nwander05 retweetledi
nwander05
14 posts


🧵Let's talk about CIS Benchmarks and how to use them to map to a compliance framework. To do this, we need to do some reading, without an LLM, so we can understand the meaning and intent. We'll use M365 as an example.
The first thing we'll consider here are the CIS Controls. If we read the document, it says that the benchmark, *IN ITS ENTIRETY*, map to CIS Controls version 8 '4.1 - Establish and Maintain a Secure Configuration Process'

English

@Brinkhoff_C Hello Christiaan how do you determine if a USB device is not compatible with Windows 365? We are unable to pass Nuance PowerMic IV devices into Windows 365 for radiology. Previous versions of PowerMic devices pass through to Windows 365.
English

@graypepeat @TomFitton @Microsoft You can use conditional access policies in azure AD to accomplish this
English

@TomFitton @Microsoft fun fact - you can't block countries from trying to access your Active Directory tenant (where your user accounts are stored) in the cloud
seems like that would be a nice feature to have, especially if you don't have any overseas employees
English

ALERT FROM @MICROSOFT: Microsoft has uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States. The attack is carried out by Volt Typhoon, a state-sponsored actor based in China that typically focuses on espionage and information gathering. Microsoft assesses with moderate confidence that this Volt Typhoon campaign is pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises.
Volt Typhoon has been active since mid-2021 and has targeted critical infrastructure organizations in Guam and elsewhere in the United States. In this campaign, the affected organizations span the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. Observed behavior suggests that the threat actor intends to perform espionage and maintain access without being detected for as long as possible.
To achieve their objective, the threat actor puts strong emphasis on stealth in this campaign, relying almost exclusively on living-off-the-land techniques and hands-on-keyboard activity. They issue commands via the command line to (1) collect data, including credentials from local and network systems, (2) put the data into an archive file to stage it for exfiltration, and then (3) use the stolen valid credentials to maintain persistence. In addition, Volt Typhoon tries to blend into normal network activity by routing traffic through compromised small office and home office (SOHO) network equipment, including routers, firewalls, and VPN hardware. They have also been observed using custom versions of open-source tools to establish a command and control (C2) channel over proxy to further stay under the radar.
microsoft.com/en-us/security…
English

@IntuneSuppTeam @AzureSupport @AzureSupport Under Admin center - Settings - Org Settings - Organization Profile you can set Exchange, SharePoint and Teams to be United States of America. Is there a way to add Intune, so our apps are downloaded from United States servers instead of all around the world?
English

@IntuneSuppTeam Is there a way to configure our tenant so it only reaches out to Microsoft's United States datacenter instead of all around the world? Due to Geo policies on the firewall, we have had a lot of issues downloading apps to end user devices
English

@IntuneSuppTeam Hello InTune Support Team,
Any update with this? We use geo fencing to block traffic going outbound to countries we do not do business with and we noticed our applications are downloading from your servers that are outside the United States. Thank you
English

@nwander05 Hi, thanks for the info! Not currently available, though you could leverage Location-based Conditional Access which enables you to control access to cloud apps based on the network location of a user. See: msft.it/6014j4sNO. Let us know if this helps! ^IH
English

@_3NCRYPTD @mniehaus We ran into this. We are decrypting SSL traffic outbound with our Palo Alto firewalls. The certificate must match Microsoft’s, so we excluded Microsoft’s cert to get around this
English

@mniehaus Been stuck on this for two months while on prem. Outside works fine. Countless msft tickets
English

Looks like another one of those days. oofhours.com/2020/11/03/som…
English


