Leave a comment

Mobile apps not in an app store, how can I use it?

July 01,2017 Update: See how System Center Configuration Manager (SCCM) can handle mobile device “side-loading” in this YouTube video.

June 13, 2017 – secRMM has added a new utility called SafeSync. SafeSync lets you install mobile device apps and of course securely copy files to the mobile device.

Sometimes it makes sense to install a mobile app without going through the trouble of getting the mobile app published into the “app stores”. App stores are big databases accessible over the internet that let users select apps to install onto their mobile device. Anyone can access the app stores as long as the mobile device has an internet connection (using the devices WiFi and a hotspot or the cellular service providers network). Apple, Google and Microsoft have the biggest app stores. These software vendors offer apps for their mobile devices hardware and/or operating system. When you want an app to go into one of the app stores, you have to go through a process defined by the vendor before it can be published.

There are scenarios where an organization does not want to put their apps into the app stores. Mainly because they do not want just anyone to be able to use the apps. As an example, suppose the military were to develop some apps that helped them with field combat. Clearly, they would not want just anyone to be able to download their app from an app store. Another example is a company that writes apps for their workers to use. Perhaps the app has company sensitive information that needs to be protected from competitors.

For scenarios where you want to distribute a mobile app but do not want it in the app stores, a common and acceptable practice is install the app from another computer (commonly a Windows computer). The Windows computer and the mobile device cooperatively perform the install using a USB cable connection between them. The computer industry uses a slang term called “side-loading” to describe this process. The app (which is just a binary with a special extension) can reside on the Windows computers local hard drive or even on a network share (so many users can access it).
The secRMM SafeSync utility makes it easy to manage the side-loading process by providing a list of available apps which you can choose to install, uninstall or re-install.


In addition, the mobile app install or uninstall events get recorded so that security administrators can be aware of the activities. Because of secRMMs integration into System Center (and other backend monitoring systems), this event information can be included in the organizations security monitoring process.

SafeSync can also generate a script so that the install/uninstall/reinstall pattern can be repeated for many devices. SafeSync also exposes the mobile device properties which are important to understand and control before a device is deployed into the field. Lastly, SafeSync can copy files to the mobile device. These files might be data files that are used by the mobile apps. This allows a device to completely be prepared before it gets deployed into the field.
In summary, secRMM continues to help IT organizations and security professionals manage the events around removable storage and especially mobile technology.

Please feel free to contact Squadra Technologies to help with your security needs around removable storage and/or mobile device technology.  There is also a YouTube video about SafeSync at https://www.youtube.com/watch?v=Z2_ODEnr2XM.

Leave a comment

WME. A great partner!

December 15, 2016 – Being in the Microsoft System Centerwme-logo space is very exciting.  You get to work on leading edge software that helps your business operate and be successful.  System Center provides so many functions and features that sometimes getting a handle on all the bells and whistles it provides can be a little intimidating.  This is when you wish there were experts you can lean on to help you understand or even help you accomplish your System Center goals.  If you don’t know of any System Center experts, please check out one of Squadra Technologies technology partners named “Windows Management Experts” or WME for short.  Let me just tell you, these guys know System Center and they are cool guys.  For example, we just released a SCCM/InTune report for secRMM.  I was trying to understand the SCCM database schema to figure out how to pull the data for the report.  I shot an email over to my buddies at WME and within a day, they emailed me back an SQL query (quite complex one I might add) that enabled me to finish the report within a couple of hours!  So awesome!

So, if you are looking for System Center help, please consider WME.
Thanks for reading.

Leave a comment

SCCM ties together MDM and DLP

December 06, 2016ems Microsoft is putting a lot of hard work into securing mobile devices in the enterprise. Recently, they have been promoting their “Enterprise Mobility Suite” (EMS). EMS has many powerful security features. The core product of EMS though is based off Microsoft’s Mobile Device Management (MDM) product named InTune. InTune is a cloud solution. It also has a hybrid mode where InTune can be managed and controlled by Microsoft System Center Configuration Manager (SCCM).

SCCM is Microsofts “enterprise management framework” work horse. It is how enterprises keep their systems running and secure. When SCCM is connected to InTune, you can see your mobile devices in the SCCM console. You can even see the mobile device hardware resources just like you can with a workstation or server.  The two screen shots below are from the SCCM console.



