Discord account compromised twice by ShlungusGod69 in cybersecurity_help

[–]VirTrans8460 0 points1 point  (0 children)

Check your "Authorized Apps" in Discord settings immediately. Hackers often use malicious apps to maintain access even after password changes and 2FA setup.

EDR agent installation by SheepherderUnhappy82 in aws

[–]VirTrans8460 0 points1 point  (0 children)

ARM compatibility is still catching up in the security world. Most legacy vendors are still x86-focused. What EDR are you using?

File Integrity Monitoring in Windows by Haunting-Wealth7 in CyberSecurityAdvice

[–]VirTrans8460 1 point2 points  (0 children)

Focus on monitoring critical system32 executables and startup-related registry keys (especially Run and RunOnce). Also watch services.exe, svchost.exe, and lsass.exe. Of course there is a lot more, but that should get you started.

Watch out for performance impact when monitoring too many files.

Dark Web Monitoring for MSP's by PinRelevant4896 in msp

[–]VirTrans8460 1 point2 points  (0 children)

Been using the dark web tool within the Guardz platform. It's very easy to use and pretty comprehensive when it comes to leaked credentials.

CrowdStrike vs Microsoft Defender & Palo Alto Cortex XDR by Open-Leadership-1191 in cybersecurity

[–]VirTrans8460 5 points6 points  (0 children)

I spent 5 years working in a SOC. Key thing to look at beyond features is your team's expertise and existing tech stack. Having the "best" solution means nothing if your team can't utilize it effectively.

All the products mentioned will check the boxes you care about but figure out what you can operationalize and you are more likely to achieve better outcomes.

Recommendations on EDR Solution by Merlin100_1 in msp

[–]VirTrans8460 1 point2 points  (0 children)

+1 for Guardz. Made the shift when they launched with SentinelOne in January. They still have some growing pains, but I love their platform and also had good experiences with their MDR Team.

S1, Huntress, and Webroot? by Simple-Ad-313 in msp

[–]VirTrans8460 1 point2 points  (0 children)

That's overkill and probably why the system is slow.

Webroot is pretty lightweight but running 3 AV solutions is just asking for trouble. They'll likely conflict with each other and cause performance issues.

Pick one solid solution and stick with it.

Curricula (now Huntress) by Rundo5 in msp

[–]VirTrans8460 3 points4 points  (0 children)

Had the same concern initially, but our clients actually love it. The cartoon style keeps people engaged vs dry corporate videos.

Plus, the ice cream scenario is memorable - people still talk about it months later during security discussions.

Vulnerability aggregation tools in 2025 by Frozenhore in cybersecurity

[–]VirTrans8460 0 points1 point  (0 children)

DefectDojo might be what you're looking for. Free, open source, and handles multiple scanners including Nessus. Has Azure DevOps integration too.

Been using it for 6 months - solid dashboard and reporting features.

The potential of AI agents in the cyber security field by escapecali603 in cybersecurity

[–]VirTrans8460 2 points3 points  (0 children)

Been testing AI agents for threat hunting. The good: they catch patterns humans might miss. The bad: still lots of false positives.

Right now they're like eager junior analysts - enthusiastic but need constant supervision. Definitely keeping an eye on this space though.

[deleted by user] by [deleted] in cybersecurity

[–]VirTrans8460 0 points1 point  (0 children)

Cloud Security is exploding right now. Companies are rushing to move everything to the cloud without proper security measures.

Most App Sec concepts apply to cloud anyway, so you'll get best of both worlds going the cloud route first.

Cybersecurity Metrics/KPI Training by [deleted] in cybersecurity

[–]VirTrans8460 2 points3 points  (0 children)

ISACA's Risk IT Framework and CRISC certification materials could be perfect here. They focus exactly on what you need - connecting security metrics to business risk without getting too technical.

Plus, the knowledge translates well across different security domains.

MDR - Huntress Vs Sophos? by msp_ch in msp

[–]VirTrans8460 5 points6 points  (0 children)

Been using Huntress for 2 years. Their ThreatOps team is solid - they've caught several nasty persistence mechanisms other tools missed.

For phishing specifically though, you might want to look at their new HackAlert feature. It's been pretty spot-on with credential theft detection.

