#microsoftdefenderthreatintelligence โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #microsoftdefenderthreatintelligence, aggregated by home.social.
-
๐จ๐ป๐น๐ผ๐ฐ๐ธ๐ถ๐ป๐ด ๐๐ต๐ฒ ๐ฃ๐ผ๐๐ฒ๐ฟ ๐ผ๐ณ ๐๐๐ฏ๐ฒ๐ฟ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐๐ถ๐๐ต ๐๐๐๐ฟ๐ฒ ๐ข๐ฝ๐ฒ๐ป๐๐ ๐ฎ๐ป๐ฑ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ
I'm excited to share my recent side project! ๐ปโจ
I've been exploring the incredible potential of a simple web app for engaging in conversations with threat intelligence data. In my case, I harnessed the power of Microsoft Defender Threat Intelligence.
All the details are in the following blog post:
I'd love to hear your thoughts and feedback.
This project has been an eye-opener for me, demonstrating how Generative AI can be a game-changer in the realm of cybersecurity. I hope it serves as a valuable starting point for other innovative applications in the cybersecurity space.
Let's connect and discuss how technology can empower us in the ever-evolving world of cybersecurity. ๐๐ก๏ธ
#azure #azureopenai #llm #chatbot #threatintelligence #ti #microsoft #microsoftdefenderthreatintelligence #mdti #cyber #cybersecurity #soc #threatactors #threatanalysis #ttp #ioc #securityanalyst #microsoftsecurity #largelanguagemodel #gpt4 #azurelogicapps #logicapps #cognitiveservices #dev #chat
-
Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.
Use Cases
โก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender
โกUpload IOC to a storage account\public GitHub
โกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender
โกM365 Defender Raw Event Detection
โกM365D Raw events flow into Sentinel with the M365 Defender Data connector
โกMDTI Feeds flow into Sentinel with MDTI Data connector
โกManual TI correlation rule
#DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp
-
Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.
Use Cases
โก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender
โกUpload IOC to a storage account\public GitHub
โกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender
โกM365 Defender Raw Event Detection
โกM365D Raw events flow into Sentinel with the M365 Defender Data connector
โกMDTI Feeds flow into Sentinel with MDTI Data connector
โกManual TI correlation rule
#DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp