๐Œ๐š๐ง๐š๐ ๐ž ๐ฒ๐จ๐ฎ๐ซ ๐๐ž๐ฏ๐ข๐œ๐ž๐ฌ ๐ฐ๐ข๐ญ๐ก ๐ž๐š๐ฌ๐ž ๐ฎ๐ฌ๐ข๐ง๐  ๐๐ฒ๐ง๐š๐ฆ๐ข๐œ ๐ซ๐ฎ๐ฅ๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐๐ž๐ฏ๐ข๐œ๐ž ๐ญ๐š๐ ๐ ๐ข๐ง๐  ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ

We are excited to announce that dynamic rules for tagging devices is now generally available. This feature enables security teams to create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal.

Dynamic tags:

- simplify tag management,

- reduce manual efforts,

- facilitate efficient device tracking,

- simplify compliance by automatically categorizing non-compliant devices

https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-your-devices-with-ease-using-dynamic-rules-for-device/ba-p/4024988

#edr #xdr #defender #defenderxdr #microsoft365defender #endpoint #management #tag #device #compliance #microsoft #microsoftsecurity #soc #cloudsecurity #cloud #cloudnative

Manage your devices with ease using dynamic rules for device tagging in Microsoft Defender

As organizations grow and the security landscape becomes increasingly complex, the SOC needs a simple and fluid approach for managing device tags across their..

TECHCOMMUNITY.MICROSOFT.COM
Investigating initial access in compromised email accounts using Microsoft 365 Defender

Introduction Fortra recently released a report indicating that business email compromise (BEC) attacks are at their zenith. Why not? As ENISA mentions in its 2022 Threat Landscape Report, financialโ€ฆ

Michalis Michalos

๐—ฅ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐—ฑ ๐˜๐—ผ ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜๐˜€ ๐—ฎ๐—ฐ๐—ฟ๐—ผ๐˜€๐˜€ ๐˜๐—ฒ๐—ป๐—ฎ๐—ป๐˜๐˜€ ๐—บ๐—ผ๐—ฟ๐—ฒ ๐—ฒ๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ๐—น๐˜† ๐˜„๐—ถ๐˜๐—ต ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—บ๐˜‚๐—น๐˜๐—ถ-๐˜๐—ฒ๐—ป๐—ฎ๐—ป๐˜ ๐˜€๐˜‚๐—ฝ๐—ฝ๐—ผ๐—ฟ๐˜

Today we are excited to expand our current public preview for multi-tenant environments in Microsoft 365 Defender, which provides large organizations with the much-needed visibility and ease of use across their distributed environments.

This addition marks the first wave of improvements, with a focus on global SOC investigation flows, including a consolidated view of incidents across tenants, device inventory, vulnerability management, the ability to perform advanced hunting across data in multiple tenants, and more

https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/respond-to-threats-across-tenants-more-effectively-with/ba-p/3901174

#microsoft #microsoft365defender #multitenant #soc #xdr #edr #azure #coudsecurity #managedserviceprovider #threat #threathunting

Respond to threats across tenants more effectively with Microsoft 365 Defender multi-tenant support

The new multi-tenant support in Microsoft 365 Defender allows security teams to investigate and respond to threats across multiple tenants more effectively.

TECHCOMMUNITY.MICROSOFT.COM

Adversary-in-The-Middle & Business Email Compromisedthreat hunting with KQL

Find out essential points for threat hunting, focusing on how to track "potential" AiTM/BEC activities using Kusto Query Language (KQL) in Microsoft 365 Defender

https://techcommunity.microsoft.com/t5/azure-data-explorer-blog/aitm-amp-bec-threat-hunting-with-kql/ba-p/3885166

#bec #AiTM #hunting #m365defender #microsoft365defender #threathunting #microsoft #azure #soc #phishing #kql #kusto #cloudsecurity

AiTM & BEC threat hunting with KQL

The evolving phishing threat is relentless and continues to grow each year. Attackers have been changing their tactics, techniques, and procedures, moving from..

TECHCOMMUNITY.MICROSOFT.COM

๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐ˆ๐๐ž๐ง๐ญ๐ข๐ญ๐ฒ ๐ž๐ฑ๐ฉ๐š๐ง๐๐ฌ ๐ข๐ญ๐ฌ ๐œ๐จ๐ฏ๐ž๐ซ๐š๐ ๐ž ๐ฐ๐ข๐ญ๐ก ๐ง๐ž๐ฐ ๐€๐ƒ ๐‚๐’ ๐ฌ๐ž๐ง๐ฌ๐จ๐ซ

Sensor that can be deployed on Active Directory Certificate Services (AD CS) servers. This new sensor builds on the existing detections for suspicious certificate usage available today and extends Defender for Identities capabilities and coverage more comprehensively across identity environments.

AD CS is a role in Windows Server that allows you to create and manage public key infrastructure (PKI) certificates.

New detections:

โžก๏ธDomain-controller certificate issuance for a non-DC

โžก๏ธSuspicious disable of audit logs of AD CS

โžก๏ธSuspicious deletion of the certificate database

โžก๏ธSuspicious modifications to the AD CS settings (coming soon)

https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/microsoft-defender-for-identity-expands-its-coverage-with-new-ad/ba-p/3894215

#defenderforidentity #xdr #mdi #azure #microsoft #micrsoftsecurity #soc #adcs #pki #windows #server #cybersecurity #microsoft365defender #cloudsecurity #identity

Microsoft Defender for Identity expands its coverage with new AD CS sensor!

