Using Defender for Endpoint for Deep Ransomware Investigation

Поделиться
HTML-код
  • Опубликовано: 9 фев 2025

Комментарии • 5

  • @kashifhasnain5458
    @kashifhasnain5458 2 года назад +1

    Well explained on investigation.. keep up the good work

  • @indiramourya2406
    @indiramourya2406 2 года назад +2

    Excellent video. Thank you for uploading.

  • @GregThomson
    @GregThomson 2 года назад +2

    Excellent video. Nice hands on actionable learning.

  • @tandasherman1360
    @tandasherman1360 Год назад +1

    Awesome video!!

  • @RichardGailey
    @RichardGailey 3 года назад +3

    That was one of the best deep dives in to what to do and how to react to certain alerts raised in Defender.
    Really liked the way that you did this.
    Regarding the IP addresses that were found in the Deep Analysis results; would these be good examples of addresses that you could create a KQL query for to add these IP's as IOC's for future events for all machines in the environment.
    Will you be doing a video n creating KQL queries in Azure and Defender (as the syntax differs) and most importantly, how to create an alert for the SOC team should any value be found in an query that you have created.
    One of the main issues that I am having at the moment, is trying to create alerts from queries that I have found online and also trying to figure out how to get an action to run when an alert is triggered, like Isolate the device instantly of a severe issue is found at 03:00hrs and we don't have a 24hr SOC.
    Liked and subbed. Awesome video.