Microsoft has written numerous SCCM mobile device reports which give you just about every piece of information about the mobile device that you will want to know …

except for …

when a mobile device is connected to a workstation or server over a USB connection!

This missing information is very valuable because it is the easiest way for users to copy files from your domain. The computer industry calls this “Data Loss” and there are many products out there that focus on “Data Loss Prevention” (DLP).

Squadra Technologies Security Removable Media Manager (secRMM) is one of those DLP products. What makes secRMM unique is that it is 100% integrated into SCCM. This means you do not have to deploy another framework just to get DLP for USB plug-and-play devices.  It integrates precisely into Microsoft’s Endpoint Protection strategy and also with EMS.

secRMM has a new SCCM report called “Mobile Device USB File Write Activity”. This secRMM report works in conjunction with the InTune/SCCM data so you can also see how/where your users are connecting their mobile devices within your domain.

The flow chart below shows you all the components wired together. Notice that in addition to mobile device monitoring, secRMM works with any type of plug-and-play storage device (i.e. flash drives, CD/DVD, SD-Cards, external hard drives).


Also, on the mobile device security side, secRMM comes with an optional mobile app that requires the end-user to first authenticate before the device is allowed to mount to the Windows workstation or server.

Below is a screen shot of the SCCM “Mobile Device USB File Write Activity” report. When you click the plus sign next to the device, it expands to show you all the USB related activity (see the second screen shot).


When you see files written to the mobile device, you can even see the complete path of the source file (i.e. the file that was copied)!


A YouTube video on this information is at:

We hope you found this information useful. Thank you for reading and Merry Christmas!!!

Leave a comment

secRMM extends SCCM PowerShell Library


October 24, 2016 – secRMM has increased its PowerShell support.  There is a new secRMM PowerShell cmdlet to give you the same property granularity that is available from the secRMM Excel AddIn (as shown in the screen shot bblog22_4elow).

This means you have the most detailed forensic removable storage security data (including mobile devices as well as thumb drives, external hard drives, SD-Cards, etc.) to process any way you can image.

The secRMM Powershell cmdlet can operate standalone and can also be used with SCCM.  Since the secRMM SDK is included with the base secRMM install, just install secRMM and then go to directory: “C:\Program Files\secRMM\AdminUtils\SDK”.

Under the SDK directory is the Powershell directory.  There is a sample PowerShell script named GetSecRMMEvents.ps1 that shows you how to use the secRMM cmdlet.  For SCCM, it couldn’t be any easier.  Here is the PowerShell line of code that gets all the secRMM data from SCCM:

$secRMMEvents = secRMMEventData -SCCM

As you can see, the secRMM cmdlet is named secRMMEventData. This name is logical because the cmdlet can get the secRMM data from multiple sources: SCCM, the secRMM event log and/or the secRMMCentral event log. Once the data comes back to the PowerShell script (or the PowerShell pipeline), you have a secRMM object that contains the various properties (data) with which you can perform more logic or store however you see fit.  The secRMM object has an Output method that will convert the text to HTML, CSV or XML.

For details, please see the secRMM SDK Programmers Guide at http://squadratechnologies.com/StaticContent/ProductDownload/secRMM/

There are also secRMM PowerShell scripts in the secRMM SDK to get/set a secRMM property and to read/write to a mobile device.


In the near future, we will be looking at ways to link together the secRMM data in SCCM with the Intune data.  We hope you found this information useful.  Thanks for reading!



Leave a comment

Block Office Macros on removable storage devices (including mobile)

blog22_0September 06, 2016 – secRMM has added another security rule which does not really fall into the Data Loss Prevention (DLP) category but more in the antimalware category.  The new rule is named “BlockOfficeMacrosOnDevice”.  As the name implies, secRMM will block opening any Microsoft Office document residing on a removable storage device that has a macro(s) embedded within it.

