NathanMcNulty Profile Banner
Nathan McNulty Profile
Nathan McNulty

@NathanMcNulty

Followers
16K
Following
68K
Media
5K
Statuses
40K

Loves Jesus, loves others | Husband, father of 4, security solutions architect, love to learn and teach | Microsoft MVP | @TribeOfHackers | 🦋@nathanmcnulty.com

Alaska
Joined June 2009
Don't wanna be here? Send us removal request.
@NathanMcNulty
Nathan McNulty
1 year
Hi, I'm Nathan McNulty 👋. I am here because I enjoy learning and helping others. I feel like I've already accomplished more than I ever dreamed, and I truly want that for everyone else. If you ever find yourself questioning my intent - start there, DM me, or call me out.
23
6
218
@NathanMcNulty
Nathan McNulty
6 hours
RT @Mister_MDM: Wondering why Intune Remote Actions are Fast at First but Slow the Next Day?. On the first day, when a device is enrolled,….
0
31
0
@grok
Grok
2 days
Join millions who have switched to Grok.
85
76
753
@NathanMcNulty
Nathan McNulty
7 hours
So many areas of security are solved problems, and the only reason we see still see them is because there's just too damn much stuff to manage for most places so tyranny of the default wins. Hopefully this stuff just disappears over the next 5 years as orgs replace devices 🙏.
3
0
7
@NathanMcNulty
Nathan McNulty
7 hours
Oh look, another one with a full list of crap that Credential Guard breaks 😎. Love this note provided near the end, great recap though I wish the guidance had been "turn this feature on so you aren't vulnerable" ;).
Tweet media one
@blackstormsecbr
Blackstorm Security
16 hours
Tweet media one
1
0
7
@NathanMcNulty
Nathan McNulty
7 hours
I mean, sure, we haven't all upgraded from Windows 10 yet. but Credential Guard is like almost 10 years old, and it and the ASR rule are so safe to enable that they do it by default now. I guess the best we can do is hope for the organic replacement of devices to catch up :(.
1
0
5
@NathanMcNulty
Nathan McNulty
8 hours
While dumb and a perfect example of "detect the technique, not the tool", this really shouldn't be an issue for anyone at this point (but I know it is. ). Credential Guard and the ASR rule for credential theft have been enabled by default for 3 years and safely blocks all of this.
@Wietze
Wietze
14 hours
Windows Defender blocks any procdump execution referencing "lsass" on the command line (1️⃣). Simply querying lsass' process ID and using this instead bypasses this somewhat naive detection (2️⃣). Even simpler? Use lsass' service name, "KeyIso" 🤷 (3️⃣)
Tweet media one
1
3
28
@NathanMcNulty
Nathan McNulty
9 hours
Endpoint admins then: Ehh, I'm not sure what will break if I try to turn on VBS, not gonna risk it. Endpoint admins now: Hotpatching is here! Oh, it needs VBS? YOLO :D. #IAmAnEndpointAdmin
Tweet media one
0
2
42
@NathanMcNulty
Nathan McNulty
12 hours
Usually I'm pretty bummed that APAC and EMEA get Intune updates before me, but not today! 😅.
@KnightNZ
Steve
13 hours
@IntuneSuppTeam We're seeing issues in multiple APAC tenancies of newly uploaded win32 packages, uploaded via console or PMPC not showing up in the list of applications. If I get the App-ID from the audit log for the app & access the URL with that then it can be accessed.
1
0
4
@NathanMcNulty
Nathan McNulty
13 hours
Doh, I missed wrapping the URL in double quotes. Had stored as a variable when testing. Thanks @ruadams for catching that. Try this instead:. Invoke-MgGraphRequest -Uri "https ://graph.microsoft.com/v1.0/auditLogs/signIns?`$filter=AppId eq '00000002-0000-0000-c000-000000000000'".
0
0
5
@NathanMcNulty
Nathan McNulty
15 hours
RT @dougsbaker: I made a video walking through how I locked down browser usage in my org using Microsoft Edge Management inside the M365 Ad….
0
16
0
@NathanMcNulty
Nathan McNulty
16 hours
If anyone has Seamless SSO enabled and happens to be bored, would you mind running this (remove space after https)? =). Invoke-MgGraphRequest -Uri https ://graph.microsoft.com/v1.0/auditLogs/signIns?`$filter=AppId eq '00000002-0000-0000-c000-000000000000'. Should show SSSO events.
1
2
19
@NathanMcNulty
Nathan McNulty
16 hours
The Defender team slays me every time I see this 😂
Tweet media one
4
1
40
@NathanMcNulty
Nathan McNulty
17 hours
This looks pretty interesting, would be fun to play with if it weren't a bit of a data compliance risk :p. Apparently it will review the agenda and slowly gets more aggressive at calling you out if you don't cover topics in the agenda 😂.
Tweet media one
2
0
2
@NathanMcNulty
Nathan McNulty
18 hours
Fr, I'm lowkey sad this flopped
Tweet media one
2
0
4
@NathanMcNulty
Nathan McNulty
1 day
RT @merill: Love @TechBrandon's session on Finding holes in conditional access policies from @CypherCon. Nice talk that covers some of the….
Tweet card summary image
idpowertoys.merill.net
Identity power user tools for Microsoft Entra admins.
0
3
0
@NathanMcNulty
Nathan McNulty
1 day
RT @ZackKorman: Microsoft isn’t disclosing this so: M365 Copilot allowed users to access files without producing an audit log. All you had….
0
561
0
@NathanMcNulty
Nathan McNulty
1 day
What are you all doing when auditing apps need privileged ReadWrite permissions because there is no Read only permission?. Interestingly, there is a .Read.Directory permission you can consent to, but it doesn't work even delegated. cc: @paulsanders87
Tweet media one
Tweet media two
2
2
18
@NathanMcNulty
Nathan McNulty
2 days
RT @NathanMcNulty: Don't forget your bottle of Elmer's next time you create an offline root CA
Tweet media one
0
8
0
@NathanMcNulty
Nathan McNulty
2 days
RT @Cyberipman: @NathanMcNulty @yuridiogenes @HeikeRitter I'd also like to shout-out John Christopher content here for anybody else looking….
0
1
0
@NathanMcNulty
Nathan McNulty
2 days
Phew, all renewed for another year :p. If anyone is going for any of the Microsoft Security or Endpoint management certs, always feel free to ping me with questions ;)
Tweet media one
20
3
145
@NathanMcNulty
Nathan McNulty
3 days
RT @arekfurt: I honestly think the fundamental reason app control hasn't (yet) gotten widespread traction while EDR has is that big securit….
0
8
0