Stay ahead in the world of cybersecurity with the latest advancements in network protection! ๐ก๏ธ Microsoft Defender for Endpoint is continuously evolving to provide comprehensive security for your network environment.
๐ New Signatures for SSL, DNS, and NTLM Protocols
We're excited to announce that we've added new signatures for SSL, DNS, and NTLM protocols. These signatures enhance our ability to detect and respond to potential threats, bolstering your network's defense against evolving cyberattacks.
๐จ Deprecation of "NetworkSignaturesInspected" Signatures
Starting July 18, 2023, we will be deprecating a subset of signatures found in the "NetworkSignaturesInspected" action type of Advanced Hunting. Our integration with Zeek has led to more comprehensive network visibility, allowing us to consolidate signatures and provide you with a more streamlined experience.
๐ Zeek Integration Unleashes New Capabilities
Our integration with Zeek has revolutionized network threat detection. With Zeek's advanced protocol parsing capabilities, we now offer enhanced visibility into network sessions, enabling us to identify anomalies and threats more effectively. This empowers you to take proactive measures against potential breaches.
๐ Expanded Query Possibilities
The Zeek integration brings a wealth of opportunities for advanced hunting. From HTTP and SSH connections to ICMP and SSL sessions, you can now execute more intricate queries to uncover potential vulnerabilities and malicious activities.
๐ก Actionable Insights from Protocol Data
Whether it's identifying suspicious user agents, detecting file downloads from HTTP, or even spotting potential ping scans, our advanced hunting examples showcase the power of Zeek-based events in uncovering threats that might go unnoticed.
๐ Leveraging SSL and DNS Insights
Our SslConnectionInspected and DnsConnectionInspected action types provide detailed information about SSL and DNS connections, both inbound and outbound. These insights allow you to monitor network activity and identify potential risks associated with these protocols.
๐ Securing NTLM Traffic
The introduction of the NtlmAuthenticationInspected action type allows you to track NTLM authentication events on managed endpoints. This invaluable data aids in monitoring and securing NTLM traffic, ensuring a strong defense against unauthorized access.
Stay vigilant and up-to-date with these enhancements to Microsoft Defender for Endpoint. By harnessing the power of Zeek integration and these advanced action types, you're empowered to defend your network against even the most sophisticated threats.
https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enrich-your-advanced-hunting-experience-using-network-layer/ba-p/3794693
#Cybersecurity #NetworkProtection #MicrosoftDefender #AdvancedHunting #ThreatDetection #zeek #edr #xdr #microsoft #azure #cloud #cloudnative