Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Threat Hunting in Microsoft 365 Environment

Автор: SANS Digital Forensics and Incident Response

Загружено: 2022-11-23

Просмотров: 9233

Описание:

SANS DFIR Summit 2022

Speakers: Thirumalai Natarajan Muthiah & Anurag Khanna

Threat Hunting

Over the last few years, Threat Actors have augmented their efforts in developing novel and sophisticated attack techniques to target Enterprise Cloud environments. Microsoft 365 is a cloud based software as a service provided by Microsoft and includes services like Exchange online, Flows, SharePoint online, Teams. Attackers consistently target M365 services in order to gain initial access, maintain persistence and perform data exfiltration. Several investigations have revealed that threat actors have not only been able to successfully compromise Cloud environments but also persist and move laterally. Organizations have found it increasingly difficult to protect Cloud services and detect threat actor activities. We will talk through ways of how blue teams can hunt for some of the techniques that threat actors use to target M365. Some of the areas that we will cover include,

1. Automated Email Forwarding
2. Delegation
3. Mailbox folder Permissions
4. OAuth Grants
5. Flows to automate Data Extraction
6. MFA Bypass Scenarios
7. Privileged roles
8. Suspicious Sign-in
9. Message Trace & eDiscovery
10. Hunting from Unified Audit Logs

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

Threat Hunting in Microsoft 365 Environment

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Hunting for Active Directory Persistence

Hunting for Active Directory Persistence

Stay ahead of the game: automate your threat hunting workflows

Stay ahead of the game: automate your threat hunting workflows

Cyber Security Through Identity Management

Cyber Security Through Identity Management

Fast Forensics and Threat Hunting with Yamato Security Tools

Fast Forensics and Threat Hunting with Yamato Security Tools

Analysis Paralysis? Setting the Right Goal for Your Incident Analysis

Analysis Paralysis? Setting the Right Goal for Your Incident Analysis

Build a Structured Threat Hunting Methodology

Build a Structured Threat Hunting Methodology

Inside the Persistent Mind of a Chinese Nation-State Actor

Inside the Persistent Mind of a Chinese Nation-State Actor

Advanced Hunting & Data visualization in Microsoft 365 Defender

Advanced Hunting & Data visualization in Microsoft 365 Defender

Microsoft Foundry — фабрика приложений и агентов на основе искусственного интеллекта.

Microsoft Foundry — фабрика приложений и агентов на основе искусственного интеллекта.

Стратегии англосферы в условиях кризиса меняющегося миропорядка | Олег Яновский

Стратегии англосферы в условиях кризиса меняющегося миропорядка | Олег Яновский

Как охотиться на опасных животных как профессионал: простой способ

Как охотиться на опасных животных как профессионал: простой способ

A Planned Methodology for Forensically Sound IR in Office 365 - SANS DFIR Summit 2018

A Planned Methodology for Forensically Sound IR in Office 365 - SANS DFIR Summit 2018

M365 Threat Hunting—How to Understand Attacker's TTPs in Your Tenant

M365 Threat Hunting—How to Understand Attacker's TTPs in Your Tenant

Главные итоги AI 2025: прорывы и поражения. Что ждать в 2026

Главные итоги AI 2025: прорывы и поражения. Что ждать в 2026

Starting with Advanced Hunting in Microsoft 365 Defender

Starting with Advanced Hunting in Microsoft 365 Defender

Microsoft 365 Defender: Guided hunting

Microsoft 365 Defender: Guided hunting

Hunting for Suspicious HTTPS and TLS Connections

Hunting for Suspicious HTTPS and TLS Connections

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Microsoft Sentinel-Threat Hunting

Microsoft Sentinel-Threat Hunting

Zero to CTI: A Novice’s Journey into Threat Intelligence

Zero to CTI: A Novice’s Journey into Threat Intelligence

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]