<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.jp/blogs/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog</title><description>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog</description><link>https://www.brocent.jp/blogs</link><lastBuildDate>Tue, 21 Oct 2025 08:39:08 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices]]></title><link>https://www.brocent.jp/blogs/post/ech0raix</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/NAS_Storage_Generic.jpg"/>In a report published Tuesday, Palo Alto Network Unit 42 researchers said the new variant of eCh0raix exploits a critical bug, CVE-2021-28799 – an improper authorization vulnerability]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mqPAtjQ4Q9WPNReMFLB7Kw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xuabfDB3TySM7w0KO5qKtg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_po8Ao24CRpKe9lV86uCAmg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_po8Ao24CRpKe9lV86uCAmg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_PKw96TWvRY-_ENKZccg5jg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PKw96TWvRY-_ENKZccg5jg"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices</span></span></h2></div>
<div data-element-id="elm_RXMdNytMQJ-D-uKlDEE2IQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RXMdNytMQJ-D-uKlDEE2IQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">Operators of the nearly-year-old eCh0raix ransomware strain that’s been used to target QNAP and Synology network-attached storage (NAS) devices in past, separate campaigns have, gotten more efficient. According to researchers, both have put out a new variant that can target either vendors’ devices in a single campaign.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">In a&nbsp;report&nbsp;published Tuesday, Palo Alto Network Unit 42 researchers said the new variant of eCh0raix exploits a critical bug,&nbsp;CVE-2021-28799&nbsp;– an improper authorization vulnerability that gives attackers access to hard-coded credentials so as to plant a backdoor account – in the Hybrid Backup Sync (HBS 3) software on QNAP’s NAS devices.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">HBS is used for backup, restoration and synchronization between local, remote and cloud storage spaces. On April 21, users of devices marketed by the Taiwanese vendor – Quality Network Appliance Provider (QNAP) –&nbsp;began to report attacks&nbsp;that, it turned out, abused this same flaw. Hundreds of users were extorted, as Bleeping Computer reported at the time.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:20px;color:rgb(0, 0, 0);font-weight:700;">Timeline</span></p><p><span style="font-size:20px;color:rgb(0, 0, 0);"><br></span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">As far as unit 42 can determine, there’s been no analysis yet of malware samples that would show eCh0raix ransomware targeting Synology devices before this. “Instances of Synology devices infected by eCh0raix have been reported from as far back as&nbsp;2019,&nbsp;but the only&nbsp;previous research&nbsp;connecting the Synology attacks to eCh0raix actors is based on decryptors that were found,” they elaborated.</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">The first time that Unit 42 researchers saw this dual-vendor variant was September 2020. Maybe the combined variant was authored at that time and the attackers had separate code bases to target the vendors’ devices in separate campaigns before that, they suggested: a hypothesis that’s confirmed by the new variant’s project name, as revealed in compilation paths in GoLang binaries: “rct_cryptor_universal” (/home/dev/GoglandProjects/src/rct_cryptor_universal).</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);">“Prior samples of eCh0raix use the project name qnap_crypt_worker,” researchers pointed out. Between June and September 2020, they did see other eCh0raix samples using that rct_cryptor_universal project name, but September 2020 was when they first saw a full-blown sample with two separate code flows.</span></p><h2 style="font-weight:700;"><p style="font-size:16px;"><br></p></h2><h2 style="font-weight:700;"><span style="color:rgb(0, 0, 0);font-size:20px;">Cover Your NAS</span></h2><h2 style="font-weight:700;"><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);font-weight:400;">Unit 42 passed along these best practices for protecting home offices from ransomware attacks:</span></p><p style="font-size:16px;"><span style="color:rgb(0, 0, 0);font-size:15px;font-weight:400;"><br></span></p><ul><ul><li><span style="color:rgb(0, 0, 0);font-size:14px;font-weight:100;">Update device firmware to keep attacks of this nature at bay. Details about&nbsp;updating QNAP NAS devices&nbsp;against CVE-2021-28799 can be found on the QNAP website</span></li><li><span style="color:rgb(0, 0, 0);font-size:14px;font-weight:100;">Create complex login passwords to make brute-forcing more difficult for attackers.</span></li><li><span style="color:rgb(0, 0, 0);font-size:14px;font-weight:100;">Limit connections to SOHO connected devices from only a hard-coded list of recognized IPs to prevent network attacks that are used to deliver ransomware to devices.</span></li></ul></ul></h2></div>
</div><div data-element-id="elm_Vjg9pCXsitW-0Il28iD9MQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Vjg9pCXsitW-0Il28iD9MQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/BLOG_PHOTO/NAS_Storage_Generic.jpg" size="original" data-lightbox="true"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 11 Aug 2021 00:08:35 +0000</pubDate></item><item><title><![CDATA[EXPANDED STATE OF EMERGENCY IN JAPAN]]></title><link>https://www.brocent.jp/blogs/post/JP-COVID-AUG</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/COVID-19-JP-AUG.png"/>On July 30, the Government of Japan declared that the State of Emergency currently in effect in Tokyo and Okinawa will be expanded to also cover the prefectures of Chiba, Kanagawa, Saitama and Osaka from August 2 to August 31.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mQEILMmbQE20U7EFOM3gsw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iU_m6VbWTAyPG23c6wLV7A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eHK-lFQzSqqL8RaNjmUUmQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tc_yTFwKT-adTH_6YzHE2w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tc_yTFwKT-adTH_6YzHE2w"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;">EXPANDED STATE OF EMERGENCY IN JAPAN</span></h2></div>
<div data-element-id="elm_idXWlmomTlCDY7d7ItPoWQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_idXWlmomTlCDY7d7ItPoWQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:12pt;"><span style="font-size:15px;color:rgb(0, 0, 0);">On July 30, the Government of Japan declared that the State of Emergency currently in effect in Tokyo and Okinawa will be expanded to also cover the prefectures of&nbsp;Chiba, Kanagawa, Saitama and Osaka&nbsp;from August 2 to August 31. The State of Emergency for Tokyo and Okinawa will also be extended until August 31.</span></p><p style="margin-bottom:12pt;"><span style="font-size:15px;color:rgb(0, 0, 0);">Residents are requested to refrain from unnecessary and non-urgent outings as much as possible, including during the day and especially after 8PM. Restaurants and other entertainment establishments are required to stop serving alcohol entirely and to close by 8PM.</span></p><p style="margin-bottom:12pt;"><span style="font-size:15px;color:rgb(0, 0, 0);">Quasi-emergency measures will also apply to the prefectures of&nbsp;Hokkaido, Ishikawa, Kyoto, Hyogo and Fukuoka&nbsp;from August 2 to August 31.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">For more information on the state of emergency, please visit&nbsp;<a href="https://corona.go.jp/en/" target="_blank">https://corona.go.jp/en/</a></span></p></div>
