home.social

#defenderforendpoint โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #defenderforendpoint, aggregated by home.social.

  1. Update ๐Ÿงต
    Rules ARE active, Event ID 1121 confirms blocking (WmiPrvSE โ†’ HPFirmwareInstaller blocked, LSASS protection firing daily).
    But Get-MpPreference returns empty, registry key missing. TVM can't detect them โ†’ Secure Score stuck at 22/22 exposed.
    Anyone seen this before? #MDE #Intune #DefenderForEndpoint

  2. ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฎ๐ง๐ฆ๐š๐ง๐š๐ ๐ž๐ ๐จ๐ซ 3๐ซ๐ ๐ฉ๐š๐ซ๐ญ๐ฒ ๐Œ๐ƒ๐Œ ๐ฆ๐š๐ง๐š๐ ๐ž๐ ๐ข๐Ž๐’/๐€๐ง๐๐ซ๐จ๐ข๐ ๐๐ž๐ฏ๐ข๐œ๐ž๐ฌ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ƒ๐„

    In this blog post, you will learn how to protect unmanaged (personal) or 3rd party MDM managed iOS and Android devices with Microsoft Defender for Endpoint as your Mobile Threat Defense (MTD) solution.

    The solution leverages Intuneโ€™s App Protection Policies aka MAM to enforce Device Protection with MDE regardless of the device enrollment state.

    techcommunity.microsoft.com/t5

    #mde #defender #defenderforendpoint #mtd #mobile #mobileprotection #mobilerhreatdefence #edr #xdr #microsoft #microsoftsecurity #soc #intune #mdm #mam #byod #ios #android #cloudnative

  3. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  4. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  5. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  6. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  7. ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

    Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

    Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

    microsoft.com/en-us/security/b

    #microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

  8. Today we are excited to announce the public preview of a ๐˜‚๐—ป๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐˜€๐—ฒ๐˜๐˜๐—ถ๐—ป๐—ด๐˜€ ๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—ฒ๐˜…๐—ฝ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ that offers a consistent, single source of truth for ๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ถ๐—ป๐—ด ๐—ฒ๐—ป๐—ฑ๐—ฝ๐—ผ๐—ถ๐—ป๐˜ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐˜€๐—ฒ๐˜๐˜๐—ถ๐—ป๐—ด๐˜€ ๐—ฎ๐—ฐ๐—ฟ๐—ผ๐˜€๐˜€ ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€, ๐—บ๐—ฎ๐—ฐ๐—ข๐—ฆ, ๐—ฎ๐—ป๐—ฑ ๐—Ÿ๐—ถ๐—ป๐˜‚๐˜….

    ๐—œ๐˜ ๐—ถ๐˜€ ๐—ฏ๐˜‚๐—ถ๐—น๐˜ ๐—ถ๐—ป๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ฝ๐—ผ๐—ฟ๐˜๐—ฎ๐—น, and therefore easily accessible for security teams, but built on the powerful capabilities of Microsoft Intune.

    techcommunity.microsoft.com/t5

    #mde #defenderforendpoint #security #securitysettings #management #microsoft #microsoftsecurity #microsoft365defedner #xdr #edr #soc #intune #device #devicemanagement #unifiedexperience #azure #cloud #cloudnative #windows #linux #macos #epp

  9. Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR

    Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.

    techcommunity.microsoft.com/t5

    #microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst

  10. Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR

    Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.

    techcommunity.microsoft.com/t5

    #microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst