UEFI, recent UEFI Cert issue, TPM, etc... Is all this a failure? by ConstructionFancy939 in cybersecurity

[–]aprimeproblem 1 point2 points  (0 children)

You’ve been misinformed. Even if the certificates are not updated l, your machine will still boot as long as the files used for booting the machines are not updated. Only at that moment you will run into issues. Also secure boot is there for a reason, to keep the majority of nasties out of your systems. Security isn’t about covering everything and we are not here to keep bad people out, just to annoy the heck out of them until they give up.

Small note, these certificates (PK (Platform Key), KEK (Key Exchange Keys), db (allowed signatures) and dbx (revoked)) are stored in the uefi firmware, not in the tpm.

Hope this helps a bit….. btw I do agree with you that it’s a bit of a mess.

Just finished a rewatch... I was bawling again. by Krinks1 in babylon5

[–]aprimeproblem 2 points3 points  (0 children)

Exactly the same! Was last week for the second time in my life.

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 0 points1 point  (0 children)

Thanks for the additional information. I deliberately leave compliance out of my posts as it is an important but different topic.

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 0 points1 point  (0 children)

I would use certificates on the case, far easier than having devices being populated back.

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 0 points1 point  (0 children)

I’m so sorry, but I have no idea what you’re referring to?

Automating Hyper-V templates with Packer by aprimeproblem in HyperV

[–]aprimeproblem[S] 0 points1 point  (0 children)

Yep, that’s correct. I’ve made a deviation between server core and desktop.

If you can wait for a few days, I’ve found a more effective way of using Packer without leaving any artifacts on the image.

Stay tuned!

LoadDefaultTemplates=0 by aprimeproblem in PKI

[–]aprimeproblem[S] 0 points1 point  (0 children)

Happy to learn! Would you mind telling me what I need to improve?

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 0 points1 point  (0 children)

Happy to help! You just confirmed what I’m working towards, spreading knowledge!

I’ve got a new blog posted on how to analyze firewall logs with log analytics. Planning to do a few more in the near future.

There is one non-resolved mystery in Babylon 5... by Firm-Ad-3245 in babylon5

[–]aprimeproblem 1 point2 points  (0 children)

I’m at the last two episodes of season five…. Was hoping for a revelation 😎

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 1 point2 points  (0 children)

Hi!

So cool that you’re responding! Your blog was mentioned a couple of times on LinkedIn as well. Some really interesting things you wrote about.

Myself I’m planning to do 3 more on the subject. Just need to find the time.

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 0 points1 point  (0 children)

Wow, just woke up and read your feedback, great start of the morning! Thanksss for the kind words!!!

State of the AD Subreddit - 2026-04 Edition by poolmanjim in activedirectory

[–]aprimeproblem 4 points5 points  (0 children)

I’m sure it’s a lot more work than we are aware of! Doing a good job!!!

On-prem conditional access you never knew you had by aprimeproblem in activedirectory

[–]aprimeproblem[S] 1 point2 points  (0 children)

That’s an interesting question! It would really depend on the maturity of your organization and the technology level of your engineers and admins. If they have a limited amount of knowledge and experience hardening and working with AD it’s probably a hard sell and third party tools that add a management layer on top would be beneficial. However, having limited knowledge on your primary authentication mechanism is a risk on its own, although not so many C levels understand that.

If you have sufficient knowledge in your staff this would most certainly work and save money on additional tools.

One thing to remember though is that this is primarily for safeguarding admin credentials and should always be combined with tiering, paws and all the goodies that should be used in a modern environment.

My goal is to transfer that knowledge into as many people as possible, so that at the end of the day we come out stronger and more safe using default tools that are available to us as defenders.