</div><div data-element-id="elm_L6yMtO3s4FwMd-vogdguNw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_L6yMtO3s4FwMd-vogdguNw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/BLOG_PHOTO/COVID-19-JP-AUG.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 02 Aug 2021 00:34:02 +0000</pubDate></item><item><title><![CDATA[Microsoft Stores for Business and Education Ending in 2023]]></title><link>https://www.brocent.jp/blogs/post/New_MS_Store</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/MS_STORE.png"/>Microsoft on Wednesday announced plans to end the online Microsoft Store for Business and Microsoft Store for Education in the "first quarter of 2023," per a Microsoft document on the topic.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_DaTF9WgLTAWeWorl7WhHFA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wOhlQ2H2TYmzultuEYdA2g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ibwTR5EBSpKOM9g39cIt1w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_EEaza05KSW-N2xyZLchSJQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EEaza05KSW-N2xyZLchSJQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:24px;">Microsoft Stores for Business and Education Ending in 2023</span></span></h2></div>
<div data-element-id="elm_eqQDVz5zTfenuKJAqutk8A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eqQDVz5zTfenuKJAqutk8A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-weight:700;"><span style="font-size:15px;color:rgb(0, 0, 0);">About the Author</span></p><p style="font-size:16px;"></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong></strong><a href="mailto:kmackie@1105media.com" target="_blank">Kurt Mackie</a>&nbsp;is senior news producer for 1105 Media's Converge360 group.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft on&nbsp;Wednesday announced&nbsp;plans to end the online Microsoft Store for Business and Microsoft Store for Education in the "first quarter of 2023," per&nbsp;a Microsoft document&nbsp;on the topic.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">These stores are different from the commercial Microsoft Store online application repository, which is currently undergoing a revamp. Microsoft Store for Business and the Microsoft Store for Education are used by businesses and schools to distribute applications to end users. Those applications might include private line-of-business apps or public apps that were customized by an independent software vendor.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><span style="font-weight:bold;">The Shift to Windows Package Manager</span><br> Instead of using the Microsoft Store for Business and Microsoft Store for Education application repositories, Microsoft wants organizations to shift to using the Windows Package Manager and Microsoft Intune, or another "unified endpoint management (UEM) solution," to get their apps.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Windows Package Manager is a command-line tool,&nbsp;released as version 1.0 in May. It's used to install apps by sending text commands, either via the PowerShell console or a&nbsp;Windows Package Manager Client terminal. Windows Package Manager fetches apps that are housed in the&nbsp;Microsoft community repository.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Back in May, Microsoft had explained that Windows Package Manager, which is Microsoft's first "native" application installer, wasn't replacing the "Windows Store" (the old name for the Microsoft Store). It's not a store replacement because Windows Package Manager just has a text interface and doesn't have the ability to show marketing information.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft's Wednesday announcement indicated that it'll be possible for organizations to use the Microsoft Store for Business and the Microsoft Store for Education to get "free apps" until the 2023 end date. Microsoft had already killed off the use of those stores to get apps that need to be purchased, which happened back in April.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">"Starting April 14, 2021, all apps that charge a base price above free will no longer be available to buy in the Microsoft Store for Business and Education," Microsoft's document had explained. The document added that apps already purchased will continue to run, but additionally licensing can't be bought.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft's plans to scrap these stores aren't wholly a surprise as they were described&nbsp;about a year and a half ago&nbsp;by veteran Microsoft reporter Mary Jo Foley.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><span style="font-weight:bold;">Windows Package Manager Integration Milestones</span><br> Microsoft wants users of the Microsoft Store for Business and the Microsoft Store for Education to shift to using the Windows Package Manager tool, which will be integrated with Microsoft Intune or another UEM.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Currently, the integration work is still a work in progress for Microsoft. The announcement described the following "milestones" to that end:</span></p><ul><li style="margin-bottom:5px;"><i><span style="font-size:15px;color:rgb(0, 0, 0);">Windows Package Manager v1.0: generally available</span></i></li><li style="margin-bottom:5px;"><i><span style="font-size:15px;color:rgb(0, 0, 0);">Intune integration with Windows Package Manager service, your private app repository, and the new Microsoft Store: Public Preview (Expected H1 2022)</span></i></li><li style="margin-bottom:5px;"><i><span style="font-size:15px;color:rgb(0, 0, 0);">Intune integration with Windows Package Manager service, your private app repository, and the new Microsoft Store: General availability (Expected H2 2022)</span></i></li><li style="margin-bottom:5px;"><i><span style="font-size:15px;color:rgb(0, 0, 0);">Retirement of Microsoft Store for Business and Education for Windows 10: expected Q1 2023</span></i></li></ul><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft's announcement included an FAQ section to clarify this rather confusing announcement. Essentially, the shift toward Windows Package Manager is just happening for users of free applications.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">If organizations have installed Windows Store for Business or Windows Store for Education apps (free or paid), then those apps will continue to run "as long as the app is not removed from the device."</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><span style="font-weight:bold;">New Microsoft Store</span><br> Microsoft had described building a new Microsoft Store in&nbsp;this June 24 post. It will be arriving at some point for Windows 10 and Windows 11 devices. The new store isn't available for buying apps right now, but it's already described at&nbsp;this landing page.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The new Microsoft Store will have improvements to help users find applications. It'll be friendly to developers that offer their apps through install links on their Web sites. In such cases for Microsoft Store apps, a pop-up installer will appear when people click on the Web site link.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The new Microsoft Store will be capable of housing all types of applications, including the older Win32 (Windows 7-era) apps. Here's what it can hold, per the June 24 post:</span></p><blockquote style="margin-bottom:25px;vertical-align:top;font-style:italic;font-size:16px;"><p><i><span style="font-size:15px;color:rgb(0, 0, 0);">Starting today, Windows developers can publish any kind of app, regardless of app framework and packaging technology -- such as Win32, .NET, UWP, Xamarin, Electron, React Native, Java and even Progressive Web Apps.</span></i></p></blockquote><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft also is giving developers a break if they use their own commerce platform to monetize their apps. In such cases, apps can be housed in the new Microsoft Store without any fee.</span></p><p></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The new Microsoft Store is apparently at the preview stage right now. Its commercial-release timing wasn't described.</span></p></div>
