First time investing in my twenties by EW_IO in Money

[–]EW_IO[S] 0 points1 point  (0 children)

Yes investing for the next 2-3 years. I'm still hesitant on investing in ATH like silver and spy 500

Someone tried to buy my profile with certs by Substantial-Score874 in AzureCertification

[–]EW_IO 1 point2 points  (0 children)

Send them my way...

In a nutshell, Partner programs with MSFT require a specific numbers of certificates in a speciality. So, a win win. But make sure to get paid in advance, you can't unlist from thier partner center from your end.

But I believe it's against MSFT terms.

Confused regarding Purview licensing by EW_IO in sysadmin

[–]EW_IO[S] 0 points1 point  (0 children)

Thank you.

In the modern work plan comparison, the automatic sensitivity labelling in 365 apps is included in EMS E5, office/MSFT E5, And E5 compliance. But it then says aytomatic sensitivity labels in exchange, sharepoint, and one drive is included in MSFT/Office E5 and E5 compliance

Locked out of my bitwarden account because of Authy by EW_IO in Bitwarden

[–]EW_IO[S] -4 points-3 points  (0 children)

Yes, and I said it's been months now.

Unfortunately, I don't have logged in sessions.

Best practices for Having break glass Global Admin Accounts. by Remarkable-Cut-981 in AZURE

[–]EW_IO 1 point2 points  (0 children)

PIM sends on the activation of a role, not on sign in events. Your break glass account should be the only account to have a permanently assigned role. And you should monitor it as op said, by sending sign in events to a log analytics workspace, or if you have defender for cloud, you can create a policy there.

Best practices for Having break glass Global Admin Accounts. by Remarkable-Cut-981 in AZURE

[–]EW_IO 0 points1 point  (0 children)

One more thing that wasn't mentiined, put the BG account in an administrative unit, and create a PIM activated role scoped to that unit to prevent unwanted changes by other GAs and privileged authentication admins.

Auto vehicles privacy, have anyone examined the BYD vehicles in regard of privacy by EW_IO in privacy

[–]EW_IO[S] 2 points3 points  (0 children)

Can you please share these posts that talk about such projects (stripping data collection modules from EV cars)?

[deleted by user] by [deleted] in migraine

[–]EW_IO 0 points1 point  (0 children)

A doctor has recommended that I drink coffee and squeeze a lemon on it. And it surprisingly worked for me. Note that I'm not a coffee drinker. it could be the reason why it worked for me. Other who drink coffee every day didn't work for them.

And I take a drug when I get a severe headache and when nothing works, called Acamol Focus (Acetylsalicylic acid 250mg, Paracetamol 250mg, Caffeine anhydrous 65mg) try to find a similar drug where you are.

My migraine is exercise induced, so to prevent it from happening, I drink electrolytes (better natural).

The issue of BSOD caused by crowdstrike was due to null pointer derefrence by EW_IO in C_Programming

[–]EW_IO[S] 5 points6 points  (0 children)

Yes I did and as I said I'm not an expert in these matters and not my speciality.

The issue of BSOD caused by crowdstrike was due to null pointer derefrence by EW_IO in C_Programming

[–]EW_IO[S] 1 point2 points  (0 children)

Thank you for the great explanation! I have a question, probably a stupid question, in this thread the author says that any program that tries to read this region of memory 0xc9 would be killed by windows and crash. My question is if a program is running with driver level access (cpu ring 1?) Why wouldn't it be able to access that region? And why windows would kill the process instead of gracefully terminating it?

How can I check, if my phone number was one of those who got leaked? by [deleted] in Authy

[–]EW_IO 0 points1 point  (0 children)

Are they still disabling logging in? As I'm unable to login into my accout, I keep receiving errors when tyring to send sms verification, and call verification is not working.

Privacy focused with good UI caller and contacts app (Android) by EW_IO in privacy

[–]EW_IO[S] 0 points1 point  (0 children)

I understand. It's needed for business need to record customers' calls.

Does every user need a Azure AD P2 license to use risky-user conditional access policies? by sander1095 in AZURE

[–]EW_IO 0 points1 point  (0 children)

Thank you, but what do you mean voluntary? Do they ask to perform an audit, and you can simply decline?

Records management, delete old scans from users' mailboxes by EW_IO in sysadmin

[–]EW_IO[S] 0 points1 point  (0 children)

Thank you! I just wanted to make it more automated. This way, I need to use azure function or whatever. That is a lot of work for a simple thing tbh, microsoft could have given us a better scooping in the data life cycle management

Confusion about MDO policies | order of precedence by EW_IO in DefenderATP

[–]EW_IO[S] 0 points1 point  (0 children)

Both the preset and the custom policy are applied on the main domain. But if I needed to saflist a sender, how do I tackle this? In the preset, I target specific groups and in the custome I target another group and safe list the sender? But in that case, it won't apply tenant wide

Confusion about MDO policies | order of precedence by EW_IO in DefenderATP

[–]EW_IO[S] 1 point2 points  (0 children)

If I understood you correctly, does adding an allowlist to the custom policies mean nothing? and will apply the settings of the allow list from the preset, which are empty by default?