This article is contributed. See the original author and article here.
Citrix has released security updates to address high-severity vulnerabilities (CVE-2023-24486, CVE-2023-24484, CVE-2023-24485, and CVE-2023-24483) in Citrix Workspace Apps, Virtual Apps and Desktops. A local user could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review Citrix security bulletins CTX477618, CTX477617, and CTX477616 for more information and to apply the necessary updates.
This article is contributed. See the original author and article here.
Introducing the New Post-delivery Activities Report in Microsoft Defender for Office 365
Attackers are always evolving to adapt to the newest protections enacted by security teams and the products they rely on. Today, attackers frequently attempt to bypass security tools by sending messages that only become malicious after they have been delivered. This requires a robust post-delivery detection and response mechanism. In this blog, we will explore the evolution of an attack, how Defender for Office 365 provides out of the box post-delivery protection, and how you can see this value for your organization. Today we’re announcing a new report in Microsoft Defender for Office 365 that highlights messages that have been acted upon or moved by Microsoft after they have been delivered to the inbox.
Post-delivery activities
Before diving into this new report, we want to start by covering post-delivery activities – what they are and how they work in Defender for Office 365.
How do attacks land in the mailbox?
Threat actors work on the fact that they can send messages and weaponize them later. Attackers frequently send messages with an inactive URL which won’t be detected at time of delivery, and once the messages have been delivered to inboxes, the URLs are then weaponized. This puts your end users at risk of credential theft and your organization at risk of a widespread attack. Threats can also be reclassified post-delivery, based on this weaponization by attackers.
That’s where Zero-Hour Auto Purge (ZAP) comes in to protect your organization from these types of attacks. ZAP is powered by Microsoft’s advanced security graph to detect and neutralize threats. ZAP is constantly reviewing your messages to identify and neutralize these threats.
How does Defender for Office 365 detect and respond to these attacks?
Microsoft Defender for Office 365 includes ZAP, a post-delivery activity which acts on malicious messages after delivery. Upon identifying a malicious Indicator of Compromise (IoC), ZAP can find all messages in user mailboxes that contain the malicious IOC. Once the messages are identified, ZAP acts on the message based on the specific policy action, securing your end users and your organization. With secure by default, our filtering will keep many potentially dangerous or unwanted messages out of your mailboxes. The secure by default feature enables malware and high confidence phishing messages detected post-delivery to be sent to quarantine by ZAP, with no additional configurations required.
ZAP receives signals from our advanced security graph and utilizes this threat intelligence to remove malicious messages from the inbox, providing out of the box post-delivery protection for all customers. And this isn’t just for Defender for Office 365 customers; we provide ZAP actions for all Microsoft email services, including Exchange Online Protection and even Outlook.com consumer accounts. The quick system-driven actions reduce the exposure time of your end users, securing your organization in a timely and effective way. There is no need for any admin intervention to identify and trigger an action. Upon detection of the malicious content, ZAP removes the message from the inbox.
Post-delivery protection with ZAP
Where can I review messages that were neutralized by ZAP?
With our Microsoft Defender for Office 365 P2 and E5 licenses, you can review messages that are neutralized by ZAP within Advanced Hunting and Threat Explorer. You can learn more here.
Introducing the new Post-delivery activity report
We’ve heard customer feedback that understanding when ZAP took action can be challenging. As a result, we’re happy to announce the launch of a new Post-delivery activity report. The report will display all the ZAP events that occurred in your organization. If the verdict assigned to a message has been changed, the new report will display this updated data, making it easier to investigate the messages.
You can find the Post-delivery activities report under Email & collaboration reports.
Figure 1: Access the Post-delivery activities report under Email & collaboration reports
Figure 2: Post-delivery activities report
From the report, you have direct access to the email entity side panel to review additional information about the message:
Figure 3: Access the email entity summary panel from the report view
Learn more about the report by viewing our documentation.
You can use the following PowerShell cmdlets to access the report information for your organization.
