James Robinson | MVP

1.5K posts

James Robinson | MVP banner
James Robinson | MVP

James Robinson | MVP

@SkipToEndpoint

Microsoft MVP - Intune and Windows | Cloud-Native Endpoint Advocate | Neurodivergent Loudmouth | | All thoughts my own |

Brighton, England Katılım Nisan 2022
231 Takip Edilen1.9K Takipçiler
James Robinson | MVP retweetledi
Micke Karlsson
Micke Karlsson@Micke_K_72·
3.10.3 Released. Added Win32 app Install/Uninstall script support and Windows Quality Update Policies. Fixed category import, JSON property order for Git tracking + multiple documentation fixes. See github.com/Micke-K/Intune… for more info
English
1
27
98
7K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
So that's basically the entire point of the OIBID I've added. If the GUID in the description matches, it doesn't matter what the policy name is (which was my first crude implementation). The only thing I'm not doing (cos it's much harder to do) is per-policy settings checks.
James Robinson | MVP tweet media
English
0
0
2
119
Adam Juelich
Adam Juelich@acjuelich·
This is really an awesome solution and it has gotten so easy to implement and support. One thing I'd like to see (unless I missed it) is to specify your own naming convention template so it can match your current structure.
James Robinson | MVP@SkipToEndpoint

🚨#OIB #Windows v3.8 & #OIBDeployer updates! I've just released v3.8 of the Windows OIB, which adds some cool things, as well as squashing a bunch of #community submitted bugs! Most importantly, I'm adding policy tracking through unique "OIBID"s, meaning much more flexible options when it comes to policy management through my OIB Deployer tool! Speaking of which, I've updated that too! A small face-lift (including dark mode!), API call improvements, and the functionality to support the new OIBID checks. Full Windows v3.8 Changelog here: stte.me/oibwin3dot8 Deploy or Update it in your tenant here: stte.me/deployoib To everyone that continues to provide support, feedback, and trust in this little project that's gotten way bigger than I ever thought it would - Thank you. 💛

