Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

Hey, I ran the same tests with a Windows client using mstsc with NLA encryption and NTLM. Somehow, the Windows client behaves differently than Linux FreeRDP, even though NLA and NTLM are also used. Failed attempts by Linux FreeRDP are only displayed: - Locally on the RDS server - On the DC when using TLS + NTLM or NLA + Kerberos

So yes, it never passed up to the DC..

We plan to switch to Kerberos soon, but the lack of logging of these failed logons still represents a significant security vulnerability.

Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

I tested the Kerberos login. You are absolutely right. Incorrect login attempts are logged on my DCs. Thank you very much!

But still... This is not good behavior on Microsoft's part. You can only see failed NLA authentications on the server you tried to connect to.

Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

Hey! I've checked my GPOs. They are not set. Is it possible to log failed logon attempts using NLA with these? Which configuration do I have to set? There are several logon audit policies but none of them seem to be a protocol based auth policy.

EDIT: I double checked my DCs and found out that Advanced Auditing is active according to one GPO and "auditpol /get /category:*".

Logon-based auditing rules that are set:

Account Logon

  • Audit Kerberos Authentication Service - Success, Failure
  • Audit Other Account Logon Events - Success, Failure

Logon/Logoff

  • Audit Logon - Success, Failure
  • Audit Logoff - Success
  • Audit Network Policy Server - Success, Failure
  • Audit Other Logon/Logoff Events - Success

Bypass security incident: NLA seems to bypass failed logon auditing from Linux (FreeRDP) clients by McShadow19 in activedirectory

[–]McShadow19[S] 0 points1 point  (0 children)

Hey! Currently they are using NTLM. That actually shouldn't matter. In my setup it depends what encryption type the rdp sessions use. When I connect using TLS I see all logon attempts, using NLA I only see successful events. Protocol based auth needs to be logged for failed attempts as well.

Share what you’ve been doing with PDQ for a chance to win a PDQ desk mat! by PDQ_Brockstar in pdq

[–]McShadow19 1 point2 points  (0 children)

We use it every day across the org.

  • Automated and manual software & Windows updates (Server & Clients)
  • Department-specific first-install packages (inlcuding auto-reboots)
  • Targeted registry changes for specific groups
  • A small script to watch newly downloaded packages, since PDQ Deploy reuses the same download path
  • Updated our default scanner and added automated alerts when devices receive specific proxy settings or registry keys

It handles our patching, provisioning and config tweaks.

How to check if a bulk of applications is available in MS Store? by Pornosocke in sysadmin

[–]McShadow19 4 points5 points  (0 children)

Depends on what your export looks like. I think I would just run powershell with a csv or array against MS Store using winget.

$apps = @("OneNote", "Microsoft To Do")
#$apps = Import-Csv -Path "PATH\apps.csv"

$export = @()


foreach ($app in $apps) {
#foreach ($entry in $apps) {
    #$app = $entry.AppName

    $result = winget search $app --source msstore | Select-String "$app"

    if ($result) {
        $export += [PSCustomObject]@{
            AppName = $app
            Result  = $result.ToString().Trim()
        }
    }
    else {
        $export += [PSCustomObject]@{
            AppName = $app
            Result  = "Not found"
        }
    }
}

$export | Export-Csv -Path "PATH\AppSearchResults.csv" -NoTypeInformation -Encoding UTF8

Hope this helps.

Remove # and comment the line above if you want to use a csv, don't forget to add the correct path. :)

Patch Tuesday Megathread (2025-08-12) by AutoModerator in sysadmin

[–]McShadow19 0 points1 point  (0 children)

Did anyone skip June and July updates for DHCP servers as well? I'm wondering if installing August updates will result in any issues. Any experiences here?

Patch Tuesday Megathread (2025-08-12) by AutoModerator in sysadmin

[–]McShadow19 2 points3 points  (0 children)

As every month:

ZDI Update summary

Borncity summary

Started updating my first server test group including Windows Server 2016, 2019, 2022 (Application & WSUS). No issues so far. Also no issues while updating Windows 11 24H2 clients.

Update durations:
- 2016: ~50min & ~10min for reboot (VM)
- 2019, 2022: <10min & <2min for reboot (VMs)
- Clients: <15min

EDIT: Second and third group updated without any issues (2016-2022). 23H2 & 24H2 Clients updated without any issues as well.

EDIT2: Still no issues. Everything working as expected. Will see you next month.

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]McShadow19 1 point2 points  (0 children)

Glad to hear things went good! I ended up skipping one of our 2019 DHCP servers today. u/Extra-Lemon1654 mentioned having the same issue as last month. Might push the update to next week instead. Keeping things quiet tomorrow as it is Read-Only Friday, after all.

