Back to all projects







61173923
Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
2025-11-21
Samson Otori
Personal Project
Blue Team

Vulnerability Management
Tenable
Azure
Windows
Authenticated Scanning
Unauthenticated Scanning
Blue Team
Cloud Security
Tenable Vulnerability Management
Azure
Windows 10/11
PowerShell
Networking
Continue Reading
Previous

Project 6.1: LOG(N) Pacific Internship – Vulnerability Management: Linux Authenticated vs Unauthenticated Scanning with Tenable
In this project, I followed the same workflow used previously for Windows, but this time focusing on an Ubuntu 22.04 Linux virtual machine.…
Nov 22, 2025
Read previous
NextProject 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario · Part 2 of 2

Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Conducting a full threat-hunting investigation using Microsoft Defender for Endpoint to identify and reconstruct Tor Browser misuse on a co…
Nov 17, 2025
Read next
Related Projects

Blue Team
Project 6.1: LOG(N) Pacific Internship – Vulnerability Management: Linux Authenticated vs Unauthenticated Scanning with Tenable
Nov 22Project

Blue Team
Project 6.4: Agent-Based Vulnerability Monitoring on Linux with Tenable Nessus Agent
Dec 5Project

Blue Team
Project 6.3: Agent-Based Monitoring on Windows 11 Using Tenable Nessus Agents
Nov 28Project
Oldest Projects
Newest Projects

Blue Team
Project 6.2: LOG(N) Pacific Internship – Windows 11 Compliance Scanning Using a Custom Tenable Scan Template
Nov 25Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Nov 17Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure
