&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-NoClobber&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  File Level Commands
&lt;/h2&gt;

&lt;p&gt;Recursively Remove Files Older than a Certain Day in a Directory&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="n"&gt;Get-ChildItem&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Path&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"C:\&amp;lt;path&amp;gt;\&amp;lt;dir&amp;gt;\"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Recurse&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Where-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CreationTime&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;-gt&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;Get-Date&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;AddDays&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nt"&gt;-180&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Remove-Item&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Recurse&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>beginners</category>
      <category>github</category>
      <category>security</category>
    </item>
    <item>
      <title>Making Sense of the Anti-Phishing Cybersecurity Product Market</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Mon, 02 Nov 2020 13:46:02 +0000</pubDate>
      <link>https://dev.to/mikeprivette/making-sense-of-the-anti-phishing-cybersecurity-product-market-4nlf</link>
      <guid>https://dev.to/mikeprivette/making-sense-of-the-anti-phishing-cybersecurity-product-market-4nlf</guid>
      <description>&lt;p&gt;&lt;strong&gt;Phishing&lt;/strong&gt; has arguably been the single most devastating cybersecurity threat to the world &lt;a href="https://cofense.com/knowledge-center/history-of-phishing/"&gt;since its inception in 1990&lt;/a&gt;. Let’s take a look at this area and all the various cybersecurity products that play in the space.&lt;/p&gt;

&lt;h2&gt;
  
  
  Terms You Might Also Hear
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Business Email Compromise (BEC)&lt;/strong&gt; (phishing meant to compromise business functions like wire transfers)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spear Phishing&lt;/strong&gt; (highly targeted phishing attacks against a company or person)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Smshing&lt;/strong&gt; (Phishing attacks over SMS/Text)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vishing&lt;/strong&gt; (Phishing attacks over the phone)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Phishing targets organizations of all sizes and people of all walks of life. The attacks can be both opportunistic and targeted depending on the motives of the attackers.&lt;/li&gt;
&lt;li&gt;Phishing attacks are largely based on financial motives, and no one is immune to receiving this kind of security threat in business and personal life.&lt;/li&gt;
&lt;li&gt;Many experts cite phishing as the &lt;a href="https://www.csoonline.com/article/3066532/10-companies-that-can-help-you-fight-phishing.html"&gt;first phase&lt;/a&gt; of most attacks leading to ransomware, business email compromise, extortion, and fraud.&lt;/li&gt;
&lt;li&gt;Some studies purport that phishing attacks account for &lt;a href="https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html"&gt;90% of all data breaches&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Identifying, preventing, and responding to phishing attacks is a priority for most organizations, but little can stop the ebbing and ever-changing flow of malicious emails.&lt;/li&gt;
&lt;li&gt;Phishing and email attacks are not only increasing, but they’re also evolving. They are a part of life on the Internet.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Market Solutions
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Enter the Anti-Phishing product market space.&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing, and &lt;strong&gt;people’s susceptibility to it&lt;/strong&gt;, means the product market space views this issue as a “&lt;strong&gt;human problem.&lt;/strong&gt;”&lt;/li&gt;
&lt;li&gt;Solutions either have to teach humans &lt;strong&gt;how to not be tricked&lt;/strong&gt; so easily or they have to accept that humans &lt;strong&gt;will be tricked&lt;/strong&gt; and try to address the problem with technology behind the scenes.&lt;/li&gt;
&lt;li&gt;Solutions in the anti-phishing space can take on different forms, and many organizations use most or all of these:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Content Disarmament&lt;/strong&gt; - by far the most common approach, these tools are designed to be in the flow of mail (between the person sending and receiving the email) to intercept, inspect, unpack, and potentially detonate malicious payloads like links or attachments. These tools &lt;strong&gt;prevent bad emails from arriving&lt;/strong&gt; at the recipient. This is often cloud-based and happens per link.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Simulated Attacks&lt;/strong&gt; - platforms that allow a company to send &lt;strong&gt;“safe”&lt;/strong&gt; phishing emails, SMS, and phone calls to employees as a means for training and awareness. These simulations are used to show how susceptible people are to phishing attacks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phishing Awareness Training&lt;/strong&gt; - learning and development platforms that &lt;strong&gt;educate employees&lt;/strong&gt; using an online course format and simulated exercises to spot signs of phishing. These courses are tailored to an individual organization to train employees on spotting phishing attacks and handling them at their company.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Job Supplementation&lt;/strong&gt; - digital and physical assets like posters, signs, stickers, and desk cards to give employees &lt;strong&gt;constant reminders&lt;/strong&gt; to be aware of phishing. Anti-phishing requires constant vigilance, so the goal here is to ingrain awareness and how to safely respond.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Players in the Space
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.area1security.com/"&gt;Area 1 Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.blackfinsecurity.com/"&gt;Blackfin (part of Symantec)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cofense.com/"&gt;Cofense (formerly PhishMe)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hoxhunt.com/"&gt;Hoxhunt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ironscales.com/"&gt;IronScales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.knowbe4.com/"&gt;KnowBe4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.mediapro.com/"&gt;MediaPro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.mimecast.com/"&gt;Mimecast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.phishlabs.com/"&gt;PhishLabs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.phishline.com/"&gt;PhishLine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.proofpoint.com/us"&gt;Proofpoint&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.wombatsecurity.com/"&gt;Wombat&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Product Space Predictions
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;With COVID-19 and &lt;a href="https://www.ey.com/en_be/covid-19/why-remote-working-will-be-the-new-normal-even-after-covid-19"&gt;remote working becoming more of a norm&lt;/a&gt;, many companies will have to &lt;strong&gt;extend the reach&lt;/strong&gt; of their security capabilities into employee home networks, which is arguably &lt;strong&gt;more hostile&lt;/strong&gt; compared to a traditional corporate network with unmanaged and untrusted routers, printers, gaming consoles, and home IoT devices. A successful phishing attack that compromises one part of the home network can pivot to other devices on the network, including the corporate managed laptop.&lt;/li&gt;
&lt;li&gt;Since phishing &lt;strong&gt;doesn’t have a work-life balance&lt;/strong&gt;, &lt;a href="https://blackcloak.io/remote/"&gt;remote employee protection&lt;/a&gt;, especially for &lt;strong&gt;high-profile executives&lt;/strong&gt;, will be on the rise. Look for a rise in vendors and products that &lt;strong&gt;can serve both corporate laptops and personal devices&lt;/strong&gt; with the same level of visibility and protection. There are obvious privacy concerns here.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;h3&gt;
  