English
1
0
5
1.3K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
🚨#OIB #Windows v3.8 & #OIBDeployer updates! I've just released v3.8 of the Windows OIB, which adds some cool things, as well as squashing a bunch of #community submitted bugs! Most importantly, I'm adding policy tracking through unique "OIBID"s, meaning much more flexible options when it comes to policy management through my OIB Deployer tool! Speaking of which, I've updated that too! A small face-lift (including dark mode!), API call improvements, and the functionality to support the new OIBID checks. Full Windows v3.8 Changelog here: stte.me/oibwin3dot8 Deploy or Update it in your tenant here: stte.me/deployoib To everyone that continues to provide support, feedback, and trust in this little project that's gotten way bigger than I ever thought it would - Thank you. 💛
James Robinson | MVP tweet media
English
0
8
40
3.6K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@marrrkkkuuu @Mister_MDM Much easier to just deploy a Local Group Management policy to remove anything you don't specifically want in that group out of it anyway rather than relying on compliance.
English
1
0
1
36
Markku Ikäheimo
Markku Ikäheimo@marrrkkkuuu·
@Mister_MDM Great post, never considered this scenario. I’m thinking a custom compliance script to mark non-compliant if any user is detected as a member of the local Administrators group.
English
2
0
1
148
Rudy Ooms
Rudy Ooms@Mister_MDM·
Autopilot Profile Missing: Why Didn’t Enrollment Restrictions Block It? We all have seen it. A device registered with the Autopilot service still ends up with a random computer name and the user being a local admin. The first reaction is usually simple... The Autopilot profile did not apply, so this must be a personal device now. And if personal devices are blocked with MDM enrollment restrictions, it should have blocked the enrollment. Well… not always. Read the @PatchMyPC blog for all the details! #Intune #PatchMyPC #MSIntune #Windows11 patchmypc.com/blog/the-autop…
Rudy Ooms tweet media
English
4
13
45
4.9K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@snr_boost @JenMsft I mean there's plenty of awful things I've seen IT teams do... That's definitely not the behaviour I'd expect to get though. Any colleagues seeing the same thing?
English
0
0
0
23
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@snr_boost @JenMsft Have you run a debloat tool or something, cos "display" should absolutely bring up exactly what you want immediately
James Robinson | MVP tweet media
English
1
0
0
37
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@SwiftOnSecurity So you're saying it's not normal that I know every single setting I've put in my OpenIntuneBaseline? Huh...
GIF
English
0
0
3
81
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
I'm going to go against the grain here and say that the the knee-jerk reaction happening after the #Stryker incident is stupid. All of a sudden I'm seeing tons of security people now shouting that #Intune Multi Admin Approval needs to be deployed, yet for years they've not even considered that a device management platform is a core part of an orgs security posture. What's worse is from my personal experience presenting topics on this exact issue, they've been actively gatekeeping security from your endpoint management teams, creating a horrible siloed culture. Stryker wasn't a critical failure in the endpoint management platform, it was just another Identity-driven attack where the proper attention to controls around least privilege, Conditional Access and authentication enforcement had been poorly implemented. Intune RBAC and Multi Admin Approval provide strong additional layers of security, but both come at a significant cost to day-to-day operational overhead that many orgs are just NOT prepared or set up to deal with. While I'm glad that it's making security folk realise that Device Management IS Security (something I've been banging on about for years at this point), you don't get to suddenly demand implementation of a thing just because you read something on the internet when you haven't done your part in shoring up security gaps. Stop living in a silo, collaborate, engage. Security is everyone's responsibility, and only working together will provide positive outcomes.
James Robinson | MVP tweet media
English
5
3
35
2.3K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@RustySowers That's such dated thinking. The "all eggs in one basket" isn't a problem. It's the siloed nature of properly implementing the tools available that causes breaches. Good luck adequately reducing security gaps in a bunch of products that struggle to talk to each other properly.
English
1
0
1
207
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@deepthought161 Then you may be surprised to know how many orgs are massively siloed, or security teams that gatekeep "security".
English
0
0
1
109
deepthought16
deepthought16@deepthought161·
@SkipToEndpoint They have always been part of security. At least then I talk to my clients I place them as a risk if not given the proper attention
English
2
0
1
133
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
An employer making a decision that you have to enrol BYOD are clueless that BYOD is a service they're providing. If anyone tried to force me to enrol a device for the pleasure of getting bugged in my own time, I'd tell them where to swivel. Everyone else should too.
English
0
0
2
119
BlackRoomSec
BlackRoomSec@blackroomsec·
The last time I discussed BYOD I got TROUNCED in the comments 😂 so maybe now that hacker MG is saying it, it'll make a difference? I carry two phones if I have to. The company is never getting access to any personal device of mine because aside from it being a security risk for me it's also security risk for them given all the toxic shit I have on my computers. Also in lawsuits they get to keep your personal devices so that's never happening.
MG@_MG_

If you use a personal phone/laptop for your work, pay very close attention to this little detail. Iran attackers wipe 200k devices at a company called Stryker. Within those devices appears to be employees PERSONAL devices. The attackers used the company’s MDM software, which is basically IT management software running on everything. It’s an incredibly attractive backdoor to an attacker. I successfully targeted MDM software for several Red Team engagements. It’s… lots of fun :) Anyway, a lot of companies require you to install their MDM software on your personal devices before you can access resources like Corp email. It’s used to keep devices updated, lock things down if they get stolen, etc. The company often promises that they won’t access personal data, erase any personal data, etc. But this is often ONLY POLICY. If a bad actor gains access to the MDM tool, as was the case here, then anything can happen. People should be aware of these risks. I refused to run MDM software on any of my personal devices. The company needs to provide me with hardware if they want that. I personally isolate all corp devices to their own network too. If an adversary can get into the corp laptop, then can then get inside my network… there have been cases of it happening in the past.

