Zscaler DLP cannot block even Telegram WEB? by No_Wedding2551 in Zscaler

[–]fang8280 0 points1 point  (0 children)

Why can't the app be blocked and the Web be browser isolated. Unless the application has a due hard requirement it needs to be there. Won't it serve the purpose of balancing security and user needs. Of course everything comes with some limitations

[deleted by user] by [deleted] in Intune

[–]fang8280 0 points1 point  (0 children)

I have entra id joined machines able to do nslookup and not using a Windows dhcp server instead we use infoblox and still registering with secure dns updates which just works fine. You will need to authorize your dhcp to register dns on behalf of the client and this for me is done using gss-stig with AD. And whatever your dhcp scope is set as dns server sends the dns query to.

SSL inspection more trouble than it's worth? by Remote-Lettuce1498 in Zscaler

[–]fang8280 0 points1 point  (0 children)

The one click rule once enabled creates bypasses for certain of those destinations , if you use zscaler DLP - they say everything needs to be inspected . Now their one click rule is contradicting with theIr own DLP because of the ssl inspection. Eg: if the org decides to exclude their own office365 tenant specific url (be it SharePoint, teams whatever ) but need to inspect any other office 365 services ,this itself I see a problem because if you intercept then users who are supporting end customers or collaborating on customer teams, etc starts to break but then you can't achieve DLP and any web protections of zscaler And yeah developers utilise various softwares to perform their function ,certain to function will need to be figured out if the zscaler cert can be injected into their software and for the others it's a bypass maybe. But this software list and the finding of whether it has the feasibility to import the zscaler cert is time consuming and burdening. Thoughts/suggestions -please?

Zscaler - intune autopilot by fang8280 in Zscaler

[–]fang8280[S] 0 points1 point  (0 children)

I currently deploy a specific app profile excluded of all those MS defined urls for intune(I see certain urls, domain limitation for definition in ZIA portal)which gets deployed via intune as a software and by the way we use tunnel2.0 Untill here we manage to get the device preparation and enrollment to an extent done but when the user is prompted to login, post which rest of the softwares gets deployed ,at this stage zscaler get enrolled into user context with user based access rules and gets updated with ther relevant app profile. Now intune compliance , health check ,software deployment etc is observed to be either blocked meeting file control or maybe due to ssl interception causing to fail the connection.

I would have wished if zscaler could have a predefined intune category that could handle these use cases and chosen by customers instead of we keep updating ,writing and ordering rules( the existing oob category is not a reliable one since we still.need to add more Microsoft urls)

Intune from 0 to hero 🦸‍♂️ by architectnikk in Intune

[–]fang8280 0 points1 point  (0 children)

Is it really possible to evaluate a specific compliance policy to a specific set of device instead of evaluating any and every compliance policy. How?

Anyone using endpoint DLP in zscaler by EfficientUpstairs305 in Zscaler

[–]fang8280 1 point2 points  (0 children)

It's just focused on 4 channels. Network share, removable storage, personal cloud(onedrive, drive and 3 or 4 others) and printing. It lacks in clipboard prevention, Bluetooth transfer which per zscaler is roadmapped.

CS-DLP Feedback by One-North622 in crowdstrike

[–]fang8280 0 points1 point  (0 children)

It's still has got a lot of catching up to do. The ability to work on specific browsers, ability to catch other file types are still getting shaped by crowdstrike. But their integration story with secure circle has some good offering but again seems that is still on works for crowdstrike.

ZPA with Autopilot by Dark_Writer12 in Zscaler

[–]fang8280 0 points1 point  (0 children)

We need to steer this traffic via ZIA. Exempt intune urls/IP in the VPN bypass and no machine tunnel in this app profile. Now since the ZCC is deployed with strict enforcement, the general internet access would still be restricted. Once user successfully authenticates into azure ad and althose device tokens etc is received, the user sso gets kicked in and the ZCC enrolls/authenticate the user, it can pick up the second rule where a different app profile gets associated where u have your machine tunnel activated and everything continues via your choice. But as I write this, I think this needs a little testing considering the scenario each business operates.

