Access Control

Security

48 sections
376 source tickets

Last synthesized: 2026-02-13 01:18 | Model: gpt-5-mini
Table of Contents

1. macOS elevated privileges: Admin Minion and long‑term admin access

51 tickets

2. Windows local administrator provisioning using LAPS and SafeApp

50 tickets

3. Blocked USB / mass‑storage devices due to security policy

65 tickets

4. Content‑level access denied for Confluence, SharePoint and CARE

105 tickets

5. External worker approver misconfiguration and self‑approval risk

8 tickets

6. Dataverse API / service account missing privileges causing null relationship fields and failed Power Automate flows

4 tickets

7. Azure Storage Account archival data needed network restrictions, monitoring and key management

3 tickets

8. Conditional Access network/location blocklist blocked Teams mobile sign-ins over cellular

5 tickets

9. LMS tenant/group configuration allowed unintended student enrollment and required alternate group for service account

11 tickets

10. Temporary Teams chat disablement for harassment / disciplinary action

1 tickets

11. SIM PIN/PUK retrieval for company mobile phone

1 tickets

12. EPOS profile search failures after long-lived tab due to Okta session expiry

7 tickets

13. Missing campus printers due to print-permission scope and VPN requirements

1 tickets

14. Stolen Windows laptop: device report, remote lock and replacement provisioning

1 tickets

15. macOS access prompt from 'install_helper' (Microsoft Defender / update helper)

2 tickets

16. iOS/iPadOS Apple Mail Exchange account warning about remote admin control

1 tickets

17. Microsoft Teams / M365 Group classification corrections

1 tickets

18. Group Policy Hardened UNC Paths enforcement for SYSVOL/NETLOGON

1 tickets

19. Suspicious sign‑in notification for third‑party SaaS (shared ElevenLabs account)

3 tickets

20. macOS Touch ID periodically requiring account password due to enforced security policy

4 tickets

21. 1Password account lockout requiring recovery key delivery

1 tickets

22. Teams security group membership assignment failed when granting admin rights

2 tickets

23. macOS iCloud Drive and Passwords app access blocked by corporate policy

1 tickets

24. Miro board ownership transfer requests

4 tickets

25. Over‑broad Freshdesk agent permissions exposing organization‑wide analytics

1 tickets

26. Datadog role change blocking webhook/integration configuration

2 tickets

27. Unauthorized third‑party AI notetakers joining Microsoft Teams meetings

6 tickets

28. BYOD requests for access to corporate network printers

2 tickets

29. Sign-in blocked by 'Your organization has disabled this device' message affecting Teams/Outlook

1 tickets

30. Proctoring/screen‑monitoring software triggering 'Invalid Access' during e‑tests

2 tickets

31. Link‑shortening service lacking long‑term click retention requiring replacement

1 tickets

32. Blocked device app store preventing installs on corporate mobile phones

1 tickets

33. Granting external .ext accounts read access to tenant audit logs and configuration

3 tickets

34. User request for a private, user-only cloud storage solution

2 tickets

35. Jamf Connect login prompt from Okta/local password desynchronization

1 tickets

36. BitLocker recovery prompted after repeated sign‑in failures during initial Windows setup

3 tickets

37. Hardware MFA (YubiKey) procurement when users cannot use corporate mobile phones

2 tickets

38. Alarm zone sensor battery depletion triggering security alert

1 tickets

39. Fail2Ban tuning and DMZ reachability discrepancies for MX2 mail server

2 tickets

40. Atlassian Jira Service Management blocked external customers due to disabled external account type

2 tickets

41. WorkFlex policy referenced deprecated CPG‑VPN, leaving public Wi‑Fi guidance out of date

1 tickets

42. Unexpected / unauthorized deletion of Microsoft Teams group and owner loss of access

1 tickets

43. Selecting a confidential collaboration tool for ISMS actions with per-person visibility

1 tickets

44. Workday HCM → Data Warehouse: access model and initial data security scoping

3 tickets

45. Mail-enabled Azure AD dynamic/security groups receiving unintended emails

1 tickets

46. Scope‑limited Docker Desktop sign‑in enforcement for licensed users

1 tickets

47. Local administrator requests resolved via Company Portal self‑service JDK availability

2 tickets

48. Jira Service Portal: tickets emailed whole organization when requesters shared requests

1 tickets

1. macOS elevated privileges: Admin Minion and long‑term admin access
93% confidence
Problem Pattern

macOS devices failed to obtain local‑admin privileges via Jamf Self Service (Admin Minion/Adminion) or local sudo. Symptoms included missing, invisible, or nonfunctional Self Service/Admin Minion entries (sometimes showing “service not activated”), the “Admin for 30 min” action absent or present but failing to grant privileges, new Self Service+ flows reporting success without granting rights, admin credential dialogs rejecting the local account password, and sudo returning “user is not in the sudoers file”. Affected users could not install/update software or change privacy permissions (camera, screen recording); incidents commonly correlated with Jamf/MDM/catalog or policy-application sync failures, incorrect admin-group membership or stale federated/AD login state, and MDM enrollment conflicts (Intune/Company Portal).

Solution

Temporary elevation via Jamf Self Service’s Admin Minion (the “Admin for 30 min” action) repeatedly restored workflows that required local admin — for example software installs/updates, developer tools/Homebrew, privacy permissions (Teams/Zoom), macOS/security updates, and font installs for Adobe. When the Minion entry was missing or nonfunctional, support restored the Minion item in Jamf or assigned the user to the designated short‑term admin group (for example MAC‑LocalAdmin‑shortterm); group‑membership propagation typically took a few hours and a restart/relaunch of Self Service commonly made the entry appear. Jamf/MDM/catalog or policy-application failures sometimes prevented elevation; restoring the Admin Minion or applying server‑side Jamf fixes and allowing policies to reapply reinstated sudo/admin access — at least one incident required a specialist-team server‑side fix before policies took effect. Device‑enrollment conflicts in which Intune/Company Portal reported the Mac as registered with another MDM correlated with inability to install software or self‑elevate; resolving the enrollment/MDM conflict or restoring Jamf‑managed Self Service functionality addressed those cases. In observed cases, admin rights assigned via Intune Company Portal propagated to macOS devices in about 30 minutes when applicable. For sustained needs, long‑term admin access was provided by adding the user to the appropriate long‑term admin group, by changing Admin‑Access‑Time to extend Minion durations, or by enabling/assigning a long‑duration Self Service entitlement (documented as “request long time Admin rights”); one case produced a three‑year admin grant. Self Service sometimes required federated login (Microsoft/Okta or Apple) before Minion could run; locating Self Service via Launchpad or Finder was effective when the Minion entry was not immediately visible. Alternate flows (Get Software/software portal or the Jamf app) occasionally succeeded when Minion was missing. In one newly observed pattern after the Self Service → Self Service+ upgrade, the new “request now” administrator flow could report success but fail to actually grant local admin/sudo (sudo continued to report “user is not in the sudoers file”); those incidents were resolved by backend/server‑side agent fixes applied by IT. A few persistent cases were resolved by updating macOS to a later build, and one isolated case required hardware replacement.

2. Windows local administrator provisioning using LAPS and SafeApp
93% confidence
Problem Pattern

Windows 10/11 endpoints lacked usable local Administrator access: LAPS/Intune/Azure AD console entries were missing or greyed‑out, showed “no local passwords found,” or contained passwords that failed to elevate at UAC. Time‑limited elevation links/emails or temporary admin tokens sometimes expired before use, and Azure AD/device synchronization delays produced temporary access gaps. UAC prompts occasionally rejected provided admin credentials without clear errors, preventing installs and developer toolchain tasks. Endpoint Privilege Management (EPM) sometimes failed to launch after Intune approval, reporting missing elevated privileges or 'path cannot be found.' Users also reported inability to access user‑profile folders (for example %AppData%\Microsoft\Excel) because of restrictive file permissions that blocked recovery of autosave files.

