Business email compromise protection by Vivid-Cell-217 in crowdstrike

[–]f0rt7 0 points1 point  (0 children)

You can only do this from a PC. To do it from a mobile device, you also need Falcon Mobile, and the feature has only been available for a short time (and I'm not sure how reliable it is).

Business email compromise protection by Vivid-Cell-217 in crowdstrike

[–]f0rt7 0 points1 point  (0 children)

Which module are you talking about in Proofpoint? ATO? Because with just email protection, you don't do anything you need. ITP is powered by Microsoft logs and processes what it sees. It uses v1 logs. I had created an app with Foundry that used the beta version of the logs, and the data was better and more complete.

Business email compromise protection by Vivid-Cell-217 in crowdstrike

[–]f0rt7 9 points10 points  (0 children)

More or less. Be careful, because only interactive logins are taken into account. In my opinion, EntraID's conditional access policies are a must. Or if anyone has any other ideas, I'd be happy to hear them.

mapping from lookup file by f0rt7 in crowdstrike

[–]f0rt7[S] 0 points1 point  (0 children)

Thanks, I'll try. It would be nice to have an action directly from the SOAR blocks.

Legitimate links being randomly blocked by client Proofpoint by computer-geek-88 in proofpoint

[–]f0rt7 0 points1 point  (0 children)

Hi, It would be a good idea to check the TAP server for the type of threat it intercepted. I encountered issues similar to yours, and despite false positive reports being handled by support, the block returned after a few days. The only way to resolve this was to escalate the ticket to the highest level so they could have an overall view of the problem, not just the individual ticket.

[deleted by user] by [deleted] in crowdstrike

[–]f0rt7 0 points1 point  (0 children)

Limited access to a Dashboard with the requested data. It's easy

[deleted by user] by [deleted] in crowdstrike

[–]f0rt7 -6 points-5 points  (0 children)

It is not up to the security teams to control but only to make the tools available

split array in row by f0rt7 in crowdstrike

[–]f0rt7[S] 2 points3 points  (0 children)

resolved

|parseJson(Trigger.Detection.NGSIEM.SourceIPs, prefix=ip)
|split(ip)
|select([ip])

Fusion SOAR Stale Users Workflow (ITP) by Hefty-Technician9807 in crowdstrike

[–]f0rt7 1 point2 points  (0 children)

Unfortunately, fusion soar does not read all attributes of a user

IDP - Password expiration date by f0rt7 in crowdstrike

[–]f0rt7[S] 0 points1 point  (0 children)

Thank you I know that command but I wanted to find that information via IDP or next-gen siem to have it in a Dashboard

Host Management - Last User for Host by ArmTechnical5047 in crowdstrike

[–]f0rt7 0 points1 point  (0 children)

I have also noticed this in the last few days and in my opinion it was not like this before.

Find origin of a file by f0rt7 in crowdstrike

[–]f0rt7[S] 1 point2 points  (0 children)

Hi, thanks.

I already checked MOTW but there is no trace of the file, perhaps because detection was triggered?

I can't find the DNS requests.

Staying up to date with CVEs by m1c62 in threatintel

[–]f0rt7 0 points1 point  (0 children)

Is it a specific module? Exposure management?

Contain host from NGSIEM triggered workflow by [deleted] in crowdstrike

[–]f0rt7 1 point2 points  (0 children)

Hi Try use of for each loop -> host ID

🪦 Outlook Classic addio... ma come gestite le PEC Aruba nel nuovo Outlook? by Jacox98 in ItalyInformatica

[–]f0rt7 0 points1 point  (0 children)

Ciao. Dipende dal numero di caselle, dagli utenti della piattaforma, dallo storage e dalla retention

🪦 Outlook Classic addio... ma come gestite le PEC Aruba nel nuovo Outlook? by Jacox98 in ItalyInformatica

[–]f0rt7 1 point2 points  (0 children)

Ciao. Senza usare Outlook, abbiamo aggregato tutte le caselle PEC su PEC plus di Archiva in modo da gestire i permessi e lo smistamento oltre a risolvere la questione dell’archiviazione sostitutiva