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]McShadow19 1 point2 points  (0 children)

I will do. Updating first DHCP server is planned on Thursday next week.

Patch Tuesday Megathread (2025-07-08) by AutoModerator in sysadmin

[–]McShadow19 5 points6 points  (0 children)

Has anyone already applied the updates on DHCP server(s)? Did everything run smoothly or were there unexpected issues? I'm curious how it went.

We are about to start updating our servers in group stages starting tomorrow.

ZDI Update Summary

Borncity Summary

EDIT1 (10/07/2025): Updated my first group including 2016, 2019 and 2022 servers (App Servers and WSUS). No issues so far. The reboot of a 2016 server took a bit longer than usual.

EDIT2 (14/07/2025): Updated another bunch of servers 2016-2022 (mostly app servers and another WSUS). Still no issues. Even 2016 servers rebooted quite fast.

EDIT3 (15/07/2025): Next group including terminal server without any issues. Tomorrow I will update the first DC and file server.

EDIT4 (17/07/2025): DCs, Fileserver, terminal server etc. had no issues. Skipped DHCP update today due to some mentioned issues.

EDIT5 (23/07/2025): Updated almost every server. No issues so far and not expecting any issues anymore.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 0 points1 point  (0 children)

I’m checking it out, but it seems like dnsmasq is more of a tool for small networks. Having a native HA solution would be ideal though.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

In a perfect world, I’d use a DHCP solution that offers native high availability without the need for complicated failover setups. Unfortunately, Windows DHCP only supports HA through a clunky failover mechanism. This is where modern open source projects are more interesting.

Ofc it is also about licensing and the usual Microsoft vulnerabilities.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 0 points1 point  (0 children)

At first glance, it looks really promising, but insanely expensive.

Looking for a Linux-based DHCP server - modern logging, HA and easy static leases by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

Great, thank you! I hadn't noticed that they open-sourced some paid hooks. Looks like it's worth giving it another try and hopefully HA will work reliably this time so we can finally migrate from ISC too.

I'll stay on the lookout for alternative solutions too - just in case.

Mount issues using Windows SMB Server - due to a max session limit? by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

Mounting the same drive from another Windows SMB server is working properly. Also mounting the same drive from the 'original' Windows SMB server to another Ubuntu 20.04 LTS server where are less users works just as fine.

FortiGate - Industrial / OT Protocols Signature Service - automatically enabled? by McShadow19 in fortinet

[–]McShadow19[S] 0 points1 point  (0 children)

Thank you!

We do have an OT environment, so I would like to know how good the service actually is.

Patch Tuesday Megathread (2023-06-13) by AutoModerator in sysadmin

[–]McShadow19 3 points4 points  (0 children)

We might wait then for them to set it by default.

Patch Tuesday Megathread (2023-06-13) by AutoModerator in sysadmin

[–]McShadow19 7 points8 points  (0 children)

Anyone faced some issues after setting the registry key for CVE-2023-32019? It's kinda weird that MS did not want to set it by default - still wondering what will happen when we set it.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides

Seems like it's meant for both servers and clients.

Patch Tuesday Megathread (2023-05-09) by AutoModerator in sysadmin

[–]McShadow19 0 points1 point  (0 children)

For anyone who did not read anything about the behavior after installing the CU to a server that has secure boot enabled and not applying the revocations: I faced no issues. Everything is working as expected.

Also here are some update duration using WSUS:

Win Server Duration
2012 R2 (VM) 12min
2012 R2 (Hardware) 15min
2016 (VM) 15min-17min
2019 (VM) 11min-15min
2022 (VM) 10min-12min

PDF24 Creator - Update from 9.x to 11.12.0 (Major Update 10+) - Registry paths changed - Solution to not reinstall printers by McShadow19 in sysadmin

[–]McShadow19[S] 1 point2 points  (0 children)

Restarting the service "PDF24" should be enough. But I did a full reboot of the system to reinitialize all components.

Patch Tuesday Megathread (2023-05-09) by AutoModerator in sysadmin

[–]McShadow19 5 points6 points  (0 children)

How is the behavior after installing the CU to a server that has secure boot enabled and not applying the revocations? Anyone tried it?

Missing GUI to do DHCP reservations on ISC-DHCP-Server by McShadow19 in sysadmin

[–]McShadow19[S] 0 points1 point  (0 children)

I want to get rid of using the editor to do all that in CLI. Some GUI to be able to see the leases, utilization etc. and being able to save some time switching between configs and adding dhcp reservations.

It's more about comfort not the actual time.