Solution

Local administrator access was provided using established enterprise mechanisms and short‑term alternatives depending on policy and urgency. Routine installs were resolved by Company Portal/self‑service packages for common developer utilities (examples: Node.js, Java, Salesforce CLI) which avoided elevation in many cases. Time‑limited admin access was granted by adding users to the IUG‑AAD‑WindowsLAPS‑Users365Days AAD group or by issuing temporary local‑admin credentials/one‑time links delivered via SAFE App or email. Support recorded Azure AD/device synchronization delays of up to about one hour before LAPS credentials appeared; when LAPS/Intune showed no password, a greyed‑out field, or a LAPS password was refused by the device, incidents were escalated to specialists and interim access was provided via time‑limited AAD group membership or direct elevation when policy allowed. Short‑lived elevation emails/tokens occasionally expired and were reissued as needed. When UAC elevation failed with no clear error, one case was resolved by using the local account with machine‑qualified username and remote troubleshooting via TeamViewer confirmed access. Endpoint Privilege Management (EPM) failures were observed where the EPM client would not start despite Intune approvals and reported either missing elevated privileges or that the path could not be found; those failures were recorded and alternative access methods (time‑limited admin group membership or an administrator performing the action) were used where necessary, and at least one incident had no technical remediation logged. For file access and recovery, support located and copied autosave/recovery files to a usable location so users could open them (examples: recovering %AppData% Excel autorecovery files). For protected data that required local admin (for example E‑Lock exports), an administrator copied the data to removable media and tested it on another device before closing the ticket. For developer and data‑science toolchains requiring device‑level changes (WSL2 kernel updates, Docker daemon/network drivers, compilers, system‑wide PATH changes, enabling VT‑x in BIOS, etc.), support either granted time‑limited local admin, performed elevated installations remotely, or provided alternative developer resources (temporary VMs or reassigned hardware) when long‑term admin was inappropriate. BIOS virtualization changes sometimes required vendor assistance; vendor/device BIOS password state was documented during triage. Long‑term local admin remained restricted by policy; extended‑duration admin requests required formal manager/security approval. Unknown vendor/application administrator credentials and licensing concerns were escalated to vendors or specialists and recorded during triage.

3. Blocked USB / mass‑storage devices due to security policy
91% confidence
Problem Pattern

On Intune/Azure AD–managed Windows 11 devices, centrally deployed endpoint/device‑control policies blocked USB mass‑storage, MTP and some external removable media (SD/memory cards), preventing volumes from mounting. Affected machines often showed removable hardware in Device Manager or Disk Management while File Explorer reported access errors such as “Access denied”, “You currently don’t have permission to access this folder”, or “X:\ is not accessible”. Non‑storage USB HID devices typically continued to function and some media files copied from blocked media failed to open with default players.

Solution

Centrally deployed Intune/Azure AD endpoint/device‑control policies had disabled USB mass‑storage and MTP on managed Windows 11 devices, which prevented mounts and produced File Explorer errors like “Access denied” or “X:\ is not accessible.” Incidents were resolved by issuing centrally managed, time‑limited access exceptions (for example via Azure AD entitlement/access‑packages), applying group exclusions, or granting temporary administrator enables (commonly 48–72 hours); some requests required manager approval or Cyber Security escalation. Temporary grants typically propagated within a few hours but occasionally required a shutdown/restart or a manual policy sync (Settings → Accounts → Access work or school → select account → Info → Sync). Where direct USB use remained blocked, support moved data through approved channels (OneDrive, SharePoint, the SAFE app, Dropbox, IU research cloud) or assisted users to upload from a personal/non‑managed device so files would sync to the managed laptop. For some research workflows teams used an on‑prem Windows 10 device not subject to the Windows 11 USB restriction to copy media and then transfer via approved storage. DRM content (for example Adobe Digital Editions/Adobe ID or e‑readers) was handled by authorizing the content on a non‑company device and synchronizing it to the managed laptop or by granting a time‑limited exception. Some multimedia files (for example VOB video files) copied from blocked media still failed to open with default players; alternative players (for example VLC) were used where present. Microsoft Store app blocks were handled by obtaining apps through the Company Portal. Requests to grant access to an internal/local drive (for example adding a user to a local access group for a DevDrive) were treated separately and resolved by adjusting group membership via the specialist team rather than by changing the endpoint storage policy. Desktop support was not permitted to permanently override the central policy. For presentation/infoscreen use‑cases where USB access was inappropriate, the specialist team procured dedicated media players (for example Viewneo boxes) or other site hardware to feed content to displays instead of granting USB mass‑storage access. Presence of third‑party security software (for example Kaspersky at a high security level) did not alter enforcement of the central USB policy. In at least one case technicians explicitly denied USB access for photo transfer per policy and advised users to use a private computer to upload photos to cloud storage (examples included Dropbox or OneDrive).

4. Content‑level access denied for Confluence, SharePoint and CARE
95% confidence
Problem Pattern

Authenticated users, guests or automation contexts were unable to open, view, edit or share content across collaboration platforms and embedded services. Symptoms included explicit 'Access Denied' or HTTP 403 responses, 'You do not have access' or 'Page not found' for attachments, 'refused to connect' for embedded frames, missing edit/comment controls, invisible or locked files, and failed shared‑link, report or folder operations. Affected systems included SharePoint/OneDrive/Teams channel libraries (including private channels and meeting recordings), LMS/Learning Hub iframes, third‑party form storage, Confluence/Jira/Salesforce/PowerBI/vendor tools, Git repositories and internal file shares; common triggers were missing owners, license or role restrictions, incorrect group/dynamic‑group membership, automation/flow execution identity or SSO/session context changes, tenant external‑sharing changes, and propagation or client cache timing.

Solution

Investigations repeatedly attributed content‑level access denials to identity or context mismatches, absent or incorrect owners, license/profile restrictions, group or dynamic‑group membership errors, automation execution identity, embed/authentication domain boundaries, corporate external‑sharing rules, or scheduled policy/automation removals. Representative findings and outcomes included: - Owner and ACL remediation: Historical Audit Committee files had been inaccessible after the owner left; access was restored by adding the requesters to the location ACLs or reassigning ownership. - Dynamic groups and Teams/SharePoint: Cases where expanding an Azure AD dynamic rule changed who could view channel content produced symptoms where users could read posts but not open the channel Files; investigations pointed to dynamic membership, SharePoint library scope differences for private channels and membership/propagation timing as the root causes. - Power Automate / flow execution context: Several incidents produced usable links only when the flow Owner executed them; troubleshooting identified execution identity/context as the cause and required escalation to the product/flow owner. - Recurring/automated revocations: Short‑term permission restorations were repeatedly undone by scheduled policies or automation; teams temporarily re‑granted access while policy automation was investigated and adjusted. - Teams private channels and meeting recordings: Files stored in private channel libraries or organizer OneDrive remained access‑controlled by separate libraries; restoring file‑level sharing or moving recordings to a channel library returned access in resolved cases. - Embedded/iframe content and LMS: 'Refused to connect' or inaccessible embedded content mapped to a separate authentication context or to allowed‑embed‑domain/permitted‑HTML policies in the consuming app; fixes adjusted allowed embed domains or addressed the service authentication boundary, with vendor escalation where vendor authentication prevented embedded access. - Third‑party form attachments: 'Page not found' outcomes were traced to vendor form/storage permissions; reporters were directed to the form owner or vendor permission contact. - Confluence, Miro and vendor tools: Missing edit/comment controls mapped to license/account types, absent space/board membership or legacy permission schemes; restoring membership, confirming license entitlements or fixing space permission mappings resolved access. - Jira / Issue Security: Visibility and edit blocks were traced to project scopes and Issue Security Levels; product administrators adjusted project configuration and security group membership where appropriate. - CARE / EPOS / document generation: Viewing and audit access required explicit CARE roles and proper location visibility; cross‑location visibility loss was resolved by restoring location assignments. DokGen/template problems were fixed by updating and redeploying templates/configurations. - Salesforce / CRM / Reports: Report failures and blocked folder operations correlated with profile, field or folder permissions; remedies involved restoring permission sets and field security so intended users retained access. - GitLab / internal apps / NTFS: Denials resolved after assigning correct project/group roles, updating in‑app rights or removing problematic NTFS/share ACLs, and handling checked‑out files or locks. - BIC / missing metadata: Files saved without author metadata became uneditable in repository roots; repository owners removed or repaired affected files to restore workspace integrity. - External sharing and anonymous reviewers: Requests to grant access to reviewers without verifiable external identity were evaluated against corporate external‑sharing policy and often treated as policy‑restricted; teams identified policy‑compliant alternatives. - Vendor support boundaries and permission portals: For vendor‑managed systems, support confirmed they only handled account provisioning and directed requesters to vendor permission portals or application/product owners when support could not change permissions. - Unresolved/escalated items: Some tickets (for example external consultant loss of PowerBI dashboard access and template access in the Learning Hub) were escalated to workspace/product administrators or specialist teams with no final resolution recorded in the ticket. General observations: resolutions commonly involved confirming license and account types, role/profile assignments, reassigning site/list/file owners, restoring explicit ACLs or group membership, and accounting for Azure AD/Entra propagation delays and client cache/stale sessions; investigators routinely advised reauthentication when user or execution context had changed and preserved privacy when reviewing file metadata or audit history.

