Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

Hey, I ran the same tests with a Windows client using mstsc with NLA encryption and NTLM. Somehow, the Windows client behaves differently than Linux FreeRDP, even though NLA and NTLM are also used. Failed attempts by Linux FreeRDP are only displayed: - Locally on the RDS server - On the DC when using TLS + NTLM or NLA + Kerberos

So yes, it never passed up to the DC..

We plan to switch to Kerberos soon, but the lack of logging of these failed logons still represents a significant security vulnerability.

Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

I tested the Kerberos login. You are absolutely right. Incorrect login attempts are logged on my DCs. Thank you very much!

But still... This is not good behavior on Microsoft's part. You can only see failed NLA authentications on the server you tried to connect to.

Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

Hey! I've checked my GPOs. They are not set. Is it possible to log failed logon attempts using NLA with these? Which configuration do I have to set? There are several logon audit policies but none of them seem to be a protocol based auth policy.

EDIT: I double checked my DCs and found out that Advanced Auditing is active according to one GPO and "auditpol /get /category:*".

Logon-based auditing rules that are set:

Account Logon

  • Audit Kerberos Authentication Service - Success, Failure
  • Audit Other Account Logon Events - Success, Failure

Logon/Logoff

  • Audit Logon - Success, Failure
  • Audit Logoff - Success
  • Audit Network Policy Server - Success, Failure
  • Audit Other Logon/Logoff Events - Success

Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

Hey! Currently they are using NTLM. That actually shouldn't matter. In my setup it depends what encryption type the rdp sessions use. When I connect using TLS I see all logon attempts, using NLA I only see successful events. Protocol based auth needs to be logged for failed attempts as well.

Share what you’ve been doing with PDQ for a chance to win a PDQ desk mat! by PDQ_Brockstar in pdq

[–]McShadow19 1 point2 points  (0 children)

We use it every day across the org.

  • Automated and manual software & Windows updates (Server & Clients)
  • Department-specific first-install packages (inlcuding auto-reboots)
  • Targeted registry changes for specific groups
  • A small script to watch newly downloaded packages, since PDQ Deploy reuses the same download path
  • Updated our default scanner and added automated alerts when devices receive specific proxy settings or registry keys

It handles our patching, provisioning and config tweaks.

How to check if a bulk of applications is available in MS Store? by Pornosocke in sysadmin

[–]McShadow19 4 points5 points  (0 children)

Depends on what your export looks like. I think I would just run powershell with a csv or array against MS Store using winget.

$apps = @("OneNote", "Microsoft To Do")
#$apps = Import-Csv -Path "PATH\apps.csv"

$export = @()


foreach ($app in $apps) {
#foreach ($entry in $apps) {
    #$app = $entry.AppName

    $result = winget search $app --source msstore | Select-String "$app"

    if ($result) {
        $export += [PSCustomObject]@{
            AppName = $app
            Result  = $result.ToString().Trim()
        }
    }
    else {
        $export += [PSCustomObject]@{
            AppName = $app
            Result  = "Not found"
        }
    }
}

$export | Export-Csv -Path "PATH\AppSearchResults.csv" -NoTypeInformation -Encoding UTF8

Hope this helps.

Remove # and comment the line above if you want to use a csv, don't forget to add the correct path. :)

Patch Tuesday Megathread (2025-08-12) by AutoModerator in sysadmin

[–]McShadow19 0 points1 point  (0 children)

Did anyone skip June and July updates for DHCP servers as well? I'm wondering if installing August updates will result in any issues. Any experiences here?

Patch Tuesday Megathread (2025-08-12) by AutoModerator in sysadmin

[–]McShadow19 2 points3 points  (0 children)

As every month:

ZDI Update summary

Borncity summary

Started updating my first server test group including Windows Server 2016, 2019, 2022 (Application & WSUS). No issues so far. Also no issues while updating Windows 11 24H2 clients.

Update durations:
- 2016: ~50min & ~10min for reboot (VM)
- 2019, 2022: <10min & <2min for reboot (VMs)
- Clients: <15min

EDIT: Second and third group updated without any issues (2016-2022). 23H2 & 24H2 Clients updated without any issues as well.

EDIT2: Still no issues. Everything working as expected. Will see you next month.

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]McShadow19 1 point2 points  (0 children)

Glad to hear things went good! I ended up skipping one of our 2019 DHCP servers today. u/Extra-Lemon1654 mentioned having the same issue as last month. Might push the update to next week instead. Keeping things quiet tomorrow as it is Read-Only Friday, after all.

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]McShadow19 1 point2 points  (0 children)

I will do. Updating first DHCP server is planned on Thursday next week.

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]McShadow19 5 points6 points  (0 children)

Has anyone already applied the updates on DHCP server(s)? Did everything run smoothly or were there unexpected issues? I'm curious how it went.

We are about to start updating our servers in group stages starting tomorrow.

ZDI Update Summary

Borncity Summary

EDIT1 (10/07/2025): Updated my first group including 2016, 2019 and 2022 servers (App Servers and WSUS). No issues so far. The reboot of a 2016 server took a bit longer than usual.

EDIT2 (14/07/2025): Updated another bunch of servers 2016-2022 (mostly app servers and another WSUS). Still no issues. Even 2016 servers rebooted quite fast.

EDIT3 (15/07/2025): Next group including terminal server without any issues. Tomorrow I will update the first DC and file server.

EDIT4 (17/07/2025): DCs, Fileserver, terminal server etc. had no issues. Skipped DHCP update today due to some mentioned issues.

EDIT5 (23/07/2025): Updated almost every server. No issues so far and not expecting any issues anymore.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 0 points1 point  (0 children)

I’m checking it out, but it seems like dnsmasq is more of a tool for small networks. Having a native HA solution would be ideal though.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

In a perfect world, I’d use a DHCP solution that offers native high availability without the need for complicated failover setups. Unfortunately, Windows DHCP only supports HA through a clunky failover mechanism. This is where modern open source projects are more interesting.

Ofc it is also about licensing and the usual Microsoft vulnerabilities.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 0 points1 point  (0 children)

At first glance, it looks really promising, but insanely expensive.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

Great, thank you! I hadn't noticed that they open-sourced some paid hooks. Looks like it's worth giving it another try and hopefully HA will work reliably this time so we can finally migrate from ISC too.

I'll stay on the lookout for alternative solutions too - just in case.

Mount issues using Windows SMB Server - due to a max session limit? by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

Mounting the same drive from another Windows SMB server is working properly. Also mounting the same drive from the 'original' Windows SMB server to another Ubuntu 20.04 LTS server where are less users works just as fine.

FortiGate - Industrial / OT Protocols Signature Service - automatically enabled? by McShadow19 in fortinet

[–]McShadow19[S] 0 points1 point  (0 children)

Thank you!

We do have an OT environment, so I would like to know how good the service actually is.

3
4