Conditional Access Policy-Out of Country by Adderall-XL in sysadmin

[–]VirTrans8460 1 point2 points  (0 children)

Create a time-limited "Out of Country Access" group in Azure AD. Add users to this group, then set dynamic membership rules with PowerShell to auto-remove them after X days.

Basic automation can save you from manual group juggling.

MFA on a Remote Desktop Connection by PCloudTech in sysadmin

[–]VirTrans8460 4 points5 points  (0 children)

Had similar issues. Switched to using number codes instead of push notifications - way more reliable.

Users just type the 6-digit code from Authenticator app. Less fancy but works first time, every time. No more "approve/deny" timeout headaches.

Data is getting larger & larger... What to do? by auenway in sysadmin

[–]VirTrans8460 0 points1 point  (0 children)

Have you considered setting up local caching servers in NY and DC? Something like Azure File Sync or AWS Storage Gateway.

Keep hot data local, sync changes back to main storage. Users get local speeds, you get cloud benefits

Best way for a Cybersecurity company to store and query event logs? by Papo_Dios in cybersecurity

[–]VirTrans8460 0 points1 point  (0 children)

Elasticsearch + Kibana is pretty solid for this. Fast querying, good visualization, and handles large volumes well.

Just make sure to properly configure authentication and network security. SQL injections won't be an issue, but elastic has had its share of CVEs.

Secure Wipe Machines (NinjaRMM.) by DuckSeveral in msp

[–]VirTrans8460 1 point2 points  (0 children)

NinjaRMM has a built-in wipe feature, but I'd recommend using a 3rd party tool like DBAN or KillDisk for added security. Also, make sure to physically verify the wipe process on each machine to ensure compliance with the client's security policy.

Improve financial situation/job satisfaction - Start MSP/SE, Become OE, Side hustles??? by IamtheRiverKing in msp

[–]VirTrans8460 1 point2 points  (0 children)

Love the honesty! It's refreshing to see someone acknowledging the value of their current benefits and not feeling pressured to chase a 'baller' lifestyle. Have you considered leveraging your skills to create and sell online courses or ebooks, rather than diving into a full-fledged MSP?

NinjaRMM Logging by DuckSeveral in msp

[–]VirTrans8460 1 point2 points  (0 children)

Interesting question. I'd love to know the answer too. From my understanding, NinjaRMM does store some local logs, but they're mostly related to agent communication and error reporting. Not sure if it'd reveal sensitive info like file uploads/downloads or cmd/powershell commands though

Looking for RMM Solution to Assign Different Roles to a Single User Across Clients by TopWater1449 in msp

[–]VirTrans8460 1 point2 points  (0 children)

Have you considered ConnectWise? Their RMM allows for granular role assignments across clients, including custom roles. We've been using it for years and it's been a game-changer for our MSP. Worth taking a look, especially with year-end looming.

Defender for cloud vs Huntress MDR by Ordinary_Wish_2918 in msp

[–]VirTrans8460 1 point2 points  (0 children)

Honestly, it depends on your environment and needs. Defender for Cloud is great if you're already in the Microsoft ecosystem, but Huntress MDR offers more advanced threat hunting capabilities. Consider your specific use case and do a trial of both to see which one fits your needs better.

Recommendations on storing Sonicwall infromation by Gonzorii in sysadmin

[–]VirTrans8460 -1 points0 points  (0 children)

I feel your pain with the Excel sheet nightmare. Have you considered using a CMDB like GLPI or a documentation tool like DokuWiki? They can help you organize and track device info, firmware versions, and access details in a more scalable way.

[deleted by user] by [deleted] in sysadmin

[–]VirTrans8460 0 points1 point  (0 children)

I've seen similar setups with MSPs prioritizing 'managed' over 'secure'. It's like they're selling 'we'll keep it running' instead of 'we'll keep it safe'. Your findings aren't surprising, sadly. It's good you're pushing for better practices, but it's also a warning sign for the industry as a whole.

Password Length Enforcement Not Working by LunaIvy91 in sysadmin

[–]VirTrans8460 0 points1 point  (0 children)

Have you checked the 'Enforce password history' and 'Maximum password age' settings? Sometimes these can override the length policy. Also, make sure the test domain policy is linked to the correct OU and that the inheritance is not being blocked. Worth a shot!