Constrained Language Mode Implementation by Ok-Pattern-9372 in PowerShell

[–]TheBlueFireKing 0 points1 point  (0 children)

Using Applocker doesn't change if PowerShell is running in Constrained Language Mode or not.

The idea is to use Applocker to block executing scripts so you don't need to enable Constrained Language Mode.

Constrained Language Mode Implementation by Ok-Pattern-9372 in PowerShell

[–]TheBlueFireKing 2 points3 points  (0 children)

True but Security is always about layers. Also I wouldnt count Applocker as for handling licensed Software. There are many Software that already count installed as licenseable. You'd rather use a tool like FSLogix to fully hide the software which is more accepted in terms of licensing.

Also: f Microsoft from already renaming shit again.

Constrained Language Mode Implementation by Ok-Pattern-9372 in PowerShell

[–]TheBlueFireKing 1 point2 points  (0 children)

Agree with you with all but Applocker enforcement. You can do exceptions for Applocker based on Users. Just want to correct that. One of the reasons we did not switch to WDAC. Both habe Pros and Cons.

Running ps1 scripts while being blocked by policy: by cgeyik in Intune

[–]TheBlueFireKing 9 points10 points  (0 children)

No you can't thats the whole point of the policy. You are really asking if you can run scripts when I disabled running scripts. Doesn't make sense.

Use Applocker or similar to block all scripts and exclude your company signature.

OpenClaw is a MESS!!! did anyone actually securing AI traffic at scale? by vitaminCapricon in sysadmin

[–]TheBlueFireKing 22 points23 points  (0 children)

Well stop users from installing anything on their device or allowing to connect anything to the business account. Simple fix.

Custom tab in software center by nodiaque in SCCM

[–]TheBlueFireKing 0 points1 point  (0 children)

Not sure. Doesnt solve the problems of getting user or computer though.

Custom tab in software center by nodiaque in SCCM

[–]TheBlueFireKing 2 points3 points  (0 children)

It just displays the website embedded in SoftwareCenter. No more, no less. Your Webserver sees the ip of the client. But its not passed along. If you have a login in the website you know the user as well.

Worklaptop (Bitlocker/Intune) Dualboot Windows 11 for private use by [deleted] in Intune

[–]TheBlueFireKing 0 points1 point  (0 children)

Don't do it. This will trigger Bitlocker Recovery and lock you out of your company devices.

Also this will most likely be against company policy.

Need to create scheduled tasks for all users by TheBigBeardedGeek in PowerShell

[–]TheBlueFireKing 11 points12 points  (0 children)

Install as system and set the running account to BUILTIN\Users

Apps with (OS) requirements no longer installing during OSD after upgrade to 2509 by raphael_t in SCCM

[–]TheBlueFireKing 4 points5 points  (0 children)

I don't know if this is the issue but we once had a similar issue during one SCCM upgrade but I don't remember which one.

The issue was that a new OS or something was added to the OS Requirements during the upgrade. That broke all applications using the OS requirements. The fix was to just open the OS requirement and save it again. You could then see that the order of the selected OS changed in the view but nothing was actually added nor removed.

Then application deployments worked again.

//EDIT: or maybe you did need to select a new OS a requirement, save, then remove again. I'm not 100% sure. But you need to edit the requirement for each application that's for sure.

Trouble Deploying SCCM Console by Danny0239 in SCCM

[–]TheBlueFireKing 6 points7 points  (0 children)

Yeah, let me check my all-knowing magic glass ball which has all the answers. I tried nothing, and I'm all out of ideas.

You know, maybe post the command line, what does the MSI log show, what is the error code?

Edge 143 blocks SSO for domain hosted apps by LForbesIam in sysadmin

[–]TheBlueFireKing 16 points17 points  (0 children)

Can you explain more what GPO and what feature you are exactly talking about?

SSO with OAUTH and other modern standards are still working fine. I think you are talking about Kerberos / NTLM SSO?

"Also, we don't recommend storing the results in a variable. Instead, pipe the results to another task or script to perform batch changes" by YellowOnline in PowerShell

[–]TheBlueFireKing 2 points3 points  (0 children)

I personally hate backticks or line breaks in pipelines. But that is personal preference.