5. External worker approver misconfiguration and self‑approval risk
62% confidence
Problem Pattern

Approval workflows failed to locate or present valid internal approvers for access and cost‑center requests, causing approvers to be wrong, external, or missing. Observed symptoms included Jira automation closing tickets with “no approver detected”, approvers populated from the wrong Workday field (e.g., Cost Center Approver vs Cost Center Manager) or not matched due to email/ID mismatches in AtlassianUser/employee imports, approval requests auto‑declining after approver timeouts and remaining closed, designated approvers unable to act from the Service Portal Approvals UI, and access‑management policy (Minerva) denials of temporary admin grants. Affected systems included Jira, Workday, Service Portal/Service Center, and downstream purchase‑order/requisition routing.

Solution

Investigations identified two principal failure modes and several user‑facing symptoms. Records that pointed approver fields to external addresses were corrected to point to internal IU contacts, and the approval/account automation was changed to disallow self‑approval and require an internal approver so external workers could not approve or extend their own access. Lookup failures that routed cost‑center approvals to incorrect people were traced to use of the wrong Workday feed field (Cost Center Approver vs Cost Center Manager) and to email/ID mismatches in AtlassianUser/employee imports; source mappings and employee import records were reconciled so the approval lookup used the correct Workday field and matched approvers to AtlassianUser/employee records, after which the approval automation reliably located internal approvers. One admin‑permission request had timed out and been auto‑declined by Jira automation and remained closed without a reopening action recorded. Separately, a requester’s temporary‑admin request was closed by IT because the Minerva access‑management policy disallowed granting temporary administrative rights; the requester was instructed to recreate the request and specify the correct Workday cost‑centre manager so an approver could be identified. A case where a designated approver could not act from the Service Portal UI was investigated; support verified the user’s Service Portal access but no further technical cause was documented. Additional cost‑center instances (for example, CC21229) were reported as routed to incorrect approvers; in at least one instance recommendations were documented in the ticket but not applied. Impacted flows included access requests and downstream purchase‑order/requisition routing through the Service Center.

6. Dataverse API / service account missing privileges causing null relationship fields and failed Power Automate flows
85% confidence
Problem Pattern

Dataverse API calls or service principals returned null for relationship fields and Power Automate flows failed with missing entity read privileges (for example, 'is missing prvRead…' errors). Azure AD security groups sometimes lacked designated owners or had incorrect group-to-role mappings across environments, preventing member management and producing unexpected read-only or read/edit access to Dataverse tables (for example crfc0_studentexamdates). The Dataverse web UI could show related data while API/service accounts, group-managed users, or individual users received nulls or permission errors when calling the API or running flows.

Solution

Issues were resolved by addressing three access-control areas: service/application principal privileges, Azure AD group ownership and role mappings, and individual user table permissions. For application/service principals: the applications were granted the missing Dataverse privileges (including prvRead and other entity privileges), their security roles were updated to include explicit read/create and related-metadata access, column-level security and secured field settings were inspected and removed where they blocked the service accounts, and environment-level access for application users was confirmed; after these changes API calls and Power Automate flows returned relationship data and succeeded. For Azure AD security groups and ownership: designated owners were added so groups could be managed via the CPC_AddUser2Group tool, group-to-role mappings were standardized across environments (admin groups received the app plus Dataverse edit rights, user groups received front-end app access without direct Dataverse edit rights, and the readonly group was renamed and given read-only Dataverse access), and separate environment-scoped group memberships (DEV/PROD) were enabled where required. For individual user access issues: specific user permissions were updated when group-level mapping was insufficient — for example, an account on crfc0_StudentExamDates was changed from read-only to write access to restore edit capability via Power Apps/Flows. These combined changes restored expected API/flow behavior and user editing capabilities without broad privilege escalation.

7. Azure Storage Account archival data needed network restrictions, monitoring and key management
90% confidence
Problem Pattern

Azure Storage accounts were flagged by Microsoft Defender for Cloud (for example 'blob-hunting' alerts) or audit checks for potentially publicly accessible blob containers (commonly a container named 'public' holding generated/test files from deprecated features). Symptoms included Defender alerts about public-container access or attempted indexing and operator reports that IAM permissions prevented completing remediation. Affected systems are Azure Storage blob containers and Defender/monitoring tools.

Solution

A Defender for Cloud 'blob-hunting' alert was investigated by enumerating containers (PowerShell was used to list public containers) and inspecting the flagged container. The investigation confirmed the flagged 'public' container contained GUID-named generated image files from a deprecated feature and was not indexable. As part of the account hardening, monitoring and detection were centralised (Log Analytics and Microsoft Sentinel integration) and Azure Defender for Cloud was enabled for threat detection. Public blob/container access was disabled and HTTPS-only enforcement was applied. Network access restrictions (IP whitelisting) were implemented and long-term access keys were rotated and managed to minimise shared key usage. Microsoft-managed encryption keys and key-rotation practices remained in place. The incident also exposed an IAM gap during remediation, so ownership/permission paths were clarified to allow required security changes.

Source Tickets (3)
8. Conditional Access network/location blocklist blocked Teams mobile sign-ins over cellular
71% confidence
Problem Pattern

Users were immediately unable to access Microsoft 365 resources (Teams, Outlook, calendar sync from third‑party apps) despite successful primary authentication in some cases. Failures appeared as explicit Conditional Access denial messages, no Azure AD sign‑in record, network‑dependent success/failure (e.g., Wi‑Fi vs cellular), or an access‑denied post‑sign‑in error “You don't have access” (Error 53003) when a device was unregistered or tenant app‑consent/Conditional Access settings blocked the resource. Affected clients included mobile apps, desktop Outlook, and third‑party sync apps; device platform and registration status varied.

Solution

Investigations started with Azure AD sign‑in logs and reproducing failures across networks. Two network‑level causes were identified and resolved: (1) Conditional Access network/location blocklist rules had been blocking mobile‑operator IP ranges (including IPv6/CIDR) and were adjusted so legitimate mobile data traffic was no longer excluded; (2) a perimeter firewall/InfoSec malicious‑IP blocklist had been blocking traffic from a campus WLAN and was removed/cleansed (when the perimeter blocked traffic, affected attempts sometimes produced no Azure AD sign‑in record). A separate Conditional Access cause was identified where third‑party apps (OneCal) or client devices were denied access after a successful sign‑in with Azure AD error 53003 (“You don't have access”); these incidents traced to tenant Conditional Access/app‑consent and device‑registration or device‑compliance requirements and were resolved by changing the tenant Conditional Access/app‑consent or device registration allowances so the authorized app or compliant device could access the resource. After addressing the relevant Conditional Access/policy definitions and firewall blocklist entries, Teams, Outlook and third‑party calendar syncs over the affected networks and devices were restored.

9. LMS tenant/group configuration allowed unintended student enrollment and required alternate group for service account
62% confidence
Problem Pattern

Provisioned identities and system controls caused incorrect access, visibility, or membership across Learn365/LMS, Microsoft Teams, and Microsoft 365 services. Reported symptoms included unintended course enrollments and visibility changes, system-wide role overrides that made assessments preview-only, AccessDenied.aspx errors when Workday-synchronized manager attributes were missing, and issuance/download of official documents (certificate of study) to users without active student status. Other symptoms included inability to add service accounts due to AD group-scope constraints, disabled or ex-matriculated accounts appearing in Teams/distribution lists or calendar meeting displays, and user reports that Team members could create meetings or invite external guests despite Team-level governance. Affected components included Learn365/LMS, Azure AD/Entra groups, Workday syncs, Microsoft Teams, Exchange/meeting systems, and the document-generator.

