Resolve individual device permissions which might have been altered by an access request from another tenant
Overview
A problem has been reported where under certain circumstances an individual device permission from one tenant, could become visible to another tenant. Upon investigation, it was found that in some cases, when the same device is present on computers from different tenants, if an user from one tenant creates an access request for that device, and the administrator approves it, it might wrongfully alter the individual device permission for that device from another tenant. As a result, there was no permission to use this device on the first tenant, and the altered permission on the second tenant would be rendered useless, because the existing users from the second tenant attached to it would be removed. With version Endpoint Data Protection 25.0, this issue was corrected, but as this fix only applies to individual device permission from future access requests, you may want to check if you are affected and fix the incorrect permissions, if they exist, and you will find the SQL script to identify altered permissions in the article below.
SQL Script
You may want to check if you are affected and fix the incorrect individual device permissions, and you will find the SQL script below:
Script for detection
With the following SQL Script you can detect if your environment is affected and has altered individual device permissions:
SELECT PermissionId, PermissionDeviceName, PermissionTenantId, PermissionTenantName, SecEntityID, SecEntityName, SecEntityTenantId, MANDANTS.NAME AS SecEntityTenantName FROM ( SELECT DEVICE_CONTROL.NAME AS PermissionDeviceName, ACCESS_CONTROL.OBJECT_ID AS PermissionId, ACCESS_CONTROL.SE_ID AS SecEntityID, SECURITY_ENTITIES.NAME AS SecEntityName, SECURITY_ENTITIES.MANDANT_ID AS SecEntityTenantId, MANDANTS.NAME AS PermissionTenantName, DEVICE_CONTROL.MANDANT_ID AS PermissionTenantId FROM ACCESS_CONTROL JOIN DEVICE_CONTROL ON DEVICE_CONTROL.ID = ACCESS_CONTROL.OBJECT_ID JOIN SECURITY_ENTITIES ON SECURITY_ENTITIES.ID = ACCESS_CONTROL.SE_ID JOIN MANDANTS ON MANDANTS.ID = DEVICE_CONTROL.MANDANT_ID ) AS combined JOIN MANDANTS on MANDANTS.ID = SecEntityTenantId WHERE SecEntityTenantId != PermissionTenantId
Steps for correction
If the query above returns any results, you can use the Console to find and repair the affected device permissions. For example:
In this case, there is a individual device permission for "NECVMWar VMware SATA CD01" on the tenant "TestB", but it is configured to apply to the user "UserOnTenantTestA" which is from tenant "TestA". In such a case, this permission will not produce any effect on either tenant. An administrator with rights to manage tenant "TestB" can now log into the Console and either edit this permission to apply to the intended users, computers or groups from tenant "TestB", or remove it entirely.