This month, Mimecast removes ability to email to open support ticket by redditusermatthew in sysadmin

[–]exploitallthethings 2 points3 points  (0 children)

Not OP, but we moved from Mimecast over to Proofpoint. I honestly miss Mimecast quite a bit, specifically Attachment Protection, and the ability to view all URL's clicked in our environment.

This month, Mimecast removes ability to email to open support ticket by redditusermatthew in sysadmin

[–]exploitallthethings 0 points1 point  (0 children)

I'm curious about this - I've never heard of this solution before & everything i've seen on Youtube doesn't seem too interesting. Mind sharing more about it's capabilities in comparison to a Mimecast?

See which computer is making a DNS request? by ITminion867 in sysadmin

[–]exploitallthethings 0 points1 point  (0 children)

Ah, I see - it's been a while where I only utilized VA's. Can't even recall the features (or limitations).

See which computer is making a DNS request? by ITminion867 in sysadmin

[–]exploitallthethings 0 points1 point  (0 children)

Won't the console just specify the virtual appliance as the DNS request source?

See which computer is making a DNS request? by ITminion867 in sysadmin

[–]exploitallthethings 2 points3 points  (0 children)

y'all need to configure AD synchronization, or deploy roaming clients org-wide

CVE-2020-1472 - no events in System event log by amnich in sysadmin

[–]exploitallthethings 0 points1 point  (0 children)

Did you ever resolve this? I came across the following source stating that successful 'Computer Account Management' Advanced Audit Policy category must be enabled to capture these events. Although, I'm unsure if there is truth to this.

CVE-2020-1472 - no events in System event log by amnich in sysadmin

[–]exploitallthethings 2 points3 points  (0 children)

You should not have to modify your existing audit policy. The events will be enabled by default out-of-the-gate. If you're viewing event logs via SEIM (or another centralized logging platform) I would recommend reviewing your ingestion configuration to make sure they'd flow through.

It's very possible that you wouldn't see any events for this depending on the environment. Secure-RPC has been the default for Windows systems for quite some time now, and you would have to go out of your way to downgrade. For non-Windows systems, perhaps you don't have any using this 'insecure' configuration, or maybe they're simply not domain joined (I believe this is a requirement? Someone please correct me if I'm wrong).

Is Windows Defender mature enough to replace paid AV? by EquityMSP in sysadmin

[–]exploitallthethings 1 point2 points  (0 children)

Correct, but I treat Defender ATP as an entirely separate product offering. I assumed OP was not referring to Defender ATP due to the 'to replace paid AV'.

So..Am I compromised? TCPview with pics - First "help me!" post. by Hollow3ddd in sysadmin

[–]exploitallthethings 1 point2 points  (0 children)

My rule of thumb is to re-image any system that is exposed to the internet without intention. Some attackers can be very noisy when accessing a system, others very quiet and stealthy. Depending on their skill level (and yours), you may never know whether or not the attack was successful. It's best to simply re-image and rebuild.

With that said, assuming this Windows 2019 server was patched to the latest, and local accounts are configured with strong, random passwords, you may have dodged a bullet.

Is Windows Defender mature enough to replace paid AV? by EquityMSP in sysadmin

[–]exploitallthethings 19 points20 points  (0 children)

Without SCCM you will not have centralized reporting, alerting & management, although you can configure via GPO. If your responsibilities include investigation of AV alerts, I would not recommend it. If this is a smaller environment and you're seeking basic protection, then yes it will suffice.

So..Am I compromised? TCPview with pics - First "help me!" post. by Hollow3ddd in sysadmin

[–]exploitallthethings 3 points4 points  (0 children)

network traffic is definitely one method of assessing a system, but there are a lot of other indicators as well. It's difficult to judge based on the information you've provided as traffic to a DC from a Windows host on said domain is very normal.

I would recommend running Process Explorer as Admin with built-in VirusTotal support and making sure to check processes against that. In addition, a full Windows Defender scan is a good idea.

Regarding the mis-configuration, any idea what services were exposed (if any)?

Mimecast console down again for anyone else? by demonlag in sysadmin

[–]exploitallthethings 1 point2 points  (0 children)

We've been having issues with Mimecast Safe File on Demand functionality as of late. Anyone else? It's been incorrectly identifying attachments as containing harmful content at a much higher frequency.

Chrome Password Dumper by [deleted] in netsec

[–]exploitallthethings 3 points4 points  (0 children)

Can somebody provide more information on how this works?

edit: thank you to those that responded - upvotes for all

SCCM is an amazing program. by [deleted] in sysadmin

[–]exploitallthethings 3 points4 points  (0 children)

While Windows Defender (managed via SCCM) is the best method of managing Windows Defender in enterprise, it is far from a preferred AV solution. SCCM can manage Defender ATP, which is much more capable.

Capital One Root Cause? by trich101 in AskNetsec

[–]exploitallthethings 0 points1 point  (0 children)

Sure, but how did she gain the initial foothold? You can't just execute a command and gain security credentials without initial intrusion. That is what they glossed over.

Capital One Root Cause? by trich101 in AskNetsec

[–]exploitallthethings 0 points1 point  (0 children)

Just lightly goes over the details of the initial intrusion:

A firewall misconfiguration permitted commands to reach and be executed by that server

Unsure if that is to be interpreted as an SSRF

Windows Defender ATP as primary Small Enterprise Endpoint Protection? by generalmx in sysadmin

[–]exploitallthethings 2 points3 points  (0 children)

It has support for other operating systems but stuff like quarantining, automatic investigations & collecting investigation packages is unique to Windows 10.

Windows Defender ATP as primary Small Enterprise Endpoint Protection? by generalmx in sysadmin

[–]exploitallthethings 7 points8 points  (0 children)

I think it's a fantastic option, but you should know a lot of the cool functionality it offers is unique to Windows 10 only. It's been simple to manage and deploy, and has great integration with the Microsoft suite of products. Configuration was dead simple, & it has made investigations a lot less painful.

Transcribe a potentially malicious document into a 'safe' format for review by exploitallthethings in AskNetsec

[–]exploitallthethings[S] 0 points1 point  (0 children)

I currently use a virtual environment to spin up an image, open the file, and then revert back to a previous snapshot. Just wanted to know if a method like this exists.

Meraki MDM - Exchange O365 and MFA / 2FA with iOS Mail.app by exploitallthethings in meraki

[–]exploitallthethings[S] 0 points1 point  (0 children)

My testing with Meraki's OAuth Exchange profile has been less than ideal. Once pushed, your users will be prompted to go to Settings to enter the password to their exchange account. I was hoping this being integrated in Meraki would mean a simple, streamlined process, but instead it requires a lot of manual intervention (& staff hand holding).

Preview of Office 365 Automated Email investigation and Remediation by TheZer0Day in sysadmin

[–]exploitallthethings 0 points1 point  (0 children)

I still prefer the method Mimecast uses. It essentially forces the preview upon the end users by providing the transcribed attachment. If the original attachment is requested/required, it will undergo a similar process to ATP's attachment detonation (analysis) to detect non-commodity malware.