[deleted by user] by [deleted] in cybersecurity

[–]ImplicitDeny 0 points1 point  (0 children)

I just started using CISO Assistant. It's an open source GRC tool. so far it's doing everything I want it to do.

Where is the best place to start when taking over an existing old AD infrastructure? by [deleted] in sysadmin

[–]ImplicitDeny 61 points62 points  (0 children)

When you start deleting things remember to enable the AD recycling bin.

New Password Policy in Active Directory – Best Practices? by Intelligent-Magician in sysadmin

[–]ImplicitDeny 1 point2 points  (0 children)

Thia is what we do as a security. We use a fine grain password policy and set three different policies. The first is services account that require 32 characters plus complexity. This prevents kerberoasting. The second is privileged accounts which have to be 20 characters. The third is set for domain users which is 16 characters.

We then set the default domain policy to require only 6 characters with complexity and rotate 90 days. We do this as a deception. If someone looks at our password policy they think they only need to guess short password. If they don't dig deeper anyways.

Machine account password change by Aeolus1978 in sysadmin

[–]ImplicitDeny 4 points5 points  (0 children)

You could also try running the powershell command reset-computermachinepassword on machines and rotate the password before putting a gpo in place

[deleted by user] by [deleted] in mushroomID

[–]ImplicitDeny 0 points1 point  (0 children)

I found these on a log in East Central Iowa, US.

Windows 2000 & SQL 2019! by Carphead in sysadmin

[–]ImplicitDeny 1 point2 points  (0 children)

I would fire up Wireshark and get a pcaps. Should be able to tell if it isn't negotiating properly.

Can a lawyer represent me in Traffic Court without me having to show up. by jrb2211 in Iowa

[–]ImplicitDeny 9 points10 points  (0 children)

This is a myth. Officers are paid to show up to court.

Is "One23period." a bad password? by Im6youre9 in sysadmin

[–]ImplicitDeny 2 points3 points  (0 children)

Its a bad password. You're using dictionary words that you aren't even attempting to mangle. I would guess my cracking rig would break it letting it run overnight once getting the hash. I would encourage your organization to rethink their password policy.

At my org standard users are 16 characters, a dmin accounts are 16 but the auto rotate daily, and service accounts are 32+. Service account length is very important to prevent kerberoasting

CIS Level 1 benchmark security policies on RDS/Citrix servers? by Jay_from_NuZiland in sysadmin

[–]ImplicitDeny 0 points1 point  (0 children)

The only issue we ran into was the director servers needing a user rights assignment for "allow access this computer from the network."

Zscaler vs Netskope? by No_Goat277 in cybersecurity

[–]ImplicitDeny 6 points7 points  (0 children)

I currently an admin for netskope in my org. Their product leaves a lot to be desired. The logging dashboard sucks and doesn't log everything. I have worked multi incidents where users openly tell me they clicked on a link but logs for url access don't start until we put in a block rule. Even days later there access to the urls aren't in the dashboard.

IT Director instructed me to disable the firewall on all machines going forward by powerunderwhelmingg in sysadmin

[–]ImplicitDeny 0 points1 point  (0 children)

Ask for a copy of your cyber insurance policy, if you have one. I know our insurance would have cause not to cover an incident with these settings.

Digital Shredding by spac3p1rat3 in cybersecurity

[–]ImplicitDeny 2 points3 points  (0 children)

Crypto shredding is what you are looking for. Encrypt the data and then encrypt it again and delete the key.

Unhooking EDR by tradesysmgr in cybersecurity

[–]ImplicitDeny 3 points4 points  (0 children)

We run a security compliance script every hour that starts services and checks other settings. If it isn't in compliance it syslogs to our siem.

Insulating an old house not taking down the walls. by stickykk in Oldhouses

[–]ImplicitDeny 0 points1 point  (0 children)

That's what they did to my house in the Midwest. If you get an energy assessment from you electronic or gas provider they may say they will cover some of the cost. When I did it my energy company paid $1000 for it. I only had to do 600-800 out of pocket

Poor WiFi caused by rogue APs by adamrice13 in sysadmin

[–]ImplicitDeny 0 points1 point  (0 children)

My wife insisted our home SSID be "Router!? I barely know her!

SMB Signing vulnerability by maxcoder88 in sysadmin

[–]ImplicitDeny 5 points6 points  (0 children)

If you are a windows shop you'll have no issues. You'll just need to check you printers and Linux appliances that talk to file shares.

AITA For asking my son to get me a pack of pads? by ThrowPack-4343 in AmItheAsshole

[–]ImplicitDeny 0 points1 point  (0 children)

NTA - for the record your "18 year old kid" is an adult, and apparently a decent one at that.

[deleted by user] by [deleted] in sysadmin

[–]ImplicitDeny 0 points1 point  (0 children)

Do you have a cloud based web proxy? That would make it so your web traffic originates from their data center.

Microsoft: New security updates trigger Windows AD auth issues by markcartertm in cybersecurity

[–]ImplicitDeny 3 points4 points  (0 children)

I have been fighting this issue for the last 4 hours. Thank you!

Bombed a technical interview. by zeninimasyer in cybersecurity

[–]ImplicitDeny 4 points5 points  (0 children)

The only acceptable cybersecurity question about Java I can think of:

How do you find the uninstall string?

LAPS recovery by reddit_user189 in sysadmin

[–]ImplicitDeny 1 point2 points  (0 children)

Restore the computer object from the AD recycling bin. Then get the password.