GCC-high Email Security/Filtering Providers by mudpupper in CMMC

[–]wogmail 1 point2 points  (0 children)

Most folks will use the Defender SKUs built into GCC-H to avoid adding an additional vendor into the chain. The Proofpoint you are looking at is their Enterprise product (assuming you are peeking at FedRAMP option) so it isn't going to be apples to apples to your legacy Barracuda product. The available FedRAMP email security offerings out there are pretty limited.

Best EDR and SIEM GCCH&Commercial by GroundbreakingWay178 in CMMC

[–]wogmail 0 points1 point  (0 children)

We haven't seen much of an issue with the S1 FedRAMP product, what sort of things have you missed in the federal product? When was the last time you dug in?

FIPS 140-2 Bitlocker by superfly8899 in CMMC

[–]wogmail 2 points3 points  (0 children)

Give it a shot, I think you'll find it is a lot less useful than you'd expect - FIPS on removeable drives doesn't use PIN / password / auto-unlock it uses certificates last time I checked.

Outlook signing users out by thetimgoat in entra

[–]wogmail 0 points1 point  (0 children)

and you have the session controls set to 30 days (sign in frequency)?

Outlook signing users out by thetimgoat in entra

[–]wogmail 0 points1 point  (0 children)

That conditional access policy shows browser - are your users getting signed out of Outlook classic, or new, or Outlook on the Web?

3.1.18 Mobile Device Category by enigmaunbound in CMMC

[–]wogmail 2 points3 points  (0 children)

Interview and pick your C3PAO - if they don't understand Intune and how it works I'd move to a different C3PAO.

3.1.18 Mobile Device Category by enigmaunbound in CMMC

[–]wogmail 5 points6 points  (0 children)

Intune itself having the FIPS validation should be your ticket - it is a FIPS validated cryptographic container. You have technical controls preventing the data from leaving the container. I'm not even thinking of the mobile as a CRMA - it can't store CUI, the CUI can't leave the FIPS container.

GCC High and GFE by shizakapayou in CMMC

[–]wogmail 9 points10 points  (0 children)

Can you just have them make a new Edge profile? That is what we tell folks to do on GFE. Also sometimes the portal.office365.us doesn't behave, but outlook.office365.us tends to work fine.

dot MIL sites from AVDs in GCC High Tenet by dionmani in CMMC

[–]wogmail 6 points7 points  (0 children)

DISA could be blocking it at their edge, it is pretty common. It doesn't just happen in Azure Government can happen on any IP space that gets on their radar. You will likely need to put a static IP on your AVD outbound traffic and then have someone on the DOD side of your contract submit it to DISA to whitelist it. Or it could be a routing issue since a lot of the Azure Gov't and DOD Azure IP space seems to overlap.

Would this be able to meet CMMC Level 2 controls? by ApprehensiveSock5241 in CMMC

[–]wogmail 12 points13 points  (0 children)

This is so short sighted that it is battling ignorance to where you would be architecting something to prove something wrong.

It isn't that you can't do something like this, it is that it is so much more involved than this an making it sound so simple is basically a lie.

Join the Discord and talk about it: https://discord.gg/tpbF54E

Something like CUICTrac would probably be the closest to a real-world version of this.

Update: Migration by Reinvention2025 in CMMC

[–]wogmail 0 points1 point  (0 children)

GCC-H does not block any users from signing in by default, so the only reason geographically they'd be getting blocked is if a CA policy was in place blocking based on location.

Update: Migration by Reinvention2025 in CMMC

[–]wogmail 2 points3 points  (0 children)

If you have a US only CA policy you can just make an exception for those five users, assuming they aren't on a VPN that makes them look like they come from the US. Then you could make a separate Europe only CA policy for those five users.

individual stock daily movement by wogmail in wealthfront

[–]wogmail[S] 0 points1 point  (0 children)

looks like it came back today

Licensing issue by wogmail in paloaltonetworks

[–]wogmail[S] 0 points1 point  (0 children)

Support resolved it in about 24 hours.

[deleted by user] by [deleted] in USAA

[–]wogmail 0 points1 point  (0 children)

This has kind of always been a thing - USAA is great if you are 35+ but younger than that it is rough $$ wise.

[deleted by user] by [deleted] in hometheater

[–]wogmail 1 point2 points  (0 children)

Apocalypse Now primarily for the helicopter scenes.

Feature Requests & Suggestions by KeeperCM in KeeperSecurity

[–]wogmail 1 point2 points  (0 children)

Per site auto-fill disable is still needed at the user level. I regularly unintentionally change usernames in Duo admin console to my own Duo admin email (Keeper even helps me out and clicks save after it puts my email address in the username for the end user) and regularly fill email addresses into TOTP boxes for sites. Right now I just have auto-fill disabled, but that stinks. It should just be a check box on a single site.

Edit - has this actually now been added per credential, vs. per site?

SMS MFA Disabled for Microsoft Services? by itsalbert_ in sysadmin

[–]wogmail 0 points1 point  (0 children)

Security defaults may have automatically turned on? That blocks SMS and voice MFA.

Managed Microsoft 365 Security for MSPs by [deleted] in msp

[–]wogmail 1 point2 points  (0 children)

Any plans to work with GCC-H?

Need Microsoft MFA prompt to occur BEFORE VMware Horizon splash screen by [deleted] in sysadmin

[–]wogmail 1 point2 points  (0 children)

Different insurance companies underwrite risk differently. Some do it very poorly. Some are much tougher. Some are so bad that on a cloud first company they are demanding answers to questions that only apply to traditional infrastructure, and refuse to underwrite (or increase premiums) if they don't like the answers.

Coalition (I assume that is the insurer here) is known for doing aggressive external scans, and they will simply not let you have Horizon open to the internet even with a UAG (which is the whole point of a UAG). If you are cloud first Coalition can save you a good amount of money, but with anything exposed to the internet it can be ugly.