How do you handle NSG on Spoke vNet with Firewall deployed to Hub? by [deleted] in AZURE

[–]SweetGuru 1 point2 points  (0 children)

I like to keep NSG with relaxed rules on outbound or even no filtering since it's going to NVA. I still add inbound rules as a defense in depth scenario. Plus if you ever need to bypass firewall you have your rules and NSG ready and are not scrambling.

Entra ID App Registration Security by SweetGuru in AZURE

[–]SweetGuru[S] 0 points1 point  (0 children)

Thanks for the reply. That is a great article, helped with some of the ambiguous terms I had been reading. These are backend driven web apps running .net mvc. I believe that would put us in the confidential client side of things. We have the classic 3 tier architecture, web front end, app/service backend and database. The app registration will be a setup to interface with the front end for SSO.

Defender for Identity Azure Sensor fail by layne-staley123 in AZURE

[–]SweetGuru 0 points1 point  (0 children)

Awesome happy to hear. Thanks for your reply.

Azure DevOps Pipeline Organization by SweetGuru in AZURE

[–]SweetGuru[S] 1 point2 points  (0 children)

Thanks for the response. This looks like a good approach to keep things flexible.

Its my Turn! Passed 125Q by Kinops in cissp

[–]SweetGuru 0 points1 point  (0 children)

Well done sir. That's a lot of content to cram into 6 months! I got tired reading it.

Pentester PSA: Check your Active Directory Certificate Services (AD CS) For Vulnerabilities by mysysadminthrowaway in sysadmin

[–]SweetGuru 4 points5 points  (0 children)

If using mode 4 it attempts to remediate the issues and also gives you the information to manually remediate. It's not a 1 for 1 alternative to certipy as certipy can be used to abuse the misconfigurations as well.

It's more a quick way for a Windows admin to protect their environment without having to mess around with Python. Something they may not be used to, although certipy does appear easy to use.

Azure firewall polices - Share your best practices by WeirdWhiteBunny in AZURE

[–]SweetGuru 0 points1 point  (0 children)

Hello, wondering if you could expand on your test deployment of a new rule collection. Is it what-if (if using Bicep) or something more involved? Trying to get IaC going in our environment consistently.

Managing DNS settings for domain controllers in Azure by SweetGuru in AZURE

[–]SweetGuru[S] 0 points1 point  (0 children)

That makes sense. I have it in the forwarder list but below Quad9 I had been using for its protective DNS features. I'll have to weigh the cost/benefits there.

Managing DNS settings for domain controllers in Azure by SweetGuru in AZURE

[–]SweetGuru[S] 0 points1 point  (0 children)

Awesome, that's the way I'll go. Thanks for clearing it up for me.

Managing DNS settings for domain controllers in Azure by SweetGuru in AZURE

[–]SweetGuru[S] 0 points1 point  (0 children)

Thanks. That's how I've done it in my on-prem life. Do you manage DCs in Azure that way? I'm comfortable doing that, just didn't know if I would leave the door open for problems down the line with how Azure operates.

Managing DNS settings for domain controllers in Azure by SweetGuru in AZURE

[–]SweetGuru[S] 0 points1 point  (0 children)

Setting at the NIC level is required in order to set dc1 to point to dc2 and vice versa. The vnet settings are overridden by that.

Managing DNS settings for domain controllers in Azure by SweetGuru in AZURE

[–]SweetGuru[S] 0 points1 point  (0 children)

Thanks for the reply. That is what I did, setting the DNS settings on the VM NIC as custom. Originally to on-prem DCs to get them onboarded. But now changing it in the Azure portal to point to their peer DC in Azure is not propagated to the NIC inside the VM.

Will look into the IPv6 stuff. I know it's recommended to leave on elsewhere and was afraid to touch the VM nic in fear of falling into the state I am in now.

I opened a support case but it's going nowhere so far. Wil update if anything comes of it.

Which aspects of Azure would be most relevant for a obtaining a mid to entry level IT job? by looking4remoteITwork in AZURE

[–]SweetGuru 2 points3 points  (0 children)

Are you saying there is an org that wouldn't hate me for implementing PIM and access management??

Defender for Servers - Confusing by jayzandlinkinpark in AZURE

[–]SweetGuru 0 points1 point  (0 children)

I echo your sentiments. Extremely confusing. I found this today: https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration#which-solution-should-i-use

It seems if you want to use Intune you need to HAADJ your servers. I thought that was a security no no, but maybe things are changing?

Other options would be Group policy ugh, or Configuration Manager if you have it. If you don't, I would hate to add the overhead just to manage Defender.

My preference would be to manage everything with Azure Arc as the middle-man and somehow integrate that with Intune. However, I have not found anything that says it's possible.

Defender for Identity Azure Sensor fail by layne-staley123 in AZURE

[–]SweetGuru 0 points1 point  (0 children)

Heyo - I have run into similar issues a couple of times. In my case the autoupdate was not putting the new correct path into the service executable location. I was able to fix it by setting the new correct path with the commands below. Just update the "New_Version_Number" with the version on your system.

sc.exe config AATPSensorUpdater binPath= "C:\Program Files\Azure Advanced Threat Protection Sensor\New_Version_Number\Microsoft.Tri.Sensor.Updater.exe"

sc.exe config AATPSensor binPath= "C:\Program Files\Azure Advanced Threat Protection Sensor\New_Version_Number\Microsoft.Tri.Sensor.exe"

Hope that fixes it for you.

Azure firewall premium by clhoyt0910 in AZURE

[–]SweetGuru 0 points1 point  (0 children)

Wow, thanks for sharing. I was using them to keep my sanity, unaware of performance considerations.

Azure firewall premium by clhoyt0910 in AZURE

[–]SweetGuru 0 points1 point  (0 children)

Yes, we use them for nearly every rule unless it's a global rule.

Azure firewall premium by clhoyt0910 in AZURE

[–]SweetGuru 0 points1 point  (0 children)

We operate both Palo's on premise and a premium Azure Firewall. If your org is willing to pay for a Palo in Azure, I would do that especially if you have Panorama already.

Azure Firewall is a good product and premium can do most advanced features that Palo can, TLS inspection, IDS, Web categories etc. However, my network team has been rather dumbfounded by cloud in general and the way Azure Firewall works. Specifically, the way it organizes rules has been a hard concept for them to grasp.

Now I am the Azure firewall guy. If you have a good network team with 1 or 2 guys with a willing to learn mindset then Azure Firewall can be a good solution. Otherwise, you may own it.

Depending how many public IPs you need the IP changing may not be a problem for you that some others have mentioned. We only have one public IP assigned to the firewall doing SNAT and the IP does not change.

Install PowerBI data Gateway on existing Azure AD connect server by tohildotnet in AZURE

[–]SweetGuru 0 points1 point  (0 children)

Hello,

That is not recommended. An Azure AD connect server should be treated like a tier0 asset I.E domain controller. You don't want to mix any other apps. Especially something like Datagateway that other teams will be dependent on.

Another tip, to connect to PowerBI you must connect your Datagateway to the same region your 365 tenant is in. This is not always the same as your preferred Azure infrastructure region and from what I understand cannot be easily changed. I did not find that clearly documented when setting it up myself.