• taladar@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    7 months ago

    I thought the Microsoft technologies designed to allow anyone to access your servers were called Exchange and Active Directory.

    • Monument@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      7 months ago

      Exchange allows users to access data and Microsoft services and it comes with good documentation and a whole slew of controls for org admins.

      Active Directory provides authentication services, and it is mostly for your internal users (so they can access org services, including Exchange), but it’s very common to allow guests and to federate under certain circumstances, so your AD talks to their AD and external guests can authenticate and use resources that have been shared with them.
      It is also well-documented with tight control in the hands of administrators.

      Copilot is a black box. Their terms of service are vague. Microsoft’s responsible AI website comprises of marketing speak, no details, and the standards guide on the site is mostly questions that amount to “TBD”. Administrative ability to control data sharing is non-existent, not yet developed, or minimal.
      We don’t know the scope of data gathered, the retention and handling policies, or where that data/any models built from that data are going to wind up.
      My read is that they’re waiting to be sued or legislated before they impose any limits on themselves.

      • taladar@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        7 months ago

        Usually those are the ones all those companies and organizations are using who have their files encrypted by malware.

        • 4am@lemm.ee
          link
          fedilink
          arrow-up
          0
          ·
          7 months ago

          Correlation != Causation.

          Now, on the other hand, the number of breaches has gone way up recently. Microsoft has pushed AD and Exchange into the cloud recently. And they just had several instances where keys were stolen and passwords were left in the clear for months after they were notified, as well…

          Well we have no solid evidence but it’s certainly within the realm of possibility.

        • lud@lemm.ee
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          7 months ago

          Yes that’s because pretty much all companies use AD and exchange is also popular (but less so now with exchange online)

          Both are also extremely valuable for companies and thus attackers.

          Ransomware attacks pretty much always rely on missconfiguration and/or social engineering.

          • Monument@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            0
            ·
            7 months ago

            Yeah… I realized that like an hour later, and couldn’t figure out how to respond appropriately. Then I forgot all about it because ADHD.

            But yeah. I definitely got whooshed here.
            In my defense, I guess I wasn’t expecting to see a joke in the thread, so … well, I didn’t see one.