</div><div data-element-id="elm_qKu4IT4F86AerwFrULg9rQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_qKu4IT4F86AerwFrULg9rQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/BLOG_PHOTO/MS_STORE.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Thu, 29 Jul 2021 00:27:10 +0000</pubDate></item><item><title><![CDATA[Indonesia Customs has updated new regulations]]></title><link>https://www.brocent.jp/blogs/post/Indonesia_Custom_Rule</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/INDONESIA_OFFICE.png"/>The Indonesia Customs has updated new regulations and the changes will be effective from 1 August, 2021. To prevent any shipment delays to and from Indonesia, we have summarized the key points for you to take note of.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_vC72bvLVSCamqI1y55An0g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lWTiyQQSSt-rNITmaErWrw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zrz5BkQ0QsW_-Q3oLhLVeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_zrz5BkQ0QsW_-Q3oLhLVeQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VaxBHFyjTo6CpwetbOMdKQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VaxBHFyjTo6CpwetbOMdKQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;">Indonesia Customs has updated new regulations</span></h2></div>
<div data-element-id="elm_HS6YjgEGSpWcPWRN7EHfug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HS6YjgEGSpWcPWRN7EHfug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">Dear Valued Customer,</span></div>
<p style="text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">The Indonesia Customs has updated new regulations and the changes will be effective from 1 August, 2021.&nbsp; To prevent any shipment delays to and from Indonesia, we have summarized the key points for you to take note of.&nbsp;</span></div>
<p style="text-align:left;"><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">What this means for you</span></div>
<p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">1. The Indonesian tax ID number or NPWP (Nomor Pokok Wajib Pajak) is now mandatory for import and export shipments.&nbsp;</span></div>
<p style="text-align:left;"><span style="color:rgb(0, 0, 0);">This is mandatory for all transactions and parcel types except documents.</span><br></p><p style="text-align:left;"><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">For businesses, companies in Indonesia must provide the Indonesian Tax ID Number or NPWP when importing or exporting shipments.</span></div>
<p style="text-align:left;"><span style="color:rgb(0, 0, 0);">For personal shipments, you are required to provide the Indonesian Tax ID Number or NPWP as well. If that information is unavailable, these are alternative information you may provide in place of that.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">•Indonesian ID Number (NIK - Nomor Induk Kependudukan) for Indonesian Nationals</span></div>
<div style="text-align:left;"><span style="color:rgb(0, 0, 0);">•Indonesian Driver’s License, for Indonesian Nationals or Foreigners</span></div>
<div style="text-align:left;"><span style="color:rgb(0, 0, 0);">•Passport Number, only for Foreigners</span></div>
<p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">2. Provide complete and accurate commercial invoice</span></div>
<div style="text-align:left;"><span style="color:rgb(0, 0, 0);">Ensure that all relevant accompanying documents such as the commercial invoice is complete and accurately filled.&nbsp;</span></div>
<p style="text-align:left;"><br></p><div style="text-align:left;"><span style="color:rgb(0, 0, 0);">3. Have the recipient's contact details ready&nbsp; &nbsp; &nbsp;</span></div>
<div style="text-align:left;"><span style="color:rgb(0, 0, 0);">If you are shipping to Indonesia, please ensure you have the receiver's contact details, such as a valid email address or phone number.&nbsp; This ensures delays can be minimised if the recipient's details are required upon customs clearance by the local DHL team.&nbsp;</span></div>
<p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><div style="text-align:left;"><br></div>
</div></div><div data-element-id="elm_uezp2jPastzkbLj9I12sXQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_uezp2jPastzkbLj9I12sXQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/BLOG_PHOTO/INDONESIA_OFFICE.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 27 Jul 2021 02:01:18 +0000</pubDate></item><item><title><![CDATA[IT Field Service Impact, Typhoon In-Fa hits Chinas coast]]></title><link>https://www.brocent.jp/blogs/post/IN-FA-TYPHOON</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/BLOG_PHOTO/TYPHOON2.jpg"/>#BROCENT IT Field Service is being Impacted by the Typhoon In-Fa, that starts on 7/26 till 7/30 - the FTE Service, TOKEN Dispatch Service, PTE Service and Professional Service Onsite Deployment.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eGUQJAIFREy7aUd5uERRaA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kkAgWdOITZGI7KpO5D20NQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_4swx_2HGSvCg0NeenAKPGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_VqoPejjNSMmWHUxcznisXQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VqoPejjNSMmWHUxcznisXQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-left " data-editor="true"><span style="color:inherit;font-size:20px;">IT Field Service Impact, Typhoon In-Fa hits Chinas coast</span><br></h2></div>
<div data-element-id="elm_j924k0JXSBi9q0MZ6u2IVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_j924k0JXSBi9q0MZ6u2IVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;"><div><span style="color:rgb(0, 0, 0);">#BROCENT IT Field Service is being Impacted by the Typhoon In-Fa, that starts on 7/26 till 7/30 - the FTE Service, TOKEN Dispatch Service, PTE Service and Professional Service Onsite Deployment. Most customers have issued the administrative notice informing all employees and contractors Work From Home (WFH).&nbsp;</span></div>
<div><span style="color:rgb(0, 0, 0);">This shall extends the impact seriously the Onsite Response Time and SLA measurement. For employees' safety, BROCENT suggests customers to reschedule or cancel the pre-booked engineer service.</span></div>
<div><span style="color:rgb(0, 0, 0);"><br></span></div><div><br></div></div></div>
</div><div data-element-id="elm_GovlvR69wlhHw0Z2VkC2dQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_GovlvR69wlhHw0Z2VkC2dQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/BLOG_PHOTO/TYPHOON2.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"></picture></span></figure></div>
</div><div data-element-id="elm_r_b-X4lE_vLm0gVxcFYF-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r_b-X4lE_vLm0gVxcFYF-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><br></div>
<div><div><div><span style="color:rgb(0, 0, 0);">Mighty Typhoon Hits Shanghai Israel today. The "In-mouth" storm brought Yuta winds of 100 km / h and hundreds of millimeters of rain to the country's eastern coast&nbsp;</span></div>
