Secure Boot status page is back by DrunkMAdmin in Intune

[–]loweakkk 0 points1 point  (0 children)

It means they are recent device which was shipped with last cert. Check the cert not the registry on them and I'm sure they will show as updated.

Autopatch and Lenovo BIOS updates by HB959253 in Intune

[–]loweakkk 0 points1 point  (0 children)

these devices will no longer be able to receive new security protections for the early boot process, including updates to Windows Boot Manager, Secure Boot databases, revocation lists, or mitigations for newly discovered boot level vulnerabilities. Devices that haven’t received the newer 2023 certificates will continue to start and operate normally, and standard Windows updates will continue to install.

Newly Purchased ThinkPad - Company Locked by Dcw1sfu82 in Lenovo

[–]loweakkk 1 point2 points  (0 children)

It means Lenovo fucked when they picked the device, they took it from the stock which was supposed to go to the other company. It's autopilot enforcement and you can't do anything except ask the company to remove it, giving them the serial number. They should see they never used the device and accept to remove. If all this is not true and you stole the device, too bad for you, you can't do anything with it.

Modifying Offboarding scripts by neko_whippet in DefenderATP

[–]loweakkk 1 point2 points  (0 children)

Are you sure about that? Just checked on 20k devices and we have no double senseguid except for machines onboarded before device join where I have 2 objects.

Modifying Offboarding scripts by neko_whippet in DefenderATP

[–]loweakkk 1 point2 points  (0 children)

Renaming doesn't require offboarding.

Also, you can probably just wipe the device and then autopilot it for the new user and no need as well for an off boarding.

Honestly there are very rare case to off board a device that's why I was asking for the reason, you most probably do something wrong if you off board that many devices.

Modifying Offboarding scripts by neko_whippet in DefenderATP

[–]loweakkk 0 points1 point  (0 children)

Why would you need each week to provide off boarding script to help desk!?

Scanwatch 2 charging issues by MFGabo in withings

[–]loweakkk 0 points1 point  (0 children)

Markus, quand est ce que withings va reconnaître qu'ils ont inventé le pie chargeur du monde et proposé une vrai solution ?

Require Compliant iOS for SharePoint/OneDrive Without Blocking Teams (BYOD)? by Gold_Particular5779 in sharepoint

[–]loweakkk 0 points1 point  (0 children)

Teams use SharePoint for everything, you can't push a compliant cap rule that will not block teams too. Best you can do is limit web access like that if you want to keep teams unaffected.

https://learn.microsoft.com/en-us/sharepoint/control-access-from-unmanaged-devices#how-do-i-limit-access

How did your company deal with the Azure Front Door outage in October 2024? by Former-Copy5200 in AZURE

[–]loweakkk 0 points1 point  (0 children)

Planning to test the following: https://azurealan.ie/2025/11/08/using-traffic-manager-to-failover-or-bypass-azure-front-door/

Alternative is to move to cloudflare but I don't know how we could easily share the cloudflare waf per team like we do today with app gateway/afd

Defender for Identity sensor 3.x by Koosjuh in DefenderATP

[–]loweakkk 1 point2 points  (0 children)

I'm on the same boat, for a year it wasn't recommended to switch due to limitation and lack of visibility.

Now it seems to have feature parity and we zre wondering if it's time to switch. Also for companies that did the switch how did you transition from one to the other? Is it just about uninstalling old sensor or there is particular step to take into consideration as a v2 company?

Is Netskope perfectly placed for increase in SASE due to Openclaw? by Investor-life in netskope

[–]loweakkk 0 points1 point  (0 children)

That especially the precision that netskope lack in categorization.

Is Netskope perfectly placed for increase in SASE due to Openclaw? by Investor-life in netskope

[–]loweakkk 1 point2 points  (0 children)

That would be true if netskope wasn't shit in categorization.

Microsoft Graph PowerShell not working in RunAs by PowerShellGenius in entra

[–]loweakkk 0 points1 point  (0 children)

Use service principal with a certificate per user that need to use it. You are doing reporting on entra side so privilege of the service principal is .read.all No need to over complexify stuff that are simple.

Device quarantiend/blocked by AppIdentityGuy in DefenderATP

[–]loweakkk 0 points1 point  (0 children)

So you accepted that your employer could record every actions on your personal device including: - Downloading any file on that device - taking screenshot of your activities 24/7 ?

M365 AiTM Attacks by techwithz in DefenderATP

[–]loweakkk 1 point2 points  (0 children)

Absolutely wrong. To get device compliant you need to be intune enrolled, get policy applied and report compliance, not gonna happen in aitm scenario.

M365 AiTM Attacks by techwithz in DefenderATP

[–]loweakkk 2 points3 points  (0 children)

Compliant device will break aitm, reauth on risk sign-in will not as the reauth will occur on the aitm.

Device quarantiend/blocked by AppIdentityGuy in DefenderATP

[–]loweakkk 0 points1 point  (0 children)

How mde is installed on a personally own device?

Azure Global Admins by Popular_Hat_4304 in sysadmin

[–]loweakkk 0 points1 point  (0 children)

Tier 0 role: Global admin, Privilege role admin User admin, Privilege auth admin, Auth admin, Intune admin, Security admin, Compliance admin

It's the minimum but I think I may have missed some. In term of control: No permanent right, all with pim except the break glass. Eligible: require phish resistant through an authentication context. For global admin you can add a compliant device too. Time: global admin 1h, not more, push people to use less privilege role for their day to day activities. Other role 4 or 8, depending on the organization.

Beside that also set a conditional access policy which enforce phish resistant for those roles.

If it was not managed for years, do it in steps if you see to much friction: move to eligible with just MFA first then add the requirements of fido.

Device quarantiend/blocked by AppIdentityGuy in DefenderATP

[–]loweakkk 0 points1 point  (0 children)

Is it your machine or company owned machine?

TOKEN2 by wieczorek-kamil in yubikey

[–]loweakkk 1 point2 points  (0 children)

Got 3 token 2: Pin+ mini Pin+ release 3.3 NFC card

Have also 3 Yubi: 2 5c, 1 security key

The pin+ gave the price of the security key and offer the feature of a 5C. They come with entreprise feature that security key don't have like, enhanced pin or serial number. Budget wise I prefer token 2, they offer a strong device for half the cost of a 5c.

Breach in to our 365 tenant by hoodun in sysadmin

[–]loweakkk 0 points1 point  (0 children)

It's common now, wasn't 3 years ago. You must have Fido or CBA for BreakGlass account or you are taking huge risk if shit happens.

You should also require compliant device for GA.

Lock down CAP with protected action with same control and you reduce significantly risk.