home.social

#m365defender โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #m365defender, aggregated by home.social.

  1. Microsoft has announced that its Defender for Endpoint and Defender for Identity now support local data residency in India. This move is part of Microsoft's commitment to aligning with local data sovereignty requirements, enabling customers to onboard confidently knowing their data will remain within the Indian boundary. This helps them meet regulatory obligations and maintain control over their data.

    In addition to India, these services are also available in the United States, European Union, United Kingdom, Australia, and Switzerland. New deployments are automatically created in the Azure region closest to your location. Existing customers can check their deployment geo within the portal or contact Customer Service and Support for a tenant reset if they want to update their service location. For more information on this topic or how you can benefit from it as a customer or potential user of Microsoft's services visit [this link](techcommunity.microsoft.com/t5).
    Post generated with the help of Azure OpenAI GPT4 ๐Ÿค– #msftadvocate #M365Defender #DefenderXDR techcommunity.microsoft.com/t5

  2. Have just discovered why some KQL in Defender has been erroring and I am in disbelief.

    You cannot have a line break between a let statement and the next line of code!

    e.g.
    let myName=โ€œTJโ€;

    |EmailEvents
    | where โ€ฆ

    will cause a โ€œNo Tabular expression statement foundโ€ error. removing that linebreak between let and |EmailEvents fixes the issues.

    KQL is weird :)

    #KQL #Defender #m365defender #cybersecurity #kusto

  3. ๐Ÿšจ #KQL Course Update and Anniversary Discount!

    The "Hands-On Kusto Query Language (KQL) for Security Analysts" course has been updated with 5 new exercises focusing on aggregations to answer investigative questions, with more to come! The course now offers:
    โœ… Lots of examples in the lessons
    โœ… A total of 23 exercises
    โœ… 2 Investigation scenarios
    allowing you to enhance your skills in Kusto Query Language.

    Last ~24 hours to get it 30% OFF!

    academy.bluraven.io/hands-on-k

    #KQL
    #SecurityAnalysis
    #Training
    #ThreatHunting
    #IncidentResponse
    #MicrosoftSentinel
    #MicrosoftDefender
    #M365Defender
    #DFIR
    #DataAnalysis

  4. ๐Ÿš€ "Hands-On KQL for Security Analysts" Course is Now Live!

    After months of dedicated work, fine-tuning, and anticipation, I am thrilled to invite you to begin your journey in mastering KQL. Whether you're a seasoned security analyst or aspiring to enhance your skills, this course is the gateway to elevating your expertise!

    โœ… Ready to Begin?
    Embark on your learning journey today. Click the link below to enroll and take the first step toward becoming a KQL expert!

    academy.bluraven.io/hands-on-k

    #KQL #SecurityAnalysis #Training #ThreatHunting #IncidentResponse #MicrosoftSentinel #MicrosoftDefender #M365Defender #DFIR #DataAnalysis

  5. ๐Ÿš€ Exciting News for Security Analysts! ๐Ÿš€

    I'm thrilled to announce the first-ever "Hands-On Kusto Query Language (KQL) for Security Analysts" training course! ๐Ÿ›ก๏ธ

    After numerous requests for training content, I've decided to take the plunge and create a comprehensive KQL course tailored specifically for security professionals. It's just about a month away from the launch, and I couldnโ€™t be more thrilled!

    If you want to learn KQL for Microsoft Sentinel or Microsoft 365 Defender, check the details and sign up to get notified at launch! ๐Ÿฅณ

    training.bluraven.io/

    #KQL #SecurityAnalysis #Training #ThreatHunting #IncidentResponse #MicrosoftSentinel #MicrosoftDefender #M365Defender #DFIR #DataAnalysis

  6. How Microsoft Sentinel Safeguards Your Organization from BEC Attacks

    Our recently released Solution for Business Email Compromise - Financial Fraud provides detection and hunting content to allow you to detect and respond to BEC threats at multiple stages of the attack cycle. In this blog we will discuss each stage of this cycle and how the Solution combines with Microsoft 365 Defender (M365D) to provide comprehensive coverage.