Solution

Incidents were resolved by reconciling provisioned identities and system constraints across Learn365/LMS, Azure AD/Entra, Workday-synchronized attributes, Microsoft Teams, Exchange/meeting systems, and the document-generator, and by remediating specific misconfigurations and stale accounts. Specific remediations included: narrowing tenant and Learn365 group-based enrollment targets so assignments applied only to intended AD groups; removing an erroneously assigned system-wide role (CPG_Kommunikationsteam_Standort) from affected student profiles, which restored normal assessment access and removed preview-only behavior; provisioning missing Workday-synchronized manager attributes or adjusting course/group mappings for courses that required the manager attribute, which removed AccessDenied.aspx errors; updating the document generator validation so certificates of study were not issued or downloadable for students with status 'Unter Vorbehalt' (those without active student status); relocating a service account out of an AD group that Learn365 rejected into an alternate AD group accepted by Learn365 and updating mappings; removing legacy myLIBF restrictions that prevented examiner/tutor account switching so selected staff could toggle those accounts; and removing users who were present in a Microsoft Teams Course Feed or distribution list but were not intended members. Stale or suspicious accounts were escalated to specialist teams where appropriate; one ex-matriculated account was deactivated and flagged not to be reactivated. A calendar/meeting-system incident was escalated to security and meeting-systems specialists: termination/disable dates were confirmed, audit logs showed no logins or activity after deactivation, and the behavior was attributed to a known meeting-systems glitch that could cause meeting updates or sender/recipient displays to appear tied to disabled iu.org accounts. For the Academic Lecturer Team, options were reviewed and it was confirmed that Microsoft does not provide a per-Team setting to block team members from creating meetings or inviting external guests; mitigations focused on membership reviews, tenant-level guest/external access controls, and governance changes to reduce risk. Post-change checks confirmed course enrollments, course visibility, assessment behavior, service-account group membership, myLIBF account-switching, Teams Course Feed and distribution-list membership, document-generator behavior, and removal or deactivation of stale/suspicious accounts behaved as intended.

10. Temporary Teams chat disablement for harassment / disciplinary action
95% confidence
Problem Pattern

A user continued to send unwanted or harassing direct chat messages in Microsoft Teams to a staff member despite requests to stop. Messages were delivered with no client errors and the behaviour required an account-level restriction to stop contact. Affected systems: Microsoft Teams messaging policies and Microsoft 365/Azure AD policy assignment.

Solution

A restrictive Teams Messaging Policy was applied to the user account to disable the chat function (implemented at 15:00) for the disciplinary period. After the two‑week suspension period concluded, the global messaging policy was reassigned to the user to restore chat functionality (re‑enabled at 15:00 two weeks later).

Source Tickets (1)
11. SIM PIN/PUK retrieval for company mobile phone
90% confidence
Problem Pattern

A user reported that they had misplaced the SIM card PIN and PUK (and related codes) for a company mobile phone and requested the credentials to unlock or manage the SIM. No device or network errors were reported; affected systems were the SIM card and telecom account tied to the service phone.

Solution

Support retrieved the stored SIM authentication credentials from records and provided the user with the PIN/PUK (and associated SIM codes) for the company phone number.

Source Tickets (1)
12. EPOS profile search failures after long-lived tab due to Okta session expiry
90% confidence
Problem Pattern

Users intermittently received HTTP 403 (access denied) or generic permission errors and/or were unexpectedly logged out when using EPOS or other Okta-authenticated web apps. Symptoms included missing person/profile search results, inability to open Salesforce-linked records, absent role-based navigation/permissions, or inability to edit files opened in browser-based Teams/Excel. Failures were frequently observed after leaving tabs open past the Okta session lifetime (~1 hour), after tab-switching or with bookmarked Firefox tabs, during Gateway Authorizer malfunctions, or when user identity/account data (for example outdated email addresses or incorrect approver assignments) were incorrect.

Solution

Investigations identified three root causes for the access/permission symptoms and distinct remediations. First, expired or invalid Okta sessions/authentication tokens caused missing search results, broken Salesforce-to-EPOS links, absent navigation tabs, and loss of edit capability in browser-embedded apps (notably Microsoft Teams and Excel Online). Restoring a valid Okta session consistently restored functionality: in many cases a page reload or signing out and back in refreshed tokens; in some browser scenarios (bookmarked/long-lived Firefox tabs or after tab-switching) the in-page embedded sessions required a full tab close-and-reopen to recover. Clearing browser cache was recommended in one incident but was not confirmed as a definitive fix. Second, separate incidents of access-control failures were traced to malfunctioning Gateway Authorizers; applying a hotfix to the Gateway Authorizers restored authorization behavior and subsequent repository/configuration corrections were recorded to prevent recurrence. Third, some HTTP 403/access-denied search failures were caused by user identity/account misconfigurations — notably outdated email addresses and incorrect approver-role assignments on the user account; correcting the account email and adjusting the approver assignment resolved those access/search failures. Support validated that affected users did not have EPOS permission misconfigurations by comparing their profiles with colleagues before applying identity/role fixes.

13. Missing campus printers due to print-permission scope and VPN requirements
90% confidence
Problem Pattern

A user could not see or access specific campus printers (Dresden) while only printers from another campus (Leipzig) were visible. Symptoms included missing printers in the print dialog with no explicit error codes; off‑campus users required VPN to load campus printers.

Solution

An administrator located the two requested Dresden printers and granted the user the required print permissions. The user was informed that permission changes can take time to appear and that off‑campus access requires connecting via VPN. Admin requested exact printer names or a contact who already had access to replicate permissions for any additional missing printers.

Source Tickets (1)
14. Stolen Windows laptop: device report, remote lock and replacement provisioning
90% confidence
Problem Pattern

A Dell Windows 11 laptop was reported stolen from a user's backpack at an event venue. The device identifier (IUGWHPX2W94) was flagged for deactivation/remote lock and the user changed their Okta credentials. After a replacement notebook was issued the user encountered an "Incorrect username or password" sign-in error with their IU/Okta account on the new device before the authentication issue later cleared and provisioning completed. Affected systems included Windows 11, Okta, device management (remote lock/wipe) and IU email.

Solution

The stolen device was reported and a deactivation/lock request was submitted to device management while Cyber Security Services were notified. The user changed their Okta password. A replacement notebook was issued; the initial authentication failure on the new device was transient and later cleared, and the replacement was successfully provisioned. The incident was closed after the lock/password actions and successful replacement provisioning.

Source Tickets (1)
15. macOS access prompt from 'install_helper' (Microsoft Defender / update helper)
90% confidence
Problem Pattern

macOS users reported unexpected system permission or administrator-access dialogs (popups) from an 'install_helper' or similar update helper process during Microsoft Defender or other package update operations. The prompt typically requested administrator rights, could repeat, and sometimes appeared after use of 'su' or other privileged actions. Users inspected Activity Monitor and screenshots but did not see error codes and sought confirmation whether the requesting process was safe to permit.

Solution

Support identified the requesting processes from user screenshots and Activity Monitor as macOS update helper processes — commonly Microsoft Defender's 'install_helper' — that were completing component updates. When the helper was confirmed legitimate, granting the requested access allowed the Defender update to finish and the prompt to stop. In a related incident where an administrative prompt repeatedly appeared after the user ran 'su', the prompt was resolved after the Mac was restarted so pending package installations could be applied; the restart removed the repeated admin popups. Identification via Activity Monitor/screenshots and either granting the helper's access or rebooting to complete pending installs were the observed resolutions.

