How do you find out who made a change to an Active Directory or Builtin Local Group? Which users were added to or removed from a group? When was a group deleted? In this post, we look at Group and Membership change Event IDs, and explore how to use Splunk to find relevant information to aid in your investigations.
We have recently enabled Single-Sign On (SSO) for our Cisco Umbrella dashboard and had to convert the existing, non-SSO accounts to use SSO. What should have been a straight-forward process was greeted with login issues and an inexplicable association with the OpenDNS dashboard. Here is how we secured the accounts and got SSO to work for each of them.
A sensitive, internal meeting was held within Microsoft Teams, and someone had accidentally recorded it. The organizer was extremely unhappy when nobody admitted to it, particularly since any attendee was able to download a copy of the recording. An urgent request to the Office 365 and Information Security teams was put out to investigate. How did we go about in doing so?
FortiManager uses a self-signed, untrusted "Fortinet_Local" certificate by default. Here is how to request and implement a CA-signed one so the "Your connection isn't private"/"This site is not secure" error thrown by your browser goes away.
As an IT Systems Engineer, I am often asked who the Members of particular Active Directory groups are. There are multiple ways to retrieve that information, including LDAP, PowerShell, and the "AD Users and Computers tool". However, did you know that since Windows 7, there is a built-in tool to search Active Directory for Users, Groups, and Computers? Here is how.
A Windows account keeps getting locked out and breaks a business-critical application that is responsible for a large volume of revenue. Angry customers have called into customer service to complain, and your manager has asked you for help. How do you find the source for the lockouts? Here is a comprehensive guide to aid you with resolving the issue. BONUS: Look up when an account was modified, disabled, enabled, unlocked, or had its password reset -- and by whom