 <?xml-stylesheet type="text/css" href="http://mspbuilder.com/Data/style/rss1.css" ?> <?xml-stylesheet type="text/xsl" href="http://mspbuilder.com/Data/style/rss1.xsl" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
    <title>MSP Builder Blog</title>
    <link>http://mspbuilder.com/blog</link>
    <description />
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>mojoPortal Blog Module</generator>
    <language>en-US</language>
    <ttl>120</ttl>
    <atom:link href="http://mspbuilder.com/Blog/RSS.aspx?p=3~3~7" rel="self" type="application/rss+xml" />
    <itunes:owner />
    <itunes:explicit>no</itunes:explicit>
    <item>
      <title>Endpoint Security - Local Accounts</title>
      <description><![CDATA[<p>Maintaining secure local access accounts can be a challenging prospect for MSPs. Learn how the RMM Suite allows MSPs to create accounts and change passwords on any frequency they desire without any manual effort.</p>

<h5>The LAUSER Account</h5>

<p>Back in 2019, a customer related an experience of when a VIP user at a major customer was in an airport lounge. The user needed to print their presentation and needed admin access to install the print driver. The WiFi was limited to http protocol access, which prevented the MSP from using their RMM to provide support. They had no choice but to provide the user with&nbsp;<em>their</em>&nbsp;internal use password. This required changing the password throughout that customer environment. We suggested that a commonly named account ("lauser") could be created and our automation could maintain and update the credentials on a weekly basis. We rolled that process into ITP and began deploying this account for our customers soon after.</p>

<p>A few years later, MSPs are looking to improve security and decide to use the LAUSER account for their local access. This led to an additional improvement in this component, allowing multiple accounts to be created using this process.</p>

<p>One of the unique security features of this process is that the password is generated based on using the date, time, and hostname, along with other logic, to seed the password generation logic. This ensures that the password is machine-specific and impossible to re-synthesize.</p>

<h5>The RAUSER&nbsp;&amp; CAUSER Accounts</h5>

<p>The RMM Suite has long supported the use of per-client accounts for the MSP (RAUSER) and the customer (CAUSER), first via Managed Variables in Kaseya VSA and now via self-ciphering Cloud Script Variables on all RMM platforms. These accounts offer the flexibility of selecting the actual login ID, display name, and password. These credentials apply to groups of agents, whether an entire customer organization or specific location or department.</p>

<h5>RMM Suite Account Management Tools</h5>

<p>The RMM Suite continues to support&nbsp;multiple methods of local account management.</p>

<ul>
	<li>If the RAUSER (or CAUSER) Cloud Script Variable (CSV) is defined (both UserID and Password), the account will be created, added to the local administrators group, and the defined password will be set on the account. This happens automatically the first time that an agent checks in. These accounts can be updated at any time by updating the account password stored in the CSV and then executing the appropriate WIN-Local Account script on the RMM platform, targeting the endpoints where the account should be&nbsp;updated.</li>
	<li>The LAUSER technology has been enhanced and migrated into our Daily Maintenance tool. Simply create a Weekly or Monthly task to run the LAUSER command. This will generate a long, complex password; create the account and add it to the Administrators group if necessary; then set the password. The password will be ciphered and written to the system registry, where it can be collected by the Daily Audit tool, deciphered, and pushed into the RMM or your documentation engine such as Hudu or IT Glue. You can define multiple tasks in Maintenance with&nbsp;the LAUSER command to create any number of local admin accounts with unique credentials.&nbsp;
	<ul>
		<li>If no argument is defined, the account name "lauser" is targeted. This maintains the process we implemented several years earlier and allows this account to be given to the user as necessary. It may be appropriate to update the frequency of this account change.</li>
		<li>If an argument is provided, it will be used as the account name. This argument should be a single word without spaces, following the usual guidelines for user account IDs.&nbsp;</li>
	</ul>
	</li>
</ul>
<br /><a href='http://mspbuilder.com/blog-endpoint-security-local-accounts'>gbarnas</a>&nbsp;&nbsp;<a href='http://mspbuilder.com/blog-endpoint-security-local-accounts'>...</a>]]></description>
      <link>http://mspbuilder.com/blog-endpoint-security-local-accounts</link>
      <author>gbarnas@mspbuilder.com (gbarnas)</author>
      <comments>http://mspbuilder.com/blog-endpoint-security-local-accounts</comments>
      <guid isPermaLink="true">http://mspbuilder.com/blog-endpoint-security-local-accounts</guid>
      <pubDate>Thu, 15 Dec 2022 15:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Implementing Security Roles the Right Way</title>
      <description><![CDATA[<p>Defining effective user security roles provides you with an added layer of security within your VSA. User Roles define which modules and settings a user can access from the VSA console. While there is no “one size fits all” model, the concepts presented here will provide appropriate access for technicians, engineers, VSA admins, and VSA managers.</p>

<p>&nbsp;In our typical VSA implementation, we create four distinct access levels, and several sub-types for MSP employees, plus three roles for customer access. <b>No user has Master role rights in our deployment configuration.</b> These roles should have a “NOC” or “MSP” prefix to designate them as internal roles.</p>

<p><b>Level 0</b> – Support A role designed for support staff to access VSA for running reports, getting agent counts, or checking use and available licensing. No access to automation is available, but these users can view agents and have virtually unlimited access to the reporting functions.</p>

<p><b>&nbsp;Level 1</b> – Technician This role, which we name “NOC-1-Tech”, grants the ability to perform basic agent administration, view audit and other configuration settings, and access remote control features. This provides the ability to perform about 80% of what a technician would do on a daily basis for end-user support.</p>

<p><b>Level 2</b> – Administrator Named “NOC-2-Admin” in our system, it grants additional capabilities to run procedures, deploy AV and AM, and perform most agent configurations. Neither of the above roles permit changing the configuration of VSA-wide settings.</p>

<p><b>Level 5</b> – Specialist These roles grant VSA administration rights to specific features, distributing the administration tasks among multiple users. In our practice, we use the following specialist types:</p>

<ul>
	<li><b>Security</b> – provides the ability to perform all Auth Anvil configuration and management tasks.</li>
	<li><b>AV-Malware </b>– grants access to administer the Antivirus and Malware components, including definition of profiles, policies, and assigning them to customers.</li>
	<li><b>Updating</b> – allows administration of all Patch Management and Software Management components. It may also allow access to other application updating components.</li>
	<li><b>Backup</b> – Allows configuration of all VSA settings related to backup operations.</li>
	<li><b>Manager </b>– grants a combination of roles, usually assigned to the Dispatch, helpdesk or Technical Manager(s).</li>
</ul>

<p><strong>Implementing these security roles will allow for better security and organization within your VSA infrastructure. To learn more, <a href="https://www.mspbuilder.com/request-demo2">schedule a demo for MSP Builder’s RMM Suite!</a></strong></p>

<p>&nbsp;</p>

<p>&nbsp;</p>
<br /><a href='http://mspbuilder.com/implementing-security-roles'>lbarnas</a>&nbsp;&nbsp;<a href='http://mspbuilder.com/implementing-security-roles'>...</a>]]></description>
      <link>http://mspbuilder.com/implementing-security-roles</link>
      <author>lbarnas@mspbuilder.com (lbarnas)</author>
      <comments>http://mspbuilder.com/implementing-security-roles</comments>
      <guid isPermaLink="true">http://mspbuilder.com/implementing-security-roles</guid>
      <pubDate>Mon, 16 Aug 2021 15:39:00 GMT</pubDate>
    </item>
    <item>
      <title>STOP! How outdated are your management scripts?</title>
      <description><![CDATA[<div>During a recent audit of an MSP's onboarding processes, I found several Agent Procedures that seemed interesting. I had not seen any other MSP performing some of these configuration steps, so I looked more deeply at the logic in these procedures. What I found would have turned any hair I had left white!</div>

<div>&nbsp;</div>

<div>One procedure in particular was named "Set Access Rights for PerfMon Folders". "What PerfMon folders?" I wondered.. Looking at the procedure, the description stated that it was modifying the Kaseya working folder permissions to allow PerfMon to access the KLogs folder. It did this by changing the permissions to "Everyone:Full Control"!&nbsp;</div>

<div>&nbsp;</div>

<div>Looking closer, I was able to determine that this procedure was quite old, and likely developed for VSA version 6 or earlier and had never been updated. While it's possible that older versions of VSA did not provide adequate access to the KWorking folder, that is no longer the case. Administrators have full control, and even users have Read &amp; Execute, so there is no issue with PerfMon reading this location.&nbsp;</div>

<div>&nbsp;</div>

<div>The most important thing to realize is that things change. If you have processes that haven't changed in years, it's time to afford them a review and decide if they are still needed, or in need of an update. This procedure, if not identified, would introduce significant risk into the MSP environment by granting Full Control rights to every account to a critical system folder. Imagine a malicious user could replace an EXE or update a script to call malware or ransomware. If the agent procedure doesn't replace these scripts and blindly calls them - often with SYSTEM rights - the damage could be extensive.</div>

