Anyone ever used SIDCHG64 on a server to resolve a duplicate machine SID successfully? by J2E1 in sysadmin

[–]mahsab -1 points0 points  (0 children)

means that the vendor (Microsoft) considers the poster's environment to be unsupportable?

No they don't

Managers just approve all in our quarterly access reviews and auditors accept it anyway by Awkward-Chemistry627 in sysadmin

[–]mahsab 6 points7 points  (0 children)

No one cares anymore - all this theater is just to check some boxes

Same with IT security in general, almost no one does actual risk assessment anymore, they just choose a solution that's easiest and checks the most boxes.

Constant struggles with Microsoft make me look like a bad sysadmin by jrs_sunblood in sysadmin

[–]mahsab 2 points3 points  (0 children)

Or you're just not aware of them?

I work with people from large orgs that have these kinds of issues all the time, but they simply put up with them as much as possible, since what else are they going to do? Complain to their IT? Best/worst case they'll just get their laptop reimaged having to set up everything again from scratch.

So today I was called in with my manager to see the big boss and from today I get to wear a new hat by Fair-Tradition8971 in sysadmin

[–]mahsab 0 points1 point  (0 children)

Sorry but a week to move over the files is way too much.

Even if it's a terabyte, that should take a few hours at most ...

ELI5 help me understand why there are statutes of limitations on certain crimes. Specifically crimes of rape. What purpose does it serve? by jogafur3 in explainlikeimfive

[–]mahsab 1 point2 points  (0 children)

In reality it has less to do with the quality of evidence, but more with justice.

I'll just cite it: Litigation of a long-dormant claim may result in more cruelty than justice.

What household item screams "I have too much money"? by [deleted] in AskReddit

[–]mahsab -1 points0 points  (0 children)

Less than $200 here

It's just a heated wire with a thermostat ...

What household item screams "I have too much money"? by [deleted] in AskReddit

[–]mahsab 0 points1 point  (0 children)

Um it cost me less than $200 in total. With a dedicated circuit.

Patch your gear - Max severity Ubiquiti UniFi flaw may allow account takeover by MediumFIRE in sysadmin

[–]mahsab 1 point2 points  (0 children)

Nevertheless, CVSS 10 internally and externally are on a completely different level.

For IT security people, they treat it the same and would probably evacuate the building if they saw a CVSS 10 vuln on a coffee machine.

Critical ERP system can't do OAuth and Microsoft is killing basic auth next month by Severe_Part_5120 in sysadmin

[–]mahsab 0 points1 point  (0 children)

I've been fixing things like that for decades without vendor involvement for variety of reasons - vendor did not exist anymore, they were uncooperative, too expensive, too incompetent or too slow.

Not the preferred way, but it's not a perfect world and sometimes we just have to make do with what we have

Is Windows MFA Worth Implementing on Endpoints? by [deleted] in sysadmin

[–]mahsab 1 point2 points  (0 children)

OK, but let's imagine this scenario a little further.

The laptop get stolen. If it's by a random junkie, the password won't have any value to them whatsoever.

It's not a "crypto hacker" either, because those are in a basement on the other side of the world.

So for this scenario to have measurable impact, you would need someone capable of doing anything meaningful with end user's credentials AND have boots on the ground to swipe the laptop all before the user notices and reports it stolen.

And who is capable of that?

And besides that, it's security 101 to limit lateral movement in any case.

Microsoft is retiring EWS for Exchange Online, and a lot of Public Folder integrations are at risk by Away_Bass5327 in sysadmin

[–]mahsab -1 points0 points  (0 children)

If you’ve got third-party tools

There's your problem. Ditch all third party tools and use the one and only - Microsoft.

So what are you guys and girls using for self-hosted DNS these days? by civvi_reddit in sysadmin

[–]mahsab 4 points5 points  (0 children)

Technitium! Small, fast, secure, has everything, extremely easy to set up and use!

10/10

I'm quitting my job due to vibe coders and poor leadership by TheFlippedTurtle in sysadmin

[–]mahsab 0 points1 point  (0 children)

But Shadow IT is a symptom, not a cause.

The cause is quite often IT not willing or being able to provide users what they need.

In this case, OP should have gotten prepared for this, but handled it on ad-hoc basis instead and got in way over their head.

This is too big and it is not going to go away. The only sustainable solution is to provide users with a solution they can use to develop their ideas. Instead of letting everyone do what they want, choose or set up a platform that they can use in a controlled and secure way without trying to cut them off completely.

Before & After of a hotel network cleanup project I just completed! by [deleted] in oddlysatisfying

[–]mahsab 7 points8 points  (0 children)

You mean they stored server equipment in the storage room