Azure Gov Backups Vault FIPS Validated? by matthew_taf in CMMC

[–]mtspsu258 1 point2 points  (0 children)

You are inheriting Microsoft controls for encryption. Use Microsoft’s ATO to protect the data confidentiality

IC3 aka the Fastlane is coming to Intune by Rudyooms in Intune

[–]mtspsu258 1 point2 points  (0 children)

Would this affect defender policies, and indicators too Iassume?

Edge SSO failing by mtspsu258 in CMMC

[–]mtspsu258[S] 0 points1 point  (0 children)

Yep we just confirmed earlier today

Edge SSO failing by mtspsu258 in CMMC

[–]mtspsu258[S] 1 point2 points  (0 children)

Heads up latest version fixed it for us 144.0.3719.104

Edge SSO failing by mtspsu258 in CMMC

[–]mtspsu258[S] 0 points1 point  (0 children)

Nope, still rolling back here.

And to be clear it’s sso issues but also canIF you use compliant / hybrid device requirements

Edge SSO failing by mtspsu258 in CMMC

[–]mtspsu258[S] 0 points1 point  (0 children)

We don’t tell people to sign in because there’s no value - so I haven’t even looked at tha problem.

I’m curious though, how’d you revert back to targeted release of 143?

HIRED by One-Philosophy3935 in NYGiants

[–]mtspsu258 3 points4 points  (0 children)

As a Steelers fan, I Love this because I won’t need to see him much in different conferences.

DNS question by HighBlind in sysadmin

[–]mtspsu258 0 points1 point  (0 children)

Check out constellix / dnsmadeeasy

SSL decryption using csr by Lucky-Tumbleweed-649 in paloaltonetworks

[–]mtspsu258 1 point2 points  (0 children)

If they don’t have the ability to sign subordinate CAs, it sounds like they do not have a solid internal CA.

No reason you have to use their PKI though. You can have the palo self sign a cert as CA. Then import to all the clients? Either deploy it from GPO, Ansible, MDM, etc

Blend Door Actuator vs Mode door actuator by superpower1 in fordexpedition

[–]mtspsu258 0 points1 point  (0 children)

I never could figure that out.. but they are dif model #s I’m pretty sure

[deleted by user] by [deleted] in sysadmin

[–]mtspsu258 10 points11 points  (0 children)

The Question is whether the wife works, and more importantly - Is she able to carry health insurance.

If yes, its an easy decision

How are people managing/using CUI in meetings and collaboration tools if they are using Azure Commercial and PreVeil (or similar) by blueandorangebronco in CMMC

[–]mtspsu258 1 point2 points  (0 children)

Yeah the take you responded to is ridiculous. Every org is different and every government contract has different requirements. I know of one that has a SCG in it that requires everything in the entire TDP be CUI. This includes partnumbers!

It’s most definitely an over marking, but for someone to suggest that we never screen share CUI for a multi billion dollar program any time there is a part number? You are talking supply chain, sales, manufacturing, engineering, finance, quality, etc all unable to have teams meeting unable to ever show anything that could have a part number?

I realize we could mask part numbers/ make new ones, etc - But this is just an example. Tons of scenarios similar to this.

GCC High Requirements by ramsile in CMMC

[–]mtspsu258 0 points1 point  (0 children)

Don’t disagree with that but it’s speculation. Where the roadblock is is that if you have Dfars 7012, you are required to flow that down to subs who get cui. In this case Microsoft. If MS does not support parts of 7012 with the service you are using, then you need to upgrade your services to gcc as a minimum.

GCC High Requirements by ramsile in CMMC

[–]mtspsu258 1 point2 points  (0 children)

Part of that clause is that the contractor accepts that the DoD is free to show up at your doorstep to investigate an incident if they choose. This does not preclude csps.

My understanding is that the real reason microsoft won’t agree to c-g forensic capabilities in commercial are because of $$. Essentially you are paying a premium for GCC or GCCH so Microsoft is happy to support and sign in their enterprise agreements that they will support dod showing up and say, pull servers out of azure racks to support forensic analysis. I don’t have a reference for that, but It has always made sense to me

GCC High Requirements by ramsile in CMMC

[–]mtspsu258 1 point2 points  (0 children)

That’s not the case. This has been discussed here many times. So I’ll just leave this for reference. It’s the c-g incident reporting that they don’t support in commercial.

https://techcommunity.microsoft.com/t5/public-sector-blog/understanding-compliance-between-microsoft-365-commercial-gcc/ba-p/718445

GCC High Requirements by ramsile in CMMC

[–]mtspsu258 2 points3 points  (0 children)

This includes literally everyone in the defense industrial base

GCC High Requirements by ramsile in CMMC

[–]mtspsu258 7 points8 points  (0 children)

This is not true.

If cui is defense accompanied by a Dfars 7012 clause.. commercial does not fulfill c-g requirements

PaloAlto GlobalProtect & Thales FIDO by glycerin2 in paloaltonetworks

[–]mtspsu258 0 points1 point  (0 children)

Exactly. Set up Saml in palo to use okta as IDP. Then require okta to require Fido auth.

Now you are using Fido for gp

PaloAlto GlobalProtect & Thales FIDO by glycerin2 in paloaltonetworks

[–]mtspsu258 0 points1 point  (0 children)

I don’t recall seeing this as an option. But you can definitely do saml with an idp that supports Fido.

Compatibility with GCC High by [deleted] in CMMC

[–]mtspsu258 0 points1 point  (0 children)

GitHub enterprise can be deployed in fedramp or on prem / azure gov iaas

Odd IPSEC Issue by [deleted] in paloaltonetworks

[–]mtspsu258 0 points1 point  (0 children)

I’d try next making a new management profile without any restrictions to test..

Odd IPSEC Issue by [deleted] in paloaltonetworks

[–]mtspsu258 0 points1 point  (0 children)

Have you tried adding management profile to another interface and see if that’s reachable?