You can also view a YouTube video on this subject

Microsoft has been doing a great job of securing the Office suite, especially with Office 2016 (see MS Blog: New feature in Office 2016 can block macros and help prevent infection).  As you can see, they have a “Group Policy” that you can apply to your domain(s).  Microsoft has a Malware Protection Center where you can get more information about Office Macros at:

What has still not been addressed (until now) is the handling of removable/plug-and-play storage devices.  We are talking about thumb drives, USB connected mobile devices, SD-Cards, external hard drives, CD/DVD, etc.  This is what the secRMM “BlockOfficeMacrosOnDevice” addresses.  You can apply this setting in multiple ways:

Active Directory Group Policy and/or
Microsoft System Center Configuration Manager (SCCM) and/or
On the individual computer by using the “Computer Management” MMC and/or
Script (Powershell, VBScript, JScript, CMD, etc.) – Yes, secRMM is 100% scriptable

Another good thing about the secRMM “BlockOfficeMacrosOnDevice” feature is that it supports Office 2016, 2013, 2010, 2007 and 2003.  It probably supports even older versions but we could not find an older version than 2003 to install and test with!

If you are concerned about Macro-based malware, now you can have this additional help by using secRMM.

The screenshots below will show you what we discussed above.

In the first 2 screenshots, we are just turning on the rule (we used the “Computer Management” MMC).  It is just a checkbox, on or off.  You must be an Administrator on the computer to be able to access the secRMM rules.



The next 3 screen shots show you what the end-user will experience when they go to open an Office document with a macro(s) embedded within it.  The first 2 screen shots are from explorer.  The third screen shot is if they try to use a command window.  Note that this blocking functionality will also apply if they first open the Office program and then do a File->Open operation from within the Office program.

Now, as the IT and/or security Administrator, you will also be able to see in the event log that this condition has occurred (i.e. an end-user tried to open an Office document on a removable storage device and the Office document had a macro(s) embedded within it).

The screen shot below has a lot of information contained within it.  First, it tells you that a “BLOCK MACROS ON DEVICE ACTIVE” event occurred (in the secRMM event log, that is event id 514).  It tells you the user who tried to open the Office document (in the screen shot, this is CONTOSO\Angela).  Next, it tells you about the removable storage device.  Next, it tells you the program that tried to open the Office document.  In this case, it is Winword.exe.  The last line is kind of long but it is really the most detailed so we break it down below the screen shot.

Command Line: “C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE” /n “E:\Programs\OfficeMacros\2003\Word1Macro_2003.doc” /o “”,
Current Directory: E:\Programs\OfficeMacros\2003,
Office Macro(s): ThisDocument(Document:3), Module1(Code:14)

The text above logs what the “command line” looked like when Windows tried to open the Office document.  It also logs the “current directory”.  Lastly, it lists the macro information contained inside the Office document.  In the above event, we can see that inside this Word document, the “ThisDocument” VBA object has a macro of type “Document” and there are 3 lines of executable code.  There is also an object named Module1 which has a macro of type “Code” and there are 14 lines of code.

Below is a screen shot of the Word document used in our example with the Visual Basic Editor open so you can see why secRMM listed what it did.


If you get a secRMM event and the Additional Info line contains:
Description=Programmatic access to Visual Basic Project is not trusted.
this means that the Office program does not trust macros so secRMM could not parse the file for macros.  What?!!!  Right, it sounds crazy but secRMM is not doing anything out of the ordinary to obtain the information about the macros.  This message means there ARE macros but secRMM is not allowed to look at them.

We hope you found this information useful.
You can try secRMM for 30 days (fully functional).
Please visit the Squadra Technologies web site to download secRMM.
Thanks for reading!

Leave a comment

Apricorn secRMM freeware



There is a youtube video showing you the workings of “Apricorn secRMM” at:

Apricorn is a removable storage hardware vendor that Squadra Technologies has had the privilege of partnering with over the last several years.  The two companies now have a jointly developed version of secRMM that is called “Apricorn secRMM” (internally named secRMM-lite so we may slip up and call it that too 🙂 ).  “Apricorn secRMM” is free software offered by Apricorn and supported by Squadra Technologies.  “Apricorn secRMM” lets Apricorn customers configure their Windows workstations and servers to allow just Apricorn devices to be used by end-users.  This is a very powerful capability since it narrows down the removable storage devices allowed in your environment to only hardware encrypted, password protected devices!


