Тёмный
CraigCloudITPro
CraigCloudITPro
CraigCloudITPro
Подписаться
Hello, I am Craig - Cloud IT Pro.

I am a 3 x Microsoft Security MVP with over 16 years experience in IT.

I specialise in Microsoft Cybersecurity Solutions.

I have started this RU-vid channel to help the IT Community on working with various technologies within Microsoft Azure, I’ll be uploading tutorials, troubleshooted problems I’ve ran into, quick fixes, as well as tips and hints what I’ve come across so far also trying to make it "fun" and enjoyable and anything that doesn’t quite add up, please feel free to leave a comment 🙂

🔴 Check out my blog 🔴
craigclouditpro.wordpress.com/

🔥Social Media's 🔥
🔴 LinkedIn: www.linkedin.com/in/craig-fretwell/
🐥 Twitter: twitter.com/craigclouditpro
📸 Instagram: www.Instagram.com/craigclouditpro
Azure Generative AI Security Risks !!!!
27:30
2 месяца назад
CoPilot for Microsoft 365 Security Risks
19:51
6 месяцев назад
Data Enrichment with Microsoft Sentinel
13:29
10 месяцев назад
Detecting Azure Platform Threats
7:01
2 года назад
Комментарии
@olafhoogstad446
@olafhoogstad446 Месяц назад
Hi Craig, first of all, thank you so much for your videos, they really help me understand a lot on the SC-200 course and exam I am currently studying for! If I understand correctly, for parsers there are (generally speaking) the following types: _Im_<schema> = Built-in UNIFYING parser Im<schema> = Built-in WORKSPACE DEPLOYED parser _Im_<schema>_<source> = Built-in SOURCE-SPECIFIC parser vim<schema> = WORKSPACE-DEPLOYED SOURCE SPECIFIC parser A corresponding set of parsers that use _ASim_<schema> and ASim<Schema> are also available. It is not completely clear to me when to use these last parsers, actually. Could you (or someone else of course) help me out please? Thank you :)
@CraigCloudITPro
@CraigCloudITPro 14 дней назад
Hi Olaf, Thank you for your kind words! I’m glad my videos have been helpful to you in your SC-200 course and exam preparation. To clarify your understanding of parsers in Microsoft Sentinel: • Im: Built-in UNIFYING parser. • Im: Built-in WORKSPACE DEPLOYED parser. • Im_: Built-in SOURCE-SPECIFIC parser. • vim: WORKSPACE-DEPLOYED SOURCE SPECIFIC parser. When to use ASIM parsers: • Use ASim when you need a built-in unifying parser for a specific schema across different sources. This helps in normalizing data from various sources into a common schema. • Use ASim for workspace-deployed parsers that are customized for your specific environment and use cases. These are useful when you have specific log sources that require customized parsing rules. These ASIM parsers are especially valuable when dealing with complex environments with multiple data sources, as they help in unifying and simplifying the analysis process. I hope this helps! Let me know if you have any more questions.
@MultiRam73
@MultiRam73 Месяц назад
Hats off to you Craig! It was mindblowing the way you simplified the whole jargon, I feel so rich with the knowledge you shared here, I was so poor before this class
@CraigCloudITPro
@CraigCloudITPro Месяц назад
@MultiRam73 thank you so much for your kind words :)
@plusvision100
@plusvision100 4 месяца назад
Realy nice vicdeo, can you please share this ransomware so we can test this in my environment.
@CraigCloudITPro
@CraigCloudITPro 4 месяца назад
Thank you for the nice comment. Unfortunately I cannot share the ransomware this would be highly unethical.
@danielk9540
@danielk9540 5 месяцев назад
Hello thank you for the concise video. Where can I find/read more on the MS AI official framework around the 6 components shown ~@4:55?
@CraigCloudITPro
@CraigCloudITPro 5 месяцев назад
Thanks Daniel, if you search for Microsoft Responsible AI Standard, v2 you'll find plenty of documentation for this :)
@itexperience
@itexperience 5 месяцев назад
@8:18 was pretty unexpected. But it did generate a smile on my face :)
@henryc7548
@henryc7548 8 месяцев назад
you deserve more subs and views This one was JUICY
@CraigCloudITPro
@CraigCloudITPro 8 месяцев назад
HENRY! you legend! thank you so much man
@henryc7548
@henryc7548 8 месяцев назад
@@CraigCloudITPro You are the legend, no one else is making content this useful for us guys trying to break in to the industry.
@robdewhurst9881
@robdewhurst9881 8 месяцев назад
Any danger of you showing how to technically respond to the issues using MS Sentinel?
@wearewhoweare6602
@wearewhoweare6602 9 месяцев назад
Master i want to be your student 😂😂😂😂 before i lose it 😂😂😂😂
@CraigCloudITPro
@CraigCloudITPro 8 месяцев назад
😂🙈
@finlaycaven4683
@finlaycaven4683 9 месяцев назад
Promo`SM
@Cyber_Guy2
@Cyber_Guy2 9 месяцев назад
This is awesome content. Great resource videos to share with our SOC team.
@CraigCloudITPro
@CraigCloudITPro 8 месяцев назад
Thank you mate
@CraigCloudITPro
@CraigCloudITPro 10 месяцев назад
@Progod, yes this is true, which is why i recommend using free enrichment for TI, using RDAP, Virus Total, RiskIQ etc, I'm hoping this bring the cost of Defender for TI down, because alot of my customers are just objecting it because of the costs
@human1822
@human1822 10 месяцев назад
Craig, would you mind uploading a video to integrate Qualys into MS Sentinel? Or briefly explain the processes?
@CraigCloudITPro
@CraigCloudITPro 10 месяцев назад
Hi mate, I’ve not worked with qualys before, I just did a quick google and the process looks relatively straight forward, so there’s plenty of documentation for you online :)
@human1822
@human1822 11 месяцев назад
Great job Craig.
@CraigCloudITPro
@CraigCloudITPro 10 месяцев назад
Thank you! 🙏🏼
@roso6326
@roso6326 Год назад
Nice video, where could we find the command line on 5:45?
@CraigCloudITPro
@CraigCloudITPro Год назад
Get-NetTCPConnection -State Established | Select LocalAddress, LocalPort, OwningProcess, RemoteAddress, @{n="Path";e={(gps -Id $_.OwningProcess).Path}},@{n="Hash";e={(gps -Id $_.OwningProcess|gi|filehash).hash}}, @{n="User";e={(gps -Id $_.OwningProcess -IncludeUserName).UserName}}|sort|gu -AS | FT -no type information Hopefully this works for you :)
@roso6326
@roso6326 Год назад
@@CraigCloudITPro Perfect, thank you for taking the time to answer
@keerthicr3234
@keerthicr3234 Год назад
how can I store Subscription Value under Variable in azure workbook
@CraigCloudITPro
@CraigCloudITPro Год назад
I show this at 4:04 :) this can be used as a variable
@tusharkamlaskar31
@tusharkamlaskar31 Год назад
Hi Craig, what if we have single tenant and multiple subscriptions.. would single sentinel workspace work?
@CraigCloudITPro
@CraigCloudITPro Год назад
Depends on your scenario, if you have data residency issues, security issues, multiple dependencies rely on the premise of that subject
@neadlead2621
@neadlead2621 Год назад
nice video , can you please provide the video
@CraigCloudITPro
@CraigCloudITPro Год назад
What do you mean?
@jaypelletier8002
@jaypelletier8002 Год назад
Your videos are fantastic!! Thanks so much for sharing you have a true talent for making the complex simple, entertaining, and practical. Keep up the great work-- Cheers!!!
@CraigCloudITPro
@CraigCloudITPro Год назад
Thank you jay!
@progod6017
@progod6017 Год назад
keep up the sentinel content!
@yaya2devops
@yaya2devops Год назад
what if i'm having a bunch of yaml files for each rule instead of a single JSON for all
@yaya2devops
@yaya2devops Год назад
That intro bro!
@CraigCloudITPro
@CraigCloudITPro Год назад
Thank you man
@haseebmohd6063
@haseebmohd6063 Год назад
how do we work on phishing email incident in sentinel plz upload the video
@CraigCloudITPro
@CraigCloudITPro 11 месяцев назад
Hi, thanks for your comment, there are a lot of videos on phishing emails on Sentinel on RU-vid :) if there is anything specific you cannot find, let me know and I’ll see what I can do
@milkteaboba3348
@milkteaboba3348 Год назад
How do you find hash values from AD joined devices? For some reason, I only see VMs like softbox but not any of the "hardbox" like actual endpoint that's joined to company intune.
@CraigCloudITPro
@CraigCloudITPro Год назад
hi milkteaboba, what is the goal you're trying to achieve here? there are multiple ways to extract data from AD and deploying said data into TI, but i don't really understand your use case?
@bashrc-kq8nu
@bashrc-kq8nu Год назад
Super useful content, Thank you Craig!
@CraigCloudITPro
@CraigCloudITPro Год назад
THANK YOU :)
@bashrc-kq8nu
@bashrc-kq8nu Год назад
@@CraigCloudITPro WELCOME :)
@Antonio-yc2kx
@Antonio-yc2kx Год назад
Your videos are really relaxing and a joy to follow. Grow your page easily = 'Promosm' .
@Maphew69
@Maphew69 Год назад
Craig your channel is a diamond find! Thank you for all the content. Love Sentinel. Do you plan any log analytics management - strategies ?
@CraigCloudITPro
@CraigCloudITPro Год назад
Hey Maphew! Thank you for the nice words! Is there anything in particular you are wanting to see?
@GregwilsonAzureSecurity
@GregwilsonAzureSecurity Год назад
Excellent overview, I work with both and your assessment of the setup time and operational effort is spot on. Sentinel is the superior product.
@CraigCloudITPro
@CraigCloudITPro Год назад
Thanks Gregory :)
@JohnConn3
@JohnConn3 Год назад
Disclaimer - I am a Splunk Account Manager so keep that in mind while reading my comments. I find this comparision to be extremely misleading. You compare Sentinel to a Splunk BYOL (bring your own license)) Cloud deployment. To put this in Microsoft terms you are comparing O365 to Exhange running in Azure. Not a fair comparison. I would recommend a redo on this video comparing Sentinel to Splunk Cloud with Mission Control which is a more comparable deployment model. This is not an apples to apples comparision, it is more like an Apples to Walnuts......
@GregwilsonAzureSecurity
@GregwilsonAzureSecurity Год назад
Must hurt to work on an inferior product.
@ishtyleretienne36
@ishtyleretienne36 Год назад
😂😅
@OzYogz
@OzYogz Год назад
Can you please post a video on Splunk Cloud with Mission Control that covers all those aspects of ingestion topology, storage, cost etc?
@matthewfranklin7541
@matthewfranklin7541 Год назад
I work with both Splunk and Sentinel and would consider myself vendor agnostic (worked with LogRythm, ArcSight and Elastic Stack too). There are a few comments I would like to make. 1. I agree Sentinel is very easy to initially set up vs Splunk / Splunk Cloud. Especially Microsoft and large vendor sources (Cisco, Fortinet, etc etc) 2. In addition to an ingest licence Splunk provide a compute based licence too. I would argue this is much easier to budget for vs ingest cost (even with Committment Tiers). I've worked with plenty of organisations (Universities for example) whose throughput massively changes from month to month 3. I would say Splunk is much more mature for non-Microsoft integrations - just look at the number of TAs available on Splunkbase. With Sentinel, you may need a developer (not a typical security engineer) to develop Function Apps to ingest into Custom Tables. 4. Skills. I would argue that Splunk, having been around 20 years, with a robust training offer - skills are much more common. Sentinel is new, and there isn't yet a specific training programme for this (Splunk Ninja Training is good though!) 5. Sentinel scheduled rules can only look back 14 days. 6. Mention of ADX for archiving. Actually Sentinel now has the very good Archive Tier. Splunk very similar (DDAA and DDSS). 