    techcommunity.microsoft.com/t5

    #microsoft #azure #sentinel #microsoftsentinel #bec #businessemailcompromise #m365defender #defender #xdr #cloudsecurity #soc #hunting #fraud #azuresecurity #analyst

  7. ๐—œ๐—ป๐˜๐—ฒ๐—ด๐—ฟ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ถ๐—ป๐˜๐—ผ ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€

    The deployment and implementation of the Microsoft 365 Defender platform will need careful planning with the SOC team to optimize the day-to-day operations and lifecycle management of the Microsoft 365 Defender service itself.

    This content explores several concepts on how to operationalize and integrate Microsoft 365 Defender with either new or existing people, processes, and technologies that form the basis for modern security operations.

    Use these steps to integrate Microsoft 365 Defender into your SOC.

    1๏ธโƒฃPlan for Microsoft 365 Defender operations readiness

    2๏ธโƒฃPerform a SOC integration readiness assessment using the Zero Trust Framework

    3๏ธโƒฃPlan for Microsoft 365 Defender integration with your SOC catalog of services

    4๏ธโƒฃDefine Microsoft 365 Defender roles, responsibilities, and oversight

    5๏ธโƒฃDevelop and test use cases

    6๏ธโƒฃIdentify SOC maintenance tasks

    learn.microsoft.com/en-us/micr

    #m365defender #defender #microsoft #xdr #soc #zerotrust #azure #cloud #cloudsecurity #securityanalyst #mdo #mde #mdi #entraid #mdca

  8. Adversary-in-The-Middle & Business Email Compromisedthreat hunting with KQL

    Find out essential points for threat hunting, focusing on how to track "potential" AiTM/BEC activities using Kusto Query Language (KQL) in Microsoft 365 Defender

    techcommunity.microsoft.com/t5

    #bec #AiTM #hunting #m365defender #microsoft365defender #threathunting #microsoft #azure #soc #phishing #kql #kusto #cloudsecurity

  9. ๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฒ ๐—๐˜‚๐˜€๐˜-๐—ถ๐—ป-๐—ง๐—ถ๐—บ๐—ฒ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐— ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ

    ๐Ÿ”ตEntra ID (formerly Azure AD) offers the Privileged Identity Management (PIM) for Groups feature, enabling users to attain just-in-time membership and ownership of groups, thus governing access to a range of services.

    ๐Ÿ”ตM365 Defender unified RBAC workloads offers centralized permissions management for the following services:

    โžก๏ธDefender for Endpoint

    โžก๏ธDefender for Identity

    โžก๏ธDefender for Cloud Apps

    โžก๏ธDefender for Office 365

    โžก๏ธMicrosoft Defender Vulnerability Management

    โžก๏ธSecure score

    PIM for Groups paired with M365 Defender RBAC offers a solution for just-in-time Defender access.

    Find out more details: techcommunity.microsoft.com/t5

    #azure #azuread #entraid #identity #rbac #m365defender #xdr #justintime #pim #pam #mde #mdo #mdi #securescore #mdca #casb #microsoft #microsoftsecurity #soc #cloud #cloudsecurity #cloudnative

  10. Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.

    Use Cases

    โžก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender

    โžกUpload IOC to a storage account\public GitHub

    โžกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender

    โžกM365 Defender Raw Event Detection

    โžกM365D Raw events flow into Sentinel with the M365 Defender Data connector

    โžกMDTI Feeds flow into Sentinel with MDTI Data connector

    โžกManual TI correlation rule

    techcommunity.microsoft.com/t5

    #DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp

  11. Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.

    Use Cases

    โžก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender

    โžกUpload IOC to a storage account\public GitHub

    โžกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender

    โžกM365 Defender Raw Event Detection

    โžกM365D Raw events flow into Sentinel with the M365 Defender Data connector

    โžกMDTI Feeds flow into Sentinel with MDTI Data connector

    โžกManual TI correlation rule

    techcommunity.microsoft.com/t5

    #DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp