#microsoft365defender โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #microsoft365defender, aggregated by home.social.
-
๐ฅ๐ฒ๐๐ฝ๐ผ๐ป๐ฑ ๐๐ผ ๐๐ต๐ฟ๐ฒ๐ฎ๐๐ ๐ฎ๐ฐ๐ฟ๐ผ๐๐ ๐๐ฒ๐ป๐ฎ๐ป๐๐ ๐บ๐ผ๐ฟ๐ฒ ๐ฒ๐ณ๐ณ๐ฒ๐ฐ๐๐ถ๐๐ฒ๐น๐ ๐๐ถ๐๐ต ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ฏ๐ฒ๐ฑ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐บ๐๐น๐๐ถ-๐๐ฒ๐ป๐ฎ๐ป๐ ๐๐๐ฝ๐ฝ๐ผ๐ฟ๐
Today we are excited to expand our current public preview for multi-tenant environments in Microsoft 365 Defender, which provides large organizations with the much-needed visibility and ease of use across their distributed environments.
This addition marks the first wave of improvements, with a focus on global SOC investigation flows, including a consolidated view of incidents across tenants, device inventory, vulnerability management, the ability to perform advanced hunting across data in multiple tenants, and more
#microsoft #microsoft365defender #multitenant #soc #xdr #edr #azure #coudsecurity #managedserviceprovider #threat #threathunting
-
๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐๐๐๐ง๐๐๐ซ ๐๐จ๐ซ ๐๐๐๐ง๐ญ๐ข๐ญ๐ฒ ๐๐ฑ๐ฉ๐๐ง๐๐ฌ ๐ข๐ญ๐ฌ ๐๐จ๐ฏ๐๐ซ๐๐ ๐ ๐ฐ๐ข๐ญ๐ก ๐ง๐๐ฐ ๐๐ ๐๐ ๐ฌ๐๐ง๐ฌ๐จ๐ซ
Sensor that can be deployed on Active Directory Certificate Services (AD CS) servers. This new sensor builds on the existing detections for suspicious certificate usage available today and extends Defender for Identities capabilities and coverage more comprehensively across identity environments.
AD CS is a role in Windows Server that allows you to create and manage public key infrastructure (PKI) certificates.
New detections:
โก๏ธDomain-controller certificate issuance for a non-DC
โก๏ธSuspicious disable of audit logs of AD CS
โก๏ธSuspicious deletion of the certificate database
โก๏ธSuspicious modifications to the AD CS settings (coming soon)
#defenderforidentity #xdr #mdi #azure #microsoft #micrsoftsecurity #soc #adcs #pki #windows #server #cybersecurity #microsoft365defender #cloudsecurity #identity
-
Microsoft Defender for Office 365 has been recognized as a leader in The Forrester Wave โข: Enterprise Email Security, Q2 2023 report.
For more information on this recognition, check out the full report here: https://reprints2.forrester.com/#/assets/2/108/RES178496/report
#microsoft #office365 #security #leader #email #xdr #defender #microsoft365defender #mdo #emailprotection #emailsecurity #phishing #spam #SecOps #soc #analyst #bec #sandboxing #emailauthentication #collaboration #siem #ir #threatintelligence #azure #cloud #cloudsecurity #cloudnative
-
Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR
Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.
#microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst
-
Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR
Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.
#microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst
-
Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.
Use Cases
โก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender
โกUpload IOC to a storage account\public GitHub
โกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender
โกM365 Defender Raw Event Detection
โกM365D Raw events flow into Sentinel with the M365 Defender Data connector
โกMDTI Feeds flow into Sentinel with MDTI Data connector
โกManual TI correlation rule
#DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp
-
Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.
Use Cases
โก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender
โกUpload IOC to a storage account\public GitHub
โกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender
โกM365 Defender Raw Event Detection
โกM365D Raw events flow into Sentinel with the M365 Defender Data connector
โกMDTI Feeds flow into Sentinel with MDTI Data connector
โกManual TI correlation rule
#DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp
-
Discovering internet-facing devices using Microsoft Defender for Endpoint
MDE is expanding device discovery capabilities through our existing network telemetry and RiskIQ integration.
Find out how to discover your internet-facing devices through Microsoft 365 Defender portal and Advanced Hunting.
#mde #edr #xdr #discovery #easm #riskiq #microsoftsecurity #microsoft365defender #advancedhunting #hunting #kql #soc #securityplatform #secops #network #discovery #microsoft #cloudsecurity
-
Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities.
Learn how Zerobot works and how to defend devices and networks against it:
- Use Microsoft 365 Defender as security solutions with cross-domain visibility and detection capabilities
- Adopt a comprehensive IoT security solution such as Microsoft Defender for IoT, integrate it with XDR platform such as Microsoft Sentinel and Microsoft 365 Defender
- Harden endpoints with a comprehensive Windows security solution
- Ensure secure configurations for devices
- Use least privileges access
#microsoft #windows #security #iot #MSTIC #azure #xdr #microsoft365defender #defenderforIoT #iot #sentinel #microsoftsentinel #siem #soar #cloud #cloudsecurity #Zerobot #ssh #leastprivilege #rat #ioc #threatintelligence #ti #tip #ddos #ZeroStresser #webapp #vulnerabilities #cve