“Apricorn secRMM” is a “limited functionality” version of the Squadra Technologies product secRMM.  “Apricorn secRMM” exposes the secRMM properties:

  1. AllowedInternalIds
  2. AllowedSerialNumbers
  3. SCCMConnection
  4. SNMP

The first two properties (AllowedInternalIds and AllowedSerialNumbers) constrain the Windows computer to only writing files to Apricorn devices that meet both properties.  Trying to write to any other type of removable storage device will fail.  The AllowedSerialNumbers can be left blank which will allow any Apricorn device.

The SCCMConnection property will allow integration into Microsoft System Center Configuration Manager (SCCM).  Note that “Apricorn secRMM” will also work with the secRMM Microsoft System Center Operations Manager (SCOM) Management Pack(s) as well.  For complete details on Microsoft System Center integration, please visit http://squadratechnologies.com/Products/secRMM/SystemCenter/secRMMSystemCenter.aspx.

The SNMP property will throw SNMP “Apricorn secRMM” traps to a SNMP trap receiver computer.

“Apricorn secRMM” generates audit events for all removable storage ONLINE and OFFLINE events.  Please note however that it will not generate file WRITE events (whether successful or unsuccessful).  To get file WRITE events (and the other secRMM events), you will need the secRMM full version.

When you first install “Apricorn secRMM”, you will have 30 days to trial the software.  During the 30 day trial, you will have the ability to toggle the software between the “Apricorn secRMM” version and the full version of secRMM.  This will help you decide if you can do without the additional functionality that the full version of secRMM provides (i.e. advanced auditing, additional authorization properties, user configurations, etc.).

Apricorn secRMM User Interface

If/when you decide that you would like to use the software (either “Apricorn secRMM” or the full version of secRMM) in your environment, please contact Squadra Technologies (sales@squadratechnologies.com) to obtain a license (either for free or to start a purchase).  If you decide that you want to purchase the full version of secRMM, you will need to tell Squadra Technologies how many computers you have in your environment that will run secRMM.  The number of computers dictates the purchase price.  The more computers, the less “per computer” price.

Squadra Technologies is very excited to be working more closely with Apricorn and Apricorn customers!  Please feel free to contact us (sales@squadratechnologies.com) anytime if you have questions about using “Apricorn secRMM” or the full version of secRMM.

Leave a comment

Use Microsoft Operations Management Suite (OMS) for DLP “plug-and-play” “Removable Storage” security assessments


Click to enlarge

Microsoft Operations Management Suite (OMS) is an online portal product that gives you the ability to monitor security events across your IT environment, from on-premises data centers to the cloud. OMS is Microsoft’s next generation monitoring tool that is built from the power of System Center Operations Manager (SCOM). In fact, OMS can be configured to sit on top of your existing SCOM deployments.

Microsoft started building OMS solutions by first providing a “security and audit” solution. OMS lets you add “solutions” based on your monitoring requirements.

An OMS solution is:
1. a collection of related event queries,
2. alert-able actions
3. and user interface components
that make it very easy to extend your monitoring framework.

It is very easy to add a solution to your OMS portal because Microsoft packages up their OMS solutions and allow you to select them from the “OMS solutions gallery”. The OMS solutions gallery is like an online store where you pick what solutions you want. Examples of some of the solutions that Microsoft offers are: Active Directory Monitoring, Exchange Monitoring. Where Microsoft has really focused though is in the security monitoring space. The security solutions include such topics as: Malware, System Update and Configuration assessments.


Click to enlarge

Like SCOM and most all of the System Center products, Microsoft allows OMS to be extensible. This allows Independent Software Vendors (ISVs) like Squadra Technologies and corporations with in-house applications to build OMS solutions as well. OMS is a perfect tool to expose plug-and-play removable storage device events. Here, we are talking about USB thumb drives, external USB connected hard drives, SD-Cards and especially USB attached mobile devices. Squadra Technologies “Security Removable Media Manager” (secRMM) is Windows security software that monitors/audits and controls the use of “plug-and-play” removable storage devices. secRMM is tightly integrated into Microsoft System Center via SCCM, SCOM, Orchestrator and now OMS.


Click to enlarge

The OMS secRMM solution is a perfect addition to the existing Microsoft OMS security solutions. Once the OMS solution gallery is open to ISVs, we will list the OMS secRMM solution in the OMS solution gallery.  For now, you can download it from here.

For more details about secRMM, please visit www.squadratechnologies.com.