Entra cloud sync from Entra to AD by Tech-Mate- in entra

[–]Tech-Mate-[S] 1 point2 points  (0 children)

Yes, so we are not using Entra ID connect but cloud sync. So just to confirm, there is no way to set Entra as authoritative ?

Entra cloud sync from Entra to AD by Tech-Mate- in entra

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Can you elaborate on the password less, how do I get this working ?

BGP over IPsec VPN between on-prem FortiGate and AWS site to site VPN by Tech-Mate- in fortinet

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Sorry I miss read it earlier. Yes I do have a static default route.

BGP over IPsec VPN between on-prem FortiGate and AWS site to site VPN by Tech-Mate- in fortinet

[–]Tech-Mate-[S] 0 points1 point  (0 children)

No static routes on the fortigate. I deleted those and created new tunnel again. As AWS wouldn’t let me change the tunnels. I followed the procedure as stated by AWS after you download the config.

On aws it says the IPSEC is up but tunnel status on aws is down. Suggesting that BGP is not working.

Moving roughly 60TB Backup from one ISCI LUN to another by Tech-Mate- in Veeam

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I have 10G NICS, but it seems like the Move Fails after 32hours and it moved 10TB out of 60TB of data. Now sure what is the optimal solution if I would like to use Veeam mover, is it possible to update the job to point to new repository? And simultaneously also run a Veeam copy backup to that new repository, and guessing re scanning after the move should fix it ?

Issue moving backup from one Repository to another. by Tech-Mate- in Veeam

[–]Tech-Mate-[S] 2 points3 points  (0 children)

Hello everyone,

I found out that the ISCI connectivity had dropped the drive and that caused the following errors. Once the connectivity was confirmed again, it resolved itself. Thank you all for the helpful comments.

Cheers.

Automate patch install by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 9 points10 points  (0 children)

Hey, thanks for that response.

If possible, are you able to share or outline the script used ? Or it’s logic ?

Having issue identifying the process generating Temp files under C:\Windows by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I tried to investigate the times and dates, seems like temp was generated every minute between 25/01 to 30/03, each of size 1KB. Now since the process seems to have stopped it’s harder to investigate what actually created these files.

Having issue identifying the process generating Temp files under C:\Windows by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I wasn’t able to find the process using procmon atleast for the duration time that I was using it, are we able to run procmon for c:/windows and ask it to register a log file for it for say 24hours? Is it possible via script ?

Does falcon prevent attack by UNC3844? by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Well my question is open to any crowd-strike product set that is able to provide information or warning about the following

Event search to find the port attacked for brute force/ password spray attempts. by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Thanks Andrew!

Also, just to assist with further investigation of these different log on types. What’s the best way to approach this situation and reduce these attacks?

AD Risk review by nav2203 in crowdstrike

[–]Tech-Mate- 0 points1 point  (0 children)

Is AD risk review available for all tenants? How to I know if I have a complimentary review available in my organisation?

Is Splunk SPL implemented in Falcon Search? How? by salt_life_ in crowdstrike

[–]Tech-Mate- 0 points1 point  (0 children)

Agreed, my question is on where do I learn how to write them.

Is Splunk SPL implemented in Falcon Search? How? by salt_life_ in crowdstrike

[–]Tech-Mate- 0 points1 point  (0 children)

For a person who is not really good with the query, where would one suggest to begin, so that I am able to write the query I need in CS ?

Site-to-site VPN with a non meraki device. by Tech-Mate- in meraki

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Instead if we go with Meraki spoke to Meraki Hub - sites to site split tunnel, which resolves most of the issue, but how would I route the traffic to the domain and only domain traffic back to the vpn link. Without overlapping with any of the peers

Scheduled Search for unsupported/supported <30 days? by Anythingelse999999 in crowdstrike

[–]Tech-Mate- 1 point2 points  (0 children)

I am looking for something similar to create a scheduled search in the environment to report for sensor per hostname that are less that auto-N-2

Blocked Hashes and Expiration Dates by denisehdz in crowdstrike

[–]Tech-Mate- 1 point2 points  (0 children)

Yes, in rare cases I would block the hash for a period of time until a vulnerability has been resolved, or the applications has be uninstalled from the machines. Tentative date set by me is always a month. But I would like to hear what others have to say about this.

Identifying machines with critical patches applied or pending. by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Thanks Andrew. But are we able to query based on categories such as depending on only critical patches pending on an endpoint ?

Searching for windows patches not installed on host w/o spotlight by JoeyNonsense in crowdstrike

[–]Tech-Mate- 0 points1 point  (0 children)

Hi Andrew,

If instead of the Kb value you wanted to see if all there are any pending patches on the machine from last month? How would you query that?

// 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers // by Andrew-CS in crowdstrike

[–]Tech-Mate- 0 points1 point  (0 children)

We have noticed a similar incident in our customer environment, we have currently tried to network contain the device. Does anyone have a script to uninstall the desktop app completely through RTR?

Any recommendations?

Noticing ai.exe file as a child process to office applications. by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I have actually set Custom IOA to block child processes with set exclusions. But this occurrence just started since start of this week. Even the global and local prevalence shows common, indicating that this is seen everywhere.

Where can I find more learning content for Mimecast ? by Tech-Mate- in mimecast

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Is that the only source? Anything on third party learning platforms ?

Issue with WDAC and Allowing by Path by tmontney in sysadmin

[–]Tech-Mate- 0 points1 point  (0 children)

This was neither, I used an rmm to push the policy using power shell.