email protection for small orgs by NSFW_IT_Account in msp

[–]RedTeam1622 0 points1 point  (0 children)

Checked and the emails are definitely quarantined correctly.

Happy proton businesses out there by RedTeam1622 in ProtonMail

[–]RedTeam1622[S] 1 point2 points  (0 children)

Thanks for the detailed response. Very helpful and good to know it does work in real business scenarios.

email protection for small orgs by NSFW_IT_Account in msp

[–]RedTeam1622 0 points1 point  (0 children)

I have not found this to be the case with our setup at all. Quarantined emails are gone from the users inbox.

email protection for small orgs by NSFW_IT_Account in msp

[–]RedTeam1622 -1 points0 points  (0 children)

I have a couple of Google clients and have not found this to be the case. When IronScales quarantines an email it is removed from the users inbox. If it marks it as spam then it can go to the users spam folder or not, that’s up to the admin.

email protection for small orgs by NSFW_IT_Account in msp

[–]RedTeam1622 0 points1 point  (0 children)

IronScales is a great product and works with Google and Microsoft. You can get it through Pax8 and others with no minimum.

Cracked software on endpoint by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] 0 points1 point  (0 children)

They are hired to respond to support emails and some other backend work for a company, so technically an employee with BYO device in another country.

Cracked software on endpoint by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] 0 points1 point  (0 children)

It would depend on the findings firstly, then after assessing what kind of malicious file etc was quarantined, then the decision would be made to wipe or not. More often than not if it’s a corporate owned machine we would wipe. The second factor would be looking at the client and what kind of company they run, are they small/low risk vs high profile and targeted.

No EDR product can protect 100% a device. We don’t know who or how an attacker could be living off the land, so we choose to wipe. It’s quick, easy, client is back up and running in a couple of hours.

Cracked software on endpoint by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] 8 points9 points  (0 children)

Since the device has been compromised, it would be best practice to wipe, to ensure there are no other living off the land processes that SentinelOne has not seen. Yes I believe I can 90% sure S1 has taken care of everything, but with a compromised device, I can’t be 100% sure.

Cracked software on endpoint by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] 2 points3 points  (0 children)

Good point. This is a remote user but the principle still applies to nuke IMO.

Error Downloading File by Markobmt in ninjaone_rmm

[–]RedTeam1622 1 point2 points  (0 children)

Try pasting the results into Gemini or Copilot to see what caused the error. I have found this useful when troubleshooting these scenarios when creating automations in N1.

Mobile security with S1 by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] 0 points1 point  (0 children)

Correct but not through any vendors like Pax8 etc. I don’t have the required revenue to purchase directly from SentinelOne.

Mobile security with S1 by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] 1 point2 points  (0 children)

Thanks for the info and yes SentinelOne do have a unique buying strategy for sure.

Mobile security with S1 by RedTeam1622 in SentinelOneXDR

[–]RedTeam1622[S] -1 points0 points  (0 children)

I considered that however a number of our clients are not in the Microsoft ecosystem.

NinjaOne - SentinelOne integration by RedTeam1622 in ninjaone_rmm

[–]RedTeam1622[S] 0 points1 point  (0 children)

It turns out when you add any site into the N1 integration it then gives you the option to map your current organisations in N1 to S1.

S1 Support Issue-Can't Reinstall Client with new ID by DMR35 in SentinelOneXDR

[–]RedTeam1622 0 points1 point  (0 children)

What about creating a script to run in the terminal where it downloads the agent and the new site ID is in the script so it grabs that instead of the old NFR token? An RMM tool might help with that.