<div><span style="color:rgb(0, 0, 0);"><br></span></div><div><span style="color:rgb(0, 0, 0);">Hundreds of thousands of people have been evacuated from the coastal areas of the Chinese city of Shanghai as Typhoon In-Fa hits the coast to its south. All flights to the city and high-speed train services have been suspended.</span><br></div>
</div><span style="color:rgb(0, 0, 0);"><br></span><div><span style="color:rgb(0, 0, 0);">Shanghai issued the second-highest-level typhoon warning as In-Fa is expected to hit the city’s southern Pudong district in another landfall later on Sunday. One video posted to social media shows the sky over the city darkened by black storm clouds brooding over Shanghai’s skyscrapers.</span><br></div>
<div style="text-align:center;"><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);">Around 330,000 people were evacuated from the city’s coastal areas, including the Fengxian District. Over 100,000 civil servants and workers were deployed to the city’s streets as part of the massive flood prevention measures initiated by the authorities.</span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);">All passenger flights to and from Shanghai’s two airports were canceled on Sunday. The city’s ports – some of the world’s busiest shipping hubs – evacuated thousands of vessels. The international airport of Hangzhou – a city southwest of Shanghai – canceled all flights as well.</span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);">Several bus lines in Shanghai were also suspended to prevent busses from crossing bridges over some rivers. All high-speed trains bound for Shanghai were suspended starting Sunday evening.</span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="font-size:15.0015px;"></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);">The typhoon already hit the city of Zhanshan in the Zhejiang province south of Shanghai earlier on Sunday, with winds reaching speeds of more than 136kph, according to Chinese media. Another video posted online shows winds ripping through a street at incredible speed.</span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;font-size:15.0015px;"><span style="color:rgb(0, 0, 0);">The typhoon is expected to swirl through Hangzhou Bay and make another landfall later on Sunday, potentially affecting the Zhejiang province and Shanghai. Footage shows people in the city already seeking shelter from the heavy rain and strong wind.</span></p></div>
<br></div></div></div><div data-element-id="elm_--9WXsq38lB6Wyprp2itlg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_--9WXsq38lB6Wyprp2itlg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/BLOG_PHOTO/TYPHOON.jpg" size="original" data-lightbox="true"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 26 Jul 2021 02:52:21 +0000</pubDate></item><item><title><![CDATA[Japans current Covid-19 response and the upcoming Olympics.]]></title><link>https://www.brocent.jp/blogs/post/tokyo_olympic</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jphttps://images.unsplash.com/photo-1585055863572-3be237d7e0a5?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDE0fHxvbHltcGljfGVufDB8fHx8MTYyNjc2MjYxOQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Covid-19 State of Emergency: Tokyo is now under a new state of emergency, expected to last until August 22nd. People are asked to not travel between prefectures, where possible, and are being asked to stay at home and refrain from non-essential outings]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_fCity0W9SQqMuZfBKX8zww" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_L7RWhKcUTqmdDW5I_s4AkQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_wTf79a_1Tei5Oal3tQZkIg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xqz8zmIkRvu-10WKWIGOuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xqz8zmIkRvu-10WKWIGOuQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Japan’s current Covid-19 response and the upcoming Olympics.</span></h2></div>
<div data-element-id="elm_ZyVHQm12Tv-kJvuvcRtrYA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZyVHQm12Tv-kJvuvcRtrYA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="font-size:14px;"><div style="text-align:left;"><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">It's regarding Japan’s current Covid-19 response and the upcoming Olympics. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;font-weight:700;color:rgb(1, 58, 81);">Covid-19 State of Emergency:</span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Tokyo is now under a new state of emergency, expected to last until August 22nd. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">People are asked to not travel between prefectures, where possible, and are being asked to stay at home and refrain from non-essential outings </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">BROCENT and #BROCENTASIA is considered an essential service, but these restrictions may affect our ability to meet SLAs throughout Japan and may require ticket rescheduling or additional charges for transportation and accommodation. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">We ask that all customers #SMB and partners respect social distancing and use recommended measures to prevent the spread of COVID19. Note that if #BROCENT field technicians feel that their safety is in danger, we will automatically withdraw them from the ticket and ask them to leave the site. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;font-weight:700;color:rgb(1, 58, 81);">We ask that you please:</span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">• inform us in advance of any shipments to our offices so that we can ask someone to be there to receive them. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">• confirm with your customers that the site is open and accessible during the State of Emergency when a ticket is opened. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">We will keep you informed of any changes to the state of emergency. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Please refer to the official website for further information: </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;"><span style="font-weight:700;color:rgb(1, 58, 81);">Tokyo 2021 Olympics &amp; Paralympics.</span></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Japan is now coming up to the 2021 Tokyo Olympics and we have already begun to see implications for travel in the Tokyo area. We would like to advise all partners that there may be delays in meeting SLA commitments from our Tokyo office around and during the Olympics and Paralympics.</span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Olympics: July 23rd to August 8th</span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Paralympics: August 24th to September 5th </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">We are expecting delays from today all the way up to the 30th of September. </span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Specific restrictions we know of so far:</span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);"><br></span></div>
</div><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">Today to 30th September: Local area around stadiums in Tokyo have restricted movement until the 30th of September. </span></div>
</div><p></p><div><div><span style="font-size:15px;color:rgb(1, 58, 81);">July 19th to August 22nd: Tokyo highways are either closed or severely restricted between 6am and 10pm. Open highways have increased charges for use during these hours. It is currently unclear what restrictions there will be during the Paralympics.</span></div>
