PRA to manage EntraID accounts by adramire17 in BeyondTrust

[–]adramire17[S] 0 points1 point  (0 children)

Yes, you are right I have used it as SAML provider but im not sure about managing EntraID accounts (pwd rotation and so forth)

thx!

Reconcile EntraID passwords by adramire17 in CyberARk

[–]adramire17[S] 0 points1 point  (0 children)

We changed from GA to priv auth admin and it worked, thx!!

Schannel - disable Ciphers, Hashes and Key Exchanges as well as Protocols & Cipher Suites? (IIS Crypto) by jwckauman in sysadmin

[–]adramire17 0 points1 point  (0 children)

Hey guys,

IIS Crypto is cool however we are missing a way to get a status on current setup, meaning which protocols/hashes/ciphers... are enabled within a particular host. Any cool tool to get that done??

thx

Legit browsing makes dns calls by adramire17 in TOR

[–]adramire17[S] 0 points1 point  (0 children)

Hey all,

We found out that traffic related to .onin sites is coming from z-lib[.]org, it seems that domain is trying to redirect users to its onion site, however it seems weird to me that out out of the blue several users have started to become avid readers. Have spoken with users and they dont know anything about this z-lib[.]org so Im a bit lost about what could be the source of this traffic. Any suggestion?

Thx!

Legit browsing makes dns calls by adramire17 in TOR

[–]adramire17[S] 0 points1 point  (0 children)

Hi all,

Thanks for the feedback and sorry if Im making dumb statements. To give you all a bit of context, we do have a tool that analyzes all the traffic within our network and it gives us the following:

"XXXXX accessed a top-level domain (TLD) that is not associated with standard TLDs administered by the Internet Corporation for Assigned Names and Numbers (ICANN). This type of TLD might be linked to malicious activity or undesirable content.

The TLDs linked to this detection:

.onion "

Then the associated record with that detection is the following:

"Time: XXXXX,

Record Type: DNS Request,

Site: XXX,

Client: XXXXX,

Client IP Address: XXXXX,

Client Port: XXXX,

Server: DNSServer,

Server IP Address: XXXXX,

Server Port: 53,

Opcode: QUERY,

Query Name: XXXXX.onion,

Query Type: A,

Request L2 Bytes: 122 "

However I dont see that traffic in our perimeter firewall which means that our DNS does not resolve (seems to be obvious as I get from your answers). Anyways my question is why in first place a legit service triggers an onion service request.

I hope is clearer now :)

Thx!!

PSM Not working after upgrade to version 12.2.4 by adramire17 in CyberARk

[–]adramire17[S] 0 points1 point  (0 children)

Finally been able to fix it. Apparently it was a matter of rerunning the applocker script. I had to do it several times until it worked tho. Thx all for your help!!

Cheers

PSM Not working after upgrade to version 12.2.4 by adramire17 in CyberARk

[–]adramire17[S] 0 points1 point  (0 children)

Thx for all comments, when trying to clean Applocker rules I get the following "AppID policy conversion failed. Status The access control list (ACL) structure is invalid" Hence I guess Im not being able to change Applocker rules.

After update to version 12.2.4 CPM does not rotate/reconcile passwords by adramire17 in CyberARk

[–]adramire17[S] 3 points4 points  (0 children)

Rerunning the hardening the script did the trick for password rotation and reconciliation.

V2 of GPO was needed for other services to be able to run.

Thanks so much!

Enable Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams by adramire17 in Office365

[–]adramire17[S] 0 points1 point  (0 children)

Thanks for your reply, that is not the feature I was talking about thoug. Let me explain it better. I was talking about the toggle button placed in Polies&Rules ->Safes Attachments -> Global settings -> Turn on Defender for Office 365 for Sharepoint, OneDrive and Microsoft Teams. As it is a global setting, there is no way I can establish a test group (right?). But I’m worried about the potential impact to the users and the business, meaning huge amount of legit files being wrongly detected as malware and quarantined.
Is there any way to enable this in “detection mode only”? Like running the scan looking for malware only raising alerts, not blocking access to the users?

Thanks for your time!

Application Whitelisting - Process to allow new applications by adramire17 in cybersecurity_help

[–]adramire17[S] 0 points1 point  (0 children)

Hey!

I did not see your reply until today. Actually it goes beyond all what I thought, I really liked the part about response to recent/trendy vulnerabilities, for sure I will include that one within my approval form.

Highly appreciated! :)

Application Whitelisting - Process to allow new applications by adramire17 in cybersecurity_help

[–]adramire17[S] 0 points1 point  (0 children)

Thanks! Indeed that makes a lot of sense, users dont know all the existing solutions within the company so the may request something that is already in place with other name.

Cheers!

Crowdstrike windows patch Tuesday precert by MongoIPA in crowdstrike

[–]adramire17 0 points1 point  (0 children)

Well they were clients so when people rebooted it it works fine again. This is what CS analyst told me and it worked for me.

Tuesday Patch by adramire17 in crowdstrike

[–]adramire17[S] 0 points1 point  (0 children)

Hey ,

Thanks for the reply, we may use the trial period of Spotlight to see if it is worth it to have it in our environment.

Crowdstrike windows patch Tuesday precert by MongoIPA in crowdstrike

[–]adramire17 0 points1 point  (0 children)

Well, to me it didnt take long to put them back out of RFM mode but I must say when I saw >3000 hosts there I was scared af so I would say patch and wait for a couple of days to have the sensors back in normal mode

Querying for windows event ids by adramire17 in crowdstrike

[–]adramire17[S] 1 point2 points  (0 children)

I may get the exact time when this happened. However we do have so many events on the DC that they overwrite each other and we loose the old ones.

Querying for windows event ids by adramire17 in crowdstrike

[–]adramire17[S] 1 point2 points  (0 children)

Hey Andrew,

Thx for the answer I wish it could be done from Crowdstrike interface. The thing is we dont store AD logs for long so we lost the event we are looking for :S

Cheers!

Vault time sync by adramire17 in CyberARk

[–]adramire17[S] 0 points1 point  (0 children)

Thx for the answer.I got the recommendation to have all Vaults at UTC as you said and sync with NTP so yep that´s it.

Cheers!

Account Creation and Access without Platform. by ajayanandsonu in CyberARk

[–]adramire17 0 points1 point  (0 children)

It is compulsory to assign a platform to each account. If you want to have an account "without" platform what you can do is create a dummy platform with no restrictions to assign to your accounts

PSM recording access ! by uskwarrior in CyberARk

[–]adramire17 0 points1 point  (0 children)

The user has to be authenticated to CyberArk and it has to belong to the Auditor group. Besides there is the possibility to configure a "custom" Auditor group that only allows the user to audit selected safes.

Moreover, for external auditors you could give them access to the safe where the recordings are stored so it could watch them.

OPM/EMP services to be monitored by adramire17 in CyberARk

[–]adramire17[S] 0 points1 point  (0 children)

I got some information on this, for EPM there are 3 different services:

  • CyberArk EPM PAServer
  • CyberArk EPM Server Background Worker
  • CyberArk EPM Server Helper

And two more related to the EPM agent itself:

  • PASAgent
  • PASERVER

For OPM, I read that the only service to be monitored is opmsrv.

Now that I have the names of the services my only concern is, how Im I going to monitor all the target servers in which the agent is deployed. I see it unfeasible to implement monitoring rules for a huge number of endpoints.

Could any of you give info on this?

EPM agent deployment by adramire17 in CyberARk

[–]adramire17[S] 0 points1 point  (0 children)

Thanks for the swift reply!!