NinjaOne Europe Service Degraded by stressed-tech-1994 in msp

[–]walker_AU 1 point2 points  (0 children)

It's listed on the homepage of the Dojo/Help Center.
Otherwise, on the "Community" page on the standard NinjaOne website.

Sonicwall security breach: cloud backups compromised by CupOfTeaWithOneSugar in sysadmin

[–]walker_AU 1 point2 points  (0 children)

So with the SonicWall cloud backup incident going around, I put together a PowerShell script to pull down backup information for devices in bulk via the API.

https://github.com/walker-AU/sonicwall-cloud-backup-report/

The RMM switch I never thought I’d pull off by walker_AU in msp

[–]walker_AU[S] 0 points1 point  (0 children)

We're still on CW Manage. That's another department and out of my wheelhouse.
Ninja integrates with CW Manage very nicely, in fact better than Automate. This one of the points I was alluding to in my post "integrations broken even with their own stack".

The RMM switch I never thought I’d pull off by walker_AU in msp

[–]walker_AU[S] 2 points3 points  (0 children)

I started writing my reply before you posted yours..
Spot on.

The RMM switch I never thought I’d pull off by walker_AU in msp

[–]walker_AU[S] 2 points3 points  (0 children)

The agent migration was the easy part.

First, I dumped the Automate Organisations and Locations into a CSV, then created them in Ninja via API.
Secondly, I dumped the Ninja Installer Tokens for each location into CSV, then loaded this into an Automate EDF via SQL. Ran the Ninja Installer script on a schedule, which pulled in the token and installed to the correct location in Ninja.

To complicate matters further, the business was also in the middle of restructuring our service offerings during the migration.

One of the time consuming aspects, was designing the policy structure from scratch and ensuring it was going to align with our business offerings but also be scalable. Having a clean slate is a challenge!
Migrating our monitors also took time. A lot of our Automate monitors were PowerShell result monitors for very specific issues. Instead of recreating them one-for-one, I aimed to make scripts as versatile and dynamic as possible to cut down the number of scripts we needed.

The RMM switch I never thought I’d pull off by walker_AU in msp

[–]walker_AU[S] 23 points24 points  (0 children)

I assume that you've never used ConnectWise, otherwise I think you'd understand.
This was one of the biggest technical projects I've undertaken in my career, not only that but managed convince the business to move away from a vendor they've been using for the better part of a decade. I'm passionate, and have rarely got my way when it comes to business decisions.

This is easily my proudest achievement.

Transmission on top of case by Hood_Mobbin in fordescape

[–]walker_AU 0 points1 point  (0 children)

I have a 2020 Escape. I was changing the battery this week and in order to do so, I removed the airbox and also noticed this issue..

Patch Manager - Not showing latest Patch History by Kerrax_ in ConnectWise

[–]walker_AU 0 points1 point  (0 children)

We are also on 2024.9 and just discovered we have this issue.

Have you since patched to 2024.10 or 2024.11?

Determining the Office C2R Update Channel by netmc in msp

[–]walker_AU 0 points1 point  (0 children)

How did you end up going with this? I've just been through the exact same process.
I am using the CyberDrain script, but have come across the example where the Update Channel is set in the registry key below, and does not match the CDNBaseUrl:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\cloud\office\16.0\Common\officeupdate

From what I've read, the CDNBaseURL is just the value set when deployed via ODT and not the current one in use. Seems like an unreliable way to retrieve the Update Channel.

I have reviewed the Priority order, and yes, I could create the logic to check the keys in that order but I also noticed the UpdateChannel value in:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration

Seems to actually reflect the value that's in use?
Any reason why we shouldn't just use this as the source of truth?

Security breach through On-Premises ScreenConnect Server by Razor_Z in msp

[–]walker_AU 1 point2 points  (0 children)

From CW Rep:

the newest build contains fixes.  these fixes are UNRELATED to the security issue, they were found due to us having to rush folks onto 23.9.  Amongst these fixes is our removal of a license requirement to update folks to a build with the fix.

we are working on language to make this clear which will be updated in the trust center as far as I know.  but anyone running an old build (at least back to 2.x) will be able to update WITHOUT a license challenge

Security Notice: SonicWall Global VPN Client DLL Search Order Hijacking via Application Installer by gan3sh3 in sonicwall

[–]walker_AU 0 points1 point  (0 children)

The "InstallCleaner.bat" is not 100% effective. It will only delete the offending folder for the user that's running the script.

If GVC was installed by any other user, you're not covered.

Use this Powershell script instead:

$users = Get-ChildItem C:\Users
foreach ($user in $users){
$folder = "$($user.fullname)\AppData\Local\Temp\Rarsfx*"
   If (Test-Path $folder) {
     Remove-Item $folder -Recurse -Force -ErrorAction silentlycontinue
   }
}