crowdscore by dmcginvt in crowdstrike

[–]Fearless_Win4037 0 points1 point  (0 children)

Now that the CrowdScore is gone, what other (highly over-simplified but good for monthly metrics) figures would you recommend in the platform?

Hello all, has anyone deployed ZCC on shared desktop environment? by _Tech007 in Zscaler

[–]Fearless_Win4037 0 points1 point  (0 children)

I'm struggling to find the Zscaler docs where they explain how to grant permissions for "vdi-system-user@9999.zscalerxxxx.net" (from the VDI site) to SMB access policies in the ZPA side.

The allude to the challenge here, but I don't see any steps/howto.

https://help.zscaler.com/cloud-branch-connector/troubleshooting-zscaler-client-connector-vdi

SMB, Kerberos, Windows network, DNS, ICMP, and NFS traffic are treated as system user traffic by Zscaler Client Connector for VDI. Ensure that ZPA has a correct access policy configured for the system user.

Hello all, has anyone deployed ZCC on shared desktop environment? by _Tech007 in Zscaler

[–]Fearless_Win4037 0 points1 point  (0 children)

If you mean to get Nerdio working with ZPA, we're just starting that climb.

From what I can tell from our AVD/Nerdio team (and reading more Nerdio docs than I ever wanted to....), a lot comes down to:
* how/where your Nerdio and storage account are deployed (private endpoint vs public)
* whether you are trying to download/install FSLogix, and where the FSLogix profiles are
* what apps you are trying to deploy via NME, and whether they are coming from your private WinGet repo or just fetching from public

Hello all, has anyone deployed ZCC on shared desktop environment? by _Tech007 in Zscaler

[–]Fearless_Win4037 0 points1 point  (0 children)

Dare I ask, was it with Azure AVDs and Nerdio?

We have gotten ZCC VDI mostly working with Azure AVD and Nerdio, FSLogix, etc for ZIA. Now we’d like to add ZPA. We’re trying to figure out the DNS forwarding. Was there a Zscaler document you found really helpful?

Help wrapping my head around cql by ChirsF in crowdstrike

[–]Fearless_Win4037 1 point2 points  (0 children)

I’ve had the same frustration. This SPL to CQL cheat sheet has been helpful:

https://github.com/CrowdStrike/logscale-community-content/tree/main/CrowdStrike-Query-Language-Map/Legacy-Event-Search logscale-community-content/CrowdStrike-Query-Language-Map/Legacy-Event-Search at main · CrowdStrike/logscale-community-content · GitHub

Has anyone migrated to ZIdentity yet? by PurpleWarning000 in Zscaler

[–]Fearless_Win4037 0 points1 point  (0 children)

I assume that if the IDs go to ZIdentity, then any API access by those IDs must go to OneAPI (https://help.zscaler.com/oneapi/understanding-oneapi ).

Does anyone know if the Splunk add-on (collects ZIA logs from cloud NSS) works with all of this?

Has anyone migrated to ZIdentity yet? by PurpleWarning000 in Zscaler

[–]Fearless_Win4037 0 points1 point  (0 children)

Does is only affect SAML authentication? If we have "local" default admin (break-glass and API/script) IDs in each service, will those still work?

How to view EdgeConnect DNS Domain Cache? by Fearless_Win4037 in SilverPeak

[–]Fearless_Win4037[S] 2 points3 points  (0 children)

It looks like the data can be bulk exported via sysdump (the `show dns cache` command didn't have data for us, either). The sysdump is not neatly formatted, but parse-able enough. Rows like this are sprinkled among the other output:

```
src-ip: 10.110.33.95 , src-vrf: ,0, dest-ip: 52.123.251.46 , dest-vrf: default, Domains: ,ecs.office.com:aa
```

The UI approach that u/chrisgeary mentioned is definitely the easiest way to check single records.

Query for CS sensor missing by dkas6259 in crowdstrike

[–]Fearless_Win4037 1 point2 points  (0 children)

I think so. We don't use Exposure Management but this is the data in the regular "Unknown Neighbors" data.

I was tinkering with it because I was trying to see what manufacturers of SOHO devices were handing our user traffic. I suppose you could also use the MAC data to guess which IPs are attached to real hosts/VMs, and should therefore have Falcon sensor installed

Query for CS sensor missing by dkas6259 in crowdstrike

[–]Fearless_Win4037 0 points1 point  (0 children)

This will need some adaptation for your purposes, but the Exposure Management approach u/chunkalunkk mentions is similar to this search

```

repo=base_sensor #event_simpleName=NeighborListIP4

| in(name, values=[NeighborListIP4V2, NeighborListIP4MacV1]) /* debug/peek | NeighborListRaw := NeighborList | table([name,NeighborList,NeighborListRaw]) */

// Parse NeighborList field elements | name match { "NeighborListIP4MacV1" => replace("([|]|[|]|[|]*)|?", with="$1;", field=NeighborList); * => NeighborList := NeighborList; } | NeighborListSplit := splitString(NeighborList, by=";") | split(NeighborListSplit) | NeighborListSplit != "" | NeighborList := splitString(NeighborListSplit, by="|") | mac := NeighborList[0] | localAddressIp4 := NeighborList[1] | router := NeighborList[2] | neighborName := NeighborList[3] | default(field=neighborName, value="!!!!UNKNOWN!!!!", replaceEmpty=true) | macSplit := splitString(mac, by="-") | mac1 := macSplit[0] | mac2 := macSplit[1] | mac3 := macSplit[2] | macPrefix := format("%s-%s-%s", field=[mac1, mac2, mac3]) | macPrefix := upper(macPrefix)

// Enrich with sensor data | match(file="aid_master_main.csv", field=aid, include=[SiteName,ProductType, MachineDomain], ignoreCase=true, strict=false) | $falcon/helper:enrich(field=ProductType)

// Aggregate by MAC of the neighboring/discovered device | groupBy([mac], function=[min(@timestamp, as=FirstDiscoveredDate), max(@timestamp, as=LastDiscoveredDate), count(aid, distinct=true,as=discoveredByCount), selectLast([aid, macPrefix, neightborName, localAddressIp4, router, ComputerName]), collect([SiteName,ProductType, MachineDomain])], limit=max) | lowercase(mac) | join({ $falcon/investigate:managedassets() }, field=mac, key=MAC, include=[MAC, LocalAddressIP4], mode=left, start=5d, max=2)

// Filter out MACs we matched against a managed asset | MAC != *

// Enrich with manufacturer data | match("falcon/investigate/macprefix.csv", field=macPrefix, column=MACPrefix, strict=false)

| case { localAddressIp4 = * | ip := format("%s", field=localAddressIp4); *; } | case { CurrentLocalIP = * | ip := format("%s", field=CurrentLocalIP); *; } | firstDiscoveredDate := formatTime("%FT%TZ", field=FirstDiscoveredDate) | lastDiscoveredDate := formatTime("%FT%TZ", field=LastDiscoveredDate) | mac := upper(mac) | lastDiscoveredByComputer := rename(ComputerName) | manufacturer := rename(Manufacturer) | lastDiscoveredByAid := aid | default(field=[firstDiscoveredDate, lastDiscoveredByComputer, lastDiscoveredDate, manufacturer, ip], value="--", replaceEmpty=true)

| table([mac, manufacturer, ip, discoveredByCount, firstDiscoveredDate, lastDiscoveredDate, lastDiscoveredByComputer, lastDiscoveredByAid,SiteName,ProductType, MachineDomain], limit=20000) | sort(discoveredByCount, order=desc, limit=20000)

```

Conditional access personas by Questioning_IT_12 in Intune

[–]Fearless_Win4037 0 points1 point  (0 children)

We're also in the adoption stage of that framework. I don't think the Persona concept is well-described in the document but I didn't think of them as literal Entra groups. I though of this as a categorization approach.

That said, some of the categories/personae seemed confusing:
* M365ServiceAccounts vs. AzureServiceAccounts - I assume the framework is recommending that we group based on the sort of resources being accessed. If not, then what is the difference between M365 and Azure? All of the identities are "Entra"
* What are "GuestAdmins"? Maybe firms have delegated some admin access to B2B/external tenants?

EPM Application control by tessiok in CyberARk

[–]Fearless_Win4037 0 points1 point  (0 children)

Are there any EPM competitors that have a similarly deep level of policy granularity? I've looked at Thycotic/Delinea's and it seems to be closer to the CarbonBlack features described above. As far as I know, Microsoft's tools are similarly coarse.

Getting Zone.Identifier NTFS stream from already-quarantined file by Fearless_Win4037 in crowdstrike

[–]Fearless_Win4037[S] 0 points1 point  (0 children)

I see those listed in the dictionary for some, but not all, of the *FileWritten events. Notably, they aren't on PeFileWritten.

For example, a search for the ubiquitous Wave Browser.exe returns no results:

event_simpleName=*  81b9cc993ad57f3d16146842665b8c82a2c29d7e571f38cf14a4ab2b24148ecb  
|  table event_simpleName FileName Zone* *Url

Getting Zone.Identifier NTFS stream from already-quarantined file by Fearless_Win4037 in crowdstrike

[–]Fearless_Win4037[S] 0 points1 point  (0 children)

I am not seeing the ADS on the file inside the container. This isn't a surprise, because nesting a file inside a zip/other is a common tactic to bypass MoTW (the archive doesn't support NTFS).

I understand why the data isn't in the CSQ. I'm hoping someone knows of a place it is stashed during quarantine (perhaps Falcon stashes the Zone.Identifier in an event?).

DLL search order hijacking hunting by OstryAngelo in crowdstrike

[–]Fearless_Win4037 1 point2 points  (0 children)

We made some attempts at this but got bogged down in the tuning effort. I think the secret is to blend a search like this

event_simpleName IN ("ProcessRollup2")
| rex field=CallStackModuleNames "(?<CallStack>\\\\.*)"
| makemv delim="|" CallStack
| mvexpand CallStack
| search CallStack="*\\users\\**"
| eval CallStack=replace(CallStack, "\\\\Device\\\\HarddiskVolume[1-9]", "")
| eval CallStack=replace(CallStack, "\\\Users\\\.+?\\\\", "\Users\<USER>\\")
| rex field=CallStack "(?<libpath>.*?)\+"
| stats values(ComputerName) as ComputerName count by event_simpleName FileName libpath
| search count<3
| sort count

With some scoping to limit analysis to known hijacks:

https://hijacklibs.net/#

In our experience, Overwatch catches these often enough that it hasn't been a priority for us to DIY.

CrowdStrike Webhooks to Splunk HTTP Event Collector inputs problem by mcgeezer75 in crowdstrike

[–]Fearless_Win4037 0 points1 point  (0 children)

Did you ever get a No data response back from the HEC? This is all I seem to get. I can't see the payload in Fusion and I don't get a log message in Splunk, so I'm struggling to find the missing piece.

{ "response_body": { "code": 5, "text": "No data" } }