  
  "The best offense is a good defense”
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Unknown, on Anti-Phishing (probably)&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Product Space Opportunities
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Go multi-threaded&lt;/strong&gt;. As a buyer in this space, you’ll need to deploy social, psychological, and technological means to keep your organization safe from phishing. One solution will not be enough, so think &lt;a href="https://en.wikipedia.org/wiki/Defense_in_depth_(computing)"&gt;Defense in Depth&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for bundles&lt;/strong&gt; where it makes sense. As mentioned in a &lt;a href="https://fractionconsulting.co/cmi-0001-zero-trust"&gt;previous issue&lt;/a&gt;, corporate buyers can rarely buy the best of the best. Bundling anti-phishing with Endpoint Detection and Response (EDR) platforms can increase your &lt;strong&gt;security observability&lt;/strong&gt; where most attacks happen by volume - on an employee’s computer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Make simulation content dynamic&lt;/strong&gt;. Most phishing simulation platforms are just versions of &lt;a href="https://mailchimp.com/"&gt;MailChimp&lt;/a&gt;. Instead of sending a singular email campaign to a list of users, make a platform that allows for &lt;strong&gt;randomization and customization&lt;/strong&gt;. Send multiple emails with variations of domains and email bodies to make them harder to detect like real phishing emails.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Make it interactive&lt;/strong&gt;. Train employees the same way you train developers to not write insecure code. Solutions that can offer immediate feedback and training at the &lt;strong&gt;time of click&lt;/strong&gt; or in the email clients will teach users at the point that it matters the most. This will be &lt;strong&gt;far more effective&lt;/strong&gt; than the once a year training that employees speed click through to the end.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Key Insights
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;A good anti-phishing program is still only &lt;strong&gt;a small piece&lt;/strong&gt; of the overall cybersecurity puzzle. This is one of the most important pieces, but you can’t overlook or neglect &lt;strong&gt;strong identification and protection defenses&lt;/strong&gt; elsewhere.&lt;/li&gt;
&lt;li&gt;Anti-phishing solution implementations &lt;strong&gt;require nuance&lt;/strong&gt;. Disrupting the user experience for the sake of security has a high trade-off of risk vs. reward, but it &lt;strong&gt;just might be worth it&lt;/strong&gt; to reduce phishing attacks.&lt;/li&gt;
&lt;li&gt;Rolling out a successful anti-phishing program is more about &lt;strong&gt;constant change management&lt;/strong&gt; than about the technology itself (as with most technology rollouts). You want &lt;strong&gt;behaviors to change&lt;/strong&gt;, which is the hardest thing to do. Take a page from the &lt;a href="https://www.kotterinc.com/8-steps-process-for-leading-change/"&gt;experts on change management&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Don’t “name and shame”&lt;/strong&gt; with phishing simulation metrics to drive better end user compliance and awareness. Showing month-over-month click rates by department or line of business isn’t useful to anyone.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://cofense.com/knowledge-center/history-of-phishing/"&gt;The History of Phishing&lt;/a&gt; - for those who like to understand origin stories.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.trendmicro.com/vinfo/us/security/definition/business-email-compromise-(bec)"&gt;Business Email Compromise&lt;/a&gt; - definitions and examples.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html"&gt;Phishing and Email Fraud Statistics 2019&lt;/a&gt; - the numbers only ever go up.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://enterprise.verizon.com/resources/reports/dbir/"&gt;Verizon 2020 Data Breach Investigations Report&lt;/a&gt; - the gold standard for data breaches and cybersecurity trends across all industries.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.redscan.com/solutions/preventing-phishing-bec-attacks/"&gt;Tackling Phishing and BEC Attacks&lt;/a&gt; - more on how to prevent attacks like this.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/Defense_in_depth_(computing)"&gt;Defense in Depth&lt;/a&gt; - the standard that cybersecurity principles are built off of in enterprise companies.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.thinkautomation.com/eli5/what-is-machine-learning-a-beginners-guide/"&gt;What is Machine Learning?&lt;/a&gt; - a beginner’s guide.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.entrepreneur.com/article/336800"&gt;More Than 8 in 10 Fell Victim to Phishing Attacks in 2018&lt;/a&gt; - this is a hard game.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Want More?
&lt;/h2&gt;

&lt;p&gt;Looking for more insights and analysis? &lt;a href="https://gumroad.com/securityinsights"&gt;Sign-up here&lt;/a&gt; to get access to all past and future &lt;strong&gt;Pro&lt;/strong&gt; issues.&lt;/p&gt;

&lt;h2&gt;
  
  
  Before You Go
&lt;/h2&gt;

&lt;p&gt;Did you enjoy this issue of Cybersecurity Market Insights? If so, consider sharing the link on social media.&lt;/p&gt;

</description>
      <category>security</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Making Sense of the SOAR Cybersecurity Product Space</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Thu, 01 Oct 2020 16:06:07 +0000</pubDate>
      <link>https://dev.to/mikeprivette/making-sense-of-the-soar-cybersecurity-product-space-2hb3</link>
      <guid>https://dev.to/mikeprivette/making-sense-of-the-soar-cybersecurity-product-space-2hb3</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is Security Orchestration, Automation, and Response (SOAR)?&lt;/strong&gt; Let’s break this down and understand both sides of this product market space.&lt;/p&gt;

&lt;h2&gt;
  
  
  Terms You Might Also Hear
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Security Orchestration&lt;/li&gt;
&lt;li&gt;Security Automation&lt;/li&gt;
&lt;li&gt;Security Operations, Analytics, and Reporting (SOAR)&lt;/li&gt;
&lt;li&gt;Security Incident and Response Platforms (SIRPs)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Interrelated Products / Functions
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;SIEM (Security Information and Event Management)&lt;/li&gt;
&lt;li&gt;Threat Intelligence Platforms (TIPs)&lt;/li&gt;
&lt;li&gt;Security Operations Center (SOC - pronounced “sock”)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Relevant Definitions
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Event&lt;/strong&gt; - one or more instances of an observable change on a system (i.e. a file was downloaded, a folder permission was changed, etc.)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Alert&lt;/strong&gt; - a notification that one or more events have occurred (i.e., an email is about a firewall rule update, etc.)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Incident&lt;/strong&gt; - one or more events or one or more alerts that negatively affect the business (i.e., an employee successfully sends a customer list to a personal email address prior to putting in their notice, etc.)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;As we covered in our &lt;a href="https://fractionconsulting.co/cmi-0001-zero-trust"&gt;first issue&lt;/a&gt;, companies are doing more with mobile and cloud services via &lt;a href="https://www.cio.com/article/3211428/what-is-digital-transformation-a-necessary-disruption.html"&gt;Digital Transformation&lt;/a&gt;. Digital transformation leads to &lt;strong&gt;more&lt;/strong&gt; devices, &lt;strong&gt;more&lt;/strong&gt; cloud resources, &lt;strong&gt;more&lt;/strong&gt; environments to monitor, and ultimately &lt;strong&gt;more&lt;/strong&gt; events, alerts, and incidents to comb through looking for cyber threats.&lt;/li&gt;
&lt;li&gt;There has been &lt;strong&gt;exponential growth&lt;/strong&gt; in the number of log sources. Log sources are the systems, services, and devices in an environment that generate events and need to be constantly monitored from a cyber threat perspective.&lt;/li&gt;
&lt;li&gt;The more log sources in an environment, the &lt;strong&gt;more noise&lt;/strong&gt;. Noise makes it &lt;strong&gt;harder to know&lt;/strong&gt; when something bad has happened or is happening in your environment. If you don’t know about a threat, you &lt;strong&gt;can’t do anything&lt;/strong&gt; about it.&lt;/li&gt;
&lt;li&gt;Security operations teams have to sift through the noise. Unfortunately, they spend &amp;gt;95% of their time chasing down &lt;strong&gt;low value/fidelity&lt;/strong&gt; events that are not really threats.&lt;/li&gt;
&lt;li&gt;Companies are doing more than ever and cybersecurity teams have &lt;strong&gt;too much to keep up with&lt;/strong&gt;. A typical workflow might look like this:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;A security alert fires, an analyst may need to investigate in the SIEM, lookup an endpoint in the Endpoint Detection and Response (EDR) platform for computer data, reset a user’s password or disable their account in Active Directory (AD), and record the case in a Case Management system.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The cybersecurity profession has a &lt;a href="https://lifars.com/2020/06/the-increasing-shortage-of-cybersecurity-professionals/"&gt;talent shortage&lt;/a&gt; which only exacerbates the problem. In short, humans can’t keep up with the amount of data coming in and the number of disparate systems they have to click through.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Market Solution
&lt;/h2&gt;

&lt;p&gt;Enter Security Orchestration, Automation, and Response (SOAR).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SOAR platforms let you create &lt;strong&gt;efficiency, consistency, and accountability&lt;/strong&gt; by way of automation between disparate technology platforms and security controls.&lt;/li&gt;
&lt;li&gt;SOAR platforms act as a central place to connect system APIs together to perform a series of actions, lookups, or checks in a visualized process flow. This creates &lt;strong&gt;accountability and traceability&lt;/strong&gt; for teams and when investigating from a single platform.&lt;/li&gt;
&lt;li&gt;SOAR platforms can achieve &lt;strong&gt;automation&lt;/strong&gt; by activating either by event/alert triggers or scenario &lt;strong&gt;“playbooks”&lt;/strong&gt;. These playbooks kick off a series of checks, actions, and steps, with or without &lt;a href="https://www.lotame.com/what-is-boolean-logic/"&gt;boolean logic&lt;/a&gt;, to attempt to &lt;strong&gt;triage and remediate&lt;/strong&gt; cyber threats. This can be with or without human interaction.&lt;/li&gt;
&lt;li&gt;Playbooks from SOAR platforms provide &lt;strong&gt;consistency and repeatability&lt;/strong&gt;. Prior to SOAR, an analyst may have followed a loosely defined playbook but would take their own path to investigate. Playbooks with SOAR provide the &lt;strong&gt;exact same process&lt;/strong&gt; each time, including the &lt;strong&gt;exact sequence&lt;/strong&gt; of tools and queries.&lt;/li&gt;
&lt;li&gt;SOAR can reduce the &lt;strong&gt;“speed-to-context”&lt;/strong&gt; to operate from and make better decisions quicker by not having to focus on low-value events, alerts, and incidents.&lt;/li&gt;
&lt;li&gt;Also covered in the &lt;a href="https://fractionconsulting.co/cmi-0001-zero-trust"&gt;last issue&lt;/a&gt;, SOAR is a prime example of how demand for professionals results in product companies trying to &lt;strong&gt;enhance or subvert&lt;/strong&gt; the talent needed. SOC teams are under immense pressure and need more help.&lt;/li&gt;
&lt;li&gt;SOAR allows your &lt;strong&gt;highly paid&lt;/strong&gt; security operations team to focus on real and bigger threats. Security investments seldom provide immediate transformational benefits, but SOAR has a chance to change that. SOAR helps solve that age-old management problem of &lt;strong&gt;“doing more with less,”&lt;/strong&gt; thereby trying to show benefit.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Players in the Space
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.paloaltonetworks.com/cortex/xsoar"&gt;Demisto / Palo Alto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.rapid7.com/"&gt;Rapid7&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cyberbit.com/"&gt;Cyberbit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ibm.com/products/cloud-pak-for-security/resilient"&gt;IBM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html"&gt;Splunk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.siemplify.co/"&gt;Siemplify&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://d3security.com/platform/"&gt;D3 Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://swimlane.com/"&gt;Swimlane&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://threatconnect.com/"&gt;ThreatConnect&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.rsa.com/en-us/products/threat-detection-response/security-automation-orchestration"&gt;RSA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fireeye.com/"&gt;Fireeye&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Product Space Predictions
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;As covered in the &lt;a href="https://fractionconsulting.co/cmi-0001-zero-trust"&gt;last issue&lt;/a&gt;, cybersecurity spending is &lt;strong&gt;dominated by regulatory and compliance drivers&lt;/strong&gt;. With escalating requirements from regulators and governing bodies, so too will the requirements for monitoring and responding to all sources be escalated. SOAR platforms can &lt;strong&gt;make or break this&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Digital Transformation initiatives at companies are changing cybersecurity landscapes and associated threats and are driving the &lt;strong&gt;need&lt;/strong&gt; for more automation across all security domains. &lt;strong&gt;Time to shine&lt;/strong&gt; SOAR platforms.&lt;/li&gt;
&lt;li&gt;New players will enter the SOAR product category that seeks to &lt;strong&gt;enhance existing SOAR platforms&lt;/strong&gt; and playbooks, like &lt;a href="https://polarity.io/blog/soar-higher-with-polarity/"&gt;Polarity&lt;/a&gt;. Adding additional context and ease-of-use for operators will be a differentiating factor. Expect &lt;strong&gt;more acquisitions&lt;/strong&gt; in this product sub-space.&lt;/li&gt;
&lt;li&gt;Players in the space will focus on the &lt;strong&gt;disrupter&lt;/strong&gt; of &lt;a href="https://www.inc.com/soren-kaplan/why-no-code-low-code-software-is-industry-disruptor-you-should-pay-attention-to.html"&gt;No-code and Low-code solutions&lt;/a&gt; as a way to drive adoption to their platforms and &lt;strong&gt;reach a broader audience&lt;/strong&gt; that cannot afford to hire highly specialized disciplines of cybersecurity professionals.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cloudy with a chance of SOAR.&lt;/strong&gt; As more business and technology moves to the cloud, SOAR platforms used on-premises will have to be able to quickly adapt to automation at Cloud Service Providers (CSPs) like AWS and Azure.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;h4&gt;
  
  
  &lt;em&gt;"I need another API like I need another hole in my head"&lt;/em&gt;
&lt;/h4&gt;

&lt;p&gt;Cybersecurity Engineer at Large Insurance Company&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Challenges for Products Buyers
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SOAR platforms work best with specific technology integrations&lt;/strong&gt;. To get the most out of your SOAR platform, you have to buy or already have all the other platforms that integrate the best. That is unless you want to get into full REST API development and maintenance to support your security stack. Which leads me to my next point...&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SOAR platforms are &lt;a href="http://ankushchopra.com/whats-on-the-menu-for-innovation/"&gt;competence destroying&lt;/a&gt;&lt;/strong&gt;. New knowledge will have to be created and learned to operate these platforms and old knowledge will be less valuable. It is no longer enough to know how a standalone endpoint or network security platform works. You need to hire people who know about APIs, DevOps, CI/CD pipelines, etc. in addition to being sysadmins. These are not skills traditional security people have in most organizations. Skill retooling is necessary.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SOAR platform rollouts are never “finished”.&lt;/strong&gt; As connected security platforms get upgraded, new features and functionality will replace old ones, APIs will change, and automation already in place can and will break. You will need resources dedicated and responsible for keeping up with this newly created ecosystem just like with delivering a software product. This speaks to the &lt;strong&gt;broader convergence&lt;/strong&gt; of technical abilities and routines happening across all IT disciplines, and cybersecurity is no exception.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How Players Will Be Successful in this Market
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Focus not just on the volume of integrations, but the &lt;strong&gt;completeness of integrations&lt;/strong&gt;. If your SOAR API connection can only perform 5 basic actions from an integration or is somehow rate limited, you are limiting what can be done with your platform. When you limit your platform, &lt;strong&gt;you make buyers, not like it.&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Show the difference.&lt;/strong&gt; After a certain amount of automation claims, you can start bleeding into the Managed Detection and Response (MDR) space. Why automate only the SOC triage, when we can automate it all with MDR? You’ll want to make sure you are telling the right story and not one that makes it sound like you are replacing people or whole functions. The &lt;strong&gt;people closest to the work&lt;/strong&gt; often have a greater say in product purchasing because those decisions impact them the most.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Push security to the business edge&lt;/strong&gt;. Want to drive broader adoption of your SOAR platform? Pushing security into the business technology teams that run the &lt;strong&gt;critical operations&lt;/strong&gt; and move/process the sensitive data for the organization gets greater engagement, and ultimately, better security.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How Will Product Buyers Get What They Need?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sell the bigger picture&lt;/strong&gt; for the overarching security operations and response capabilities and goals. Security investments seldom provide immediate transformational benefits, and showing an uptick in closed tickets is &lt;strong&gt;not&lt;/strong&gt; a measure of SOAR success or actually reducing security risks to the company.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hire people from other technology backgrounds&lt;/strong&gt;. Cybersecurity technology is evolving just like cloud, data, and other larger drivers of innovation in IT. Hire the right technical leaders to bring over the disciplines from other IT functions like software development. Things like &lt;a href="https://www.perforce.com/blog/qac/what-lint-code-and-why-linting-important"&gt;code linting&lt;/a&gt;, code reviews, testing (unit/functional), and automated deployment should become your &lt;strong&gt;new norm&lt;/strong&gt;. These practices will have ripple effects across your organization and increase security while enabling other teams to work faster.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://danielmiessler.com/study/event-alert-incident/"&gt;The Difference Between Events, Alerts, and Incidents&lt;/a&gt; - a quick primer and an all-time personal favorite cybersecurity-related website&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.fireeye.com/products/helix/what-is-soar.html"&gt;The Benefits of SOAR&lt;/a&gt; - listing of benefits and definitions&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://blog.cadre.net/soar-in-the-cloud-7-factors-to-consider"&gt;SOAR in the Cloud&lt;/a&gt; - 7 factors to consider&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://swimlane.com/blog/arming-your-soc-with-soar/"&gt;Arming your SOC with SOAR&lt;/a&gt; - practical and common use cases for SOAR playbooks&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.gartner.com/en/documents/3986721/hype-cycle-for-security-operations-2020"&gt;Gartner’s take on SOAR&lt;/a&gt; - the Hype Cycle for Security Operations&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Want More?
&lt;/h2&gt;

&lt;p&gt;Looking for more insights and analysis? Check out the &lt;a href="https://gumroad.com/securityinsights"&gt;Pro&lt;/a&gt; version of this newsletter where you’ll find:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;9&lt;/strong&gt; Predictions for the product space (80% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;5&lt;/strong&gt; Challenges for Product Buyers (67% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;6&lt;/strong&gt; Insights for Players to be successful (100% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;4&lt;/strong&gt; ways Buyers can get what they need (100% more)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When you subscribe to the &lt;a href="https://gumroad.com/securityinsights"&gt;Pro&lt;/a&gt; version, you’ll get access to the pro version of this issue and all past and future issues.&lt;/p&gt;

&lt;h2&gt;
  
  
  Before You Go
&lt;/h2&gt;

&lt;p&gt;Did you enjoy this issue of Cybersecurity Market Insights? If so, consider sharing it on social media or telling some friends about it. Maybe something like this?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“Looking to learn about #cybersecurity in plain English and looking for product buying guidance? Check out the &lt;a href="https://fractionconsulting.co/"&gt;Cybersecurity Market Insights&lt;/a&gt; newsletter!”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Be sure to also check out &lt;a href="https://fractionconsulting.co/"&gt;Fraction Consulting&lt;/a&gt; if you’re interested in deeper dive engagements, fractional CTO/CISO consulting, and guidance on an array of technology and cybersecurity efforts.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Making Sense of the Zero Trust Cybersecurity Product Space</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Sun, 06 Sep 2020 13:17:36 +0000</pubDate>
      <link>https://dev.to/mikeprivette/cybersecurity-market-insights-0001-zero-trust-37j4</link>
      <guid>https://dev.to/mikeprivette/cybersecurity-market-insights-0001-zero-trust-37j4</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--19lKG6GA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/9bsvkw81k8pnf7javt60.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--19lKG6GA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/9bsvkw81k8pnf7javt60.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is the inaugural post for the &lt;em&gt;Cybersecurity Market Insights&lt;/em&gt; newsletter!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A popular topic as of late, Zero Trust, can mean many different things to many different people. Let’s break this down further and understand both sides of the market.&lt;/p&gt;

&lt;h2&gt;
  
  
  Terms You Might Also Hear
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Microsegmentation&lt;/li&gt;
&lt;li&gt;Zero Trust Security&lt;/li&gt;
&lt;li&gt;Zero Trust Architecture&lt;/li&gt;
&lt;li&gt;Zero Trust Network&lt;/li&gt;
&lt;li&gt;Zero Trust Network Access&lt;/li&gt;
&lt;li&gt;Zero Trust Principles&lt;/li&gt;
&lt;li&gt;Zero Trust Execution&lt;/li&gt;
&lt;li&gt;Secure Access Service Edge (SASE pronounced “sassy”)&lt;/li&gt;
&lt;li&gt;Application Perimeter&lt;/li&gt;
&lt;li&gt;Cloud Workload Protection&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Traditional company networks are built like an M&amp;amp;M - hard shell on the outside, smooth on the inside. Networks have a firewall perimeter for security to keep bad guys out, but fewer security controls inside the network.&lt;/li&gt;
&lt;li&gt;Everyone inside is “trusted” by default. If an attacker breaches the network in this model, they can easily exploit other systems and steal data because of fewer restrictions.&lt;/li&gt;
&lt;li&gt;With companies doing more with mobile and cloud services via &lt;a href="https://www.cio.com/article/3211428/what-is-digital-transformation-a-necessary-disruption.html"&gt;Digital Transformation&lt;/a&gt;, the concept of a perimeter you can protect yourself disappears and trust becomes even more important.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Market Solution
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Enter Zero Trust. “Zero trust” means that no one “entity” is trusted by default from inside or outside the network.&lt;/li&gt;
&lt;li&gt;It’s an alternative network and application design with a security model that isolates computer networks, systems, and users from one another.&lt;/li&gt;
&lt;li&gt;No users, no systems, no applications, and no workloads are to be trusted, internally or externally, to the business environment.&lt;/li&gt;
&lt;li&gt;Isolation stops bad guys who get at one system or one piece of sensitive data from getting at others because all systems and resources are locked down by default.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Players in the Space
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.banyansecurity.io/"&gt;Banyan Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://odo.io/"&gt;Odo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.paloaltonetworks.com/network-security/zero-trust"&gt;Palo Alto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/zero-trust.html"&gt;Cisco&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.illumio.com/solutions/zero-trust"&gt;Illumio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.broadcom.com/products/cyber-security/information-protection/secure-access-cloud"&gt;Symantec / Broadcom&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Product Space Predictions
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Cybersecurity professionals will continue to push for zero trust principles. This will, in turn, drive demand up for professionals with experience in this space. Where there is a demand for professionals in a specific discipline, product companies will follow quickly behind to either enhance or subvert the talent needed.&lt;/li&gt;
&lt;li&gt;Digital Transformation initiatives at companies are changing cybersecurity landscapes and associated threats and are creating more desire for zero trust solutions.&lt;/li&gt;
&lt;li&gt;High tech companies like Google, Netflix, etc., will implement versions of zero trust principles that the product industry will mimic.&lt;/li&gt;
&lt;li&gt;The cybersecurity product industry will set zero trust as a base expectation - experts and vendors alike will cite that future breaches can be avoided by implementing zero trust principles.&lt;/li&gt;
&lt;li&gt;Regulators will catch on to zero trust and start asking questions. Soon they will cite deficiencies for not having zero trust principles implemented. Internal Audit teams will do the same.&lt;/li&gt;
&lt;li&gt;Cybersecurity budgets at large companies will continue to surge and this will be a significant portion of spending.&lt;/li&gt;
&lt;li&gt;Differentiation among product players will become more of a challenge.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;h2&gt;
  
  
  “The only way to get to zero trust is to bury your computer in concrete”
&lt;/h2&gt;

&lt;p&gt;-- Cybersecurity Executive at Top 5 US Bank&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Challenges for Products Buyers
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Zero Trust is Not Important Yet - Cybersecurity spending is dominated by regulatory and compliance drivers. Zero trust isn’t important to regulators yet.&lt;/li&gt;
&lt;li&gt;Zero Trust is Really Hard - Zero trust is a high effort for very little visible reward. Implementations take a really long time and require deep knowledge of how applications and infrastructure integrates into upstream and downstream systems. Technical Debt only makes this worse.&lt;/li&gt;
&lt;li&gt;Zero Trust Requires Homework - Zero trust requires a company to know much more about their IT applications that most companies ever do.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How Players Will Be Successful in this Market
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Make zero trust implementation less complex.&lt;/li&gt;
&lt;li&gt;Products that create an easy-path to implement “zero trust principles” onto existing technology stacks with limited management overhead will win.&lt;/li&gt;
&lt;li&gt;Enable the zero trust way of operating. Offer complementary products that enable the zero trust principles or that ease the path into zero trust.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How Will Product Buyers Get What They Need?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Scale&lt;/strong&gt;. Corporate buyers rarely have the financial latitude to buy the “best of” anything, so scale and interoperability matters. Use your limited capital to buy products in this space with the most integrations for your environment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Plan for Now&lt;/strong&gt;. Buy for what can work now on premises and in cloud-hosted environments.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.beyondtrust.com/blog/entry/why-zero-trust-is-an-unrealistic-security-model"&gt;Why Zero Trust is an Unrealistic Security Model&lt;/a&gt; - why zero trust is really hard to do&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.forrester.com/report/Five+Steps+To+A+Zero+Trust+Network/-/E-RES120510"&gt;Forrester’s Five Steps to a Zero Trust Network&lt;/a&gt; - a simple framework that is all but simple to execute. Most companies never get those five steps completed, but it’s good to have something to shoot for.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.optiv.com/cybersecurity-dictionary/microsegmentation"&gt;Microsegmentation&lt;/a&gt; - a core component of zero trust architecture&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/Technical_debt"&gt;Technical Debt&lt;/a&gt; - the coding you must do tomorrow because you took a shortcut in order to deliver the software today.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://csrc.nist.gov/publications/detail/sp/800-207/final"&gt;NIST SP 800-207 Zero Trust Architecture&lt;/a&gt; - want to get really, really deep? Start here. For the hardcore techies only.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Want More?
&lt;/h2&gt;

&lt;p&gt;Looking for more insights and analysis? Check out the &lt;a href="https://gumroad.com/securityinsights"&gt;Pro&lt;/a&gt; version of this issue where you’ll find:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;11&lt;/strong&gt; Players (83% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;13&lt;/strong&gt; Predictions (86% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;5&lt;/strong&gt; Challenges (67% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;5&lt;/strong&gt; Product Space Opportunities (&lt;strong&gt;Pro Only Section&lt;/strong&gt; 100% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;7&lt;/strong&gt; Insights on how Players can be successful (133% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;4&lt;/strong&gt; Tips on how Product Buyers can get what they need (100% more)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;8&lt;/strong&gt; References (60% more)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Before You Go
&lt;/h2&gt;

&lt;p&gt;Did you enjoy this issue of Cybersecurity Market Insights? If so, consider sharing it on social media or telling some friends about it. Maybe something like this?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“Looking to learn about #cybersecurity in plain English and looking for product buying guidance? Check out the &lt;a href="https://fractionconsulting.co/"&gt;Cybersecurity Market Insights&lt;/a&gt; by Fraction Consulting newsletter!”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Be sure to also check out &lt;a href="https://fractionconsulting.co"&gt;Fraction Consulting&lt;/a&gt; if you’re interested in deeper dive engagements, fractional CTO/CISO consulting, and guidance on an array of technology and cybersecurity efforts.&lt;/p&gt;

</description>
      <category>security</category>
      <category>privacy</category>
    </item>
    <item>
      <title>How to Get Your Startup Through Vendor Onboarding</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Mon, 17 Aug 2020 12:29:09 +0000</pubDate>
      <link>https://dev.to/mikeprivette/how-to-get-your-startup-through-vendor-onboarding-3gfl</link>
      <guid>https://dev.to/mikeprivette/how-to-get-your-startup-through-vendor-onboarding-3gfl</guid>
      <description>&lt;p&gt;Getting your startup through vendor onboarding at a large company is harder than it should be.&lt;/p&gt;

&lt;h4&gt;
  
  
  Why is vendor onboarding so hard?
&lt;/h4&gt;

&lt;p&gt;You are looking to make a business relationship with a larger company that can provide you with some kind of access to data, customers, or that can leverage the services you're selling.&lt;/p&gt;

&lt;p&gt;You get the business side excited about your products and services. They buy into what you're pitching, and they are ready to move. Congratulations on making it this far, a lot of hard work is now done!&lt;/p&gt;

&lt;p&gt;However, now you get handed to the sourcing team for the official vendor onboarding process. You get met with a lot of questions and formality. You get the 3rd degree from sourcing specialists, corporate attorneys, and IT/cybersecurity professionals. Now you have to answer a 300 question spreadsheet, and you have 48 hours to do it.&lt;/p&gt;

&lt;p&gt;It doesn't matter that half of the questionnaire does not apply to your business model. It also doesn't matter that the other half is the same set of the questions repeat themselves in slightly different ways or using terms you've never seen before.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;It shouldn't be so hard to get your company through vendor onboarding, right?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So, how do you get your startup through the vendor onboarding process? It's all about:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Understanding 3rd party risk management&lt;/li&gt;
&lt;li&gt;Learning what really matters to the 3rd party risk &amp;amp; security teams&lt;/li&gt;
&lt;li&gt;Making a plan to close gaps&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Understanding 3rd Party Risk Management
&lt;/h4&gt;

&lt;p&gt;Big companies use big systems to operate and govern themselves. The result to the outsider looking in can seem like too much complexity and formality.&lt;/p&gt;

&lt;p&gt;Without big systems, however, it's hard to coordinate so many different teams and groups to get anything done.&lt;/p&gt;

&lt;p&gt;Here's what that big vendor onboarding program cares about as it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Limiting Risk&lt;/li&gt;
&lt;li&gt;Process efficiency&lt;/li&gt;
&lt;/ol&gt;

&lt;h5&gt;
  
  
  Limiting Risk
&lt;/h5&gt;

&lt;p&gt;Companies want to limit the amount of legal, regulatory, operational, reputational, and security risks from 3rd parties. The company's brand is at stake when they bring on 3rd party companies, so this process is a means to limit exposure in all possible ways.&lt;/p&gt;

&lt;p&gt;Additionally, the more important or "critical" your business or services to the larger company, the more risk you have for them, and the more they want to reduce that risk. Here are some items that go into determining your company's risk level to the larger company:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;💻 Classifications, types, and volume of data they'll be sharing with you&lt;/li&gt;
&lt;li&gt;🌎 Any geography-specific laws or regulations&lt;/li&gt;
&lt;li&gt;🙋 Whether or not you're a customer-facing service for them&lt;/li&gt;
&lt;li&gt;☁️ Whether or not you are cloud-hosted (yes this still matters ⚡)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All of this comes down to how "important" or critical your business will be to the larger company's operations. The more critical you are, the more risk they have to mitigate.&lt;/p&gt;

&lt;h5&gt;
  
  
  Process Efficiency
&lt;/h5&gt;

&lt;p&gt;The bigger the company, the more 3rd party vendors they have. Sourcing is a whole business itself at most large companies, and they have to field 100's or 1,000's of new 3rd party vendor relationships every year (not to mention the ones they have to maintain).&lt;/p&gt;

&lt;p&gt;As a result, vendor sourcing teams need standardized intakes, standardized questionnaires regardless of the type of business relationship or type of company, and standardized workflows with SLAs (Service Level Agreements). Not to mention standardized governance routines to oversee and monitor all of the above.&lt;/p&gt;

&lt;p&gt;I think we can all agree you'd standardize this too if you had to do the same thing that many times. This efficiency also helps with fair and consistent practices from an ethical and legal standpoint.&lt;/p&gt;

&lt;h4&gt;
  
  
  Learning What Really Matters to the 3rd Party Risk &amp;amp; Security Teams
&lt;/h4&gt;

&lt;p&gt;Remember that 300 question spreadsheet? 😱&lt;/p&gt;

&lt;p&gt;Yes, you &lt;em&gt;really&lt;/em&gt; have to fill that out to move forward.&lt;/p&gt;

&lt;p&gt;Your company may not have anyone "doing security" at this point, let alone someone who is in charge of security overall.&lt;/p&gt;

&lt;p&gt;You might have a hard time taking that big spreadsheet and figuring out what your company does in relation. You may have a hard time understanding how you even achieve some of these things. You might have a hard time committing to closing any identified gaps based on where you are at as a company. The good news, however, is your company doesn't have to be compliant with every single item or do all of those functions today.&lt;/p&gt;

&lt;p&gt;Here's the thing - larger companies have dedicated security and risk management teams. They evaluate their 3rd party vendors based on their own level of security and compliance. They want to see equal or better controls to have certain assurances on how their data will be treated (remember the Limiting Risk part?).&lt;/p&gt;

&lt;p&gt;Once you realize this, you can have a conversation to determine what really matters to the company. This will vary some, but most concerns fall into these categories:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Information Protection&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Server/Cloud services controls&lt;/li&gt;
&lt;li&gt;Encryption of data-in-motion and at-rest&lt;/li&gt;
&lt;li&gt;Vulnerability patching&lt;/li&gt;
&lt;li&gt;Threat monitoring&lt;/li&gt;
&lt;li&gt;Physical security controls (less relevant for cloud-based companies)&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Business Continuity &amp;amp; Disaster Recovery&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your ability to recover and continue services in case of an event or outage&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Compliance&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your ability to comply with laws based on the data you have and process as a part of your business (&lt;a href="https://www.pcisecuritystandards.org/pci_security/"&gt;PCI&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Money_laundering"&gt;AML&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Know_your_customer"&gt;KYC&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Office_of_Foreign_Assets_Control"&gt;OFAC&lt;/a&gt;, etc.)&lt;/li&gt;
&lt;li&gt;Human resource items like training, security awareness, background checks, etc.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you're not sure what to start with some of these, check out our earlier post on &lt;a href="https://fractionconsulting.co/securing-your-startup"&gt;Securing Your Startup&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Sometimes all the larger company needs are the understanding that you hear their concerns and the assurance that you will address what they care about most.&lt;/p&gt;

&lt;h4&gt;
  
  
  Making a Plan to Close Gaps
&lt;/h4&gt;

&lt;p&gt;Building off the above, to close on the vendor onboarding process to a point where you can do the business function you were brought in to do, you need to make a plan to close out those gaps. The larger company understands you do not have the same resources that they do, but they will need dates and milestones to make them comfortable.&lt;/p&gt;

&lt;p&gt;Don't ask the larger company how long you can have to close a specific set of gaps.&lt;/p&gt;

&lt;p&gt;You need to be transparent and realistic about what you can commit to over the next 3 to 12 months on a remediation plan and tell them what you can do. Help the larger company understand that you will address risks as you grow, and some risks are not possible to closeout until you get to certain financial milestones or bring in more people. Let the larger company come back to you on what they want to see done faster or in what order.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here's another piece that is almost always overlooked when it comes to this process&lt;/strong&gt; 👇&lt;/p&gt;

&lt;blockquote&gt;
&lt;h6&gt;
  
  
  Keep your "business contacts" engaged through the whole exercise.
&lt;/h6&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is the team or group you originally made traction with. This is the group that liked your offerings enough to get you started on the vendor onboarding process. This group needs to understand and weigh in on the risks from their business point of view.&lt;/p&gt;

&lt;p&gt;These business relationships often are accelerators at getting new products to market or being competitive. The risk of not being able to use your business or services also has risks associated with it. Your business contacts are the best to articulate what is at stake and what levels of risk are acceptable.&lt;/p&gt;

&lt;h4&gt;
  
  
  Wrap-Up
&lt;/h4&gt;

&lt;p&gt;If everything goes well for your company, you will be in this position many times! Each company may have a slightly different set of concerns and a somewhat different spreadsheet or online form (though it will still be massive!), but how you approach and negotiate success can be the same.&lt;/p&gt;

&lt;p&gt;If you need help from a trusted partner who has been on the other end of the spreadsheets asking the questions, reach out to us to learn how we can help.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>YANMSS (Yet Another New Mac Setup Script)!</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Wed, 05 Aug 2020 16:29:37 +0000</pubDate>
      <link>https://dev.to/mikeprivette/yanmss-yet-another-new-mac-setup-script-30b7</link>
      <guid>https://dev.to/mikeprivette/yanmss-yet-another-new-mac-setup-script-30b7</guid>
      <description>&lt;p&gt;Jump right to my Github page if you just want the script: &lt;a href="https://github.com/mikeprivette/yanmss"&gt;https://github.com/mikeprivette/yanmss&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  About
&lt;/h2&gt;

&lt;p&gt;This setup script is for modifying some default settings on Mac OS X, installing some of my preferred Terminal tools, and a few applications.&lt;/p&gt;

&lt;p&gt;Please feel free to fork and/or add issues/PRs to help make this work better for everyone.&lt;/p&gt;

&lt;h3&gt;
  
  
  Installation with Curl
&lt;/h3&gt;

&lt;p&gt;To install this script from a brand new Mac (fresh out of the box!) run the following command in terminal with no additional tools or permissions needed:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sh &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://raw.githubusercontent.com/mikeprivette/yanmss/master/setup.sh&lt;span class="si"&gt;)&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Want to know what "curl -fsSL" stands for? Check out this &lt;a href="https://explainshell.com/explain?cmd=curl+-fsSL+example.org#"&gt;link&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you do not already have &lt;a href="https://developer.apple.com/library/archive/technotes/tn2339/_index.html#//apple_ref/doc/uid/DTS40014588-CH1-WHAT_IS_THE_COMMAND_LINE_TOOLS_PACKAGE_"&gt;Xcode Command Line Tools&lt;/a&gt; installed, you will be prompted to install them after being prompted for sudo access.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why ask for sudo access?
&lt;/h3&gt;

&lt;p&gt;You'll need sudo access to do the initial Finder modifications, but it is not required to install Homebrew or associated packages.&lt;/p&gt;

&lt;p&gt;If you're not comfortable allowing this script to prompt you for sudo access, feel free to copy/paste the commands you want out of this script into the Terminal as you see fit.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mac OS X Modifications
&lt;/h2&gt;

&lt;p&gt;All of the following are commands that you can enter directly into Terminal or let the script run for you.&lt;/p&gt;

&lt;h3&gt;
  
  
  Modify Finder Preferences
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Show Library Folder in Finder
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;chflags nohidden ~/Library
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Show Hidden Files in Finder
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;defaults write com.apple.finder AppleShowAllFiles YES
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Show Path Bar in Finder
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;defaults write com.apple.finder ShowPathbar &lt;span class="nt"&gt;-bool&lt;/span&gt; &lt;span class="nb"&gt;true&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Show Status Bar in Finder
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;defaults write com.apple.finder ShowStatusBar &lt;span class="nt"&gt;-bool&lt;/span&gt; &lt;span class="nb"&gt;true&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Terminal Tools
&lt;/h3&gt;

&lt;p&gt;All of the following are commands that you can enter directly into Terminal or let the script run for you.&lt;/p&gt;

