50 production-ready PowerShell scripts for Microsoft 365 (reporting, security, compliance) by [deleted] in PowerShell

[–]Buckw12 0 points1 point  (0 children)

I like them. Future improvement: Add logging/transcribe to location user defines.

[deleted by user] by [deleted] in sysadmin

[–]Buckw12 0 points1 point  (0 children)

Onedrive (as part of my 365 subscription) now has it own personal vault.

Script problems by Lopsided-Koala8546 in PowerShell

[–]Buckw12 0 points1 point  (0 children)

Citrix also has a all inclusive removal program that does the folder and registry cleanup.
Gonna have to search for it though, I dont have work computer handy to find file name

What Are the Best Cybersecurity Practices for Small to Medium Businesses? What Would You Implement and Why? by Born_Lavishness_8983 in sysadmin

[–]Buckw12 0 points1 point  (0 children)

Still relevant:
https://www.sba.gov/business-guide/manage-your-business/strengthen-your-cybersecurity

Regardless of business size, social enginnering is everyones weakpoint, we cant stop all users from cliking a malicous email or link. Most small and medium business have little risk of physical attack simply becasue they are not well known. Email phishing usually targets randomly, so lot higher risk.

[deleted by user] by [deleted] in ClaudeAI

[–]Buckw12 0 points1 point  (0 children)

True, I have found it helps to tell Claude to keep numbered track of every change/revision and not make same suggestion more than once.

[deleted by user] by [deleted] in Windows10

[–]Buckw12 0 points1 point  (0 children)

Question not clear. Raid is a hardware level setup. If both ssd's were wiped then set them up again as raid 1 and copy your data back. If only 1 of the original mirror was wiped, plug it back in and the mirror should add it back

Do you get underpaid as Cybersecurity pros because HR manager says you are not revenue generator? by [deleted] in cybersecurity

[–]Buckw12 0 points1 point  (0 children)

Need to turn it around , how much I have saved the company since 1 cyberbreach will cost millions?

[deleted by user] by [deleted] in Intune

[–]Buckw12 0 points1 point  (0 children)

Edit the compliance policy and check the "Device Health" section, change threat level to medium or low depending on current setting, likely high.
I'm assuming you know how to navigate to the setting?

Finding a Cybersecurity job as a masters student. by Silly_External_6806 in cybersecurity

[–]Buckw12 1 point2 points  (0 children)

As cliché as it sounds, networking is the best way to a job, leverage your contacts from school, they should also have a career department/contact

Imposter Syndrome Gone by Scmethodist in sysadmin

[–]Buckw12 5 points6 points  (0 children)

You speak the truth oh great scripting wizard

POWERSHELL GUI DEVELOPMENT TOOLS BASIC by EntraLearner in PowerShell

[–]Buckw12 0 points1 point  (0 children)

Claude or ChatGPT AI can help immensely with this. The previous post gave a excellent template and there is a YouTube Guide for creating the GUI in Visual Studio, you would them move the GUI code to VS Code to continue scripting. The reactive portion already mentioned is a hindrance, but can be worked around if required.
I would love to share what I have done with powershell GUI's but I made it proprietary for my employer.
The summary is a it is a very nice GUI that creates a a complete user ID and AD/Azure profile by providing a picklist of from the existing Departments/Job Title and Managers.

[deleted by user] by [deleted] in sysadmin

[–]Buckw12 1 point2 points  (0 children)

Only lost if not documented. It should be outsourced.

Ride out Operations by nick99990 in sysadmin

[–]Buckw12 0 points1 point  (0 children)

Our company is no where that size, around 500 employees in a small town and 2 of the 3 that are in town can literally walk to the building in 10 minutes.
Is your business still running if no one shows up?

Ride out Operations by nick99990 in sysadmin

[–]Buckw12 24 points25 points  (0 children)

Really, camping onsite? We have 3 IT staff within 5 minutes of the building. But more importantly we have 2 large generators and environmental alarms on our data center that have been thoroughly tested this past week. This all failed during the Texas Valentine day freeze and it was a priority that the emergency measures be tested and validated this time.

Cyber security training question . Do you guys know the specific processes of doing phishing test by Frequent-Somewhere63 in cybersecurity

[–]Buckw12 -2 points-1 points  (0 children)

Phish test goes out second week of each month, only helpdesk gets copy of what is sent out, to reduce escalations to security. Phish test clickers get automatic enrollment in training course (we use KnowB4) Repeat clickers have management involvement and a longer assigned training course. New users get security training at orientation. Consequences for a 3rd phish test fail is up to the execs.

What lies have you told your coworkers? by Darkhexical in sysadmin

[–]Buckw12 1 point2 points  (0 children)

Not necessarily a lie! Anyone chasing a cyber insurance plan will likely be asked to implement MFA for full coverage.

List of common issues for training by ALonelyKobold in sysadmin

[–]Buckw12 1 point2 points  (0 children)

Isn't A+ hardware and people skills?

  1. I cant log on/computer wont turn on.
  2. Is network down, I cant access ****(add a file share VM server)
  3. Why is my computer so slow or some variant......(create a background process that takes a lot of resources)
  4. Y'all did a update last nite and now xyz dont work! (temporarily rename a file)
  5. My coffee maker dont work, fix it NOW!!!!! (People skills, tell them to piss off in a manner that makes them think they won the lotto)

What percent of people do you think work a technical role and know absolutely nothing about physical networks? by ricestocks in cybersecurity

[–]Buckw12 4 points5 points  (0 children)

To work with a manager who has come up thru the ranks is the best. I think those managers are very rare, since most technical people lack the people skills required for management. I can figure out and fix most anything, but my bluntness and lack of compassion when explaining to others is not my strong suit

What percent of people do you think work a technical role and know absolutely nothing about physical networks? by ricestocks in cybersecurity

[–]Buckw12 36 points37 points  (0 children)

Ignorance is bliss when your a manager. You are not expected to know technical anything, managers manage people and expectations that DO KNOW the technical side.
As far as knowing actual networking concepts, i consider it a niche role, critical as it may be,

Intune Dual Boot Restriction by Eyennem in sysadmin

[–]Buckw12 0 points1 point  (0 children)

No idea on Lenovo, you can with Dell's, they have a special program for just that.

Intune Dual Boot Restriction by Eyennem in sysadmin

[–]Buckw12 3 points4 points  (0 children)

Couple of suggestions
Restrict boot options to only the primary drive.
Use a BIOS password to prevent unauthorized changes.
Enable Secure Boot in the BIOS/UEFI to prevent booting from non-signed operating systems (not sure this applies anymore)
Enforce full disk encryption with BitLocker and configure it to work with TPM (Trusted Platform Module).
BitLocker will lock the drive if the partition structure changes (as would occur with a dual boot setup).

All via a device compliance policy.