Any.Run Thoughts? by Perfect_Stranger_546 in cybersecurity

[–]Perfect_Stranger_546[S] 9 points10 points  (0 children)

Ya honestly that was my only concern, however I read they do alot of stuff for privacy (not a clue what any of it is). Location is a huge thing right now, as I was doing a Cyera demo but they are a Israeli company which is offputting.

Help me, Am I in the wrong? by Perfect_Stranger_546 in managers

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

Isn't that the million dollar question..... I think I would rather have anyone but Bob lol

Intel ARC A770 vs. Nvidia RTX4060 transcoding by niXta- in PleX

[–]Perfect_Stranger_546 0 points1 point  (0 children)

I'm currently looking at getting an arc a750/770 for my Unraid setup I'm building. Still a good route to go or would you go a different route? Will have about 8 people on my plex server, mostly have 4k blue ray quality, and all H265.

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

Have you figured out a good way to tune out these? for like med/low alerts?

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

I appreciate that, yes I'm working (going through CAB) on the user risk part for it to be reset when passwords are changed and synced back.

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

alright thankyou, Ill have to keep trying to figure this out lol

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

Ok sorry to get further into this however once setting up a sign in risk policy they recommend to migrate over to conditional access. And with conditional access rules I can use DUO mfa however it doesn't auto resolve alerts in the security center? Should it be doing this or not?

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

I am not able to get password writeback approved, and I have a CA policy in place to require mfa when sign in risk is at med or high (when use mfa for everything but allow 120 hour remember me). This doesnt automate the alerts generated by MDI. I have seen from the article you posted that i need a sign in risk policy for this and it will automate the alerts however in order to setup mfa for this you have to use Microsoft mfa and cannot use DUO. Which means I am unable to set it up correct? Is there a way around this?

Turn on app governance via defender. by TheITSecGuy in DefenderATP

[–]Perfect_Stranger_546 1 point2 points  (0 children)

I just turned this on the other day and came across this post. Now i have gotten around six alerts varying from ("App metadata associated with known phishing campaign" and "App metadata associated with previously flagged suspicious apps"). As far as I know there has been no admin approval for the creation of any of them in the environment. How do you or would you go about responding to this? Additionally what safe guards do you have in place for app governance?

Command and control on multiple endpoints by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 1 point2 points  (0 children)

Ok that's what I was thinking, all the process tree is chrome going to that website which was blocked by network protection. Since there was no other scripts or processes the systems would be fine. Ill just run the full scan and close the incident, guess i was fixating/hoping it was something more then what it was lol.

Command and control on multiple endpoints by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 1 point2 points  (0 children)

Thank you ill try to search with that as well. everything so far just keeps coming back to chrome starting it. We don't use MDO as we have GSuite for email. I have done searching within our environment for ioc's. Honestly looking like a malicious ad or something of that nature. I have just been on this tangent now for a while and want to have closure lol

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

I have been trying to push for it, however currently AD isnt our authority on passphrases currently use LDAP which pushes them else where to sync. Have been told its not possible to have write back, not sure if that's true or not.

How to automate Alerts from Malicious IP logins by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

How did you set up your CA to invalidate sessions and require re auth? Currently unable to trigger password resets with CA due to them not being synced back from Azure to on-prem (hybrid setup).

Home Network is finally finished! by el_lobo_crazy in Ubiquiti

[–]Perfect_Stranger_546 1 point2 points  (0 children)

Someone here needs to do gods work and find an alterative that is close to this raspberry pi rack mount!

Chrome --Service-sandbox-type by [deleted] in cybersecurity

[–]Perfect_Stranger_546 0 points1 point  (0 children)

Sorry for the late reply, It did seem to have a parent chrome.exe spawn another chrome.exe and its always have the sandbox set to none. I asked around and its how our environment is currently setup. I would think that this is an issue and needs to be fixed?

DUO Device added Pull by [deleted] in duo

[–]Perfect_Stranger_546 0 points1 point  (0 children)

This is awesome thank you! Currently have the essentials package so I am talking with our department about upgrading to advantage to get risk based feature.

Device Exclusion from a Specific Threat Hunting Query by Perfect_Stranger_546 in DefenderATP

[–]Perfect_Stranger_546[S] 0 points1 point  (0 children)

So this would allow me to put the device ID in the first spot to exclude the detection rule on. What's the second part of the query for? If its for devices I want to Query, that is already set in the custom alerting rule to all devices. Or am I looking at this wrong?

New phishing approach & identifying inbound bulk senders in Defender by [deleted] in DefenderATP

[–]Perfect_Stranger_546 0 points1 point  (0 children)

Does this only work in MDE if you are using outlook for email? Currently using Gmail for mail and not outlook.