Some articles I worked on elsewhere, mostly from my time at Palantir. I am keeping these together here rather than publishing each as a tiny link-only post.

Windows privilege abuse

Windows Privilege Abuse: Auditing, Detection, and Defense

This post was written with help from friends at SpecterOps and focuses on high-impact Windows privilege abuse paths that are easy to miss in enterprise environments. The useful bit is the defensive framing: audit the privileges that matter, collect telemetry that can show abuse early, and reduce blast radius before full remediation is complete.

Restricting SMB-based lateral movement

Restricting SMB-based Lateral Movement in a Windows Environment

This one maps common SMB-driven lateral movement paths from adversary simulation work and turns them into practical restrictions. The operational lesson is that lateral-movement controls need phased rollout, good exception handling, and a clear understanding of what business workflows depend on SMB.

Microsoft Defender Attack Surface Reduction

Microsoft Defender Attack Surface Reduction Recommendations

This post covers a staged ASR rollout model: audit first, tune noisy rules, then enforce the controls that provide the best return. The main idea is to treat ASR as an operational program, not a one-time policy toggle.

Managing browser extensions at scale

Managing and Automating Browser Extensions at Scale

This post describes a policy-as-code workflow for browser extension decisions. Browser extensions are a surprisingly meaningful enterprise risk surface, and the useful pattern here is giving teams a review and approval path that is fast enough to use but structured enough to govern.

Image

Chad Duffey

Blue Team -> Exploit Development & things in-between

Back to Overview