home.social

#microsoft365defender โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #microsoft365defender, aggregated by home.social.

  1. ๐—ฅ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐—ฑ ๐˜๐—ผ ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜๐˜€ ๐—ฎ๐—ฐ๐—ฟ๐—ผ๐˜€๐˜€ ๐˜๐—ฒ๐—ป๐—ฎ๐—ป๐˜๐˜€ ๐—บ๐—ผ๐—ฟ๐—ฒ ๐—ฒ๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ๐—น๐˜† ๐˜„๐—ถ๐˜๐—ต ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—บ๐˜‚๐—น๐˜๐—ถ-๐˜๐—ฒ๐—ป๐—ฎ๐—ป๐˜ ๐˜€๐˜‚๐—ฝ๐—ฝ๐—ผ๐—ฟ๐˜

    Today we are excited to expand our current public preview for multi-tenant environments in Microsoft 365 Defender, which provides large organizations with the much-needed visibility and ease of use across their distributed environments.

    This addition marks the first wave of improvements, with a focus on global SOC investigation flows, including a consolidated view of incidents across tenants, device inventory, vulnerability management, the ability to perform advanced hunting across data in multiple tenants, and more

    techcommunity.microsoft.com/t5

    #microsoft #microsoft365defender #multitenant #soc #xdr #edr #azure #coudsecurity #managedserviceprovider #threat #threathunting

  2. ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐ˆ๐๐ž๐ง๐ญ๐ข๐ญ๐ฒ ๐ž๐ฑ๐ฉ๐š๐ง๐๐ฌ ๐ข๐ญ๐ฌ ๐œ๐จ๐ฏ๐ž๐ซ๐š๐ ๐ž ๐ฐ๐ข๐ญ๐ก ๐ง๐ž๐ฐ ๐€๐ƒ ๐‚๐’ ๐ฌ๐ž๐ง๐ฌ๐จ๐ซ

    Sensor that can be deployed on Active Directory Certificate Services (AD CS) servers. This new sensor builds on the existing detections for suspicious certificate usage available today and extends Defender for Identities capabilities and coverage more comprehensively across identity environments.

    AD CS is a role in Windows Server that allows you to create and manage public key infrastructure (PKI) certificates.

    New detections:

    โžก๏ธDomain-controller certificate issuance for a non-DC

    โžก๏ธSuspicious disable of audit logs of AD CS

    โžก๏ธSuspicious deletion of the certificate database

    โžก๏ธSuspicious modifications to the AD CS settings (coming soon)

    techcommunity.microsoft.com/t5

    #defenderforidentity #xdr #mdi #azure #microsoft #micrsoftsecurity #soc #adcs #pki #windows #server #cybersecurity #microsoft365defender #cloudsecurity #identity

  3. Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR

    Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.

    techcommunity.microsoft.com/t5

    #microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst

  4. Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR

    Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.

    techcommunity.microsoft.com/t5

    #microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst

  5. Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.

    Use Cases

    โžก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender

    โžกUpload IOC to a storage account\public GitHub

    โžกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender

    โžกM365 Defender Raw Event Detection

    โžกM365D Raw events flow into Sentinel with the M365 Defender Data connector

    โžกMDTI Feeds flow into Sentinel with MDTI Data connector

    โžกManual TI correlation rule

    techcommunity.microsoft.com/t5

    #DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp

  6. Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.

    Use Cases

    โžก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender

    โžกUpload IOC to a storage account\public GitHub

    โžกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender

    โžกM365 Defender Raw Event Detection

    โžกM365D Raw events flow into Sentinel with the M365 Defender Data connector

    โžกMDTI Feeds flow into Sentinel with MDTI Data connector

    โžกManual TI correlation rule

    techcommunity.microsoft.com/t5

    #DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp

  7. Discovering internet-facing devices using Microsoft Defender for Endpoint

    MDE is expanding device discovery capabilities through our existing network telemetry and RiskIQ integration.

    Find out how to discover your internet-facing devices through Microsoft 365 Defender portal and Advanced Hunting.

    techcommunity.microsoft.com/t5

    #mde #edr #xdr #discovery #easm #riskiq #microsoftsecurity #microsoft365defender #advancedhunting #hunting #kql #soc #securityplatform #secops #network #discovery #microsoft #cloudsecurity

  8. Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities.

    Learn how Zerobot works and how to defend devices and networks against it:

    - Use Microsoft 365 Defender as security solutions with cross-domain visibility and detection capabilities

    - Adopt a comprehensive IoT security solution such as Microsoft Defender for IoT, integrate it with XDR platform such as Microsoft Sentinel and Microsoft 365 Defender

    - Harden endpoints with a comprehensive Windows security solution

    - Ensure secure configurations for devices

    - Use least privileges access

    microsoft.com/en-us/security/b

    #microsoft #windows #security #iot #MSTIC #azure #xdr #microsoft365defender #defenderforIoT #iot #sentinel #microsoftsentinel #siem #soar #cloud #cloudsecurity #Zerobot #ssh #leastprivilege #rat #ioc #threatintelligence #ti #tip #ddos #ZeroStresser #webapp #vulnerabilities #cve