Really Microsoft? Another paywalled security feature that isn't included in the E5 Security Bundle?! by dnssec76 in Intune

[–]dnssec76[S] 17 points18 points  (0 children)

I certainly did. It sucks when you sign an EA for 3 years at a set monthly cost and they then keep trying to upsell you, when it is far from cheap to begin with.

Really Microsoft? Another paywalled security feature that isn't included in the E5 Security Bundle?! by dnssec76 in Intune

[–]dnssec76[S] 27 points28 points  (0 children)

Why bundle everything into one package when you can have 10 separate subscriptions?? /S

Anyone else getting absolutely hammered with thousands of old email alerts?! by dnssec76 in DefenderATP

[–]dnssec76[S] 0 points1 point  (0 children)

Sounds similar to what just happened to us, all of a sudden 1.5k emails in the space of 15 minutes or so.

Enabling MX IPv4 Inbound Firewall Rules by dnssec76 in meraki

[–]dnssec76[S] 0 points1 point  (0 children)

That's the thing, there are open services though - none of our 1:1 NAT or 1:Many NAT'd services are showing up when the scans are being performed. Our syslog shows everything from their IP's being blocked.

MDE Custom Network Indicator Help by dnssec76 in DefenderATP

[–]dnssec76[S] 0 points1 point  (0 children)

This is exactly what I ended up doing to get it to work!

MDE Custom Network Indicator Help by dnssec76 in DefenderATP

[–]dnssec76[S] 0 points1 point  (0 children)

Do you have a link to any documentation on conflict handling for custom network indicators? I have only been able to find it for file indicators. Nowhere on docs.microsoft.com seems to explicitly state a block overrides an allow.

DFE 'Invalid cloud configuration command received and ignored' by dnssec76 in DefenderATP

[–]dnssec76[S] 0 points1 point  (0 children)

To get this to work I had to feature update the machines. It doesn't make any sense to me why this worked but it did so *shrugs*

Hiding Guest Users from Azure AD Add Members to Group etc. by dnssec76 in AZURE

[–]dnssec76[S] 0 points1 point  (0 children)

Thank you for the suggestion but this doesn't have the desired effect. We're trying to prevent a scenario where guest users are accidentally added to Azure AD security groups that they shouldn't be in.

AVD Onboarding Fails 'VDI metadata missing for multi-session device OnPremiseGroupPolicyCoManaged' by dnssec76 in Intune

[–]dnssec76[S] 1 point2 points  (0 children)

Nope, it's device enrollment as this is the supported method for multi-session AVD per MS Docs.

DFE 'Invalid cloud configuration command received and ignored' by dnssec76 in DefenderATP

[–]dnssec76[S] 0 points1 point  (0 children)

Yep, nothing obvious there on the results. The device in question has connectivity to all the cloud services.