Source Tickets (2)
16. iOS/iPadOS Apple Mail Exchange account warning about remote admin control
65% confidence
Problem Pattern

When adding an IU Microsoft Exchange account to Apple Mail on iOS/iPadOS, users saw an Apple warning that the Exchange admin can remotely manage the device (add/remove restrictions, remote wipe). The prompt caused privacy concerns and confusion about whether Jamf or Intune was applying device‑management policies; the warning did not appear on macOS Apple Mail. No device management profile was observed in Jamf during testing.

Solution

Support clarified that the iOS/iPadOS prompt was the operating system warning generated when an Exchange ActiveSync account with server‑side device‑level controls was added; it did not indicate automatic MDM enrollment. During investigation no Jamf policies or MDM profiles were being installed by the account setup, and the warning was reproducible only on iOS/iPadOS Apple Mail. The explanation to users and documentation of the behaviour resolved the privacy concern; users who preferred to avoid the prompt were routed to the Outlook mobile app or webmail as alternatives.

Source Tickets (1)
17. Microsoft Teams / M365 Group classification corrections
90% confidence
Problem Pattern

Multiple Microsoft Teams/Microsoft 365 groups had incorrect or missing classification values (for example, groups marked 'Unmanaged / Students only' needed to be changed to 'Confidential / Employees only' or 'Trusted / Employees and trusted guests'). The issue required bulk or per‑group reclassification across Azure AD/Teams without runtime errors being present.

Solution

Team membership and classification attributes were updated in Azure AD/Teams using administrative automation (PowerShell/Graph where appropriate). The requested classification values were applied to the listed groups (e.g., switching from 'Unmanaged / Students only' to 'Confidential / Employees only' or to 'Trusted / Employees and trusted guests') and the changes propagated to Teams and the Microsoft 365 group objects. The classification updates were performed via scripted admin workflows to ensure consistency and traceability.

Source Tickets (1)
18. Group Policy Hardened UNC Paths enforcement for SYSVOL/NETLOGON
95% confidence
Problem Pattern

A security scan (Ping Castle) reported a 'Hardened Paths' weakness: Group Policy UNC entries (including SYSVOL and NETLOGON and patterns like \\DCName\*) were not configured to require integrity and mutual authentication, exposing SYSVOL/NETLOGON accesses to potential interception or tampering.

Solution

The GPO Hardened UNC Paths settings were edited to add or update entries that contained SYSVOL, NETLOGON and relevant UNC patterns and to set RequireIntegrity and RequireMutualAuthentication on those entries. The hardened UNC path configuration change addressed the Ping Castle finding referenced to MS15‑011/MS15‑014, and the updated policy was applied to domain controllers to enforce integrity and mutual authentication for SYSVOL/NETLOGON accesses.

Source Tickets (1)
19. Suspicious sign‑in notification for third‑party SaaS (shared ElevenLabs account)
70% confidence
Problem Pattern

Users reported unexpected or unaccounted sign‑in events for third‑party SaaS or identity provider accounts (examples: ElevenLabs, Okta) and unexplained file‑access/activity entries in Microsoft 365 (SharePoint/OneDrive/Excel). Symptoms included email sign‑in notifications showing logins from unfamiliar locations, user-reported logins they did not perform, file-history or access-log entries attributing activity to users at odd times, and cases where administrators could not verify the event in logs.

Solution

Investigations used a combination of identity verification, log review, and account remediation. For third‑party SaaS notifications support verified the sender domain and that team members could access the shared account from known devices; reporters were advised to avoid links in the notification and to sign in at the official vendor page, and passwords were changed when sign‑ins could not be accounted for. For an identity provider (Okta) sign‑in where logs were not available, the administrator initiated a forced password reset; the user completed the reset and successfully signed in. For Microsoft 365 file‑access concerns investigators asked where the entry was observed (SharePoint in browser, OneDrive, Excel), reviewed Microsoft 365 file access logs and the file’s version/history, and looked for automated integrations or background services that generate activity; in the reported case no access matched the 03:27 AM timestamp and all observed accesses were legitimate. The combination of domain verification, direct sign‑in confirmation, log and version/history review, checking for integrations, and using account resets when events could not be verified resolved the reported incidents.

20. macOS Touch ID periodically requiring account password due to enforced security policy
90% confidence
Problem Pattern

macOS devices showed settings or features unavailable or behaving unexpectedly because an institutional configuration profile or MDM policy enforced restrictions. Symptoms included enforced screensaver/lock-screen timeouts that locked the device (commonly every 10 minutes) and interrupted presentations, periodic Touch ID prompts that still required the account password, Time Machine settings reporting they were controlled by a profile, and inability to change the default browser with Chrome showing “managed by your organization.” Users also reported related issues such as inability to share screens in Microsoft Teams and blocked access to specific web portals.

Solution

Technicians reviewed installed configuration profiles and MDM controls on affected Macs and ran a short support session with the user where applicable. The Mac Team confirmed the observed behaviors were caused by institutional device‑management policies that could not be changed locally. Specifically, a lock timeout enforced by IU Admin/IT Security prevented changing screensaver or lock‑screen settings (devices locked on the enforced interval, commonly 10 minutes), periodic Touch ID prompts were required by a security policy and still required the account password, Time Machine had been intentionally disabled by a configuration profile on managed Macs, and the default‑browser setting was managed by a browser/MDM policy (Chrome displayed “managed by your organization”). Local admin access did not remove these restrictions; users were informed that the behaviors were due to device management/profile policies and could not be changed on the device.

21. 1Password account lockout requiring recovery key delivery
90% confidence
Problem Pattern

A user was locked out of their 1Password account after repeated incorrect master password attempts. The account presented a recovery-key requirement and the user could not sign in or create support tickets from the locked account. The sign-in screen showed the account-locked/recovery-key prompt and access to stored vaults was blocked.

Solution

Support generated and delivered the user's 1Password recovery key via a one-time secure link and coordinated handoff through a colleague. After the recovery key was provided to the user and used, the user regained access to their 1Password account and no further issues were reported.

Source Tickets (1)
22. Teams security group membership assignment failed when granting admin rights
85% confidence
Problem Pattern

Administrators reported failures when granting or obtaining admin privileges tied to Microsoft 365/Teams security groups. Symptoms included unspecified errors when adding a user as an admin to a Teams security group and accounts that still lacked expected admin capabilities (Teams group management, password resets, MFA management) after attempted changes. Affected systems included Microsoft 365/Teams and PWA admin accounts. Problems occurred when adding users to security groups or assigning roles for administrative scopes.

Solution

Support resolved these issues by ensuring affected accounts were members of the appropriate security groups and by applying the required role assignments. In one incident, support added the user to the existing IUG-LeadershipTeam-Member security group, which granted the requested Microsoft 365/Teams 'My Team' admin membership. In a separate incident, the request was escalated to the specialist team; they created a new security group for the PWA admin accounts, added the specified accounts as members, and adjusted permissions/roles per the provided role attachment so the accounts could perform password resets, manage MFA, and operate Teams groups.

Source Tickets (2)
23. macOS iCloud Drive and Passwords app access blocked by corporate policy
90% confidence
Problem Pattern

macOS Sequoia user reported that Apple iCloud Drive and the Passwords app were not accessible and would not sync across Apple devices, causing loss of access to scripts, books and saved credentials; a UI error was shown when attempting to open iCloud Drive/Passwords and the issue affected access to data stored in iCloud.

Solution

Access was confirmed to be blocked by corporate policy for company-managed devices. The user was informed that iCloud Drive and Apple Passwords were not permitted on corporate systems. Corporate alternatives were recommended (OneDrive for file sync and 1Password for password management). No changes were made to the Mac and the ticket was closed after notifying the user.

Source Tickets (1)
24. Miro board ownership transfer requests
90% confidence
Problem Pattern

Users reported access or ownership problems for collaborative resources such as Miro boards, Confluence spaces, and user-managed calendars. Symptoms included requests to transfer board or space ownership when current owners had left or needed updating, users with assigned licenses who could not open or see specific Miro boards without error codes, and requests to remove calendar sharing or permissions that support could not change because they were owner-controlled. Affected systems included Miro, Confluence, and enterprise calendars; common user-reported issues were missing visibility, inability to open resources, and owner/permission-change requests.