&lt;p&gt;Install the following terminal tools:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://brew.sh/"&gt;Homebrew&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ruby &lt;span class="nt"&gt;-e&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://raw.githubusercontent.com/Homebrew/install/master/install&lt;span class="si"&gt;)&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Update Brew&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew config
brew update
brew upgrade
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://www.iterm2.com/"&gt;iTerm2&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install &lt;/span&gt;iterm2
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://ohmyz.sh/"&gt;oh-my-zsh&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;sh &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;curl &lt;span class="nt"&gt;-fsSL&lt;/span&gt; https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh&lt;span class="si"&gt;)&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Git&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew &lt;span class="nb"&gt;install &lt;/span&gt;git
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://github.com/powerline/fonts"&gt;Powerline fonts&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/powerline/fonts.git
&lt;span class="nb"&gt;cd &lt;/span&gt;fonts
sh &lt;span class="nt"&gt;-c&lt;/span&gt; ./install.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Ruby&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew &lt;span class="nb"&gt;install &lt;/span&gt;ruby
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"Adding the brew ruby path to shell config..."&lt;/span&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s1"&gt;'export PATH="/usr/local/opt/ruby/bin:$PATH"'&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt;~/.bash_profile
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://nmap.org/"&gt;Nmap&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew &lt;span class="nb"&gt;install &lt;/span&gt;nmap
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://github.com/sivel/speedtest-cli"&gt;Speedtest-cli&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew &lt;span class="nb"&gt;install &lt;/span&gt;speedtest_cli
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Additional Applications
&lt;/h3&gt;

&lt;p&gt;All of the following are commands that you can enter directly into Terminal or let the script run for you.&lt;/p&gt;

&lt;p&gt;Install the following applications:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.alfredapp.com/"&gt;Alfred&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--appdir&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/Applications"&lt;/span&gt; alfred
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://code.visualstudio.com/"&gt;Visual Studio Code&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--appdir&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/Applications"&lt;/span&gt; visual-studio-code
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://www.mozilla.org/en-US/firefox/new/"&gt;Firefox&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--appdir&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/Applications"&lt;/span&gt; firefox
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://slack.com/"&gt;Slack&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--appdir&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/Applications"&lt;/span&gt; slack
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://1password.com/"&gt;1Password&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--appdir&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/Applications"&lt;/span&gt; 1password
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Caffeine (Keeps your screen on)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cask &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--appdir&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/Applications"&lt;/span&gt; caffeine
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Clean Up
&lt;/h3&gt;

&lt;p&gt;Run the brew cleanup script and remove old or unneeded casks&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;brew cleanup
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Post Script Actions
&lt;/h3&gt;

&lt;p&gt;I have not yet figured out to automate the post script actions for some of these installations, so there are a few more steps to manually complete.&lt;/p&gt;

&lt;h4&gt;
  
  
  Enable Any Oh My Zsh Plugins
&lt;/h4&gt;

&lt;p&gt;Oh My Zsh comes with a ton of plugins you can take advantage of. Here is the &lt;a href="https://github.com/ohmyzsh/ohmyzsh/wiki/Plugins"&gt;wiki&lt;/a&gt; page.&lt;/p&gt;

&lt;p&gt;Open your ~/.zshrc file via Terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;open ~/.zshrc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find and edit the plugins section to add the ones you want&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Example format: plugins=(rails git textmate ruby lighthouse)&lt;/span&gt;
&lt;span class="c"&gt;# Add wisely, as too many plugins slow down shell startup.&lt;/span&gt;
&lt;span class="nv"&gt;plugins&lt;/span&gt;&lt;span class="o"&gt;=(&lt;/span&gt;git brew ruby osx&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Set the Oh My Zsh Theme
&lt;/h4&gt;

&lt;p&gt;Open your ~/.zshrc file via Terminal&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;open ~/.zshrc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Modify the theme. You can find a list of the themes &lt;a href="https://github.com/ohmyzsh/ohmyzsh/wiki/Themes"&gt;here&lt;/a&gt;. I personally like the &lt;a href="https://github.com/ohmyzsh/ohmyzsh/wiki/Themes#agnoster"&gt;agnoster&lt;/a&gt; theme.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;ZSH_THEME&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"agnoster"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Make sure to save and close the file after editing. You may have quit and reopen iTerm2 for the theme to take effect.&lt;/p&gt;

&lt;p&gt;To make the Agnoster theme look the way it does on the wiki page you have to go to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open iTerm2&lt;/li&gt;
&lt;li&gt;Select Preferences&lt;/li&gt;
&lt;li&gt;Click Profile&lt;/li&gt;
&lt;li&gt;Click Colors&lt;/li&gt;
&lt;li&gt;Change "Color Presets" to "Solarized Dark"&lt;/li&gt;
&lt;li&gt;While still in the same window as above, click "Text"&lt;/li&gt;
&lt;li&gt;Click on the dropdown under Font and select any font with "Powerline" in it. I chose "Meslo LG DZ for Powerline"&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The End
&lt;/h3&gt;

&lt;p&gt;That's all I have folks. I appreciate any feedback and suggestions on how to make this better!&lt;/p&gt;

</description>
      <category>security</category>
      <category>beginners</category>
      <category>github</category>
    </item>
    <item>
      <title>Securing Your Startup</title>
      <dc:creator>Mike P</dc:creator>
      <pubDate>Mon, 27 Jul 2020 19:42:35 +0000</pubDate>
      <link>https://dev.to/mikeprivette/securing-your-startup-11ji</link>
      <guid>https://dev.to/mikeprivette/securing-your-startup-11ji</guid>
      <description>&lt;p&gt;When it comes to early-stage startups and cybersecurity, the two concepts do not always go hand-in-hand. In this write-up, we'll explain the importance of cybersecurity and how it will build trust with customers and investors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Table of Contents (1260 words, 5 minute read):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Target Audience&lt;/li&gt;
&lt;li&gt;Why This Matters&lt;/li&gt;
&lt;li&gt;Problems to Solve&lt;/li&gt;
&lt;li&gt;Where This Applies&lt;/li&gt;
&lt;li&gt;Common Arguments From Founders&lt;/li&gt;
&lt;li&gt;Why to Start Early&lt;/li&gt;
&lt;li&gt;Security Guiding Principles for Startups&lt;/li&gt;
&lt;li&gt;What You Can Do Right Now&lt;/li&gt;
&lt;li&gt;Moving Forward&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Target Audience
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Founders (technical &amp;amp; non-technical)&lt;/li&gt;
&lt;li&gt;CTOs &amp;amp; Developers&lt;/li&gt;
&lt;li&gt;Sales &amp;amp; Business Development&lt;/li&gt;
&lt;li&gt;Investors (Private Equity, Venture Capital, etc.)&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Why This Matters
&lt;/h4&gt;

&lt;p&gt;Cybersecurity, data privacy, and regulatory compliance have become increasingly essential business challenges for startups and global organizations alike, and these issues impact starting, running, investing, or acquiring a business.&lt;/p&gt;

&lt;p&gt;Today's consumer has become more focused on data protection and privacy and has less confidence in a startup's ability to safeguard digital assets.&lt;/p&gt;

&lt;h4&gt;
  
  
  Problems to Solve
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Consumer Trust&lt;/strong&gt; - Trust in a digital world is harder to earn and keep, and startups are considered riskier by the average consumer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Meeting Standards&lt;/strong&gt; - Enterprise customers expect mature data protection, and data privacy practices and early startups can struggle to meet standards.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Regulatory Costs&lt;/strong&gt; - Solving for the evolving regulatory landscape only gets more expensive with time and company scale&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Where This Applies
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Feo1n94grdh9d2nstsqih.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Feo1n94grdh9d2nstsqih.png" alt="Should you think about security at your startup?"&gt;&lt;/a&gt;&lt;br&gt;
Does your startup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Have users logging into your platform?&lt;/li&gt;
&lt;li&gt;Use a database?&lt;/li&gt;
&lt;li&gt;Leverage cloud-based resources like IaaS (Infrastructure as a Service)?&lt;/li&gt;
&lt;li&gt;Have intellectual property (IP) to safeguard?&lt;/li&gt;
&lt;li&gt;Process payment transactions?&lt;/li&gt;
&lt;li&gt;Collect, store, use, or process Personally Identifiable Information (PII) data?&lt;/li&gt;
&lt;li&gt;Collect, store, use, or process any regulated data (i.e., financial or healthcare)?&lt;/li&gt;
&lt;li&gt;Have customers who operate in highly regulated industries (i.e., Critical Infrastructure,  Insurance, etc.)?&lt;/li&gt;
&lt;li&gt;Have operations in geographies with consumer protection laws or regulations (i.e., EU for &lt;a href="https://gdpr-info.eu/" rel="noopener noreferrer"&gt;GDPR&lt;/a&gt;, US for &lt;a href="https://oag.ca.gov/privacy/ccpa" rel="noopener noreferrer"&gt;CCPA&lt;/a&gt;, etc.)?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If &lt;strong&gt;yes&lt;/strong&gt; to any of the above, security, privacy, and compliance need consideration early and often.&lt;/p&gt;

