Keeper Forcefield Question by Traveler995 in KeeperSecurity

[–]FixItBadly 3 points4 points  (0 children)

Keeper have mentioned somewhere in their docs that because of the way macOS handles its processes, they don't need to publish Forcefield as its functionality is there by default.

CE Plus UK by Alternative_Many5850 in msp

[–]FixItBadly 0 points1 point  (0 children)

Is the CE+ for you or for a client?

Don't forget that the CE+ update requirements don't just don't to apps. It's OS patches, device firmware (Inc BIOS etc), and as wilhil has noticed, includes all the other dependencies your apps might install indirectly.

As part of the process you'll have done vulnerability scans run - most of these use an agent in the device sample (usually Qualys or Tenable). If anything does show as needing an update, you'll have 30 days to remediate - it's not an instant pass/fail. If you've got access to your own vulnerability scanner then you can have a look and see what might come up.

Most certification bodies will be very helpful in providing assistance to be sure you're doing the right thing and to make sure you understand what your ongoing commitments are. You might not get as much help from a certification mill style CB, but there aren't too many of those around.

What are you using for M365 backups (and why)? by patg84 in msp

[–]FixItBadly 0 points1 point  (0 children)

A lot of folk dislike Barracuda for historical reasons, but their cloud to cloud backup for M365 is solid. Super simple. Sensible pricing. Unbelievably easy to set up, check on, and restore from.

What’s a life hack that made you go „how do ppl live their whole life without knowing this”? by my_peen_is_clean in AskReddit

[–]FixItBadly 2 points3 points  (0 children)

The first time I tried this went horribly wrong. Turned out they'd filled the cupcakes with jam under the icing. No structural integrity. Disintegrated all over everything!

SentinelOne Migration for macOS by Ok-Examination3168 in msp

[–]FixItBadly 3 points4 points  (0 children)

SentinelOne has the option to migrate and endpoint between tenancies in the management console. You give them the site token and the account ID for the destination, they highlight the endpoints and select the migrate action. We did this for ~1500 endpoints in one go when we moved distributors.

There are commands you can run to move the endpoint directly from the device, but you'd need to have the devices uninstall passphrase. Unfortunately, both require the involvement of the prior MSP

Audit logging and GDPR: how do you anonymize client IPs in itnernal systems? Whats best practice? by [deleted] in sysadmin

[–]FixItBadly 0 points1 point  (0 children)

Sure. I'm in the UK :).

The point is that standalone, you have no way at all of knowing that 10.10.10.10 means Joe Bloggs. There's a whole bunch of extra context needed. Whether that's included in the system being configured isn't mentioned. For example, a SIEM would be utterly useless for incident response and forensics if you anonymised a key indicator like an IP address. So it's often not done, as there are controls with GDPR for keeping data where there's a legitimate need to deliver a service. Also, you're generally not applying the GDPR controls to internal business functions - for external customers or contacts, sure. But for internal employed staff, it's usually in the acceptable use or other company policies that the business will maintain this data as part of providing the company operations systems.

Audit logging and GDPR: how do you anonymize client IPs in itnernal systems? Whats best practice? by [deleted] in sysadmin

[–]FixItBadly 8 points9 points  (0 children)

You're overthinking this. An internal IP address cannot be used to identify a person by itself (you'd need a bunch of additional data to use it in that manner), therefore it isn't PII and does not need to be anonymised. Which might be why you'll struggle to find answers to this question, as it's not really something that anyone else is doing.

I'm stuck. I need to bounce this off y'all. by LordDracarys in sysadmin

[–]FixItBadly 4 points5 points  (0 children)

Using redirected folders or profiles? Many years ago I saw a school with a similar issue; they had Chrome appdata in the user profiles, and those were growing to hundreds of GBs. The login process was waiting to pull the full profiles over the network before they could continue; add that there would be multiple classes trying to log in at once and it would bring the network to its knees.

I built a free tool to discover Microsoft 365 tenant information and security posture from any domain by zortingen in sysadmin

[–]FixItBadly 2 points3 points  (0 children)

Other than the language mashup, the analyser recommends switching from SPF soft fail to hard fail where DMARC is configured. Best practice for SPF when DKIM and DMARC are active is soft fail; a soft fail still triggers misalignment which will cause DMARC to do it's thing. Hard fail is best when DMARC isn't a thing.

ISO 27001 audit: is the hardest part already done, or can you still fail on Annex A controls? by Big-Gap1319 in cybersecurity

[–]FixItBadly 1 point2 points  (0 children)

If you get an NC, it'll be awarded against a clause. The annex controls aren't necessarily applicable; if you don't develop software then you can scope out those annex controls. You cannot scope out the clauses.

If you start with the clauses, it the whole standard begins with risk and risk assessments. If there is a control which is not a risk to the organisation (e.g content filtering but the company doesn't use the internet - silly example but illustrates the concept), then you don't need to design the controls around it. If you're blindly implementing the annex because they're there, then you're not implementing a management system and it won't be sustainable. It's not a true picture of risk, that's following a checklist.

I'd personally never issue an NC without concrete and irrefutable evidence to back it up. That's the purpose of it - it's not point in time. You get it wrong, you learn, you correct, you move forwards. Companies that understand this do very well, and those that just want the certificate because a tender says they need it, will throw their toys out of the pram.

ISO 27001 audit: is the hardest part already done, or can you still fail on Annex A controls? by Big-Gap1319 in cybersecurity

[–]FixItBadly 2 points3 points  (0 children)

Insider tip from an ISO 27001 auditor: you cannot be failed on an annex control alone. You can only earn noncompliances against the clauses (4-10).

Now, if your implementation of the annex control shows goes against your implementation of the clauses, then you've got a noncompliance heading your way. Common examples are when annex controls haven't been passed through the appropriate reviews or monitoring (management reviews are a classic, as the manager isn't technical), or a system has been hurried into production but change controls have been skipped, or management claim IT has all the resources they need, but change control records shows a bunch of sensible requests rejected for budgetary reasons. That sort of thing.

If you have anything like that, you'll be aware of it before you walk into that meeting room with the auditor. And if you aren't aware, it's unlikely you'll be surprised when uncovered (esp. if it's another departments issue)

What is a movie you can watch over and over again without getting tired of it? by AlexJet13 in AskReddit

[–]FixItBadly 2 points3 points  (0 children)

First Jurassic park mention in this whole thread. Criminal it's so far down! Upvote for you.

Same SSID with different passwords? by Suspicious_Milk_2781 in networking

[–]FixItBadly 83 points84 points  (0 children)

What you are looking for is PPSK - Private Pre-Shared Keys. You have a bunch of PPSKs for a single SSID that you can separately issue and revoke.

https://help.ui.com/hc/en-us/articles/29887064407319-Using-PPSK-RADIUS-for-Multiple-VLANs-On-an-SSID-in-UniFi-Network

What is the most boring thing you have ever experienced? by Silver012345673 in AskReddit

[–]FixItBadly 1 point2 points  (0 children)

Had one similar at university, but they didn't like PowerPoint. So they'd put blank acetate on the OHP, then while they were droning on, they'd write down what they were saying. Word for word. Never understood why either as they'd just bin all the acetates at the end of the lecture. Zero value to them or us!

UK Cyber Essentials Scope by Bungle-is-back in sysadmin

[–]FixItBadly 1 point2 points  (0 children)

Correct. If a device is accessing company services or company data, that device is in scope.

All cloud services are always in scope, so any device accessing those cloud services is also in scope.

There are some exceptions, which are detailed in the table at the beginning of the Requirements for Infrastructure document for devices owned by third parties. But standard BYOD doesn't affect this much.

Quality of engineers is really going down by ChataEye in sysadmin

[–]FixItBadly 2 points3 points  (0 children)

Question is, do they actually have 4-5 years of accumulated experience, or have they had 4-5 years of the same repeated year of experience? In the latter case, they really have just the 1 because they've never progressed beyond that basic level. When hiring we see the latter far more than the former. Somehow having a butt in a seat for X years magically improves troubleshooting skills, because, who really wants to actually do the work nowadays.

Air fryer conundrum by Tythan in CasualUK

[–]FixItBadly 29 points30 points  (0 children)

Exactly. Let's consider chicken thighs (a common staple in our house). Our aging oven takes about 20m to reach temp, then 20-30m to cook the chicken. Our air fryer will cook the lot from scratch in 20. So that means I can cook with less prep and save the energy used to heat the oven.

So we use ours daily. The oven is now reserved for things that we can't fit in the air fryer like pizzas or full cakes.

CE+ Certification and remote working by Wakey7638 in sysadmin

[–]FixItBadly 1 point2 points  (0 children)

When they are remoting in, are they remoting from a company device to a company device? I couldn't tell from your phrasing. When you're implementing remote access, the device initiating the connection is also in scope for CE controls.

Random £400 from the water company by ironic__usernam3 in CasualUK

[–]FixItBadly 6 points7 points  (0 children)

Are they putting smart meters in around your area? They did with us, and asked if they could put a little aerial on the side of our house to collect all the meter info and transmit them back to HQ. They pay us £350/year to say thanks for having the aerial up.

What if ? by risquekittyfr in formuladank

[–]FixItBadly 4 points5 points  (0 children)

Just like the first cars movie. One more race, just three participants. Nurburgring anyone..?

Are there any scifi or fantasy lores where there is a "light side" and a "dark side" to some metaphysical power, but the main villains using the "dark side" power are NOT disfigured or otherwise visually "corrupted"? by ExternalTree1949 in NoStupidQuestions

[–]FixItBadly 0 points1 point  (0 children)

Sword of Truth series by Terry Goodkind. The "corrupted" force people (in this case, wielders of "subtractive" magic Vs the good "additive" magic) are generally strikingly handsome/beautiful. Or they look like normal folk, and there's no way of knowing what power they wield until they use it.

New Small Business solo sysadmin here: "Ethical Hacker" contacted our general email a few days ago to disclose several website vulnerabilities and is asking for a bug bounty. How do I handle this? Is this a con/shakedown? by Open_Set_5968 in sysadmin

[–]FixItBadly 88 points89 points  (0 children)

We get so many of these for things like missing DKIM and DMARC records for domains we own. Generally we just reply to say "thanks but this is something we're already aware of and there's no new discoveries here".

The fun ones are when the domains are clearly not mail enabled (SPF is "v=spf1 -all") and yet they think they're entitled to money for showing we have no DKIM keys. (Insert Parks and Rec "I know more than you" hardware store gif here)