#defenderforendpoint โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #defenderforendpoint, aggregated by home.social.
-
Update ๐งต
Rules ARE active, Event ID 1121 confirms blocking (WmiPrvSE โ HPFirmwareInstaller blocked, LSASS protection firing daily).
But Get-MpPreference returns empty, registry key missing. TVM can't detect them โ Secure Score stuck at 22/22 exposed.
Anyone seen this before? #MDE #Intune #DefenderForEndpoint -
๐๐ซ๐จ๐ญ๐๐๐ญ ๐ฎ๐ง๐ฆ๐๐ง๐๐ ๐๐ ๐จ๐ซ 3๐ซ๐ ๐ฉ๐๐ซ๐ญ๐ฒ ๐๐๐ ๐ฆ๐๐ง๐๐ ๐๐ ๐ข๐๐/๐๐ง๐๐ซ๐จ๐ข๐ ๐๐๐ฏ๐ข๐๐๐ฌ ๐ฐ๐ข๐ญ๐ก ๐๐๐
In this blog post, you will learn how to protect unmanaged (personal) or 3rd party MDM managed iOS and Android devices with Microsoft Defender for Endpoint as your Mobile Threat Defense (MTD) solution.
The solution leverages Intuneโs App Protection Policies aka MAM to enforce Device Protection with MDE regardless of the device enrollment state.
#mde #defender #defenderforendpoint #mtd #mobile #mobileprotection #mobilerhreatdefence #edr #xdr #microsoft #microsoftsecurity #soc #intune #mdm #mam #byod #ios #android #cloudnative
-
๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ถ๐ป๐ด ๐ป๐ฒ๐ ๐๐ฒ๐ฐ๐๐ผ๐ฟ๐: ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐ฎ๐ฐ๐๐ผ๐ฟ๐ ๐ฎ๐๐๐ฒ๐บ๐ฝ๐ ๐ฆ๐ค๐ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ ๐๐ผ ๐ฐ๐น๐ผ๐๐ฑ ๐น๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐บ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐
Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.
Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโa method previously seen in VMs and Kubernetes clusters but not in SQL Server.
#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc
-
๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ถ๐ป๐ด ๐ป๐ฒ๐ ๐๐ฒ๐ฐ๐๐ผ๐ฟ๐: ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐ฎ๐ฐ๐๐ผ๐ฟ๐ ๐ฎ๐๐๐ฒ๐บ๐ฝ๐ ๐ฆ๐ค๐ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ ๐๐ผ ๐ฐ๐น๐ผ๐๐ฑ ๐น๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐บ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐
Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.
Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโa method previously seen in VMs and Kubernetes clusters but not in SQL Server.
#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc
-
๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ถ๐ป๐ด ๐ป๐ฒ๐ ๐๐ฒ๐ฐ๐๐ผ๐ฟ๐: ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐ฎ๐ฐ๐๐ผ๐ฟ๐ ๐ฎ๐๐๐ฒ๐บ๐ฝ๐ ๐ฆ๐ค๐ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ ๐๐ผ ๐ฐ๐น๐ผ๐๐ฑ ๐น๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐บ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐
Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.
Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโa method previously seen in VMs and Kubernetes clusters but not in SQL Server.
#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc
-
๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ถ๐ป๐ด ๐ป๐ฒ๐ ๐๐ฒ๐ฐ๐๐ผ๐ฟ๐: ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐ฎ๐ฐ๐๐ผ๐ฟ๐ ๐ฎ๐๐๐ฒ๐บ๐ฝ๐ ๐ฆ๐ค๐ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ ๐๐ผ ๐ฐ๐น๐ผ๐๐ฑ ๐น๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐บ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐
Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.
Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโa method previously seen in VMs and Kubernetes clusters but not in SQL Server.
#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc
-
๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ถ๐ป๐ด ๐ป๐ฒ๐ ๐๐ฒ๐ฐ๐๐ผ๐ฟ๐: ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐ฎ๐ฐ๐๐ผ๐ฟ๐ ๐ฎ๐๐๐ฒ๐บ๐ฝ๐ ๐ฆ๐ค๐ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ ๐๐ผ ๐ฐ๐น๐ผ๐๐ฑ ๐น๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐บ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐
Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.
Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโa method previously seen in VMs and Kubernetes clusters but not in SQL Server.
#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc
-
Today we are excited to announce the public preview of a ๐๐ป๐ถ๐ณ๐ถ๐ฒ๐ฑ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐๐๐ถ๐ป๐ด๐ ๐บ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐ ๐ฒ๐ ๐ฝ๐ฒ๐ฟ๐ถ๐ฒ๐ป๐ฐ๐ฒ that offers a consistent, single source of truth for ๐บ๐ฎ๐ป๐ฎ๐ด๐ถ๐ป๐ด ๐ฒ๐ป๐ฑ๐ฝ๐ผ๐ถ๐ป๐ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐๐๐ถ๐ป๐ด๐ ๐ฎ๐ฐ๐ฟ๐ผ๐๐ ๐ช๐ถ๐ป๐ฑ๐ผ๐๐, ๐บ๐ฎ๐ฐ๐ข๐ฆ, ๐ฎ๐ป๐ฑ ๐๐ถ๐ป๐๐ .
๐๐ ๐ถ๐ ๐ฏ๐๐ถ๐น๐ ๐ถ๐ป๐๐ผ ๐๐ต๐ฒ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ฏ๐ฒ๐ฑ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐ฝ๐ผ๐ฟ๐๐ฎ๐น, and therefore easily accessible for security teams, but built on the powerful capabilities of Microsoft Intune.
#mde #defenderforendpoint #security #securitysettings #management #microsoft #microsoftsecurity #microsoft365defedner #xdr #edr #soc #intune #device #devicemanagement #unifiedexperience #azure #cloud #cloudnative #windows #linux #macos #epp
-
Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR
Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.
#microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst
-
Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR
Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.
#microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst