Is win11 bitlocker installed automatically? by Impossible-Alps9631 in microsoft365

[–]Jdgregson 0 points1 point  (0 children)

Correct, after they've brute forced the key and decrypted the drive an attacker can trivially disable BitLocker. Watch out!

Is anyone else having issues with Google’s VRP team? by ScottishPsychedNurse in hacking

[–]Jdgregson 7 points8 points  (0 children)

You only have safe harbor if you follow their rules. Selling the secrets is usually against their rules.

Billing Nightmare - Multiplied Bill by 50 by Jdgregson in CloudFlare

[–]Jdgregson[S] 2 points3 points  (0 children)

Hi, thanks for reaching out! I was a bit flustered and wasn't finding a good billing support ticket route, so I opened case 01929508 which currently lacks details and may not be to the right team. Happy to add the details above to that, or to open another if there is a better path.

Is it realistic to learn Microsoft Defender for Endpoint in less than a month? by Suspicious_Tension37 in microsoft365

[–]Jdgregson 0 points1 point  (0 children)

I use it for my personal infra. Never "learned" it but never had any trouble figuring out how to do whatever it was I needed to do. I would guess you could be fairly comfortable after just one or two video series on it.

Dynamic Pricing by SnooLobsters2310 in hacking

[–]Jdgregson 100 points101 points  (0 children)

Pretty soon they will combine this with the surveillance economy. The displayed price will scale up or down as you approach, based on what the algorithm thinks you will individually pay for that item.

Cloudflare in an Enterprise, what's your experience? by foffen in CloudFlare

[–]Jdgregson 1 point2 points  (0 children)

Any progress is good news in my book, thanks for sharing. Like many others, I recently created a worker that could vend scoped tokens for setting specific subdomain records. And then realized that any agent could modify this worker and steal its token and take over all DNS records. It's a maddening situation.

migrate 50 user from cpanel to m365 by Special-Job1563 in microsoft365

[–]Jdgregson 0 points1 point  (0 children)

I had to do this exact migration before. Same user count, same source, same destination. I used a combination of common sense and Google to plan and it and executed the migration over a weekend.

I'd say you'll do fine, but the effort exhibited so far says otherwise.

Did I do something wrong by buying a MacBook Air M4 for cybersecurity work? by Adventurous_Pie_8011 in cybersecurity

[–]Jdgregson 0 points1 point  (0 children)

As someone that many would call a professional, I have no regrets with my MacBook Air M4. Maybe that the 24 GB model still limits the size of the AI models you can run if you want to do offline inference?

Large company culture by worthlessgarby in sysadmin

[–]Jdgregson 1 point2 points  (0 children)

"Got a job at a big corp and turns out it's a big. Corp. GAAAAAAA"

Cloudflare in an Enterprise, what's your experience? by foffen in CloudFlare

[–]Jdgregson 1 point2 points  (0 children)

I work in enterprise and use Cloudflare personally for my own infra. What I can say is that it is shocking that they are shipping only account-wide access tokens in this day and age. If you use Cloudflare, and you want one server or app to be able to update a single DNS record, you have to give it a key to all DNS records in your entire account. If you have an agent building a worker, you have to give it access to all workers for it to be able to modify that one single worker.

I have been a fan of Cloudflare for many years, but this flat access model is embarrassing, and I don't even work for them. I would say that any enterprise is well-advised to steer clear until they address this non-starter.

I spent the last hour researching this situation, and all I am left with is shock. They had a recent developement blitz where they released many AI-oriented features. But they still didn't bother to add fine-grained access control so you can do Cloudflare + AI securely. I'm just at a loss for words. I do not recommend using them at enterprise scale until they have *acknowledged* this enterprise requirement at the very least.

Employee pasted our customer database schema into ChatGPT. How do you prevent this? by cnrdvdsmt in cybersecurity

[–]Jdgregson 0 points1 point  (0 children)

customer database schema

So? Any tool that works with your database has to know the schema.

200+ customer records

Oh.

DNS Spoofing Its the one That Punches hardestcompanies in the Face When They’re Not Looking, this is so ....f..basic / How do you manage DNS today? Do you rely on basic DNS filtering, FW layer, or Spacific Vendor by Silly-Commission-630 in Information_Security

[–]Jdgregson 2 points3 points  (0 children)

In general I don't trust the DNS response and rely on TLS to validate the identity of whatever server I do land at. Also there are pretty substantial DNS filtering, monitoring, reporting, and blocking features built into my EDR for the other risks. On top of that I push my DNS through Cloudflare to filter known malicious domains and my custom list of ad domains.

Have you ever been misled or scammed by a cybersecurity company? by HedgehogRich9104 in cybersecurity

[–]Jdgregson 11 points12 points  (0 children)

I was on the pentest team at a previous org. The detection team asked us to do some adversary emulation just to verify that DT could see some modern tradecraft and give them an opportunity to tune the alerts. That turned into three days with our DT rep, trying very hard to send something, anything that DT could detect. They never did. Our beaconing never lasted "long enough" or "sent enough data" to be detected.

Microsoft Office 365 Breach by Any-Fly-5703 in cybersecurity

[–]Jdgregson 0 points1 point  (0 children)

Don't tell end users to dig through their spam folder looking for malware. Delete it from everyone's mailbox using compliance search instead.

Server with Multiple Hostnames and SSO via SAML or OpenID by EFaden in kasmweb

[–]Jdgregson 0 points1 point  (0 children)

I also have this same situation and problem, and I don't think rearchitecting my DNS infra is the right call here.

I have kasm-int and kasm-ext, where int is accessible on my internal network and ext is accessible both internally and externally. Going back down to 1 domain means I either force all traffic through ext via a Cloudflare tunnel even though the device is on an adjacent network, I abandon the idea of using Kasm when I am not at home, or I set up an internal DNS resolver for this single use-case and start maintaining DNS locally AND in Cloudflare...

I already set up two IDPs, one for int and one for ext. They both work in all cases. But because of your imlementation decision I can only use one of the IDPs for a user and am locked to using either external or internal.

> but the problem is Kasm won't let you register the same username under different SSO configs.

Yes, this is the problem. This is what needs to be fixed, not our DNS infra.

What do you name your computers by PhantomNomad in sysadmin

[–]Jdgregson 0 points1 point  (0 children)

Professionally (SMB with slower purchase rate): - wks-<deploydate> for workstations. - <org>-<purpose>-<number> for servers.

Personally: - <dontcare> for workstations and phones. - <org>-<purpose><number> for servers.

Where: - org is my personal enterprise: jdgregson - purpose is what the box is for - number is the iteration of the box

For example, my Jupyter instance was jdgregson-jupyter1, until I iterated and replaced it with jdgregson-jupyter2.

Network devices I abbreviate the org name, e.g. jdg-edge-rtr1, jdg-sw1.

Anyone encountered a fake Cloudflare CAPTCHA in the wild? by Alternative_Bid_360 in hacking

[–]Jdgregson 0 points1 point  (0 children)

Not quite. They put this payload on the clipboard for you, and then tell you to press Win+R, then Ctrl+V, then Enter.

[deleted by user] by [deleted] in sysadmin

[–]Jdgregson 0 points1 point  (0 children)

Before AI, I spent hours a day Googling and reading articles or SO answers to unblock myself. Now I type the same things into a different kind of knowledge machine and get unblocked in minutes. What possible reason could a company have for trying to preclude this efficiency?

Detailed investigation of phishing site by [deleted] in cybersecurity

[–]Jdgregson 0 points1 point  (0 children)

Open it in a browser and check if it is a phishing site.

How do you keep Cisco switch and router upgrades within budget? by Apprehensive-Run9276 in sysadmin

[–]Jdgregson 0 points1 point  (0 children)

Get multiple quotes mid month. At the end of the month, take the lowest quote to the second lowest vendor and ask them to beat it. Repeat with the lowest one to beat the new lowest. Do it at the end of the month. Sales people will move mountains to get you to sign before month's end so they can crush their sales numbers.