&lt;blockquote&gt;
&lt;h4&gt;
  
  
  Simply put, you cannot do business without cybersecurity, data privacy, and regulatory compliance in mind today
&lt;/h4&gt;
&lt;/blockquote&gt;

&lt;p&gt;A few other reasons you need to consider security, data privacy, and compliance:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your company brings in new employees (part-time or otherwise)&lt;/li&gt;
&lt;li&gt;You want your company to be acquired&lt;/li&gt;
&lt;li&gt;You are seeking private equity or venture capital investment (see &lt;a href="https://fractionconsulting.co/why-private-equity-needs-cybersecurity" rel="noopener noreferrer"&gt;Why Private Equity Needs Cybersecurity Expertise&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Simply put, you cannot do business without cybersecurity, data privacy, and regulatory compliance in mind today (at least not for very long).&lt;/p&gt;

&lt;h4&gt;
  
  
  Common Arguments From Founders
&lt;/h4&gt;

&lt;p&gt;❌ "We're here to sell product X or service Y first, not be secure..."&lt;/p&gt;

&lt;p&gt;❌ "We'll take a look at that when we get bigger..."&lt;/p&gt;

&lt;p&gt;❌ "We'll wait until we have enough customers asking..."&lt;/p&gt;

&lt;p&gt;Many startups gauge their level of involvement and commitment to cybersecurity based on either the company's financial expense or certain financial milestones.&lt;/p&gt;

&lt;p&gt;Instead of waiting for a specific windfall event or a set number of times a customer asks about your cybersecurity practices, do this instead:&lt;/p&gt;

&lt;p&gt;✔️ Consider what industry you are in (or your customers are in)&lt;/p&gt;

&lt;p&gt;✔️ Consider the risk associated with the data your company has (or hopes to have)&lt;/p&gt;

&lt;p&gt;✔️ Consider what that would mean if that data was lost or stolen&lt;/p&gt;

&lt;h4&gt;
  
  
  Why to Start Early
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Price You Pay to Play&lt;/strong&gt; - Some enterprise customers will require specific security and regulatory compliance levels even to do business (i.e., SOC2, PCI-DSS, etc.).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Sells&lt;/strong&gt; - Security and compliance are selling points in the current state of the world, and your customers will expect it. Security, or lack thereof, could make or break your first big B2B customer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Create Your Moat&lt;/strong&gt; - Do what others will not. Security, data privacy, and regulatory compliance in your industry can make you stand out and create a competitive barrier to entry into your market.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limit &lt;a href="https://securityboulevard.com/2020/03/what-is-security-debt-and-how-do-i-get-out-of-it/" rel="noopener noreferrer"&gt;Security Debt&lt;/a&gt;&lt;/strong&gt; - Cybersecurity, data privacy, and regulatory compliance design decisions early on cost a lot less than down the road as your company begin to scale as customers, and requirements get larger.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Security Guiding Principles for Startups
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fa1epWOW.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fa1epWOW.jpg" alt="security_guiding_principals"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Create a Security Culture&lt;/strong&gt; - Adopt strong security and data privacy practices from the beginning and make it a part of everyone's job. Security is more process than technology.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Do the Right Things&lt;/strong&gt; - And Do the Things Right. You can't be good at everything early on, so pick a few things to be very good at and make it an essential piece of how you operate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Work the Plan&lt;/strong&gt; - You don't have to have it all done up front, but you have to plan to get it all done. Customers will be OK with timelines to get compliant or resolve security issues. Customers will &lt;strong&gt;NOT&lt;/strong&gt; be OK with no plans.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What You Can Do Right Now
&lt;/h4&gt;

&lt;p&gt;While not meant to be an exhaustive or exact list on what may work for your company, here is a sample guide on what you can do now with associated timelines:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use What You Have (0-3 months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use environment-native security controls where possible&lt;/li&gt;
&lt;li&gt;Use environment-native compliance reporting (i.e., AWS Trusted Advisory, etc.)&lt;/li&gt;
&lt;li&gt;Use available 3rd party tools/integrations for security&lt;/li&gt;
&lt;li&gt;Start talking to employees about how to avoid phishing scams and &lt;a href="https://en.wikipedia.org/wiki/Business_email_compromise" rel="noopener noreferrer"&gt;Business Email Compromise (BEC)&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Know Yourself and Know Your Vendors (0-3 months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Understand the &lt;a href="https://aws.amazon.com/compliance/shared-responsibility-model/?ref=wellarchitected" rel="noopener noreferrer"&gt;"Shared Responsibility Model"&lt;/a&gt;of securing your cloud resources&lt;/li&gt;
&lt;li&gt;Be able to explain how you collect, store, process, and use a customer's data&lt;/li&gt;
&lt;li&gt;Hold your 3rd party vendors to a high level of security rigor with your data&lt;/li&gt;
&lt;li&gt;Make sure all employees, contractors, etc. understand what information they can and cannot share&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Understand Compliance in Your Industry (3-6 months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Know the regulations and certifications that your industry or customers require&lt;/li&gt;
&lt;li&gt;Make someone at your company responsible for cybersecurity, data privacy, and regulatory compliance (doesn't have to be their &lt;em&gt;only&lt;/em&gt; job, but this will ramp up quickly)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Get Outside Support (6-9 months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Find out how other startups or companies in your market space are addressing security concerns&lt;/li&gt;
&lt;li&gt;Seek out a part-time or fractional trusted advisor to help navigate cybersecurity, data privacy, and regulatory compliance&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Nail the Basics (9-12 months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Build your business with security and data privacy principles upfront&lt;/li&gt;
&lt;li&gt;Create Information Security policies and standards&lt;/li&gt;
&lt;li&gt;Use multi-factor/two-factor authentication wherever possible&lt;/li&gt;
&lt;li&gt;Do not share passwords and get password vault manager to manage your company's many accounts (I like &lt;a href="https://1password.com/" rel="noopener noreferrer"&gt;1Password&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Use the model of least privilege (e.g., the CEO should not be "admin" on everything)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Work Smarter, Not Harder (9-12 months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Make managing users of your services easy to use, self-service, and auditable&lt;/li&gt;
&lt;li&gt;Make someone's full-time responsibility looking after security or hire a new person to take on this role&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Test Yourself (12+ months):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do static/dynamic code analysis on your web and mobile applications&lt;/li&gt;
&lt;li&gt;Audit yourself early and often (your institutional customers will)&lt;/li&gt;
&lt;li&gt;Perform tabletop exercise to respond to threats or loss of your services due to a cybersecurity event&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every scenario will be different, and the risk of your particular company should be driving your roadmap here. Adjust as needed.&lt;/p&gt;

&lt;h4&gt;
  
  
  Moving Forward
&lt;/h4&gt;

&lt;p&gt;We hope this detailed write-up has been useful for you! Every startup has dreams of being a "big" or "real" company one day. The goal here is to learn how to bake security in from the beginning so the company's security response can adapt to the changing risk posture and goals as the company grows. If you can do this successfully before reaching too much velocity, you can combat security debt and use security to accelerate your growth.&lt;/p&gt;

&lt;p&gt;&lt;a href="///contact.html"&gt;Contact Us&lt;/a&gt; to discuss how we can help your startup with any of these steps and more.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
