blog.icewolf.ch

Let's talk about IT!
posts - 2078, comments - 295, trackbacks - 0

My Links

Archives

Post Categories

icewolf

Security

Patches, Updates, Applications, Windows, Virus, Trojans
Analyze Azure Active Directory Sign-in Location

Hi All, Azure Active Directory Sign-in Logs is really helpful, when analyzing Sign-in Problems. But it also can be very helpful, when analyzing the overall Sign-ins or looking out for strange behavior. One of the Tips would be th Filter for Location and use the CountryCode and Status of Sucess I have set up Azure Active Directory Diagnostics to save the Sign-In Logs to a LogAnalytics Workspace. Here you can Query the Logs with KQL. Let's search for Logins that come from Outside Switzerland. SigninLogs | where TimeGenerated > ago(30d) | where LocationDetails.countryOrRegion <> "CH" //| where Status.errorCode <> "0" //Not Sucessful Logins | project UserPrincipalName, Status.errorCode, Status.failureReason,AppDisplayName, ResourceDisplayName, LocationDetails.countryOrRegion It's...

posted @ Thursday, May 26, 2022 8:12 AM | Filed Under [ Security Azure ]

Windows Hello for Business - Couldn't turn on the Camera

Hi All, I've been using Windows Hello for Busindess with Face recocnition since a long time on my Surface Laptop 3. This week it stopped working suddently with the Message "Couldn't turn on the Camera". Even the Driver and Firmware Update did not help. The Camera App is working just fine. Also in Teams the Camera works fine. In the End i remved the two Cameras in the Device Manager (devmgmt.msc) and searched for new Hardware. The Camera where added back again and Windows Hello for Business Face recocnition did work again. Regards Andres Bohren

posted @ Tuesday, March 29, 2022 9:20 PM | Filed Under [ Security Windows ]

Protect your Azure SQL Database with Firewall Rules

Hi All, In this Blog Article, i want to talk about how to protect your Azure SQL Databases with Firewall Rules at Server or Database level. Azure SQL Database and Azure Synapse IP firewall rules https://docs.microsoft.com/en-us/azure/azure-sql/database/firewall-configure The Server Level you can find on your Server Object You can also find this when query the master Database --Database: master SELECT * FROM sys.firewall_rules At the Database level use this sp_set_firewall_rule (Azure SQL Database) https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/sp-set-firewall-rule-azure-sql-database?view=azuresqldb-current --Database: db_home_icewolf Select * FROM sys.database_firewall_rules To allow Azure Services add the following -- Enable Azure connections.   EXECUTE sp_set_database_firewall_rule N'Allow Azure', '0.0.0.0', '0.0.0.0'; to add a custom IP or IP Range use these -- Create database-level firewall setting for only IP 0.0.0.4   EXECUTE...

posted @ Saturday, March 19, 2022 9:45 AM | Filed Under [ Security SQL Azure ]

Microsoft Defender for Endpoint

Hi All, In mid January Microsoft Announced, that the Microsoft Defender for Endpoint Plan 1 will be now Included in M365 E3/A3 Licenses. Microsoft Defender for Endpoint Plan 1 Now Included in M365 E3/A3 Licenses https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639 My Account has a M365 E3 License and i can see "Microsoft Defender for Endpoint Plan 1" has been assigned. Overview of Microsoft Defender for Endpoint Plan 1 https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1?view=o365-worldwide I went for the Documentation and Set it up in Micrsosoft Endpoint Manager. Set up and configure Microsoft Defender for Endpoint Plan 1 https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/mde-p1-setup-configuration?view=o365-worldwide I was not sure if i had to choose the Group with the User or the Group with the Computer....

posted @ Saturday, February 5, 2022 9:25 PM | Filed Under [ Security Windows Microsoft365 ]

PFX Certificate Password Recovery Tool (Brute Force)

Hi All, A customer recently could not remember the Password of the PFX File. I was curious and searched for a PFX Password Recovery Tool. I created a PFX with a Password 9 chars uppercase chars lowercase cars numbersspecial caracter Certificate Password Recovery Tool https://7thzero.com/blog/certificate-password-recovery-tool I startet the Tool on Friday 14 January 23:41:41 After about 9 Days there where tested 569'890'000 diffrent combinations. And we're still at 5 Characters. Conclusion: If you have a weak password or know parts of the Password - this might work for you in an acceptable time. If it is a secure...

posted @ Tuesday, January 25, 2022 11:18 PM | Filed Under [ Security ]

Threat Explorer in Microsoft 365 Defender got a refresh

Hi All, I am pretty sure, i did not read anything about this refresh of Explorer in Microsoft 365 Defender (Security Admin Center) ttps://security.microsoft.com/threatexplorer It has also been renamed from "Threat Explorer" just to "Explorer". What i absolutely love about this, is that the default now points to "All email" instead of "Malware" like before. You sill have a lot of Filtering possibilities And also the Chart view has diffrent Filtering options A quick check in the Advanced Hunting shows, that here also were made some changes After a Moment (15-30 Minutes) i was able to execute the Querys again. Regards Andres Bohren

posted @ Tuesday, January 25, 2022 9:05 PM | Filed Under [ Security Microsoft365 ]

