So, waking up to leaked credentials can be frustrating. Probably since you do not know how exactly they got leaked. Fortunatly Azure AD have some sugestions on what to do.
This is what it looks like in Azure Identity Protection and how you mitigate the impact:
A very high risk, click the risk to see what it is.
Here you see what it was all about, click on the event to se which user
here you see the user. click on the user to get actions on what to do
Here is what yo can do
Here is what I did to mitigate the event.
I simply requested the user for a password change. Keep in mind that the malware that did this might have stolen all other passwords as well. It might also be active on the target device, så MFA might be something you should consider.
Also have the user change passwords on all other services he uses!
In order to be eligible for the adoption funds you need to have a success plan owner on your success plan and that owner need to be from the customer email-domain.
Here is how you as a PARTNER can do it:
Find the success plan and make sure it is all 100%Click on 1. Business Case and wait for page to load. Then click teams
Make sure you have these roles
If you are missing Success Plan Owner , click add and add him.
Now go back up to the success plan and click the gear icon and Edit members
If you do not see a customer plan owner click add/edit members
Select the customer owner from the drop down list
Now you are ready to submit your offer request. Click on Offers and continue or “Learn more”
Associate the success plan which now has a owner
Attach any aditional files and click submit.
Customer Success Plan Owner now has to approve the project in the fasttrack portal.
If you want to use Microsoft Intune to deploy a MSI file it needs to be signed by a Code Signing Certificate. Most MSI’s from software vendors are signed already, but if you created a custom MSI (e.g. Office 365) by wrapping an EXE then you need to sign that MSI.
Using a MSI will enable Intune to push that software using the MDM channel. All MDM joined PC’s will be able to recieve this software.
Scenario this covers: I want to use Microsoft Intune to deploy apps and exe files to PC’s e.g. Office 2016/Custom Software
Step 2 – Download and Install Windows 7 SDK to get the signtool.exe get the SDK from here: https://www.microsoft.com/en-us/download/confirmation.aspx?id=8279 ->Accept all defaults and do not change anything. It will prompt errors
->Check that you have the signtool.exe in this folder: C:\Program Files\Microsoft SDKs\Windows\v7.1\Bin
Step 3 – Get your certificate exported in a PXF file. and put it in the same folder as your MSI file.
Step 4 – Run CMD as administrator and input this command:
Click Install GeneratorLaunch it and install itClick Start NewSelect 32 bit if a fresh install, if you have 32 bit installed you can not select 64 bit.Feel free to add a lanugageJust click NextRemove stuff you do not wantEnsure you have the right edition or mabye you want to add 64 bit?Of course you want automatic updates. Click nextMake it real silent. Don’t do Auto ActivateNEW: Self signing certificate. Remember to check and generate. If you do not do this there will be a UAC promptCould be anythingGive it a name and click save
Finner ikke lisensene?
-> Sjekk at du har tillatelse på avtalen, trykk på Administrasjon->Mine Tillatelser
I listen nederst på bildet må du finne den avtalen du har kjøpt lisenser på. Ser du ikke den så må du be om tillatelser.
Finner ikke lisensene i avtalelisten din og må få tilgang?
->Be om tillatelse ved å trykke på Administrasjon->Be om tilatelser
Skriv enkelt og greit inn avtalenummeret og huk av på administrator, da får du full tilgang. Teksten kan du skrive selv dersom du føler du trenger det.
You must be logged in to post a comment.