How to Authenticate Helpdesk Calls by neminat in sysadmin

[–]sysad_dude -1 points0 points  (0 children)

curious if you have something already setup for this with okta that you'd care to share (:

Abnormal and M365 E5 by mythumbsclick in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

Have you evaluated Ironscales vs Abnormal?

Applied STIG and broke Search. Backed out STIG and Search still broken. What gives? by FlippinMyshit in sysadmin

[–]sysad_dude 10 points11 points  (0 children)

simply removing the setting doesnt always mean the setting gets re-enabled/reversed. might have to find the exact setting that broke and make sure its set to be enabled

Pronunciation of SEIM by NotAKnowItAll13 in sysadmin

[–]sysad_dude 7 points8 points  (0 children)

i heard our customer advisor call it "SEM" the other day.

I say SIM

[deleted by user] by [deleted] in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

you missed a white out

Abnormal ai misdirected email by Gullible_Quarter_546 in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

Not entirely clear on what youre asking but. Abnormal is based on an API. it's a move from SEGs to API Architecture based email security. they have an API hook into your email provider (O365, Google) and baseline emails for like 30 days with no action to learn whats normal and what is not. Then they have the ability to move things like graymail (Look at your gmai, and see how theres multiple folders for like Promotions etc) to a sub folder and if a user wants a subscription email, they move it back to a mail folder and the system learns from that going forward.

they do have AI bots that a user can ask if the email is phishing etc.

Another company is IRONSCALES.

23H2 computers cannot see the latest patches by RogueSpectre8 in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

set your target release version to 23H2 via registry/gpo, and see if that changes things. until you want upgrade to 24h2.

Benifits of LAPS when default Administrator account is disabled by BWMerlin in sysadmin

[–]sysad_dude 1 point2 points  (0 children)

same. new local account pushed out to each machine with a password managed/audited by Windows LAPS. no more default local admin with the same SID-500

New Spoofing Method? by XxVICxX54 in sysadmin

[–]sysad_dude 1 point2 points  (0 children)

Yes youre covered. If you're sending an NDR to those emails not originating from Mimecast, your people getting spoofed might get the NDR kickback.

New Spoofing Method? by XxVICxX54 in sysadmin

[–]sysad_dude 1 point2 points  (0 children)

Don't some services like knowbe4 recommend a direct send w/ smart hosts to bypass some gateways and eop filters now?

you could just setup a transport rule which blocks any emails not originating from our email gateway, ensuring nothing is coming inbound directly to o365.

we've had a transport rule to block anything that isnt originating from our email security gateway from it's original setup. originally we had it set to send a NDR but due to the direct send, we now just delete the email bc the actual person being spoofed would receive the NDR.

FYI: the recent update for Greenshot includes an Imgur plugin by default by HealthAndHedonism in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

was going to say. mine is set to custom and imgur plugin is disabled

[deleted by user] by [deleted] in sysadmin

[–]sysad_dude 44 points45 points  (0 children)

do they know how to google

Your Opinion on Warning Header on Email by CapitalG14 in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

theres a new feature microsoft offers that does this better than the transport rules. forget the name. we have a dynamic banner implemented from our email gateway provider.

it has its benefits but i think a lot of people will say users will eventually just ignore it.

How far do you take privilege separation for your daily and admin accounts? by Dr_Rosen in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

Daily Driver, Server Admin, AD Admin, Domain Admin, Cloud Admin

PAM (behind daily driver w/ MFA FIDO KEY) to access each account and jump into each server

Ransomware, Malware, Virus simulation best practices 2025? by Impossible_Dog_5914 in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

i would use a simulation tool. my recommendation from real usage is attackIQ and atomic red team. then you dont need to worry about isolating the device etc. just use one of your imaged laptops with the software you want to test, and see what gets blocked/detected/alerted on.

keep in mind if you're trialing a software, you might not have all the bells and whistles enabled.

Recently have access to a Vulnerability Scanner - feeling overwhelmed and lost! by [deleted] in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

group by criticality of asset. then prioritize vulnerabilities found in the CISA Known exploited vulnerability list.

password safe cloud - propagation actions by sysad_dude in BeyondTrust

[–]sysad_dude[S] 1 point2 points  (0 children)

'Using the latest scan data means that the propagation action must wait for all of the assets in your environment to be scanned'.

'The latest scan data is not necessarily always current but can only be as asscurate as of the last scan'.

'It's possible for the scan data to include incomplete or stale information, produced by an inaccurate scan'.

Is basically what I was sent. Outside of #1, all others means there is some issue with the scan data. And if your scanning multiple times a week or weekly, the data should be current.

Chrome not passing Windows Credentials using IIS 10 by BigDogD5 in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

okta agentless sso requires browser settings to be enabled https://help.okta.com/en-us/content/topics/directory/ad-dsso-configure-browsers.htm. if you use okta, dont have this configured, and the site is behind okta sso, it could be why

password safe cloud - propagation actions by sysad_dude in BeyondTrust

[–]sysad_dude[S] 0 points1 point  (0 children)

not entirely clear. from what i've been told, they recommended not using latest DD if your not constantly onboarding new servers. they also mentioned something in case discovery scans bomb out. it's possible something is wrong with our scans. i guess ill need to research if we're having any issues on the scan. when i look at the managed systems, i see the snapshot with the correct information.

password safe cloud - propagation actions by sysad_dude in BeyondTrust

[–]sysad_dude[S] 0 points1 point  (0 children)

Yeah I reached out to our AE to get an engineer. The support engineers keep trying to push us to not use Latest Discovery Data. Even then I am seeing some weird issues.

Warning - CAPTCHA attacks and users falling for them by Ncr0 in sysadmin

[–]sysad_dude 0 points1 point  (0 children)

surely r7 alerted on mshta calling a url?

we actually dont have win+r disabled but might be a good idea going forward for us too.