top of page

Welcome

This site is dedicated to the practical hardening of Microsoft Windows and IT systems against security threats, with a focus on automation using PowerShell, Ansible, and deployment tools like SCCM/MECM and MDT.


I'll show real-world implementation, offering clear demonstrations of Windows hardening techniques and IT security practices that can be applied directly in enterprise environments. I'll also explore common hacking techniques and analyze how they interact with Windows security mechanisms.

 

By understanding how attackers exploit misconfigurations and weaknesses, we can better anticipate and defend against real-world threats. The goal is to enhance your defensive strategies through informed and practical implementations.

 

Windows Hardening - First Experiences

My work with Windows security began in 2000 on an NT4 Server, where securing a system often meant manually managing file permissions with little centralized control. Since then, I’ve focused on hardening a wide range of Microsoft environments. In situations without Group Policy or domain infrastructure, effective security becomes less about following a guide and more about applying practical expertise, automating protections without compromising usability. That balance is what continues to drive my work.

 

SCCM\MECM\MDT and PowerShell

For those focused on automation, this site offers tips and tricks covering ConfigMgr, MDT, and PowerShell. Rather than relying on repetitive manual tasks, the emphasis is on scripting and automation to create efficient, scalable solutions. And while the focus is technical, a bit of humor is always welcome, just like a reliable backup strategy.

​Links to Content

Scripts can be found on Github @ https://github.com/Tenaka.

Pentesting stuff can be found @ https://tenaka.gitbook.io/pentesting (this is under development).

Attacker vs Defender Results

Reference and results table for the tests carried out so far, click on the links for details.

Contact me by submitting a message

Thanks for submitting!

Feel free to use the scripts and techniques but only after thoroughly testing and not for anything malicious. All the content on this site has been tested and should work as-is, the steps are I hope clear and concise, however, if there are any problems please email me using the form.

The material and information contained on this website are for general information purposes only. You should not rely upon the information on this website as a basis for making any changes to your Enterprise IT systems.

bottom of page