<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Service Hardening on Koos's Tech Blog</title><link>https://koosjanse.com/tags/service-hardening/</link><description>Recent content in Service Hardening on Koos's Tech Blog</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://koosjanse.com/tags/service-hardening/index.xml" rel="self" type="application/rss+xml"/><item><title>Finding Weak Service Executable Paths with Defender TVM and PowerShell</title><link>https://koosjanse.com/posts/devices/serviceacl/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://koosjanse.com/posts/devices/serviceacl/</guid><description>Microsoft Defender can flag services that run outside common protected locations. This post shows how to use KQL to identify the affected service paths and PowerShell to validate whether the base folders are writable by broad user groups.</description></item></channel></rss>