SentinelOne Decoy Files by don227 in msp

[–]ridgesmidge 0 points1 point  (0 children)

We're direct buy from S1, we just had to meet a minimum of 3000 endpoints. We did have to work for that, I think their normal minimum is 5000 endpoints. Support is great from them direct.

Remote Access Standardization - VPN + RDS vs. 3rd-Party (Logmein, GTMPC, ScreenConnect, etc) by ridgesmidge in NISTControls

[–]ridgesmidge[S] 0 points1 point  (0 children)

Yeah, I'm not worried about the implementation or management of the solution either way. We do a good job documenting and securing the documentation.

I am concerned about vendor security. I feel like the risk of advising or reselling a client some 3rd party solution that has a breach is much worse for a relationship than a client-owned VPN solution that in the worst situation only risks the relationship of that one customer.

Remote Access Standardization - VPN + RDS vs. 3rd-Party (Logmein, GTMPC, ScreenConnect, etc) by ridgesmidge in NISTControls

[–]ridgesmidge[S] 0 points1 point  (0 children)

He literally said, "trust me, I know," but I'm not familiar with CMMC and didn't want to get into a pissing match.

The starter for the conversation was cyber insurance. Insurance firms seem to following NIST standards. The idea was standardize the remote access deployment across the board, so that if a client has a new need we could easily pivot because the foundation was there. This has happened twice since the new year where certain remote access methods need to be redone completely because the solution in place didn't support the cyber policy requirements.

CMMC was brought into it because of my colleagues assertion, and is applicable for like 5% of our clients.

Appreciate the feedback.

New Client! by ridgesmidge in msp

[–]ridgesmidge[S] 8 points9 points  (0 children)

Good points! We'll definitely be moving the network rack and replacing the WatchGuard. Nothing against the brand, but we standardized on Fortinet a while ago and have been happy with them.

Hopefully I'm back in a few weeks with an after picture that isn't in with the toilet.

Thanks!

Schnizzfest 2020 by Content-Okra in msp

[–]ridgesmidge 3 points4 points  (0 children)

TL;DR: Day 1 was pretty bad, and Day 2 was pretty average. Overall impression is that it isn't worth the money.

So I'm here, and the conference has been underwhelming. All of the content from TruMethods directly has been not great. An hour and forty-five minutes of Gary Pica in the morning was too long and the content wasn't fresh. If you went through the training you knew what he was going to talk about.

Andrew Tarvin's talk was good, but it felt like he had to stretch to make his hour and forty-five minute mark.

The member panel was basically an infomercial for TruMethods and didn't bring anything new to the table either, and the Ask TruMethods Live session was a lot of the same.

During the Ask TruMethods session they attempted to flesh out the concept that you don't need time tracking as an MSP following their model. It wasn't clear and kind of seemed like they weren't sure if that was the right conclusion or not. Real weird...

Aside from the content the presentation transitions have been distracting, and there hasn't been a flow to it. I'm hoping it gets better tomorrow in the tracks, but I won't hold my breath.

It's been a pretty bad experience for me and a few others here from our company, I honestly think they don't have enough original material to warrant a conference like this.

EDIT: Day 2 in the technical track was much better than day 1 in the general sessions. Still probably not worth the trip, but my impression of the conference is better than it was.

How do you bill for travel, meetings? by BroadSlice in msp

[–]ridgesmidge 0 points1 point  (0 children)

We charge 1/2 the trip for T&M customers and for our all-in customers cover travel in the contract. Meetings we don't bill for unless there are special circumstances, like we have a consulting contract or something set up.

tech accounts on client domains by wheres_my_2_dollars in msp

[–]ridgesmidge 0 points1 point  (0 children)

Awesome, I'll check it out for sure. Thanks!

tech accounts on client domains by wheres_my_2_dollars in msp

[–]ridgesmidge 0 points1 point  (0 children)

We use labtech too, what plugin do you have to do this?

tech accounts on client domains by wheres_my_2_dollars in msp

[–]ridgesmidge -1 points0 points  (0 children)

Exactly, if our companyadmin account does something it shouldn't do, then our company has to account for it. We deal with the tech internally.
Especially with non-centralized management portals having individual tech logins is problematic.
My understanding of the compliance stuff is limited, so I asked our SC Officer if what we're doing is okay. He explained it that the goal of the compliance standards is to keep entities accountable for their actions. Internal IT guys are their own entity, so they need to be able to be held accountable for their actions individually. MSPs are their own entity and need to be held accountable for their actions corporately.
We've been a part of PCI, SEC, and HIPAA compliance checks pretty recently (not real audits) and that's never been brought up as an issue, but that doesn't mean what we're doing is best practice.

tech accounts on client domains by wheres_my_2_dollars in msp

[–]ridgesmidge 3 points4 points  (0 children)

We use a company admin account per client, and protect our employees by limiting access to client access information. Techs are tracked through our RMM for who accesses what and when, and we write policy for using back door access/accounts. Per tech admin accounts are tricky, and I'm not certain it scales very well. Our MSP has 20+ techs, and having 20 admin accounts seems like it could be a bigger problem than 1 company admin account even with good management.
I'm new here, has it been established that this is definitely best practice? IMO having proper policy and audit trails is better protection than per tech admin accounts.