English
24
24
173
13.2K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@UK_Daniel_Card @cyber_scrutiny So I've been reliably informed that's actually not the case and personal iOS devices can just be wiped if enrolled. Madness. More fuel on the fire that BYOD should be secured via App Protection without forcing enrolment.
English
0
0
3
23
Haroon
Haroon@cyber_scrutiny·
I've played with MDMs. MDMs cannot access/wipe anything outside Work Profile in the case of a BYOD (both Android & iOS) So in this case devices must have been enrolled as "fully managed" devices in the MDM. This is pretty bad if they were BYODs. Often employees don't know what level of permissions they've granted to their employer's MDM, simply because setting up Work Profiles on each device by the device owner is a bit of a geeky work for noobs. I'll be interested to know if Stryker faces a lawsuit by theie employees if BYODs were wiped via their MDMs @Alph4betSoup
MG@_MG_

If you use a personal phone/laptop for your work, pay very close attention to this little detail. Iran attackers wipe 200k devices at a company called Stryker. Within those devices appears to be employees PERSONAL devices. The attackers used the company’s MDM software, which is basically IT management software running on everything. It’s an incredibly attractive backdoor to an attacker. I successfully targeted MDM software for several Red Team engagements. It’s… lots of fun :) Anyway, a lot of companies require you to install their MDM software on your personal devices before you can access resources like Corp email. It’s used to keep devices updated, lock things down if they get stolen, etc. The company often promises that they won’t access personal data, erase any personal data, etc. But this is often ONLY POLICY. If a bad actor gains access to the MDM tool, as was the case here, then anything can happen. People should be aware of these risks. I refused to run MDM software on any of my personal devices. The company needs to provide me with hardware if they want that. I personally isolate all corp devices to their own network too. If an adversary can get into the corp laptop, then can then get inside my network… there have been cases of it happening in the past.

English
8
2
29
3K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@UK_Daniel_Card @cyber_scrutiny I just managed to actually wipe my test iPhone that I'd enrolled as personal, but it required one key step: Changing the ownership from Personal to Corporate. Their admins were doing something they shouldn't have been doing, and the users would have been notified, too.
English
1
0
3
177
mRr3b00t
mRr3b00t@UK_Daniel_Card·
@cyber_scrutiny Yeah it would be odd to enroll a personal device as a corporate one. Especially as that requires wiping the device to start with before it’s enrolled.
English
6
1
12
896
Stephen Devlin
Stephen Devlin@TheITCloudGuy·
Microsoft Conneced Cache is a fantastic addition to any large network for Windows, Office, Edge updates aswell as Intune App deployments . Really reduces the bandwidth requirements across the organisation. It's just a real shame that Microsoft still have not included Visual Studio updates! Is this on the roadmap @MicrosoftHelps? learn.microsoft.com/en-us/windows/…
Stephen Devlin tweet media
English
1
3
37
4.7K
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@zsattler @ariaupdated Oh for sure, and it wasn't pointed at you. I just can't stand it when security products actively make you less secure, or security teams who don't understand when something is better 😉
English
1
0
2
91
Zach Sattler
Zach Sattler@zsattler·
@SkipToEndpoint @ariaupdated Yep, have tried, and will continue to do so. Would like to use Autopatch and I said I liked the change, this wasn't a complaint against it, just noting an obstacle I've had trying to do so.
Milwaukee, WI 🇺🇸 English
1
0
2
74
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@zsattler @ariaupdated I'd argue that's something to take up with your vendor product rather than Autopatch. That seems like a pretty poor show from them.
English
1
1
4
175
Zach Sattler
Zach Sattler@zsattler·
@ariaupdated I like this Aria, but we've had issues with a security vendor not respecting the Hotpatch build number as a valid fix for certain vulns. All they care about is the build number in the registry and if it doesn't meet that it throws red flags into our alerting, while protected.
English
1
0
2
283