Cybersafety the hard way

I’ve been working in the education sector for almost a decade and after so long a great many things that inform my thinking become assumed, unacknowledged. Some of my greatest revelations have come from describing the things we do, the problems we have and the ways we fix them to folk outside of our wheelhouse. That’s what this post is; it’s a primer on attitudes to technology in schools through the lens of cybersafety....

June 27, 2022 · 9 min · 1909 words · Chris Beattie

Exchange Online mailbox sender restrictions with Azure AD synced groups

I’d love to see current global stats comparing use of Exchange on-prem vs cloud. Surely given the number of recent security disasters, any notion of physical ownership of mailboxes equating to their safety has been well and truly dispelled and only the bravest or most prodigiously-resourced organisations would attempt hosting it themselves. Exchange Online is doubtless the most popular version and would most often be deployed alongside an on-prem Active Directory, yet as soon as AD is in the mix the assumption is that Exchange is on-prem or hybrid....

June 13, 2022 · 3 min · 599 words · Chris Beattie

KB5014754 Certificate Confuddle

In a masterful stroke of irony, within days of me sharing my solution for NPS RADIUS with AADJ devices, itself made necessary because Microsoft doesn’t consider the needs of their cloud-first customers, they made a major change to how certificates work in Active Directory in KB5014754 without considering the needs of their cloud-first customers. This change breaks the mechanism my solution relies on to operate and while there is a workaround, it is only viable until the change kicks in....

June 9, 2022 · 5 min · 995 words · Chris Beattie

I'm in the docs!

So my previous blog around AADJ device certs for RADIUS on NPS gathered some steam. Thank you @jabbrwcky for this inspiring article that shows how to bring NPS into the cloud era with smart solutions like @scepman_ and @RADIUSaaS. https://t.co/5AYb47qMw6 — glueckkanja-gab (@glueckkanjagab) May 25, 2022 It now features in the official documentation of SCEPman, the cloud CA I used in my solution! Intriguing to see how to lift NPS to the cloud era, and great to see clever solutions to all challenges....

May 29, 2022 · 1 min · 143 words · Chris Beattie

Microsoft Virtual Event Presentation

Delighted that the Microsoft education team gave me the opportunity to present some of my recent work to their top schools around the country and thankful for the great encouragement from those that attended. Honestly, the education community is just brilliant – and I’m proud to be a part of it!

May 27, 2022 · 1 min · 51 words · Chris Beattie

Microsoft NPS RADIUS for AADJ devices

Microsoft’s Network Policy Server (NPS) has been running network authentication in the enterprise for decades but is now out of the loop when it comes to a modern cloud-first infrastructure. Using an inventive approach, I show that it is possible to overcome its recalcitrance and get it authenticating Azure AD-joined (AADJ) as well as on-prem AD clients. This is the long-form writeup of the project I presented at Microsoft’s Australia-wide Surface Gold & Lighthouse Virtual Event in May 2022....

April 29, 2022 · 13 min · 2748 words · Chris Beattie

Something New

Everyone too busy trying to survive to spend any time creating something new. –James S.A. Corey Wisdom comes from experience. Experience is often the result of a lack of wisdom. –Terry Pratchett Aside of an excuse to quote Corey and Pratchett, I feel like both of those perspectives are relevant to the notion of writing a blog. Some days it really is just about survival, yet those are often the very ones with the most useful lessons learned, and the temptation is to just rush headlong into the next thing rather than stop to reflect and build on them....

January 13, 2022 · 1 min · 189 words · Chris Beattie

Case Study: HTC's Vuln Shock

Here’s another great PBL case study from my pgcert cybersecurity course, based on this article. In this instance the focus was less on the details of the flaw itself than the circumstances of how it was revealed by the researchers (way too soon) and handled by HTC (way too late). Now, I’m not an expert in the circumstances of this case, but this is a summary of the general points I took from it and successfully presented....

September 6, 2021 · 6 min · 1240 words · Chris Beattie

Case Study: Vulnerable Voicemail

This was a PBL case study in my pgcert cybersecurity course. The problem was outlined in this news article. Essentially at one point mobile providers were using a pre-set voicemail PIN or generating one from a known formula that could be inferred based upon data points such as characteristics of the customer. This would make it a trivial matter to guess a voicemail PIN and access a subscriber’s confidential information....

September 1, 2021 · 3 min · 602 words · Chris Beattie

The case of the red-handed router

These days it’s very common to have a single hardware device on the network acting as firewall / gateway / router / proxy / content filter; great for providing a high degree of security while saving cost. Some providers even offer the boon of a managed automatic update to these devices, which sounds great - I mean, why wouldn’t you want to be automatically patched against a vulnerability as soon as there’s a fix or take advantage of new features as soon as they’re available?...

July 19, 2013 · 5 min · 1054 words · Chris Beattie