Microsoft Defender Vulnerability Management |
|
Guidance for handling CUPS remote code execution vulnerability using Microsoft Security capabilities.
In this blogpost we will demonstrate how you can easily discover if your organization is vulnerable to this critical unauthenticated RCE flaws in CUPS printing systems and view guidelines on remediation.
|
|
Microsoft Security Exposure Management |
|
Ninja Show: In this 2 episodes, we explore Microsoft Security Exposure Management, learning how it quantifies risks, generates reports for key stakeholders, unifies the security stack, and optimizes attack surface management. Watch the recordings of Part 1 and Part 2.
|
|
Microsoft Security Experts |
|
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack. Since April 2024, we have observed a significant increase in Teams phishing attacks, which have led to endpoint-related incidents, particularly through the abuse of Remote Monitoring and Management (RMM) tools such as Quick Assist (Ref : Threat actors misusing Quick Assist in social engineering attacks leading to ransomware | Microsoft ...), and other tools such as Any Desk, and Team Viewer. In this blog, we will walk through one of the observed scenarios and discuss hunting approaches for detecting such attacks. |
|
Microsoft Unified RBAC roles are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability. Learn more on our docs.
|
|
Microsoft Defender for Cloud Apps |
|
We released various new data in advanced hunting via the CloudAppEvents table
- Anomaly data
- Conditional Access app control / inline data
- OAuthAppId
|
|
We published a new short training video (6 minutes) for App Governance.
Threat actors are using non-human app identities as an attack vector and unfortunately this isn't as well understood as it should be. Customers who own Defender for Cloud Apps can turn on app governance with a few simple clicks and light up powerful capabilities.
|
|
Microsoft Defender for Office 365 |
|
Microsoft Defender for Endpoint |
|
|
Microsoft Defender for Identity |
|
(Preview) Defender for Identity is expanding coverage with new 10 Identity posture recommendations. Read the details on our documentation to learn how these new recommendations can help you improve your posture.
|
|
Copilot Identity Summary released to Public Preview. Read this blog to see how Copilot for Security can simplify SOC teams’ investigation with the new Identity Summary feature within Defender XDR.
Copilot for Security Identity Summary
|
|
(Preview) Sensor management (add, remove, list ...) through new public API. Check out our documentation to learn more about this API.
|
|
|
|