</div></div></div></div></div><div data-element-id="elm_9FWlf79zRBiRCi1mLW7CpQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 20 Jul 2021 06:31:16 +0000</pubDate></item><item><title><![CDATA[One-Click Mitigation Tool Mitigating Exchange Attacks]]></title><link>https://www.brocent.jp/blogs/post/MS_Exchange_Tool</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/Microsfot/Microsoft-Building-Logo.jpg"/>Microsoft’s scramble to address the fallout from the zero-day attacks against on-prem Exchange Server installations continued this week with the release of a one-click mitigation tool help businesses contain the damage.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_RpVcy3T5RX2lj9udnGX1qA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fF83sLkfQgeH7woEDCl1DA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dmrwRKTYRN-__2U_ta0XRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1iecBKuySwuheSZXxDVGAw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1iecBKuySwuheSZXxDVGAw"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">One-Click Mitigation Tool Mitigating Exchange Attacks</span></h2></div>
<div data-element-id="elm_n8CgorsjRIa2yCCmxb4x1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_n8CgorsjRIa2yCCmxb4x1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>Microsoft’s scramble to address the fallout from the zero-day attacks against on-prem Exchange Server installations continued this week with the release of a one-click mitigation tool help businesses contain the damage.</strong></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong><br></strong></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The new&nbsp;<a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/EOMT.ps1" target="_blank">Exchange On-premises Mitigation Tool (EOMT)</a>&nbsp;is aimed at companies without dedicated security or IT teams to manage patching and post-incident forensics.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Microsoft said the tool has been tested across Exchange Server 2013, 2016, and 2019 deployments and is meant to be “an interim mitigation for customers who are unfamiliar with the patch/update process or who have not yet applied the on-premises Exchange security update.”</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">The EOMT has been combined with the&nbsp;<a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download" target="_blank">Microsoft Safety Scanner</a>&nbsp;to automatically mitigate the dangerous&nbsp;<strong>CVE-2021-26855</strong>&nbsp;vulnerability on any Exchange server on which it is deployed.&nbsp;</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">“This tool is not a replacement for the Exchange security update but is the fastest and easiest way to mitigate the highest risks to internet-connected, on-premises Exchange Servers prior to patching,” Microsoft warned.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Here’s the latest list of Redmond’s recommendations:</span></p><ol><li><span style="color:rgb(0, 0, 0);">Download the&nbsp;<a href="https://aka.ms/eomt" target="_blank">EOMT tool</a>.</span></li><li><span style="color:rgb(0, 0, 0);">Run it on Exchange servers immediately.</span></li><li><span style="color:rgb(0, 0, 0);">Follow the more detailed&nbsp;<a href="https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/" target="_blank">guidance</a>&nbsp;here to ensure that your on-premises Exchange is protected.</span></li><li><span style="color:rgb(0, 0, 0);">If you are already using&nbsp;<a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download" target="_blank">Microsoft Safety Scanner</a>, it is still live and Microsoft recommends keeping this running as it can be used to help with additional mitigations.</span></li></ol><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>SecurityWeek has compiled a list of resources to help incident response teams and IT administrators respond to this global incident:</strong></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong><br></strong></span></p><ol><li><span style="color:rgb(0, 0, 0);"><strong><a href="https://proxylogon.com/" target="_blank">ProxyLogon</a></strong>&nbsp;— the researchers who reported some of the actively exploited vulnerabilities to Microsoft have named the issues ProxyLogon and have set up a dedicated website. They plan on publishing a technical paper in the future.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://us-cert.cisa.gov/ncas/alerts/aa21-062a" target="_blank">CISA advisory</a>&nbsp;with instructions on how organizations can conduct a forensic analysis if they see evidence of compromise.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://cyber.dhs.gov/ed/21-02/" target="_blank">CISA Emergency Directive</a>&nbsp;with instructions for federal agencies, including for identifying potential compromises, conducting a forensic investigation, and responding to an incident.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.huntress.com/blog/rapid-response-mass-exploitation-of-on-prem-exchange-servers" target="_blank">Huntress</a>&nbsp;has been tracking attacks and vulnerable servers. The company has shared some recommendations for MSPs and technical information on the attacks.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.ic3.gov/Media/News/2021/210310.pdf" target="_blank">Joint advisory from CISA and FBI&nbsp;</a>containing information on targeted sectors, attack techniques, mitigations, as well as technical details for detecting exploitation and attacker activities.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.praetorian.com/blog/reproducing-proxylogon-exploit/" target="_blank">Praetorian</a>&nbsp;has reproduced the Exchange exploit chain and it has shared detailed technical information on the vulnerabilities.&nbsp;</span></li><li><span style="color:rgb(0, 0, 0);">Unit 221B provides an online tool named&nbsp;<a href="https://checkmyowa.unit221b.com/" target="_blank">Check My OWA</a>, which is designed to “aid victim notification based on lists of compromised Exchange servers with Outlook Web Access(OWA) enabled, which were obtained from perpetrators of this mass breach event.”</span></li></ol><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>Indicators of compromise (IOC) and other threat hunting resources</strong></span></p><ol><li><span style="color:rgb(0, 0, 0);"><a href="https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/" target="_blank">Volexity</a>&nbsp;has shared information on the Exchange exploits, post-exploitation activity observed in attacks, and IOCs.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/" target="_blank">Microsoft</a>&nbsp;provides technical details on the attacks it observed, instructions for checking if a system has been compromised, host IOCs, endpoint and Azure detections, and advanced hunting queries.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.fireeye.com/blog/threat-research/2021/03/detection-response-to-exploitation-of-microsoft-exchange-zero-day-vulnerabilities.html" target="_blank">FireEye</a>&nbsp;has shared information on attacks targeting Exchange servers, investigation tips and technical IOCs.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security" target="_blank">Scripts from Microsoft</a>&nbsp;for checking IOCs related to the China-linked threat actor HAFNIUM, and for detecting malicious files on Exchange servers.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.pwndefend.com/2021/03/07/checking-for-hafnium-or-other-groups-impact-from-exchange-abuse/" target="_blank">Pwndefend</a>&nbsp;has made available a list of bad IP addresses, as well as an IOC hunting script that should provide a more detailed view in some areas.</span></li><li><span style="color:rgb(0, 0, 0);">Latvia’s CERT-LV has released a&nbsp;<a href="https://github.com/cert-lv/exchange_webshell_detection" target="_blank">script that detects web shells</a>&nbsp;dropped on Exchange servers following successful exploitation of the vulnerabilities.&nbsp;</span></li></ol><p><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);"><strong>Tools and other resources for defenders</strong></span></p><ol><li><span style="color:rgb(0, 0, 0);"><a href="https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse" target="_blank">Nmap script&nbsp;</a>made by researcher Kevin Beaumont can be used to scan a network for potentially vulnerable Microsoft Exchange servers.</span></li><li><span style="color:rgb(0, 0, 0);"><a href="https://www.domaintools.com/resources/blog/examining-exchange-exploitation-and-its-lessons-for-defenders">DomainTools</a>&nbsp;has conducted an analysis of the attacks and has shared some recommendations for network detection.&nbsp;</span></li></ol></div>
</div><div data-element-id="elm_3gdC9CpGWK8k8RT268LfXw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_3gdC9CpGWK8k8RT268LfXw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Microsfot/Microsoft-Building-Logo.jpg" size="original" data-lightbox="true"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 17 Mar 2021 14:44:19 +0000</pubDate></item><item><title><![CDATA[Wi-Fi Site Surveys: Passive, Active, Survey-on-A-Stick]]></title><link>https://www.brocent.jp/blogs/post/wifi_survey_type</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/Network/AP_ON_STICK.jpg"/>The lifecycle of a wireless network is the process of designing, validating, optimizing, and troubleshooting that network. We’ve discussed Wi-Fi site surveys in a couple of Webinar. However, not all site surveys are equal. There’s three common types of on-site surveys that can be performed.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-YdTriwzQpaSJdgELObXyA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__GDAY0mCQN6mI5tNvXCd1w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lHrG1yEOQduhnWH3ZhHSlQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_lHrG1yEOQduhnWH3ZhHSlQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6rQfkG0oQKOQt-eVUJHB4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6rQfkG0oQKOQt-eVUJHB4Q"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Wi-Fi Site Surveys: Passive, Active, Survey-on-A-Stick</span></span></h2></div>
<div data-element-id="elm_1hniPIlHQwG0_RWk-4ZOPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1hniPIlHQwG0_RWk-4ZOPA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;font-size:16px;">The&nbsp;</span>lifecycle of a wireless network<span style="color:inherit;font-size:16px;">&nbsp;is the process of designing, validating, optimizing, and troubleshooting that network. Whether upgrading an existing wireless network or designing a greenfield network, you have to account for capacity requirements or potential interferences in the environment. Before you deploy your new or upgraded network infrastructure, you need to ensure you have real-world data to provide insight and insurance for your wireless project.&nbsp;</span><span style="color:inherit;"><span style="font-size:16px;">We’ve discussed Wi-Fi site surveys in a couple of Webinar.&nbsp;</span><span style="font-size:16px;">However, not all site surveys are equal. There’s three common types of on-site surveys that can be performed.</span></span><br></p></div>
</div><div data-element-id="elm_y0I7yOKdQDEu4lsB2Bpq4g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y0I7yOKdQDEu4lsB2Bpq4g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:24px;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Passive site surveys</span></span></p><p>Performed to get an understanding of the RF characteristics on-site. By RF characteristics I mean Wi-Fi signal strengths, noise levels, SNR (signal-to-noise ratio), and the like. &nbsp;The reason the site surveys are called “passive” is that your Wi-Fi network adapter is pretty much just listening to packets when performing passive site surveys. OK, the NIC might send some probes out, but that’s about it.</p><p><span style="color:inherit;"><span style="font-size:24px;"></span></span></p><h3 style="font-weight:700;"><br></h3></div>
</div><div data-element-id="elm_qDNJRKcLf0-H1aD13VlVXA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qDNJRKcLf0-H1aD13VlVXA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:24px;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Active Site Surveys</span></span></p><p>Provide more insight on the network connectivity and/or performance. Things like packet loss, packet delay, and access points you’ve associated with, can be measured during active site surveys. As the name suggests, with active surveys the Wi-Fi adapter is receiving AND sending packets to figure out what’s truly going on with the network.</p></div>
</div><div data-element-id="elm_TExE4KZYSlC63aq2Vbkz5A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TExE4KZYSlC63aq2Vbkz5A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:30px;color:rgb(0, 0, 0);">What is an AP on a Stick survey?</span></p><p>An AP on a Stick (APoS) survey is a method of temporarily staging APs at deployment height utilizing a tripod or other mounting options in order to validate your predictive design before a full site deployment. APoS surveys identify the RF signal propagation characteristics of the environment while providing additional confidence your proposed design will work as planned, reducing the need for costly AP location changes, and validating you have the correct number of APs in your design.</p></div>
</div><div data-element-id="elm_Q2ZRYtMg3wtmP1TeLL5TSg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Q2ZRYtMg3wtmP1TeLL5TSg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Network/c93e298ed532977a77f6ffb3f6fa905.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 08 Mar 2021 12:17:30 +0000</pubDate></item><item><title><![CDATA[Protect Organization Data against Adrozek]]></title><link>https://www.brocent.jp/blogs/post/adrozek_protection</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/it security/ADROZEK_DISTRIBUTION.png"/>Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020;]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kG2O2-KwS2--LX0VqLmbxA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_z30tSiQeQfSah0AdBArsDA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_v7PE9fmGSZeI4lg7Oc_ETw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_P9tiKwyBSu2WXLPvPeVIXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_P9tiKwyBSu2WXLPvPeVIXg"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Protect Organization Data against Adrozek</span></span></h2></div>
<div data-element-id="elm_GJ91LFh1T3e6Iy8nWhK2ZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GJ91LFh1T3e6Iy8nWhK2ZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:18px;">Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also designed to collect information extracted from browsers by modifying browser settings and extensions. It affects Google Chrome, Microsoft Edge, Mozilla Firefox, and the Yandex browser. Considering the risks Adrozek poses to organizations, IT admins need to take some preemptive measures to ensure security.</span></span><br></p></div>
</div><div data-element-id="elm_Xy8kp3p0ThpCf5Epch7qzw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Xy8kp3p0ThpCf5Epch7qzw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/it%20security/ADROZEK_DISTRIBUTION.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_Ak5QMzYKRPJnWsjNX4iMNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ak5QMzYKRPJnWsjNX4iMNg"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:18px;font-weight:700;">How does Adrozek affect your organization?</span></span></h2></div>
<div data-element-id="elm_PkVv9qoQ1E50xF8n20tGvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PkVv9qoQ1E50xF8n20tGvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;"><span style="font-size:18px;">Adrozek is being distributed through drive-by attacks, where users are tricked into installing the malicious software, often bundled with or disguised as legitimate software. Once installed, it makes a number of modifications to browser settings and extensions. Adrozek disables browser updates and turns off Safe Browsing, which is a feature designed to prevent users from landing on malicious websites. It then installs and activates new browser extensions that run in incognito mode; these extensions run without explicit user permissions, and are hard to notice since they aren’t displayed in the toolbar. These modifications help the malware inject users’ search engines with ads. In certain browsers, the malware further steals users’ credentials. When users access enterprise web applications on the infected browsers, the organization’s data security is at risk.</span></span><br></p></div>
</div><div data-element-id="elm_KezIhUphVG5WGWnxbc_ZOg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KezIhUphVG5WGWnxbc_ZOg"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:18px;font-weight:700;">How to protect your organization against Adrozek</span></span><br></h2></div>
<div data-element-id="elm_2fU12Q6mLG0kHU28b4rZxQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2fU12Q6mLG0kHU28b4rZxQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:30px;font-size:18px;">It’s always better to be safe than sorry. IT admins can implement a stringent yet foolproof, three-step preventive mechanism to help secure their organizations against Adrozek.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>1. Restrict users’ access to trusted websites</em></span></p><p style="margin-bottom:30px;font-size:18px;">Implement URL filtering software to prevent users from accessing websites that are unauthorized by the IT teams. This ensures that users don’t land on infected websites, preventing the installation of malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>2. Limit downloads to trusted websites</em></span></p><p style="margin-bottom:30px;font-size:18px;">While step one eliminates the chances of users installing the malware, limiting downloads to trusted websites creates an additional layer of security, preventing it from being downloaded in the first place.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>3. Restrict execution of untrusted applications</em></span></p><p style="margin-bottom:30px;font-size:18px;">Restricting the execution of untrusted applications will prevent Adrozek from running if it’s present in the enterprise network. This final step creates a fortified boundary, preventing the execution of the malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="color:rgb(0, 0, 0);">BROCENT Managed IT Security Service (MSS) to implement these three-fold preventive measures. In case users’ machines are already infected with Adrozek, IT admins can implement a few best practices to limit the damage.</span></p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>1. Deploy browser configurations to users’ browsers</em></span></p><p style="margin-bottom:30px;font-size:18px;">Browser configurations and behavior can be managed from a central location with the managed antivirus console. Configurations deployed&nbsp; cannot be overwritten by users, nor by Adrozek. For example, deploying a configuration to enable browser updates will prevent the malware from modifying the setting. Similarly, BROCENT support center can enable the Safe Browsing configuration, ensuring that Adrozek cannot disable it. This will minimize the impact of the malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>2. Restrict installation of new browser extension and add-ons</em></span></p><p><span style="color:inherit;"></span></p><p style="margin-bottom:30px;font-size:18px;">IT admins can restrict the installation of new extensions and add-ons. This will prevent the malware from installing new extensions capable of injecting ads and stealing credentials. To prevent loss of productivity that could arise from lack of extensions, mission-critical extensions and add-ons can be distributed to users’ browsers BROCENT managed network behavior management console.</p></div>
</div><div data-element-id="elm_FErr3wMguDa9CVXOA3y-RQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_FErr3wMguDa9CVXOA3y-RQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/it%20security/adrozek_cn.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 17 Feb 2021 04:00:28 +0000</pubDate></item><item><title><![CDATA[Microsoft LAPS: What is it and why you should be using it]]></title><link>https://www.brocent.jp/blogs/post/microsoft_laps</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/Microsfot/password_image.png"/>Password management within an enterprise environment can be difficult, more so when you consider the management and controlling of local administrator accounts across all Windows devices.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_HCCmRDXtRLCMWeGWB_-OrQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_UXOa_5GXTW-A-noRU3wZnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_vI2r_5pzRrC4wTqsfo6dNg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_H_qnkzknRwCp0-8H_m9Hpg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_H_qnkzknRwCp0-8H_m9Hpg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;">Password management within an enterprise environment can be difficult, more so when you consider the management and controlling of local administrator accounts across all Windows devices. Ensuring that everyone is using their computers with normal low-level privileged accounts can be a challenging task, more so when you need to ensure that any local administrator passwords should be secure and yet managed easily.</span></p><p><span style="color:inherit;font-size:15px;"></span></p><p><span style="font-size:15px;">A lot of people will simply use the same password for all local administrator accounts, which can allow the management of machines to be frighteningly easy, however what happens if one machine is breached and the local credentials are dumped and then broken? The attacker has access to the whole estate.&nbsp; This is where Microsoft LAPS comes into play.</span></p></div>
</div><div data-element-id="elm_j4_0IyeyHcX6CnfdK-yGpQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_j4_0IyeyHcX6CnfdK-yGpQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:30px;">What is Microsoft LAPS?</span></span><br></p></div>
</div><div data-element-id="elm_Wf70v29Lem_eOii91aZB9w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Wf70v29Lem_eOii91aZB9w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Microsoft Local Administrator Password Solution (<a href="https://www.microsoft.com/en-us/download/details.aspx?id=46899">LAPS</a>) is a password manager that when configured is integrated into Active Directory. LAPS allow domain administrators and/or help desk staff to manage and rotate passwords for local administrative accounts across all Windows devices. Having this tool setup within your Active Director environment is a great way to ensure that if anyone gains access to an endpoint that any lateral movement is restricted due to having unique passwords across all endpoints.</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="font-size:16px;">Another benefit of using LAPS is that it is not reliant upon additional computers, applications or services to manage these passwords, once setup its tightly integrated into Active Directory, thereby allowing you to integrate and manage passwords in AD compatible tools.</p></div>
