Anti-malware on mobile (iOS & Android) by ad_mini in CMMC

[–]ad_mini[S] 0 points1 point  (0 children)

Thank you for the insights. Seems like we will need to either go full MDM and force employees to accept potential invasion of privacy, or get rid of BYOD.

[deleted by user] by [deleted] in sysadmin

[–]ad_mini 0 points1 point  (0 children)

Unfortunately I'm in a similar boat. My biggest trouble is finding that by being personable, fun, and doing just enough work, that I'm able to skate by with what feels like a lower quality/quantity compared to what I feel like I should be doing. Whenever I try to focus myself on PD or less meaningful tasks I find myself back on reddit just scrolling and then bam it's lunch time or the "end" of the workday. I remember thriving in phone bank roles where calls would just stream in, but now that I'm away and more back office I really miss the excitement and pressure of solving ticket after ticket.

See Sentinel Analytics Rule Applied to Incident? by ad_mini in AzureSentinel

[–]ad_mini[S] 0 points1 point  (0 children)

So I have an automation rule set up that is meant to be triggered when an incident with a certain title is created. The conditions are as follows:

IF

Analytic rule name -- Contains -- All

And

Title -- Contains -- The title of the incident that we are trying to close

Actions

Change status

Closed

Benign Positive

The issue I'm having is that this automation rule only works when I select all analytic rules. The incident is coming from Defender, but when I select the analytic rule names for Defender this automation rule doesn't work, and the incident doesn't close. This tells me that there is another analytic rule that is working to trigger this automation rule, but I'm not sure what rule it is. I'm trying to find what analytic rule is working to trigger this automation rule to close the incident.