mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#microsoftdefender

0 Beiträge0 Beteiligte0 Beiträge heute

Frage in die Runde:
Hat jemand von euch (oder kennt jemanden) in den letzten Jahren eine Endpoint Protection oder ein EDR in der Firma eingeführt (z.B. Jamf Protect, Microsoft Defender for Business o.ä.)?

Wie lange hat das ca. gedauert (inkl. datenschutzrechtlichen und IT-Sicherheitsabklärungen)?

Wäre um ein paar Erfahrungswerte aus der Schweiz und dem EU-Raum dankbar 🙏

We’re excited to announce our new integration with Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management. This means SOC teams can now streamline incident response, reduce alert fatigue, and focus on what really matters: high-priority risks.

With real-time enrichment from Corelight and Defender, teams can:
➡️ Prioritize alerts based on real-time environmental risks
➡️ Gain deeper visibility into all devices, even unmanaged ones
➡️ Speed up investigations and remediation

As Todd Wingler, Corelight Vice President, Global Alliances and Channels, puts it 💬 "Corelight is now the only NDR vendor providing real-time enrichment with data from the top three EDR vendors, enabling our customers to conduct more streamlined investigations resulting in quicker remediation."

🔗 Discover how this integration enhances your SOC: corelight.com/company/newsroom

With a rise in Adversary in the Middle (AiTM) phishing, we've seen attackers leverage trusted compromised accounts to launch multi-stage attacks and follow-on BEC activity. Too often, investigations end with "If only this data had been available!"

We are kicking off our 3-part series on handling Business Email Compromise (BEC) incidents in Microsoft 365! 📧 In Part 1, Rachel dives into the key artefacts for investigating a BEC in M365 and where to find them.

👉 pentestpartners.com/security-b

This includes:

Why enabling Unified Audit Logging is essential for tracking attackers.

How to use Purview Content Search to analyse compromised mailboxes.

Pro tips for using Defender's Advanced Hunting to quickly scope the scale of an attack.

Stay tuned for more actionable insights in Parts 2 & 3!

#CyberSecurity #BusinessEmailCompromise #M365 #IncidentResponse
#MicrosoftDefender #EmailSecurity #DigitalForensics #DataRetention #ThreatHunting #CloudForensics

Microsoft Plant Überarbeitung der Windows-Sicherheit nach CrowdStrike-Ausfall
Microsoft verstärkt seine Pläne, Windows widerstandsfähiger gegen fehlerhafte Software zu machen, nachdem ein missglücktes
apfeltalk.de/magazin/news/micr
#News #Tellerrand #CrowdStrike #Cybersicherheit #Cybersicherheitsgipfel #Kernel #KernelZugriff #Microsoft #MicrosoftDefender #Sicherheitslcken #Sicherheitssoftware #Windows

Security Tech Accelerator - On-demand Recordings mow available!

The Security, Compliance, and Identity Tech Community hosted a virtual "Tech Accelerator", an event consisting of over 12 deep dives & live AMAs for you to engage with Microsoft Product Experts and ask questions.

Event | Microsoft Security Tech Accelerator - December 6, 2023
techcommunity.microsoft.com/t5

TECHCOMMUNITY.MICROSOFT.COMMicrosoft Security Tech AcceleratorAsk questions. Stay connected! Welcome to the Microsoft Tech Community if you’re new. Welcome back if you’ve been here before! Join us Wednesday, December 6th..