Solution

Ownership and access problems for collaborative resources were handled depending on the resource type. For Miro boards, support changed board owners when requested, verified licensing, and corrected board-level sharing and team access when sharing settings prevented visibility; after owners or support updated sharing, requesters were able to access the boards. For Confluence spaces, support completed recorded space ownership changes so spaces had current owners. For enterprise calendars, support did not have permission to modify another user’s calendar sharing; support informed requesters that calendar sharing and access revocation were controlled by the calendar owner and must be removed by that owner, and no calendar-side changes were performed by support. Requesters were notified after changes or guidance were provided.

25. Over‑broad Freshdesk agent permissions exposing organization‑wide analytics
90% confidence
Problem Pattern

A Freshdesk agent account had excessive permissions and could view agent performance metrics and analytics across the entire organization instead of only relevant groups. Users reported no error messages; symptom was visibility into all groups and org‑wide analytics that should have been restricted. The issue affected Freshdesk and Freshdesk Analytics access scopes for HR and other teams.

Solution

The user’s Freshdesk role was narrowed to remove global/all‑groups visibility and limit access to only the explicitly requested HR groups. Access to Freshdesk and Freshdesk Analytics was granted only for the HR People Admin&Service, HR Print, HR Queue Team, HR Documents, HR Payroll, HR Corona Team, HR International Payroll and HR Jobrad groups. Permission changes were verified and the user’s analytics and group views were confirmed to be limited to those groups.

Source Tickets (1)
26. Datadog role change blocking webhook/integration configuration
88% confidence
Problem Pattern

A Datadog user could not create or edit webhooks because the Webhooks/Integrations UI indicated only read permissions and configuration actions were blocked. The user received permission errors when attempting to add or manage integrations, preventing alerts from being sent to Microsoft Teams channels.

Solution

Datadog role permissions were adjusted to restore Integrations/Webhooks configuration rights after a Datadog role change removed required privileges. The affected role was updated so the user regained configure/manage access for integrations and was able to add webhooks to send alerts to the Teams channel. The user verified creation and editing of webhooks succeeded after the role change.

Source Tickets (2)
27. Unauthorized third‑party AI notetakers joining Microsoft Teams meetings
82% confidence
Problem Pattern

Third‑party AI meeting notetaker services or OAuth apps were able to join or access meetings and capture audio, transcripts, or screenshots across Microsoft Teams, Zoom and Google Meet by authenticating with organizational accounts or via user consent. Affected tenants reported notetaker participants appearing in meetings, unexpected emails/messages sent in users' names, exported transcripts, or vendor‑created workspaces using the organization’s domain; some apps were not registered as Azure/Entra service principals and no platform error messages were shown. OAuth scopes granting calendar access, offline_access, or persistent sign‑in were commonly involved.

Solution

High‑risk third‑party AI meeting notetaker applications were identified and blocked across identity and meeting controls. Administrators disabled known notetaker enterprise applications/service principals in Azure AD Enterprise Applications and removed their ability to sign in or obtain consent. Where service principals were absent, Conditional Access app blacklists were updated and applied to affected user groups to block specific OAuth apps (for example, Otter.ai and Fireflies.ai). Cross‑tenant/external identity and enterprise‑app consent controls were tightened to prevent new untrusted bots from authenticating.

In incidents where vendors retained access via external OAuth providers, remediation included removing the OAuth application from users’ external accounts (for example removing the otter.ai app from Google) and deleting vendor‑side workspaces or duplicate accounts that had been created using the organization’s domain, which stopped continued mailbox posting and message sending. Calendar integrations and OAuth scopes were audited and revoked where calendar, offline_access, or persistent sign‑in permissions had been granted to notetaker services. Meeting join/authentication policies (lobby, guest restrictions, and requiring authenticated users) were enforced to reduce unauthorized joins.

Platform and group‑level controls and content filters were updated across Teams, Zoom and Google Meet (for example adding known notetaker domains to student blocklists). Conditional Access policies were used where appropriate to block app sign‑ins, and rollback procedures were maintained to address any operational impact.

28. BYOD requests for access to corporate network printers
95% confidence
Problem Pattern

A staff member requested access to corporate/internal resources (for example, VPN connectivity to internal systems or access to networked printers) from a personal/unmanaged device such as a personal laptop, MacBook, iPad, or other iOS device. There were no error messages; the user asked whether a non‑managed/private device could gain network or VPN connectivity and access internal printers. Affected systems included VPN, internal networks, networked printers, and device management/policy enforcement.

Solution

Support determined that personal/private (unmanaged) devices were not permitted to access the organization's internal network or services. Both local network/printer access and VPN connections from personal devices (including macOS and iOS/iPadOS devices) were blocked per the organization’s device‑management and remote‑access policies. Requesters were informed of the device‑management policy, asked whether they had an organization‑issued/managed device, and advised to use an issued/managed device or follow the organization's approved remote‑access procedures. The ticket was closed after communicating the policy decision.

Source Tickets (2)
29. Sign-in blocked by 'Your organization has disabled this device' message affecting Teams/Outlook
85% confidence
Problem Pattern

On startup a user saw the error message 'Your organization has disabled this device' and was unable to sign in to Microsoft Teams and Outlook (desktop and web). The same sign‑in errors appeared when attempting to use the services in a browser. The device involved was a Lenovo Windows 10 machine and the user lacked local administrator rights.

Solution

Support provided a browser‑based workaround and the issue was resolved when the user signed in using the browser's private/incognito mode; services worked successfully in that session. The temporary workaround allowed access to Teams and Outlook while the underlying device state remained unchanged.

Source Tickets (1)
30. Proctoring/screen‑monitoring software triggering 'Invalid Access' during e‑tests
90% confidence
Problem Pattern

During e-tests, proctoring or screen‑monitoring clients either triggered 'Invalid Access' detections (e.g., 'Invalid Access – Securus XT') that logged students out and interrupted exams, or were prevented from running/being installed on employer‑managed devices (e.g., ProctorU/LogMeIn Rescue) due to company security policies, firewalls or device‑management, often including blocked webcam access. Terminating some monitoring agent processes sometimes produced logout events.

Solution

The monitoring client Securus XT had been added to the e‑test whitelist following the E‑test installation manual (whitelist instructions referenced on page 18), which stopped it being detected as 'Invalid Access' and prevented the logout/interrupt events. Several affected sessions were also mitigated by using the proctoring software's suspend/resume capability during exams, and by running paper‑based exams when whitelisting could not be applied immediately. A separate set of incidents involved employer‑managed devices where vendor proctoring applets (for example ProctorU's LogMeIn Rescue) or webcam access were blocked by corporate firewalls or device‑management (Intune/company portal); those cases required coordination with the device owner/IT to permit the support applet or webcam, or the candidate to use a personal device or reschedule, because the restrictions originated from the corporate management of the endpoint. It was noted that some monitoring agents could not be uninstalled and that killing their processes could itself trigger logout events, so whitelisting at the e‑test level resolved detection errors where it could be applied.

Source Tickets (2)
31. Link‑shortening service lacking long‑term click retention requiring replacement
95% confidence
Problem Pattern

The central Bitly account used by the marketing team only displayed/stored click data for the past 30 days, preventing access to all‑time click metrics. This limitation required monthly manual CSV exports and caused downstream analytics processes and the Sales Analytics team to rely only on the most recent 30‑day data.

Solution

The team replaced Bitly with short.io as the link‑shortening and click‑tracking solution. After migrating to short.io and onboarding the new service, the retention and analytics requirements were met and the issue was confirmed resolved.

Source Tickets (1)
32. Blocked device app store preventing installs on corporate mobile phones
90% confidence
Problem Pattern

User reported that the device app store on their corporate mobile phone was blocked/disabled and they could not download or install apps (examples: Outlook, Microsoft Teams). The issue affected standard app installation workflows on the company handset and was reported during attempts to get productivity apps onto the device.

Solution

The device app store remained intentionally disabled by corporate policy. The case was resolved by directing the user to the organisation's Self Service Portal on their smartphone to access and install approved applications; Outlook and Microsoft Teams were available there and the user confirmed the installation pathway worked.

