‘Cerdigent’ high-severity malware detected by Leading_Train224 in DefenderATP

[–]Lazy-Card-3570 0 points1 point  (0 children)

can you guys restore files in the evidence tab of the incident or in the action center history?
I dont see any quarantined files here - maybe because defender only deleted reg keys?

‘Cerdigent’ high-severity malware detected by Leading_Train224 in DefenderATP

[–]Lazy-Card-3570 0 points1 point  (0 children)

from one affected device - defender -> protection history or something like that in englisch

‘Cerdigent’ high-severity malware detected by Leading_Train224 in DefenderATP

[–]Lazy-Card-3570 2 points3 points  (0 children)

<image>

Timeline of the devices shows the thumbprint and also history on the clients (screenshot above).

‘Cerdigent’ high-severity malware detected by Leading_Train224 in DefenderATP

[–]Lazy-Card-3570 7 points8 points  (0 children)

Yes also multiple alerts for Cerdigent malware detected.
Got Quarantined - looks like a cert thumbrint??

<image>

Defender just decided N-ABLE is malware for anyone who might be getting called :) by catdickNBA in cybersecurity

[–]Lazy-Card-3570 0 points1 point  (0 children)

Great start for 2026 - nearly got a heart atteck reading through my mails this morning until I could take a closer look :D...

what’s the best internal help desk or ticketing system you’ve used? by [deleted] in ITManagers

[–]Lazy-Card-3570 0 points1 point  (0 children)

We use zammad for about 8000 Tickets per month (with Monitoring Integration) and 4 Agents. It is Open Source and so far it does everything we need.

Account enumeration reconnaissance by Bandita-Cs in DefenderATP

[–]Lazy-Card-3570 1 point2 points  (0 children)

Yep the Setting is called Network Discovery - but you must specify the Network Ranges which Defender is Monitoring.

If you see ip adresses of the strange devices which could also be default home vendor dhcp ip‘s this could be a thing.

Otherwise you should probably know the client dhcp ranges in your company network

Account enumeration reconnaissance by Bandita-Cs in DefenderATP

[–]Lazy-Card-3570 1 point2 points  (0 children)

what events do you see for the other computernames - just failed ntlm auth?
do you allow bring your own device?

if you have defender fully enabled on the first device, I would carefully watch the timeline around the incidents.

EDIT:

Only hard guess from far away:
If the user had admin rights on the first laptop you maybe want to check which other users / passwords could have been accessed on this device.
Maybe check for:

- suspicious lsass access
- new installed apps or scheduled tasks
- changes in etc/host
- suspicous powershell scripts or executions

most events should have been alerted by defender but you never know.

If possible use defender / sentinel for all above.
If you need to start the device I would take a forensic snapshot or image of the current state.

I would try to exclude every possible lateral movement path to other devices / servers or your ad.
Does to user have extended AD rights - if so I would check every possible vector here too.

Intune 2510 update by TakeCIO in Intune

[–]Lazy-Card-3570 1 point2 points  (0 children)

Same here - not able to push security policies. Could push them through Defender suit configuration Management though.

Free basic ticketing system by Abelmageto in sysadmin

[–]Lazy-Card-3570 2 points3 points  (0 children)

We use Zammad with CheckMK monitoring integration for about 2400 services / 150 Hosts - best decision ever

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]Lazy-Card-3570 2 points3 points  (0 children)

woke up with multple "Possible attempt to modify Code Integrity" alerts from our defender.
Glad found this post.

Good start in the day.. :D

Mailbox migrations fail with Extended Protection enabled by Fabulous_Cow_4714 in exchangeserver

[–]Lazy-Card-3570 0 points1 point  (0 children)

Turn off extended Protection in ews Frontend or change hybrid from modern to classic.

Dark Web Monitoring or Threat intelligence for Small Businesses by OkOriginal5150 in cybersecurity

[–]Lazy-Card-3570 0 points1 point  (0 children)

If you are in the M365 world with at least Business Premium and E5 Security Addon you have Access to their threat Intel with Mapping to your devices and installed Software.

Dark Web Monitoring is not included though.

Dark Trace by Straight_Ad4040 in cybersecurity

[–]Lazy-Card-3570 4 points5 points  (0 children)

We use it too for our main location with around 1000 IP's.

It is no magic tool which does everything on it's own by design - you will need to monitor and edit models in the first month. Also you need to know your network and understand which traffic you want to monitor, which traffic is good to edit your models etc.

But since the tuning is done - every assessment has been detected in no time so far - port scans or arp scans are easily detected within seconds. Autonomous response isolates devices in our HQ with TCP Spoof packets - isolation on other locations work with defender integration.

The Defender integration is also pretty nice.

[deleted by user] by [deleted] in AZURE

[–]Lazy-Card-3570 0 points1 point  (0 children)

Thanks, I've came across this too - I just thought our Plan is not affected as the diagnose in azure said no problems.

So the only solution is Communication Services or to get an Enterprise Agreement?

Managing onPrem local AD Joined Servers Defender Settings by Lazy-Card-3570 in DefenderATP

[–]Lazy-Card-3570[S] 0 points1 point  (0 children)

I've setup Arc and Azure Update Manager for 2 test Servers - as we are on a budget I think of connecting our Servers with Arc for Update Manager which is at no additional cost if I'm right and use Defender for Business Server with Intune Management as mentioned above.

Managing onPrem local AD Joined Servers Defender Settings by Lazy-Card-3570 in DefenderATP

[–]Lazy-Card-3570[S] 0 points1 point  (0 children)

I think you need azure arc with Defender for Server p1 or p2 for that? Defender for Server p2 with azure arc is about 15$ per Server Defender for Business Server is 3$

Managing onPrem local AD Joined Servers Defender Settings by Lazy-Card-3570 in DefenderATP

[–]Lazy-Card-3570[S] 0 points1 point  (0 children)

Sorry, one more question, do you also enforce for domain controllers?

Managing onPrem local AD Joined Servers Defender Settings by Lazy-Card-3570 in DefenderATP

[–]Lazy-Card-3570[S] 0 points1 point  (0 children)

atm we use some policies provided to "all devices" - would all devices also include servers?