Azure AD Signins KQL Query für Legacy TLS

Hallo zusammen, Im folgenden Artikel vom Azure Active Directory Identity Blog wird nochmals darauf hingewiesen, dass ab 31. Januar keine TLS 1.0 und TLS 1.1 Verbindungen mehr möglich sein werden Act fast to secure your infrastructure by moving to TLS 1.2! https://techcommunity.microsoft.com/t5/azure-active-directory-identity/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/ba-p/2967457 Am besten kann man das über ein KQL Query in einem Azure Log Analytics Workspace machen. Wie man so einen einrichtet habe ich bereits hier gebloggt https://blog.icewolf.ch/archive/2020/03/17/integrate-azure-ad-signins-into-azure-log-analytics-workspace.aspx Ihr braucht folgendes KQL Query: SigninLogs | where TimeGenerated > ago(30d) | extend a = parse_json(AuthenticationProcessingDetails) | where a[0].key startswith "Legacy TLS" and a[0].value == "True" | extend LowLTS = a[0].value | project-away a | summarize count() by UserPrincipalName, UserAgent, AppDisplayName | order...

posted @ Wednesday, November 24, 2021 10:13 PM | Filed Under [ Security Azure ]

Beta: Location und App im Microsoft Authenticator anzeigen

Hallo zusammen, Ich bin kürzlich über den folgenden Blog Artikel gestolpert: https://c7solutions.com/2021/10/adding-location-to-azure-ad-mfa Ich habe das in meinem Tenant durchgespielt. In Azure AD Security > Authentication Methods > Microsoft Authenticator auswählen. Dabei ist es wichtig, dass eine Gruppe für den Authenticator aktiviert ist. Holt man sich nun die Einstellungen via Graph Explorer BETA API. Dazu benötigt man die "Policy.ReadWrite.AuthenticationMethod" Berechtigungen. Die kann man allenfalls im "Modify Permissions (Preview)" Tab gewähren. https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy/authenticationMethodConfigurations/microsoftAuthenticator Die Antwort kopiert man nun nach oben und wählt bei der Methode "PATCH" aus. Die Eigenschaft "displayAppInformationRequiredState" habe ich von "default" auf "enabled" verändert. Beim Anmelden sieht die Meldung nun anders aus. Man sieht die App und...

posted @ Monday, November 1, 2021 3:48 PM | Filed Under [ Security Azure ]

Multifactor Authentication and Passwordless for Microsoft Account

Hallo zusammen, Heute gab es einen ziemlichen Wirbel, weil Microsoft Passwordless für Microsoft Accounts angekündigt hat. Dabei wird das Passwort komplett entfernt. Introducing password removal for Microsoft Accounts https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-password-removal-for-microsoft-accounts/ba-p/2747280 Zuerst meldet man sich bei seinem Microsoft Account an https://account.live.com. Unter Sicherheit > Zusätzliche Sicherheitsoptionen können die Einstellungen verwaltet werden. Als erstes aktiviere ich die Zweifaktorautentifizierung Nun startet ein Wizard Den Wiederherstellungscode sollte man an einem sicheren Ort aufbewahren. Vorzugsweise ein Passwortmanager. Ein App Kennwort ist für die Outlook App nicht erforderlich. Die Erklärungen sind hier meiner Ansicht nach etwas zu ungenau. Auch funktioniert Modern Authentication ohne Probleme mit Outlook 2016 / Microsoft 365 Apps for Enterprise. Zweifaktor oder Multifaktor...

posted @ Wednesday, September 15, 2021 10:48 PM | Filed Under [ Security Windows ]

Secure Remote Desktop Connections with Certificates

Hallo zusammen, Ich habe mich kürzlich mit den Remote Desktop Zertifikaten bschäftigt. Wenn man eine interne Certificate Authority (CA) hat, so ist der Empfohlene Weg in der CA ein neues Zertifikatstemplate anzulegen und dieses mit einer GPO beispielsweise an die Server zu verteilen. Using certificates in Remote Desktop Services https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn781533(v=ws.11) Eine gute Zusammenfassung der möglichen Szenarien gibt es hier Remote Desktop Connection (RDP) - Certificate Warnings https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/remote-desktop-connection-rdp-certificate-warnings/ba-p/259301 Ich gehe hier aber mal noch einen anderen weg. Schauen wir uns erstmal die Default Konfiguration an. Grundlagen Bei der Installation wird ein Self Signed Zertifikat angelegt und im Zertifikatsspeicher unter Local Computer\Remote Desktop\Certificates abgelegt. Der Hash des SelfSigned Certificates ist...

posted @ Saturday, July 3, 2021 11:38 AM | Filed Under [ Security Windows ]

Full Security Archive

Powered by:
Powered By Subtext Powered By ASP.NET