Source Tickets (1)
33. Granting external .ext accounts read access to tenant audit logs and configuration
90% confidence
Problem Pattern

Requesters sought read access to tenant audit logs and tenant configuration (often for external '.ext' accounts) or exported Microsoft 365 audit-log data for specific users/timeframes to investigate application events. Separately, analysts asked for per-team or per-user breakdowns of app installations/usage from the Teams Admin Center (for example to identify which Teams a service-account bot was installed on) but lacked permissions to run those reports. Reported symptoms included only aggregated usage counts being available and inability to retrieve lists of specific Teams or users. Affected systems included Azure AD, Microsoft 365 audit logs, and Microsoft Teams/Teams Admin Center.

Solution

Two consistent handling patterns were used depending on the request. For external collaborators who needed ongoing read visibility into tenant audit logs and tenant configuration, the involved external accounts were granted the Azure AD Global Reader role via Azure AD role management; the Global Reader assignments provided the requested read visibility. No alternate built-in role limited to audit-log-only reads was implemented for those requests. For forensic or troubleshooting requests that targeted specific users and time ranges (for example to investigate CourseFeed/MyCampus enrollment events), Microsoft 365 audit-log exports were produced and delivered for the specified users/timeframes instead of issuing tenant-wide role assignments. For Teams app-installation/usage queries (for example identifying which Microsoft Teams instances a bot/service account was installed on), support ran an app-usage/report in the Teams Admin Center and retrieved aggregated usage counts (the report returned 22 Teams and 85 Users within the last 30 days in the reported case) but could not provide lists of specific Teams or users because the analyst lacked the necessary reporting permissions.

34. User request for a private, user-only cloud storage solution
90% confidence
Problem Pattern

Users requested secure cloud storage that was not publicly accessible and that was limited to either a single user or a specific small group (examples: personal OneDrive storage or an election board restricted to named individuals). Requests referenced Windows, OneDrive, Microsoft Teams, SharePoint and on-premise fileshares and sometimes asked for a password‑protected drive; no error messages or technical failures were reported. Users sought guidance on which storage option would provide exclusive access and how access would be restricted.

Solution

Personal private storage was provided by the standard OneDrive application when users signed in with their IU credentials; support confirmed OneDrive was installed and signed in, and that configuration satisfied the requirement for user-only cloud storage. For sensitive files that needed to be shared only among a specific small group, IT recommended creating a cloud-based private Microsoft Teams team or a dedicated SharePoint document library and restricting permissions to the named individuals; this approach was presented as the preferred alternative to on-premise fileshares, which were being deprecated. Requesters accepted the guidance and reported they found a suitable solution; tickets were closed.

Source Tickets (2)
35. Jamf Connect login prompt from Okta/local password desynchronization
90% confidence
Problem Pattern

macOS devices running Jamf/Jamf Connect repeatedly presented a login prompt that rejected the user's Okta/laptop password with a user/password mismatch. The behaviour started after an Okta password change and left the device's local account and Okta credentials out of sync, causing persistent authentication prompts on the affected Mac.

Solution

The user opened the Jamf/Jamf Connect menu and used the Connect action to reauthenticate with their Okta credentials. After a successful Jamf Connect login the recurring Jamf prompt stopped and the local laptop password became synced with the Okta password, resolving the authentication errors.

Source Tickets (1)
36. BitLocker recovery prompted after repeated sign‑in failures during initial Windows setup
95% confidence
Problem Pattern

During initial Windows setup or first sign‑in the device displayed a BitLocker recovery screen ('You're locked out') after repeated failed sign‑in attempts or loss of a temporary sign‑in password. Users reported being unable to enter expected characters at the BitLocker preboot prompt and observed an unexpected keyboard layout (for example US vs German/QWERTZ) that prevented correct password entry. Multiple provided recovery keys sometimes failed to unlock the device due to incorrect key‑to‑device mapping. Affected systems were Windows 10/11 laptops using BitLocker with Okta‑managed credentials.

Solution

Support delivered the BitLocker recovery key to the user (commonly via a one‑time link) and the user used that key to unlock the PC. When multiple recovery keys failed responders confirmed device identifiers/service tag to locate and provide the correct recovery key. Where users could not type the password at the BitLocker prompt responders identified a keyboard‑layout mismatch at the preboot prompt (for example the prompt defaulting to a US layout while the physical keyboard was German QWERTZ); switching the layout resolved the input problem. After the device was unlocked responders restored account access as appropriate for each case — either resetting the user's Windows sign‑in (issuing a new temporary sign‑in password to the user's private email) or resetting the user's Okta authentication method — and confirmed the user regained access.

37. Hardware MFA (YubiKey) procurement when users cannot use corporate mobile phones
90% confidence
Problem Pattern

Requests for hardware MFA (YubiKey) procurement, delivery, custody, or secure storage when users cannot or will not use corporate mobile phones. Tickets described purchase/delivery or physical-security/logistics needs (for example, georedundant safekeeping of backup YubiKeys for administrative or AWS root accounts) rather than authentication errors. Affected systems include corporate SSO, administrative root accounts, and on-site IT-Ops offices; users asked for purchase, shipping, storage recommendations, or local custody options.

Solution

A YubiKey purchase was approved and a purchase order (PO-007431) was created; IT ordered the hardware and set the delivery address to the user’s campus location, with the user to receive shipment/tracking information once dispatched. For requests about physical custody or georedundant backups, IT confirmed that standard IT offices did not have safes beyond an existing key cabinet. IT offered that, if requesters procured dedicated safes, IT-Ops would securely store YubiKeys in the IT-Ops office at each site and worked with requesters on site custody logistics and contacts.

Source Tickets (2)
38. Alarm zone sensor battery depletion triggering security alert
80% confidence
Problem Pattern

An alarm zone (CPGBRH2-1OG-ZPA-Raum-123) reported a low/empty battery and generated an alert condition. The report included the alarm zone identifier and a low‑battery symptom without additional error codes.

Solution

The depleted battery in the specified alarm zone sensor was replaced. After the replacement the alarm/alert condition cleared and the ticket was closed.

Source Tickets (1)
39. Fail2Ban tuning and DMZ reachability discrepancies for MX2 mail server
80% confidence
Problem Pattern

A newly deployed DMZ mail server (MX2) showed inconsistent reachability: external scanners (Nessus) reported traceroute/ICMP errors while a VPN workstation could connect and some internal hosts/service scanners could not nmap its internal IP (172.16.0.4). MX2 resided in its own VLAN/DMZ with restricted routing to internal networks. Operators were also unsure which Fail2Ban configuration file (jail.local vs jail.conf) was taking effect and requested DEFAULT values and per-service jails for SSH on port 19222 and mail services.

Solution

Investigation found the scanner differences were due to DMZ-to-internal routing restrictions and traceroute/ICMP behaviour rather than any mailserver service failure. Fail2Ban behaviour was corrected by consolidating overrides into /etc/fail2ban/jail.local so custom settings took precedence over the packaged /etc/fail2ban/jail.conf; explicit jails were created for sshd (non-standard port 19222) and Postfix-related checks. DEFAULTs were standardized in this environment to bantime=3600, findtime=600, maxretry=5 and ignoreip was populated with known VPN/scanner and AWS SES addresses to reduce false positives. After reloading Fail2Ban, permitted scanners observed the expected open ports (25/587 and 19222) while networks without DMZ routing remained correctly isolated; Nessus traceroute warnings were documented as a network-level artefact rather than a mailserver fault. In a separate SSH brute-force incident against a Nextcloud VM where password authentication was enabled, the affected account password was reset, the new credentials were stored in 1Password and communicated via Microsoft Teams, and the ticket was closed.

Source Tickets (2)
40. Atlassian Jira Service Management blocked external customers due to disabled external account type
70% confidence
Problem Pattern

Portal attempts to add non‑IU / external email addresses as Jira Service Management customers failed with the error "External account type disabled in customer access settings." Affected systems were Jira and Atlassian customer access settings; agents could not invite or add external authors and it was unclear whether prior external customers had been added or whether project admin rights were missing.

Solution

A site‑level customer access setting that had disabled the "External account" customer type was re‑enabled in the Atlassian admin console, and a project administrator was assigned to manage the project's customer list. After the external account type was enabled and the project admin managed the customer list, non‑IU email addresses could be invited/added to the Service Portal and previously added external customers became visible.