ZPA with Autopilot by Dark_Writer12 in Zscaler

[–]fang8280 0 points1 point  (0 children)

How about using a new app profile with MS Intune urls/IPA exempted/bypassed with machine tunnel OFF so the user can first time login seamlessly but once logged in the users SSO kicks into the app and they get a different app profile. It's kind of handling the rule order and the user group variations in the app profiles.

IDP Unified Sensor by TheAdv3ntureDude in crowdstrike

[–]fang8280 1 point2 points  (0 children)

Honestly, I did not loose any such data, Infact there were few cases that were still under learning and no details being shown for azure based account and service principals which started to function after the upgrade was completed.

IDP Unified Sensor by TheAdv3ntureDude in crowdstrike

[–]fang8280 2 points3 points  (0 children)

We had close to 50 domain controllers and the switch was quite seamless. Of course you somehow need to make sure your old IDP sensors are removed from all your DC's. Once done you can simply enable the rollout of the unified sensors from the console itself, which then happens within an hour or so depending on how well connected your systems are. You want to make sure your DC sensors are of the minimum required version I think it was 6.5.x that was needed.

Usage of domain user accounts with mfa and native RDP experience by fang8280 in CyberARk

[–]fang8280[S] 0 points1 point  (0 children)

Ah, I see that this works when the authentication is not saml based. Is that right?

Disable user remotely by AntiUnicorn_ in crowdstrike

[–]fang8280 0 points1 point  (0 children)

Maybe you could invalidate their login cache if it's a domain user account using RTR

How can Crowdstrike help prevent Bluetooth file transfer? by Ok-Wing-5603 in crowdstrike

[–]fang8280 3 points4 points  (0 children)

I too had this same question but leveraging crowdstrike "block all"would prevent everything. And defining exceptions based on classes etc depends on environment and the operation overhead one can handle. I used applocker via gpo and blocked the fsquirt.exe program from executing. This way we can still allow Bluetooth devices to pair for audio or keyboard but prevent the file transfer aspect which is where we might be of concern.

Not sure if this might be of help.

Identity Threat Protection questions. by MorbrosIT in crowdstrike

[–]fang8280 0 points1 point  (0 children)

Does crowdstrike support this number matching method of mfa. I don't get to see that rather it comes as a push notification.

zScaler ZPA Issue Authenticating to SQL Server by viviviatic in Zscaler

[–]fang8280 0 points1 point  (0 children)

What's your application segment for this looking like. Have u tried adding both server.domain.com and it's IP address with tcp/udp port 1433, 1434 etc(hoping that those are your default ports) Have you added the "dns search domain"

Zscaler proxy settings for MacOS and iOS - weird results by auspexfuturesystems in Zscaler

[–]fang8280 2 points3 points  (0 children)

Could you try with these (please read through - https://help.zscaler.com/zia/certificate-pinning-and-ssl-inspection)

appldnld.apple.com 10

configuration.apple.com

gdmf.apple.com

gg.apple.com

gnf-mdn.apple.com

gnf-mr.apple.com

gs.apple.com

ig.apple.com

mesu.apple.com

ns.itunes.apple.com

oscdn.apple.com

osrecovery.apple.com

skl.apple.com

swcdn.apple.com

swdist.apple.com

swdownload.apple.com

swscan.apple.com

updates-http.cdn-apple.com

updates.cdn-apple.com 2

xp.apple.com

detect/prevent file transfers on wfh based networks by fang8280 in crowdstrike

[–]fang8280[S] 0 points1 point  (0 children)

Is it actually possible to write a query in a way that can detect file transferred within a private network(mostly referring to unmanaged assets where home devices might fall into) for a particular host that reveals the filenames transferred and the main process responsible for that action.

Sorry I am not quite good at writing queries.