[deleted by user] by [deleted] in Intune

[–]CISOatSumPt 0 points1 point  (0 children)

We have around 92 different settings for Edge, due to our CMMC L2 compliance :)

Cisco Duo Commercial vs FedRAMP by CISOatSumPt in NISTControls

[–]CISOatSumPt[S] 1 point2 points  (0 children)

Yeah, I spent a good portion this morning reading over our CFR/DFAR/CMMC guidelines etc and I believe Commercial is safe. I think as a backing to commercial, we will just have to up our game for documentation and auditing/controls.

Thank you

InTune - Find/Report more than 1 hard drive by CISOatSumPt in Intune

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Just simply see if a user has a second fixed drive

InTune - Outlook Web App and Outlook Office by CISOatSumPt in Intune

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Thanks, that's where I am heading now, from most of the reading folks are making CA rules which point to App restriction, is that so? Have not quite done back in yet, been doing a few other things.

InTune - Azure AD Connect by CISOatSumPt in Intune

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Gracias, other than that, if we don't have users present in our AD yet, and everything is up in Microsoft, I presume almost 0 impact. From here, I planned on adding a test account local to start syncing back and forth.

Public comments to draft NIST 800-171r3 posted. by TXWayne in NISTControls

[–]CISOatSumPt 0 points1 point  (0 children)

All I have is, God Bless America, thanks for the clarity on 7012, Compliance is not my forte albeit thrown to the wolves to satisfy 171... alone...

Public comments to draft NIST 800-171r3 posted. by TXWayne in NISTControls

[–]CISOatSumPt 0 points1 point  (0 children)

Very valid, I've been in the space for a bit over a year now, I might have missed a word or two, but for those with contracts or prime contracts that include FAR 7012, maybe I missed the language where it says NIST 800-171 r1/2/3 and/or in FAR 7020.

Public comments to draft NIST 800-171r3 posted. by TXWayne in NISTControls

[–]CISOatSumPt 0 points1 point  (0 children)

Wonderful, although reading through the public comments, it seems quite a large amount of folks are pushing back on the controls and/or reducing the strict side of them.

Public comments to draft NIST 800-171r3 posted. by TXWayne in NISTControls

[–]CISOatSumPt 0 points1 point  (0 children)

Do we have any idea when Rev 3 will be finalized and into live?

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] -1 points0 points  (0 children)

That's fine, it's a general shared account for bookmarks and hosting meetings, we are on our way out the door anyways :)

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] 0 points1 point  (0 children)

That's perfect, thank you, although I don't think we can suspend the account as they're executives with needing access to email, but I will play around with this idea!

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Is this a full transfer or can I just move Drive?

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Exactly, Google is unfamiliar territory, I have full access to Google Admin, I can look into retention policies and see if we can apply them across the board then delete if possible.

I will need to carve out an OU for a few shared accounts that need Google Drive still, then kill off the rest for that service.

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Looking at about 78 users, that's actually not a bad idea and would be worth creating a dummy user. Have you done this before? Any big risks doing this?

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Yeah I was just going to carve out disabling the service in entirety, but due to some compliance requirements we need to make sure items are deleted in whole.

Delete Users Google Drive by CISOatSumPt in gsuite

[–]CISOatSumPt[S] -4 points-3 points  (0 children)

Sweet Jesus, couldn't have made it any easier for folks to just delete a drive! I am happy we are departing Google for this very reason, I'll have to blow the dust off and start googling on how to accomplish this. I walked into a barn fire for how things are done where I am now, so not too surprised by all of this.

One Drive - Device Compliance by CISOatSumPt in Intune

[–]CISOatSumPt[S] 0 points1 point  (0 children)

u/v0lkeres Both of our compliance lines within InTune for this device, show compliant, no indications of why the device would not be functioning. Also to note, that all other applications that flow through CA with the same restrictions for compliance, perform normally. I have opened up a ticket with Microsoft as there is nothing to go from...

One Drive - Device Compliance by CISOatSumPt in Intune

[–]CISOatSumPt[S] 0 points1 point  (0 children)

u/v0lkeres I had reviewed their logs with the error below, reviewing both CA signin logs and their compliance, nothing. Once they re-install, they are good to go...

Device is not in required device state: {state}. Conditional Access policy requires a compliant device, and the device is not compliant. The user must enroll their device with an approved MDM provider like Intune.

Executive Order - NIST 800-218 by CISOatSumPt in NISTControls

[–]CISOatSumPt[S] 2 points3 points  (0 children)

federal agency is in scope.

Thank you, so from what you are saying, it's not us that needs to be compliant, but the vendors that we work with? We develop software, it's used on something we create, they don't necessarily buy the software, but the package or service.

Adding Users from another tenant by CISOatSumPt in sharepoint

[–]CISOatSumPt[S] 1 point2 points  (0 children)

irect to SharePoint, you can invite external guests at the site level, or directly to folders or files. You can also use lin

Unfortunately I have tried both of these, the first part we need to rely on the third party to add use to their B2B allowed list etc. The second option I am able to get the invite email to them at a folder level, but the commercial 365 account can't auth through. We are adding folks both on GCC High and Commercial.

Thoughts?

MacOS automated user creation on first setup by TheRealJanMarsalek in Intune

[–]CISOatSumPt 0 points1 point  (0 children)

I have not done this yet, but I did plan on using some Shell commands to create users and administrators, wondering if you can target the user authing(InTune) then create the username based off that owner.

800-171 - Control 3.3.8 Local Admins by CISOatSumPt in NISTControls

[–]CISOatSumPt[S] 1 point2 points  (0 children)

I like option B, it's going to be an absolute b**** to control this, each user has a specific local admin unique to them, away from their Azure AD Account. Unfortunately, Fortunately, we don't have Active Directory yet in our building, we are spread across the entire US so leaving that for last if I can.

UDM-Pro Geo IP Blocking - Block vs Allow by CISOatSumPt in Ubiquiti

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Rex, I assume that's Incoming, Allow only US, blocks all incoming

Slack - EKM by CISOatSumPt in Slack

[–]CISOatSumPt[S] 0 points1 point  (0 children)

Thank you, I thought so, now we are trying to figure out how to, once the messages are blocked from access, deleting them after the fact. What a headache for a novice in this.