<div>&nbsp;</div>

<div>Why risk this? Take time to review your procedures and tools to make sure they are still required and operate in compliance with today's security model. Remove processes that are no longer needed, and update those that are still needed to follow current security requirements. The business you save might be your own!</div>
<br /><a href='http://mspbuilder.com/blog-how-outdated-are-your-management-scripts'>gbarnas</a>&nbsp;&nbsp;<a href='http://mspbuilder.com/blog-how-outdated-are-your-management-scripts'>...</a>]]></description>
      <link>http://mspbuilder.com/blog-how-outdated-are-your-management-scripts</link>
      <author>gbarnas@mspbuilder.com (gbarnas)</author>
      <comments>http://mspbuilder.com/blog-how-outdated-are-your-management-scripts</comments>
      <guid isPermaLink="true">http://mspbuilder.com/blog-how-outdated-are-your-management-scripts</guid>
      <pubDate>Sun, 23 Feb 2020 14:00:00 GMT</pubDate>
    </item>
    <item>
      <title>Security - Multi-Factor Authentication</title>
      <description><![CDATA[<p>There’s no doubt that Multi-Factor Authentication is a hot topic and an excellent way to improve secure access to your infrastructure. Remote access to your RMM and PSA tools, as well as the RDP Gateway will benefit from using MFA. But what about access when you are in the office – do you need MFA</p>

<p>Since you are already in a protected environment (you lock your doors and have a firewall and other logical and physical security – right?), you don’t need to require MFA. Most MFA solutions provide one or more methods of “whitelisting”. Which method you choose will make the difference between being secure and not…</p>

<h4>User Whitelisting</h4>

<p>User whitelisting is used for application accounts that would not be accessed externally, or support accounts that need to be used by external support teams. You would <i>never</i> whitelist your employees! Unfortunately, we see this configuration all too often. When we point it out, the response is typically “yes, but we trust our team!”</p>

<p>Sure – you can trust your employee, but you <i>can’t trust their credentials!</i> That’s the distinction that MFA makes. If an employee’s credentials are compromised, any bad actor can try to log in. If their account is whitelisted, there would be no Multi-Factor authentication and access would be granted!</p>

<h4>Network Whitelisting</h4>

<p>Network whitelisting identifies the internal network range(s) that you trust – typically the office network <i>public addresses</i>. In most situations, this would be the public IP address assigned to your external firewall (or firewalls if you have redundant Internet connections). This is the preferred way to allow your techs to work without MFA when in the office, but require it when they are at home, customer sites, or otherwise outside of the office.</p>

<h4>MSP Builder Tools</h4>

<p>Many of the MSP Builder tools utilize the VSA APIs to perform their tasks. While these tools use the API to authenticate over an SSL connection, there are some processes that we follow to improve the security of these tools. As each tool runs, it requests an authorization token to do its work by authenticating to VSA. The tasks that the tools perform take anywhere from a few milliseconds to about 3 seconds to complete. Once the task completes, the tool closes the session, invalidating the authorization token.</p>

<p>Another level of security that we use is MSP Builder License Authorization. All tools that utilize the APIs must first authenticate to the MSP Builder licensing server. This authorization is such that it is extremely difficult (if not impossible) to circumvent, requiring multiple data parts to complete a license validation. In a sense, this is a form of MFA for the tools that utilize the Kaseya APIs. Our API account does not require the password to be distributed to the systems that use it, and is designed to be changed on a 24-hour cycle, increasing the difficulty of a brute-force attack.</p>

<h4>Summary</h4>

<p>Multi-Factor Authentication is an excellent method to improve the security and integrity of your environment, but it requires careful and correct configuration. Incorrect settings will negate the security you’re trying to deploy, so take your time, double and triple-check your configuration, and use whitelisting options properly!</p>
<br /><a href='http://mspbuilder.com/blog-security-multi-factor-authentication'>gbarnas</a>&nbsp;&nbsp;<a href='http://mspbuilder.com/blog-security-multi-factor-authentication'>...</a>]]></description>
      <link>http://mspbuilder.com/blog-security-multi-factor-authentication</link>
      <author>gbarnas@mspbuilder.com (gbarnas)</author>
      <comments>http://mspbuilder.com/blog-security-multi-factor-authentication</comments>
      <guid isPermaLink="true">http://mspbuilder.com/blog-security-multi-factor-authentication</guid>
      <pubDate>Sat, 12 Oct 2019 16:00:00 GMT</pubDate>
    </item>
  </channel>
</rss>