Source Tickets (2)
41. WorkFlex policy referenced deprecated CPG‑VPN, leaving public Wi‑Fi guidance out of date
60% confidence
Problem Pattern

WorkFlex policy contained a VPN section that still referenced the company CPG‑VPN which was being deprecated, causing staff guidance to imply an available VPN tunnel for protection on public/untrusted Wi‑Fi that no longer existed. Users and HR/legal reviewers asked whether NordLayer or another solution was the supported alternative and whether onboarding/offboarding and license management via the Service Portal and cost‑center approvals would scale.

Solution

The WorkFlex policy text was revised to remove references to the deprecated CPG‑VPN and to explicitly describe the current risk posture for public/untrusted Wi‑Fi. NordLayer was designated as the supported replacement and the Service Portal was updated with a NordLayer application entry (onboarding request) that used the existing cost‑center approval workflow. Onboarding and offboarding processes were documented and integrated with centralized license inventory so licenses could be allocated and reclaimed via the Service Portal. NordLayer licensing and vendor capacity were validated for the expected user counts and communications were issued to staff explaining the change and how to request access.

Source Tickets (1)
42. Unexpected / unauthorized deletion of Microsoft Teams group and owner loss of access
90% confidence
Problem Pattern

A Microsoft Teams team/group was deleted without the owner's knowledge or notification, causing the owner to lose access. There were no explicit error messages; the owner requested who deleted the group and immediate restoration. Affected systems included Microsoft Teams, Microsoft Entra (Azure AD) and audit logs.

Solution

The deleted Teams group was restored and the owner was informed. An audit-log investigation in Microsoft Entra and Teams audit logs identified the deletion as having been performed by an internal IT action. The restoration and investigation resolved the immediate access loss and provided attribution for the deletion; the owner was notified of the outcome and that IT had performed the removal during an internal operation.

Source Tickets (1)
43. Selecting a confidential collaboration tool for ISMS actions with per-person visibility
80% confidence
Problem Pattern

The ISMS team required a collaboration/communication tool to manage ISMS actions and collect feedback where each action and response must be visible only to the responsible site manager and the ISMS manager. The request compared PowerApp, Jira Service Management and a simple Jira board; concerns included confidentiality and license requirements for ~30 site managers.

Solution

A meeting was organized to review tool options and next steps; the Jira Service Management owner (Matthias Wiatrok) was included in the discussion. Proposed approaches considered during the meeting were using Jira Service Management, using a simple Jira board (noting the licensing impact for ~30 site managers), or developing a Power App interface. Further work was deferred to the scheduled follow-up meeting for decision and implementation planning.

Source Tickets (1)
44. Workday HCM → Data Warehouse: access model and initial data security scoping
70% confidence
Problem Pattern

Stakeholders lacked a unified access-control model and clear ownership for HR and integration/service accounts, causing missing or incomplete role definitions and group mappings, unknown owners for many ISU/service accounts, stale passwords, and no documented lifecycle for owner changes. Symptoms included uncertainty which accounts or privilege groups could view sensitive MA- or client-data, inactive ISU accounts with no logins for >12 months, and unclear classification of access events across Workday APIs, the Data Warehouse/PowerBI, on‑prem Active Directory, Microsoft Entra/Azure AD, Okta, Windows endpoints (including Tier0), and vendor integrations.

Solution

Stakeholders established a consolidated roles-and-rights concept for Workday HCM ingestion and the enterprise identity estate and produced deliverables to close the gaps discovered in scope. The artifact enumerated approved HCM fields for API extraction and documented PII tagging and retention categories for DWH ingestion and downstream PowerBI usage. A role-based access model enforced least-privilege view-level access for functional teams while preserving full visibility for DWH administrators. For the broader identity estate, the concept defined consolidated access rules across Windows 11 clients and servers (including Tier0), student/employee/contingent-worker accounts, and privilege-group mappings that identified which groups could view MA-account and client data. Audit sources and monitoring pipelines were enumerated (Workday API logs, DWH ingestion and access logs, on‑prem AD and EntraID/Azure AD logs, Okta authentication logs, and Microsoft Sentinel alerts), and access-event quality gates were specified (permitted vs denied, logged-only, logged-plus-actively-monitored). Data-protection controls were captured (encryption in transit and at rest, PII tagging and retention), and group-management templates and role-definition documentation were produced. In response to discovered unmanaged service/ISU accounts, the deliverable was extended to include an ISU inventory and ownership register, classification of ISUs by purpose and business owner, identification of inactive ISUs, and a recorded remediation plan that covered password-rotation integration with the WCC service (an initial WCC password refresh occurred in August 2025) and lifecycle steps for owner changes and deprovisioning. The work also documented gaps where HR review did not consistently cover finance/IT or vendor-related ISUs and recorded actions to assign accountable owners and integrate ISU governance into the consolidated roles-and-rights model; those remediation actions were recorded but not fully implemented at the time of reporting.

45. Mail-enabled Azure AD dynamic/security groups receiving unintended emails
100% confidence
Problem Pattern

An Azure AD dynamic/security group had been mail-enabled and was accepting emails from employees, creating unintended mail delivery to a technical/security group. The symptom was unexpected inbound messages being delivered to the dynamic group email address, affecting Azure AD group configuration and Exchange Online routing.

Solution

The group's mail settings were modified to block incoming messages: send/receive permissions were adjusted so the dynamic/security group no longer accepted email. The configuration change removed the unintended mail delivery capability and the group's status was updated to reflect the new incoming‑message restrictions.

Source Tickets (1)
46. Scope‑limited Docker Desktop sign‑in enforcement for licensed users
60% confidence
Problem Pattern

Request to enforce authenticated, licensed sign‑in for Docker Desktop on employee workstations while excluding education users. The org could not apply a global forced‑sign‑in policy because lecturers/professors must be allowed to run Docker Desktop without registration. A scoped/custom policy was needed that would target specific groups (e.g., engineering cost center) and integrate with existing Company Portal and internal package deployment mechanisms; impacted components included Docker Desktop, registry.json enforcement, WSL, and the Company Portal packaging pipeline.

Solution

Sign‑in enforcement was implemented by distributing a Docker Desktop build configured with registry.json enforcement through the internal package deployment pipeline and Company Portal, and by scoping that deployment to the engineering cost‑center AD/group. The scoped package required Docker sign‑in for users who received the deployment; WSL integration remained unchanged. Education and lecturer accounts were excluded by omitting them from the targeted deployment group so they could continue to use Docker Desktop without registration.

Source Tickets (1)
47. Local administrator requests resolved via Company Portal self‑service JDK availability
90% confidence
Problem Pattern

Users could not install required software on corporate laptops because they lacked local administrator privileges. Symptoms included installers being blocked or failing to complete with no explicit error codes. Affected systems included the end‑user device and corporate self‑service tooling (Company Portal / SelfService App).

Solution

Resolutions followed one of two paths depending on availability of packaged software in the corporate self‑service tooling. When the Company Portal offered the required JDK package, the user accepted the packaged version and no local administrator elevation or device changes were performed. In cases where no suitable package existed, the user submitted an access request through the SelfService App and local administrator rights were granted; the user then installed the required software and confirmed the issue was resolved. Systems involved in these tickets were the end‑user laptop and the Company Portal / SelfService self‑service tooling.

Source Tickets (2)
48. Jira Service Portal: tickets emailed whole organization when requesters shared requests
88% confidence
Problem Pattern

Tickets created in the IT Service portal sometimes generated email notifications to an entire organization (the 'IU Group'), causing unexpected inbox notifications. The issue occurred only when requesters used the portal's Organizations field to share their request; team members did not receive the mail unless the request was shared. Affected systems were Jira Service Management / Jira Forms and the portal Organizations setting.

Solution

Investigation found the portal's Jira Forms 'Organizations' field allowed requesters to share their own requests with the IU Group, which triggered group notification rules. Engineers removed the IU Group association from the affected requests and adjusted the portal's organization visibility/notification configuration so that requesters could not inadvertently notify the whole IU Group. After removing the organization association and tightening the organization-sharing settings, group-wide email notifications ceased.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X