We are happy to announce the availability of the Microsoft Defender for Identity sensor for Active Directory Certificates Services (AD CS) after successfully..

TECHCOMMUNITY.MICROSOFT.COM
Forrester Reprint

Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR

Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.

https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/automatically-disrupt-adversary-in-the-middle-aitm-attacks-with/ba-p/3821751

#microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst

Automatically disrupt adversary-in-the-middle (AiTM) attacks with XDR

Microsoft has been on a journey to harness the power of artificial intelligence to help security teams scale more effectively. Microsoft 365 Defender correlates millions of signals across endpoints, identities, emails, collaboration tools, and SaaS apps to identify active attacks and compromised ass...

TECHCOMMUNITY.MICROSOFT.COM

As if defenders haven't had enough headaches already, #Google decided recently to provide gTLD registrations for .zip and .mov domains opening new opportunities for threat actors for malicious activity.

Below is a #Microsoft #KQL query, with high recall for .zip and .mov network connections.

Also, as with any other domain TLD, if you type a non-existent file such as update.zip at the file explorer, user will be redirected to the relevant website (check first comment for PoC).

Query includes MITRE ATT&CK mapping.

โžœ https://github.com/cyb3rmik3/KQL-threat-hunting-queries/blob/main/Threat%20Hunting/network-zipandmov-access.md

#MicrosoftSecurity #Microsoft365 #Microsoft365Defender #MicrosoftDefender #MITREATTACK

KQL-threat-hunting-queries/network-zipandmov-access.md at main ยท cyb3rmik3/KQL-threat-hunting-queries

A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft 365 Defender. - KQL-threat-hunting-queries/network-zipandmov-access.md at main ยท cy...

GitHub

Microsoft Defender Threat Intelligence (Defender TI) is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.

Use Cases

โžก Advanced hunting with Defender TI IOCs against the logs and Events within Microsoft 365 Defender

โžกUpload IOC to a storage account\public GitHub

โžกUsing KQL Externaldata operator as correlation source and proactive hunting and enabling custom detection on M365 Defender

โžกM365 Defender Raw Event Detection

โžกM365D Raw events flow into Sentinel with the M365 Defender Data connector

โžกMDTI Feeds flow into Sentinel with MDTI Data connector

โžกManual TI correlation rule

https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-mdti-interoperability-with-microsoft-365-defender/ba-p/3799846

#DefenderTI #TI #threatintelligence #MicrosoftDefenderThreatIntelligence #xdr #soc #securityplatform #securityanalytst #m365defender #microsoft365defender #microsoft #azure #intelligence #ioc #threathunting #ttp

Whatโ€™s New: MDTI Interoperability with Microsoft 365 Defender

Microsoft Defender Threat Intelligence (Defender TI) helps streamline security analyst triage, incident response, threat hunting, and vulnerability management workflows, aggregating and enriching critical threat information in an easy-to-use interface. At Microsoft Secure, we announced new features,...

TECHCOMMUNITY.MICROSOFT.COM

๐Ÿ“ข Find out new Microsoft Entra Features:

โžกIdentity security / protecting Identities

๐Ÿ”ธ Azure AD Recommendations

๐Ÿ”ธ More information on why a sign-in was flagged โ€œunfamiliarโ€

โžกIdentity modernization

๐Ÿ”ธConverged Authentication Methods

๐Ÿ”ธGranular device management using custom roles

๐Ÿ”ธAzure AD Single-Sign-On enhancements

๐Ÿ”ธAttribute Name format for SAML claims

๐Ÿ”ธApply RegEx Replace to the group claim content

๐Ÿ”ธMultiple instances of the same application (IDP- and SP-initiated)

๐Ÿ”ธ Persistent NameID for IDP-initiated apps

๐Ÿ”ธAD FS migration advisor in Microsoft 365 admin center

โžกIdentity Governance

๐Ÿ”ธNew SCIM connector for ServiceNow

๐Ÿ”ธProvisioning insights workbook

๐Ÿ”ธ Expanding Privileged Identity Management (PIM) role activation across the Azure portal

โžกIdentity for multicloud

๐Ÿ”ธWorkload Identity Federation for Managed Identities

โžกPasswordless

๐Ÿ”ธMultiple Passwordless Phone Sign-in for iOS devices

https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/new-microsoft-entra-features-now-available/ba-p/2967447

#microsoft #azure #security #entra #azuread #azureactivedirectory #aad #epm #identity #pim #multicloud #passwordless #ios #saml #servicenow #sso #singlesignon #cloudidentity #governance #identitygovernance #iam #iag #microsoft365 #microsoft365defender

New Microsoft Entra Features Now Available

Microsoft has recently introduced a range of new security tools and features for their Entra product family, aimed at helping organizations to improve their security posture. With the ever-increasing sophistication of cyber-attacks and the increasing use of cloud-based services and the proliferation...

TECHCOMMUNITY.MICROSOFT.COM