Ondrej Sebeladoitpshway.com·Oct 2, 2024Automated Software Vulnerability NotificationToday, I’ll guide you through setting up an automation system that notifies your users about vulnerable software detected on their devices. This information will be sourced from the Microsoft Defender API. In this post, I’ll demonstrate how to create...Discuss·2 likes·202 readsAzureAzure
Jonathan DeLeonforCybersecurity Projects & Blogmrcyberleon.hashnode.dev·Aug 24, 2024SOAR + EDR Project using Lima Charlie / TinesObjective: Utilizing SOAR automation for Endpoint Detection & Response (EDR) to enhance workflow efficiency and automate the isolation of a device across multiple communication channels. Tools Used: In this project, I employed a range of sophisticate...DiscussLima Charlie
Jonathan DeLeonforCybersecurity Projects & Blogmrcyberleon.hashnode.dev·Aug 24, 2024Utilize Custom Analytics with Query in Microsoft Sentinel to monitor for malicious login activities.Objective: Utilize SIEM technology to consolidate logs (Windows Events) for ingestion into the SIEM and formulate a custom analytics query to run/detect potential malicious activity, thereby monitoring for possible Brute Force Login attempts. Tools: ...DiscussAzure
Ondrej Sebeladoitpshway.com·Jun 12, 2024Manage Microsoft 365 Defender (XDR) via PowerShellIn case you are using Microsoft Defender you are familiar with the security.microsoft.com portal. You also probably know that Microsoft also offers API for this security solution. Today I will show you some of my PowerShell commands (M365DefenderStuf...Discuss·958 readsOther stuffDefender for Endpoint
Sven BergendahlProsvenbergendahl.com·Mar 5, 2023Build your Microsoft demo and test tenant with the CDX PortalIntroduction Sometimes you need a fully-fledged Microsoft 365 (or other) test, demo, user experience environment/tenant to test something yourself or present some features to a customer he is interested in. You can certainly use your own or your comp...Discuss·6.0K readsMicrosoft Entra