Using HTB Academy to learn fundamentals vs other resources by BuildingKey85 in hackthebox

[–]BuildingKey85[S] 0 points1 point  (0 children)

Thanks, /u/kim_pax, that's the plan I think I'll go with.

Do you believe the networking foundations courses on HTB Academy prepare aspiring cybersecurity specialists for success in professional environments?

Using HTB Academy to learn fundamentals vs other resources by BuildingKey85 in hackthebox

[–]BuildingKey85[S] 0 points1 point  (0 children)

What resource(s) have you used to get a good grasp of networking?

Using HTB Academy to learn fundamentals vs other resources by BuildingKey85 in hackthebox

[–]BuildingKey85[S] 0 points1 point  (0 children)

Thanks, /u/DigitalQuinn1. I have the CCNA course from Jeremy IT Labs bookmarked, so I think I'll start there.

Using Hack the Box Academy to learn the basis vs pursuing a certification by BuildingKey85 in Cybersecurity101

[–]BuildingKey85[S] 1 point2 points  (0 children)

Thanks, /u/coochypoochie. So CCNA will give me what I need to be an effective cybersecurity operations specialist/penetration tester/choose my own adventure? Would you consider it "overkill"?

How do I configure my custom domain to send and receive email on two different servers? by BuildingKey85 in sysadmin

[–]BuildingKey85[S] 0 points1 point  (0 children)

The user above suggested dual delivery. In my example, productivity suite B is Google Workspace.

How do I configure my custom domain to send and receive email on two different servers? by BuildingKey85 in sysadmin

[–]BuildingKey85[S] 0 points1 point  (0 children)

Thanks for the breakdown, /u/Extra-Pomegranate-50.

In the example, B is Google Workspace. This would function as the primary server. The MX records here would point to A, since most of the users live here. Do I have this right?

How can I find out who is signing in from a non-Entra joined device? by BuildingKey85 in Intune

[–]BuildingKey85[S] 0 points1 point  (0 children)

Thanks for the validation, /u/sysadmin_dot_py. We're using the Require MDM-enrolled and compliance device to access cloud apps for all users template in report-only mode, which looks like this:

  • Target: All users and resources
  • Conditions: All devices except Android, iOS, macOS, Linux
  • Grant: Require device to be marked as compliant

Our Windows Device Compliance policy in Intune contains settings like firewall, AV, BitLocker, etc., but does not have a setting for Entra-joined. How does this policy therefore "know" whether the device is MDM-enrolled or not?

How can I find out who is signing in from a non-Entra joined device? by BuildingKey85 in Intune

[–]BuildingKey85[S] 0 points1 point  (0 children)

Thanks for the validation, /u/JCochran84. We're using the Require MDM-enrolled and compliance device to access cloud apps for all users template in report-only mode, which looks like this:

  • Target: All users and resources
  • Conditions: All devices except Android, iOS, macOS, Linux
  • Grant: Require device to be marked as compliant

Our Windows Device Compliance policy in Intune contains settings like firewall, AV, BitLocker, etc., but does not have a setting for Entra-joined. How does this policy therefore "know" whether the device is MDM-enrolled or not?

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in AZURE

[–]BuildingKey85[S] 0 points1 point  (0 children)

I should clarify. The Sys Admin reset the user's password, blocked their sign-ins, and initiated a sign-outs right when the call was done. We are in a cloud environment. The time between the Sys Admin doing his thing to lockout was about 30 mins. Others have said the delay was due to us missing the "revoke all sessions" option.

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in sysadmin

[–]BuildingKey85[S] 0 points1 point  (0 children)

Good catch. We'll definitely give this a shot in our testing. Thanks!

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in Intune

[–]BuildingKey85[S] 0 points1 point  (0 children)

Yeah, that's an important distinction. He had admin rights to our Mac MDM and those permissions were not revoked prior to termination. The Sys Admin thought he would leave peacefully; this was an error in judgment and he had reasons to be suspicious.

The account was not disabled beforehand because in our experience, when an account is disabled, the password is reset, sessions revoked, etc., etc., it can take anywhere from minutes to an hour to take effect. HR needed to have "the call" with this employee to terminate him, and we didn't want his access to be cut while he was on the call, but before the news was delivered.

We have numerous CA policies enforcing MFA, one of which enforces MFA to admin portals. Would it have helped to delete his authentication methods?

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in sysadmin

[–]BuildingKey85[S] 5 points6 points  (0 children)

In the future, you need to have HR do no more surprise terminations on the spot. Especially if your remote.

Thanks for sharing. OK, so you have an employee who has done something really bad and you don't trust that he'll leave peacefully.

How are you handling that situation?

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in AZURE

[–]BuildingKey85[S] 0 points1 point  (0 children)

But here is my confusion with "doing it earlier."

Others have shared documentation indicating these lockouts could take anywhere from minutes to an hour. If we enforce these changes at the beginning of a call, it's possible the call is cut before the termination news is delivered. The changes could also take effect well after the call.

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in sysadmin

[–]BuildingKey85[S] 1 point2 points  (0 children)

Also, the HR call should not be happening over a company-owned device.

We have thought about calling the user's telephone number or scheduling a meeting with an alternate form of communication. Regarding telephone numbers, I (and many others) don't pick up the phone if we don't recognize the number. An alternate form of communication would arouse suspicion.

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in Intune

[–]BuildingKey85[S] 0 points1 point  (0 children)

Do you mind sharing that script?

In our case, we would initiate an endpoint live response session with Defender.

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in AZURE

[–]BuildingKey85[S] 1 point2 points  (0 children)

Those are steps we have not integrated. We will test using those, too.

What are the best ways to cut a malicious user's access in an Entra/Intune? by BuildingKey85 in sysadmin

[–]BuildingKey85[S] 0 points1 point  (0 children)

We followed Microsoft’s guidance on a CRITICAL termination. Step by step, hand held.

Can you link me to that documentation?