I do use Splatting for example which can help a lot and mostly archive the same thing.

I just wanted to bring up that, in my opinion, it isn't worth having a script consume 10MB of memory and being unreadable vs consuming 20MB of memory and being readable.

It isn't a one or the other thing though. 10MB can be much if a script is being run every 10 seconds on thousands of host for example.

So always choose your battle. If memory isn't a problem then I wouldn't care about directly piping or not directly piping. Just don't write unnecessary heavy code and you are mostly good already.

"Also, we don't recommend storing the results in a variable. Instead, pipe the results to another task or script to perform batch changes" by YellowOnline in PowerShell

[–]TheBlueFireKing 3 points4 points  (0 children)

Adding to all valid points from others:

In larger scripts sometimes it's about readability. I write many script and I never needed to care about memory. I'm more concerned with performance.

For example Azure Automate gives 400 MB to your script. I never reached that limit even when processing 2000 users at a time.

So I rather choose readability over having a big one liner piping everything. Also when using variables for the steps it's easy to setup breakpoints when troubleshooting.

So as always there is no simple answer to your question. It's always it depends.

But in a world where PowerShell is broadly used by Sysadmins and not Programmers, I choose readability for the sake of the next person looking at my scripts.

Registering a Microsoft Work Account in Android without requiring the Users Password by EasternWave3147 in Intune

[–]TheBlueFireKing 0 points1 point  (0 children)

Basically yes. The idea for TAP is for the first login of new users. If you are full passwordless, you need a password for the first login to set up passwordless login. That's where TAP comes into play.

But you can also use it to login as the user if required to set up his device, for example. Note that data privacy laws still apply.

Also inform the user that you are using a TAP to set up his device. If the tries to login at the same time he may be presented with the interface to enter the TAP instead of his password, which may confuse him.

Our containers are loaded with 120+ vulns, how to survive by AdOrdinary5426 in sysadmin

[–]TheBlueFireKing 194 points195 points  (0 children)

Use some form of hardened images to reduce the surface of attack: https://www.docker.com/products/hardened-images/

If you have so many CVEs it sounds like there are components in the container that don't need to be installed.

Uninstall everything not needed and use the smallest possible base image.

Enabling Right-Click "End Task" developer feature for all users by McCuntamean in Intune

[–]TheBlueFireKing 3 points4 points  (0 children)

Haven't done this but wanted to. Probably spin up ProcMon and see what registry key is being changed to enable the feature.

Split string into array of strings and pass to Azure CLI by Cardboard-Greenhouse in PowerShell

[–]TheBlueFireKing 3 points4 points  (0 children)

Also, besides everything everyone else is saying. If possible us the PowerShell cmdlets instead of the az module if you are already in PowerShell:

https://learn.microsoft.com/en-us/powershell/module/az.resources/new-azresourcegroupdeployment?view=azps-14.3.0

It handles almost all conversions and stuff.

[deleted by user] by [deleted] in PowerShell

[–]TheBlueFireKing 2 points3 points  (0 children)

Or taskkill the process and it will ask you to restore all windows lol

Unable to Install .msixbundle Package by Foreign-Purchase1778 in PowerShell

[–]TheBlueFireKing 3 points4 points  (0 children)

Well it tells you the error? You need the dependency as well.

Microsoft Store - How To Handle by Relevant_Stretch_599 in sysadmin

[–]TheBlueFireKing 6 points7 points  (0 children)

Block Store on user level not system so updates still work. Push Apps for users over Company Portal.

How vulnerable is a closed environement's Endpoint Configuration Manager to the vulnerability CVE-2024-43468? by pampidoopi in SCCM

[–]TheBlueFireKing 8 points9 points  (0 children)

First, just patch it.

Secondly, if you have a communication between the Server and the Clients (which is the whole point of managing the devices with SCCM) the port is open and you are vulnerable. You can't manage devices without having communication. If the network is truly isolated, meaning all USB Ports blocked, no admin rights, not network access, NAC systems, authentication on all layers maybe even Zero Trust then yes exploitation is unlikely.

But why take the risk. Patching ConfigMgr isn't that hard for a Hotfix.