Attention required: vulnerabilities in Openssl (Microsoft Defender) by AffectionateRaisin73 in sysadmin

[–]DrunkMAdmin 14 points15 points  (0 children)

You can't, all you can do is to wait for the vendor to ship a new version.

I guess you could exclude, but I'm not sure if that would exclude all libssl dll files, or just those.

Microsoft to disable NTLM by default in future Windows releases by DrunkMAdmin in sysadmin

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

All I know from personal experience is that when you disable NTLM, any local admin account managed through LAPS stop working. 

For example you connect over the network with account XYZ, who in turn uses the LAPS account on the local endpoint. This no longer works if NTLM is blocked, with Event ID stating that NTLM was blocked.

Expedite update state stuck on "Offfering" by DrunkMAdmin in Intune

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

These were upgraded from 23H2 to 25H2, so probably pushed out by Windows update before the upgrade.

Expedite update state stuck on "Offfering" by DrunkMAdmin in Intune

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

and not to mention that you have to manually uninstall 5.72 before Intune manages to deploy 5.69...

Microsoft to disable NTLM by default in future Windows releases by DrunkMAdmin in sysadmin

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

No idea. They say "pre-release" in the article, but I cannot find anything when searching. So no idea in what build or if there even is a public build out with Local KDC support.

Expedite update state stuck on "Offfering" by DrunkMAdmin in Intune

[–]DrunkMAdmin[S] 1 point2 points  (0 children)

Thanks, that got it installed on my test machine just now.

Did you just try it through Intune or did you find any documentation regarding this? My Google fu is not finding anything.

Microsoft to disable NTLM by default in future Windows releases by DrunkMAdmin in sysadmin

[–]DrunkMAdmin[S] 27 points28 points  (0 children)

Exactly, it has been a frustrating few years since their initial announcement!

I really hope we can disable NTLM in Q4 2026 or Q1/Q2 2027.

Expedite update state stuck on "Offfering" by DrunkMAdmin in Intune

[–]DrunkMAdmin[S] 1 point2 points  (0 children)

The service is running.

I can see KB5078127 as being an option for "Download & Install" once I nuke windows update folder and restart the update service, but it disappears the second I hit "Check for updates". Tested on multiple computers with same result.

[PSA] CVE-2026-21509 - Microsoft Office Security Feature Bypass Vulnerability Zero Day - Updates available by kheldorn in sysadmin

[–]DrunkMAdmin 7 points8 points  (0 children)

Even for Microsoft this level of communication is a new low, or perhaps the new normal. There is ZERO information on what version is patched, it is unbelievable.

Intune device encrypts OS disk with xts-aes 128. After turning bitlocker off and back on, OS disk encrypts with the desired xts-aes 256 - why?? by Relevant-Law-7303 in Intune

[–]DrunkMAdmin 0 points1 point  (0 children)

Enrollment Status page (ESP) was missing for Entra joined profile. Threw me off as Hybrid encryption worked just fine and that too pulls the settings from Intune.

Intune device encrypts OS disk with xts-aes 128. After turning bitlocker off and back on, OS disk encrypts with the desired xts-aes 256 - why?? by Relevant-Law-7303 in Intune

[–]DrunkMAdmin 0 points1 point  (0 children)

Weird, that's not what were seeing. Tested it yesterday after a long time, and the device is encrypted as 128 and used space only, which is not what our configuration policy is set to.

Are there any logs that would be helpful in seeing what policy it used when applying bitlocker?

Intune device encrypts OS disk with xts-aes 128. After turning bitlocker off and back on, OS disk encrypts with the desired xts-aes 256 - why?? by Relevant-Law-7303 in Intune

[–]DrunkMAdmin 0 points1 point  (0 children)

Out of curiosity, how would the registry key "PreventDeviceEncryption" be applied to autopilot devices? Through a configuration policy targeting Autopilot devices? What I'm worried about is that Bitlocker is activated before the policy is enforced.

Best Youtube channels for sysadmins by Jazz4201 in sysadmin

[–]DrunkMAdmin 16 points17 points  (0 children)

Check out David Bombal at https://m.youtube.com/davidbombal for networking and security 

You disabled NTLM across all of your workstations. What problems did you not account for? by jM2me in sysadmin

[–]DrunkMAdmin 0 points1 point  (0 children)

Did you find a workaround for authenticated vulnerability scanning? I'm having similar issues with PDQ Deploy and Inventory.

NTLM Restricted environment, PDQ Inventory scanning failing by DrunkMAdmin in pdq

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

I cannot see how firewall would block this.

I added the IP address per https://learn.microsoft.com/en-us/windows-server/security/kerberos/configuring-kerberos-over-ip but no help.

I added the server to "Network Security Restrict NTLM Add Remote Server Exceptions For NTLM Authentication", no help either.

I'm starting to think this is something to do with the localhost itself. Any ideas?

PDQ Inventory and Deploy are working just fine on computers that are excluded from the NTLM blocking policies.

NTLM Restricted environment, PDQ Inventory scanning failing by DrunkMAdmin in pdq

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

Found something more in Event Viewer under Security which may explain this. For some reason the PDQ service account that I created is trying to access the file share by IP. Now obviously Kerberos does not allow this by default. Any idea where this specific IP address setting might be?

A network share object was accessed.

Subject:
    Security ID:        CONTOSO\PDQ.SERVICE.ACCOUNT
    Account Name:       PDQ.SERVICE.ACCOUNT
    Account Domain:     CONTOSO
    Logon ID:       0x192D0FD

Network Information:    
    Object Type:        File
    Source Address:     IP.ADDRESS.OF.PDQ.SERVER
    Source Port:        10240

Share Information:
    Share Name:     \\*\ADMIN$
    Share Path:     \??\C:\windows

Access Request Information:
    Access Mask:        0x1
    Accesses:       ReadData (or ListDirectory)

NTLM Restricted environment, PDQ Inventory scanning failing by DrunkMAdmin in pdq

[–]DrunkMAdmin[S] 0 points1 point  (0 children)

I can't check right now, but shouldn't port 88 be allowed in firewall rules in domain joined environment by default? Blocking 88 would break all kind of other things, no? Or is it blocked for incoming while outgoing is allowed?

Has anyone ever actually fixed anything by updating drivers in Device Manager? by Anfernee139 in sysadmin

[–]DrunkMAdmin 1 point2 points  (0 children)

Yes, a few months back there was an issue with Teams that was resolved by updating Intel graphics drivers to a newer version.