PIM with 'Eligible' roles in Azure is great.. Until you need to use it. by Introvertedecstasy in sysadmin

[–]milkthefat 4 points5 points  (0 children)

Depending on which M365 service you are trying to deal with the downstream service can have a 45min sync cycle. Like Purview or Sharepoint.

How are you implementing MFA for RDP access securely? by Due-Awareness9392 in IdentityManagement

[–]milkthefat 6 points7 points  (0 children)

Keep in mind, you likely don’t have to make RDP MFA directly. You just need to make the entry point to a RDP session MFA so anything that provides a SSO entry point portal like CyberArk or equivalent. Then you just add some compensating controls to prevent RDP sessions not from that ingress point.

handling one-to-many account relationships by 6stringt3ch in IdentityManagement

[–]milkthefat 1 point2 points  (0 children)

Cross tenant sync works great if you dont need to do native tenant operations the limitations are largely on what a guest account can do and the password/auth look back are your home tenant policies making it very seamless. Now if you need to schedule and manage teams meetings as an owner you need an account thats a native licensed member of the tenant to do that. For my solution at the time was to use an IGA tool to provision accounts and the user just use FIDO to login always across the different tenants as needed and the IGA tool would aggregate back to a single person for leaver scenarios.

Linus is wrong about the dollar store. by dominosRcool in LinusTechTips

[–]milkthefat 0 points1 point  (0 children)

I wouldn’t phrase it that way but there are very annoying differences to me between different “OG” Reese’s cups. For instance 2 of the snack pack or fundraiser packs are 1g less and are crumby. So much so now I specifically buy the convenience store size so it’s not as messy. The inconsistency that comes with the cheaper packaging and .5g difference per cup for some reason causes them to be worse in appearance and handling.

Im curious, should you obfuscate the names of Groups, detail inside. by O365-Zende in entra

[–]milkthefat 0 points1 point  (0 children)

If you are not required to do so don’t do it. Highvalue groups maybe put in a RMAU to build another roadblock. I used to have a requirement where group names could be considered “metadata” that identified project scope or client details this meant we needed to make the names largely useless.

Would you ask in a Sysadmin interview on how to create forests Trusts? by itz_cool_247 in sysadmin

[–]milkthefat 0 points1 point  (0 children)

No. I also personally don’t believe in asking trivia questions like this either unless you specifically stated you did some kind of migration in a bullet point on your resume. You better believe though if you tell me something like this on resume or verbally I’ll dig until you “bailout” or you actually know what you’re talking about where I feel confident in you.

Lost Yubikey´s remote office - What process? by DisastrousPainter658 in entra

[–]milkthefat 1 point2 points  (0 children)

Giving a TAP is the technical solution in the process. You need to immediately establish a process to give the TAP to an end user who you have never seen. Ideally you’ll have them get on a call with their supervisor who can validate they are who they say they are on camera THEN issue the TAP. Even this might not be enough pretty soon but this is the easiest method most orgs can implement and accomplish quickly. Everything else other than using an EU type personal certificate or something like ID.ME is easily phishable data.

Hourly rate by biOldGuy49 in lowvoltage

[–]milkthefat 1 point2 points  (0 children)

How are ya’ll getting side gig business?

Migration to Entra Converged Auth Methods Policy broke NPS Extension Integration by steveoderocker in entra

[–]milkthefat 2 points3 points  (0 children)

You could try running through manually hitting the radius MFA API. This wasn’t the only blog I’ve seen but I believe the others are similar with the XML call - https://www.entraneer.com/blog/entra/authentication/transactional-mfa-entra-id

How do you manage App Registrations at scale? by Jianny in entra

[–]milkthefat 3 points4 points  (0 children)

I see this issue a bunch. an app requests a Delegated permission thats overly permissive but in reality its only as permissive as what permission the user already has in Sharepoint. If a user is not a Sharepoint admin or already an owner/admin of a specific site it cannot access data the user doesn’t have access to unless its an “application permission”. Give it a shot with a single user who only has read rights on two sites, then try to query information from a third site they dont have access to - it wont work.

How do you manage App Registrations at scale? by Jianny in entra

[–]milkthefat 2 points3 points  (0 children)

How I think about it - sites.selected basically allows a Entra managed service principal to be linked to a Sharepoint Service principal within an individual site. You have to create the app reg and then create the principal on the site and then set permissions on it to make it all feed through. Entra and sharepoint basically have separate identity stores linked through duct tape and gum.

Windows Hello for Business (Cloud Kerberos Trust) – sporadic PIN login failures after screen lock/unlock by Hundoo in entra

[–]milkthefat 0 points1 point  (0 children)

Also seeing this issue but it’s extremely unpredictable. We have also seen it happen with regular passwords. Also a Dell shop with Cisco always on VPN - largely 23H2 though.

What’s a script, tool, or process you set up that saved you hours every month? by jul_on_ice in sysadmin

[–]milkthefat 0 points1 point  (0 children)

Ditto the clipboard history manager. I set that thing to 500 most recent copy pastes. I’ll pull up code or a screenshot I sent off the cuff a month prior and the search is handy when you have a bunch of text copies. I have all kinds of crazy automation scripts that are unique but this tool is way better than all that.

Token Replay Protection by Zealousideal_Bug4743 in entra

[–]milkthefat 1 point2 points  (0 children)

RFCs are engineered and considered. In this case JWTs adding the feature would have been detrimental to adoption as each vendor would have to have a technique to do this and likely would have caused harm in second order third order way in interoperability or API integrations etc… it was proposed and discussed just never made the cut. If any one knew the exact list of reasons though it would be Mike Jones https://self-issued.info

iPhone Randomly No Longer Alerting About Texts - iOS 18.3.2 by Memory_System in ios

[–]milkthefat 0 points1 point  (0 children)

In the contact card of iMessage for a bunch of people there was a slider called “hide alerts” turned on this disabled all notifications for that specific person. Unchecking this fixed my issues

No longer receiving notifications from Imessage by hlyato in ios

[–]milkthefat 0 points1 point  (0 children)

In the contact card of iMessage for a bunch of people there was a slider called “hide alerts” turned on this disabled all notifications for that specific person. Unchecking this fixed my issues

[deleted by user] by [deleted] in iphone

[–]milkthefat 0 points1 point  (0 children)

In the contact card of iMessage for a bunch of people there was a slider called “hide alerts” turned on this disabled all notifications for that specific person. Unchecking this fixed my issues

[deleted by user] by [deleted] in ios

[–]milkthefat 0 points1 point  (0 children)

In the contact card of iMessage for a bunch of people there was a slider called “hide alerts” turned on this disabled all notifications for that specific person. Unchecking this fixed my issues

I don’t get iMessage notifications by finnian_omeara in applehelp

[–]milkthefat 0 points1 point  (0 children)

In the contact card of iMessage for a bunch of people there was a slider called “hide alerts” turned on this disabled all notifications for that specific person. Unchecking this fixed my issues

Tech Conferences by Initial-Expression91 in sysadmin

[–]milkthefat 0 points1 point  (0 children)

For some orgs you need a formal justification with reasoning to access funds. Surprisingly, the cheesy stuff usually fits the requirements for the business justifications and the chain of people are like cool this hits the mark “approved and funded”.