GetAggregateZapReport
GetDetailZapReport
You can learn more about these PowerShell cmdlets here.
If you are part of a Security Operations team or a Cyber Threat Intelligence team, get started by navigating to security.microsoft.com/reports/PostDeliveryActivities, to review the messages we have blocked in your organization post-delivery.
For questions or feedback about Microsoft Defender for Office 365, engage with the community and Microsoft experts in the Defender for Office 365 forum.
This article is contributed. See the original author and article here.
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device.
CISA encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible: • Safari 16.3.1 • iOS 16.3.1 and iPadOS 16.3.1 • macOS 13.2.1
This article is contributed. See the original author and article here.
With the new Global Inventory Accounting Add-in, Microsoft Dynamics 365 Supply Chain Management now supports parallel cost accounting. The ability to perform inventory accounting using multiple costing ledgers enables organizations that do business internationally to easily comply with multiple accounting standards at the same time.
Global organizations face complex accounting challenges
International organizations face a complex accounting challenge when they produce and sell items across many countries. For each item they produce and sell, they must often calculate multiple representations of inventory costs to comply with local generally accepted accounting principles, statutory accounting principles like the International Financial Reporting Standards (IFRS), and internal management accounting practices, even when these directly conflict with one another.
In addition, companies may need to account inventory costings using both a potentially fluctuating local currency and a solid second currency for statutory compliance. Finally, companies may need to use one cost valuation method internally, and a different one for their local country or region.
Parallel cost accounting made easier
A key feature of the Global Inventory Accounting Add-in is its ability to create a single document that applies multiple accounting rules simultaneously based on different currencies, input measurement bases, and cost flow assumptions. With the new multi-ledger functionality, organizations can define as many costing ledgers as they need. Inventory accounting in dual currencies and in dual valuations are both supported.
For example, a subsidiary in a country with a hyper-fluctuating local currency is required by the local government to account and manage inventory in the local currency. At the same time, to comply with IFRS, the subsidiary must also account and manage inventory in a stable currency like USD or EUR. With Global Inventory Accounting, the subsidiary can record and check values in multiple currencies by switching between various predefined ledgers for a specific sales order.
Because Global Inventory Accounting runs as a micro service, it provides inventory statements, valuations, and variance reporting in cloud-hosted environments such as Microsoft Dataverse.
Greater visibility into costs with Power BI reporting
Global Inventory Accounting also enables organizations to analyze their costs in greater detail. Organizations can retrieve informative Power BI reports for further analysis, and use the included templates to generate inventory overviews, inventory statements, and more for cost controllers and managers to analyze costs and make decisions about future changes.
Parallel cost accounting: Behind the scenes
Global Inventory Accounting performs inventory accounting in individual ledgers. Organizations can create as many costing ledgers for each of their legal entities as needed to ensure they can obtain multiple inventory representations. All documents (such as purchase orders, sales orders, transfer orders, and so on) that are posted in a legal entity are accounted in all the costing ledgers that are associated with the entity.
The following diagram shows the composition of a Global Inventory Accounting ledger.
Looking ahead
To empower organizations to achieve compliance while operating internationally, Global Inventory Accounting supports both standard cost and moving average for retail and distribution industries. Future enhancements will target manufacturing companies by adding support for standard cost, moving average, weighted average, first in first out (FIFO), and other calculation methods.
This article is contributed. See the original author and article here.
Today, we got a question where our customer asked that if using ApplicationIntent=ReadWrite with an user with db_datareader permision, the results of DATABASEPROPERTYEX(DB_NAME(), ‘Updateability’) will be affected or not.
In this situation, let’s try to create a business critical database with readscale out enabled and create the following user. Right now, the answer is not affected.
create user UserName with password = 'PasswordX2X3X1!'
alter role db_datareader add member UserName
Once we have established the connection using SQL SERVER Management Studio using this user and execute the query
Recent Comments