</div><div data-element-id="elm_RruvTx5ZE8SKQ5GEcq7GoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RruvTx5ZE8SKQ5GEcq7GoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:30px;">How to setup Microsoft LAPS</span></span><br></p></div>
</div><div data-element-id="elm_UZW8Tr9B3ObAriQSHeCQYQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UZW8Tr9B3ObAriQSHeCQYQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Before we begin, there’s a small disclaimer up front, installing and configuring LAPS is not as simple and download and execute a setup application, there is some manual configuration which is required using PowerShell and Group Policy.&nbsp; If you aren’t sure what these are or how to use them, Microsoft does have some good documentation on installing and setting up LAPS, check out the ‘LAPS_OperationsGuide.docx’ document for more information.&nbsp;<strong>Note: You will need to be an AD Schema administrator for some parts of the setup process.</strong></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Once you have downloaded the LAPS installation application, run the application on a domain controller, you will be asked if you want to install the following items.</p></div>
</div><div data-element-id="elm_hovDGqG4W2dZ41UeWPzRmg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_hovDGqG4W2dZ41UeWPzRmg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Microsfot/LAPS01.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_ULsLyyn6_SoWLkV46KA8Bg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ULsLyyn6_SoWLkV46KA8Bg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">In this example, we’re going to select all items (for endpoints you only need to push out the ‘Adm GPO Extension’). Go ahead and install the features.</p><p style="font-size:16px;">Once installed, the next step is to extend your Active Director Schema to allow the support of LDAPS. Microsoft provides a PowerShell module that will take care of this process (make sure you are an Active Directory Schema Administrator when running this). There will be two computer attributes added to your schema these are: ‘ms-Mcs-AdmPwd’ which stores the local administrator password and ‘ms-Mcs-AdmPwdExpirationTime’ which stores the time until the password expires.</p><p style="font-size:16px;"><span style="color:inherit;"></span></p><p style="font-size:16px;">Launch a PowerShell terminal and then import the ‘AdmPwd.ps’ module.&nbsp;<span style="color:inherit;">Extend the AD Schema.&nbsp;</span><span style="color:inherit;">Once you have extended the schema you will see the two new attributes</span></p></div>
</div><div data-element-id="elm_3yVkyABeRv0JO_cnKVT9Kg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_3yVkyABeRv0JO_cnKVT9Kg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Microsfot/LAPS03.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_vdWXBUUTSMIXh4y168Nycg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vdWXBUUTSMIXh4y168Nycg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;"><span style="color:inherit;">Now, if you go into Group Policy management editor, you can configure LAPS.</span><br></p></div>
</div><div data-element-id="elm_9WoV9dZEKkVWITZVcm7zpg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9WoV9dZEKkVWITZVcm7zpg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;"><span style="color:inherit;">The ‘Password Settings’ GPO setting allows you to configure the password complexity for the passwords which are going to be used for the local administrator accounts, including the length and age.&nbsp;</span><span style="color:inherit;">The ‘Enable local admin password management’ setting controls if the endpoints are governed by the GPO which are being managed by LAPS.</span><br></p></div>
</div><div data-element-id="elm_5tN0g07UeaH3tpZxnSQZEQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_5tN0g07UeaH3tpZxnSQZEQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Microsfot/LAPS04.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_2eaxdVI9iWsOfPrW7Mo6wA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_2eaxdVI9iWsOfPrW7Mo6wA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Microsfot/LAPS05.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_YNIOicSJdAU0WYG5OdlwVw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YNIOicSJdAU0WYG5OdlwVw"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Deploying AdmPwd GPO Extension to endpoints</span></h2></div>
<div data-element-id="elm_DiTVEqgBPoQbpbZ-PLU0Vw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DiTVEqgBPoQbpbZ-PLU0Vw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Before you can manage all the endpoints with LAPS you will have to deploy the ‘AdmPwd GPO Extension’ to all endpoints, this can be done a number of ways, some of these are:</p><p><span style="color:inherit;"></span></p><ol><li>Run the LAPS.x64.exe application on all endpoints and only install the GPO extension</li><li>Copy and deploy the dll file across all machines</li><li>Silently install the application via group policy</li></ol></div>
</div><div data-element-id="elm_k58rwNI-EKduBg0Wo-0IhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_k58rwNI-EKduBg0Wo-0IhQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Managing passwords</span></h2></div>
<div data-element-id="elm_B_WViHnrjjkUW7dBgEjOzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_B_WViHnrjjkUW7dBgEjOzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:16px;">Once all set up, you can manage the passwords a number of ways, the easiest way is using the LAPS UI application, but you can also use PowerShell to manipulate the passwords.</span></span><br></p></div>
</div><div data-element-id="elm_F-iaoXjgVRsXAQVRfj-3MQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_F-iaoXjgVRsXAQVRfj-3MQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.brocent.jp/Microsfot/LAPS06.png" size="original" data-lightbox="true"></picture></span></figure></div>
</div><div data-element-id="elm_QDCtAuCTh4NYQU5PgAu33Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QDCtAuCTh4NYQU5PgAu33Q"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Microsoft LAPS: What is it and why you need?</h2></div>
<div data-element-id="elm_goGq-QqY9GrQKQOYubUeGA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_goGq-QqY9GrQKQOYubUeGA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/taBxaxDo9iM" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_nB3MBxmNJnckF6f3jUsNrw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_nB3MBxmNJnckF6f3jUsNrw"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Microsoft LAPS: How to Deploy agents to Endpoint?</h2></div>
<div data-element-id="elm_aineRCgK920y4CFusVhMEQ" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_aineRCgK920y4CFusVhMEQ"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/vSGMfrLECzY" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_lnkkAjs2bH8YDcTVmcSkcw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lnkkAjs2bH8YDcTVmcSkcw"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Microsoft LAPS: Secure the OUs for Access</h2></div>
<div data-element-id="elm_zkp41V5bPq2034LjsNsQsw" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_zkp41V5bPq2034LjsNsQsw"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/3b81AygPTz4" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 16 Feb 2021 04:02:02 +0000</pubDate></item></channel></rss>