User Profile
EtienneFiset
Brass Contributor
Joined 3 years ago
User Widgets
Recent Discussions
Monitoring copied files on External drive - USB
Hello Guys, i struggle to find a way in Defender for EPP or other solutions to monitor when a user copied files on an external peripheral such as hard drive and USB. Some one have the procedure or documentation ? NOTE : Defender timeline could see when a user is plugging a USB stick. but that's... Thanks !SolvedHow to get the Protection History from a device
Hello, I would like to get the Protection History without the user intervention. I don't understand why is not in the device page in Microsoft 365 Defender initially... I tried to find a way to doing it in the Advanced hunting, but it's new for me, if some one have the command, thanks in advance. I tried with the Live response, but you can only use the CMD(Is it a way to initiate the Live response with Powershell ?) run a powershell script and tried to get the output file, but i got every time the error : Empty file, even if i doing a -outfile with my PP script and tried to get this specific file... Someone can help me please 🙂 ? Thanks1.9KViews0likes3CommentsRe: Failed to create object ID in Intune for new onboarded device.
Thank you for all of the information. All of these steps was done. The only question i have is what to do when you have a problem with this : service connection point (SCP) ? FYI, i have found the root cause of my issue. It's was that the AWS machine wasn't recognized as a normal server but as a Domain controller due to a misconfiguration. After enabled the DC enforcement in XDR, the server was able to be onboarded correctly in MDE.19Views0likes1CommentDefender console - Disabled Connected to a custom indicator & Connected to a unsanctionned
Updated - November 2024 I have found a way to disabling these annoying alerts. Look for the solution above. Issue: I want to know how I can disable these two following alerts : Disabled Connected to a custom indicator Connected to an unsanctioned blocked app Those alerts type needs to be enabled or disabled on demand, like the other alerts types. Why's that : Description of the workload : When we block(Unsanctioned) an application through Defender for Cloud apps. It creates automatically the indicators to Defender XDR. When someone for example click or go the URL related to the application, the following alerts will be triggered. When an indicator is automatically created through that, it checks the box to generate alert when the indicator is triggered. We would like to automatically uncheck the box or disable to alerts describing. Possible to disable the custom alert in setting ? No. Why ? Explanation : You cannot suppress "custom detection". But, they are categorized as "Informational" and you can suppress severity alert type. Solutions : IMPORTANT: Make sure to create a transform rule to not ingest this alerts in Sentinel. That could increased the Resolved incident ingestion and false your SOC optimization reports. The rule is automatically close only the “Informational” alerts with the specified titles. Other Informational alerts with different titles will not be affected. In the Defender XDR setting->Alert tuning->Create this rule: Here's an example: Rule Analysis From the updated rule configuration screenshot, it appears that you’ve set up a filter in the AND condition to only automatically close Informational alerts that do not match specific alert titles (e.g., “Malware was detected in an email message,” “unwanted software,” “malware,” “trojan”). This approach should ensure that the rule closes all Informational alerts except those that contain these specified titles. Here’s a breakdown of how it’s working: 1. Severity Filtering: By setting Alert severity to Informational, only Informational alerts are considered. 2. Title Exclusion: Adding Not equals conditions for each title you want to exclude prevents this rule from affecting those specific alerts. So, any Informational alert with a title that does not match the specified exclusions will be automatically closed. This setup should effectively allow you to close all unwanted Informational alerts while retaining visibility on any malware or security-related Informational alerts that require further review. Regards,Failed to create object ID in Intune for new onboarded device.
We are deploying Defender for Cloud with XDR onboarding. We are implementing Defender policy with Intune enforcement setting, everything is working for 98% of devices as well. But, for some devices like Arc enabled machines, after going through each step and Microsoft troubleshooting documentation. Some devices are not able to create the synthetic object in Intune to receive Defender XDR policies. No solution is provided in the documentation or in MDEclient parser. In the onboarding workflow, the synthetic object is normally created to apply the policy via Intune. But, when a device fails this process, we have no solution even after re-onboarding.Solved48Views0likes2CommentsFailed to create object ID in Intune for new onboarded device.
We are deploying Defender for Cloud with XDR onboarding. We are implementing Defender policy with Intune enforcement setting, everything is working for 98% of devices as well. But, for some devices like Arc enabled machines, after going through each step and Microsoft troubleshooting documentation. Some devices are not able to create the synthetic object in Intune to receive Defender XDR policies. No solution is provided in the documentation or in MDEclient parser. In the onboarding workflow, the synthetic object is normally created to apply the policy via Intune. But, when a device fails this process, we have no solution even after re-onboarding.SolvedRe: How do I run a local Script using my local Azure Cli installation
balasubramanimWow, simple as *** i though i was needed to specify the path or upload the file in Azure. Thanks. Note: i have SA on the sub and RG in Azure and sign-in with az login before. I'm getting this error now :392Views1like2CommentsHow do I run a local Script using my local Azure Cli installation
Could be a stupid question, but didn't found anywhere to information. I'm trying to run a local script to Azure CLI on Mac and i didn't find the correct path or command for that. Is it a way to do that ? Local script on Desktop and run Az -Solved442Views0likes6CommentsRe: How to deleting a registry key
Hi guys, yes i had look through Live response and i found it really limited overtime. I know i can create a powershell script and uploading it through Live response, but it's not working super good. If we don't have the possibility to doing through Defender, that will be an important feature to add. And it's possible to undo a remediation for a registry key but not the opposite with Live response..452Views0likes1CommentZapped - AIR investigation failed
Hello, We had some AIR related to zapped malicious email, but all the steps in the investigation log are failed. And I don't find any way to restarting it or what I can do to fix it ? Note : I know i can go in threat explorer and create a manual remediation/investigation. But after 10 AIR failed like that, i suppose that this functionality has an issue and need to be fixed. The automated zero-hour purge is important. ThanksRe: Enable RDP to take remote of Intune managed devices, Firewall blocking the connection
GerardoHernandez Hey guys, we fixed our issue with the create of a new group to apply for a new Defender firewall policy accepted this : "The firewall allows RDP connection only with the private network or with the same domain via NTLMv2 authentication." So need to turn on 2 profile through firewall as private network and domain accepting the outbound connection through NTLMv2 or your own config.38KViews0likes0CommentsEmail flow between specific region/international
Hey Guys, I would like to know if it is possible for a large multinational to choose where the email workflow will pass. Example: We work in the USA/Canada and on the old continent. If we have employees in India and EU, we would like when communicating via email for a customer in Australia or near China that the emails do not transit to the Microsoft Singapore data center. Is it a way to doing that ? Best regards !Solved584Views0likes1CommentRe: Monitoring copied files on External drive - USB
Thanks for that ! For the ultimate goals of this, here's what I found: The goal of monitoring this kind of activity obviously relates to a DLP strategy. So in our case, we are managing devices in Intune and have Defender E3/E5 licenses. So, for other people who have the same type of IT setting, you can use Microsoft Purview->Insider Risk management to be more efficient in this type of use case. But, for a temporary solution you can use the Advanced hunting section to investigation with the query above and in the TimeLine for Plug and play device/USB/External/thunderbolt log event type.11KViews2likes0Comments