7. Developing integrations for sources not yet available in Splunkbase (a rare thing) is super easy using Splunk's Add-on builder. I find with Sentinel you will need to employ someone comfortable with developing Python, Poweshell etc for developing Function Apps. These have to be maintained. Growing list of course open source on GitHub, but catching up. 8. Log source monitoring. Sentinel has some work to do to catch up with Splunk's "TrackMe" app which uses ML to detect outliers, throughput etc. 9. Licence. Sentinel is kinda similar to Splunk ES in the licence model. Sentinel (Splunk ES) is charged on the ingest volume on top of the ingest +storage cost of the underlying Log Analytics Workspace (Splunk Enterprise/Cloud) 10. Learning Microsoft KQL is required, much in the same way as the need to learn Splunk SPL. I like both, and coming from an Oracle background I kind of prefer the KQL language which is more similar and query optimisation is performed transparently. That said Splunk accelerated data is much much quicker. I also like Splunk's "schema on the fly" way of doing things. 11. A Splunk Deployment Server (or supported Ansible, Puppet, Chef, SCCM, ...) isn't mandatory, but useful for configuration of a large number of agents (if only collecting API sources, not needed for example). This is similar to Sentinel's data collection rules (DCR) now available with the AMA agent. Until AMA it hasn't been easily possible to fine tune what is collected (thinking the 4 built-in filters for Windows Security Event collection).
@carcamp5451
@carcamp5451 2 месяца назад
Which one do you prefer learning in 2024 to get a job?
@matthewfranklin7541
@matthewfranklin7541 2 месяца назад
​@@carcamp5451find your niche, don't go with the masses. I might suggest Google Chronicle
@TechForceCyber
@TechForceCyber Год назад
Good one, Craig.
@CraigCloudITPro
@CraigCloudITPro Год назад
Thanks matey :)
@okomu.gabriel7357
@okomu.gabriel7357 2 года назад
this is a very useful and helpful video, currently doing my MSc dissertation research on how sentinel can help mitigate ransomware attack. This video has come to the rescue; I will surely reference your work. Thank you
@CraigCloudITPro
@CraigCloudITPro Год назад
Thank you!
@bhavinibharti1889
@bhavinibharti1889 2 года назад
Please come up with "how to crack Sentinel interview?"
@CraigCloudITPro
@CraigCloudITPro Год назад
That would be difficult, there are many topics and a lot of integrations for Sentinel
@bhavinibharti1889
@bhavinibharti1889 2 года назад
This was very helpful 😊
@CraigCloudITPro
@CraigCloudITPro Год назад
Thank you
@andersondesouza2013
@andersondesouza2013 2 года назад
Great content! I'm using it to ignite my career transition. Don't stop hacking!
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Thank you!
@Aghiad87
@Aghiad87 2 года назад
Good content. The volume was a little low. Thanks!
@CraigCloudITPro
@CraigCloudITPro Год назад
I’m working on increasing volume, thank you
@Dips_M
@Dips_M 2 года назад
These videos are awesome! Far more informative/engaging than the official MS ones, thank you!
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Thank you @Dips_M that means a lot :)
@tiphotisted
@tiphotisted 2 года назад
Hey Craig, really good video. For writing analytic rules in Sentinel, I was wondering if you knew of a place of reference to go to in order to check for an extensive list of names of programs, extensions, directories and other indicators to put in KQL queries for the contains, !contains, has, !has, and so on fields for different types of analytic rules we may be writing. Basically for the filtering part of any analytics rule.
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Hey @tiphotisted, you can use the ones from the KQL Microsoft Docs site, they come under the data explorer section I believe :)
@poppasensei2427
@poppasensei2427 2 года назад
Great thanks!!
@iambest7666
@iambest7666 2 года назад
Thanks for the video.. It was very informative... I just want to know if we use Azure Blob storage for data retention you said we cant use KQL queries.. but can we connect Blob storage to sentinel using data connector and run KQL on that data..? Thanks in advance..
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Hi IAm, you won’t be able to use the SAME queries as if the data were in Sentinel, it’s more difficult and tedious to navigate inside each data folder in a blob storage :)
@maxwilliamson9889
@maxwilliamson9889 2 года назад
Enjoyed this video. Hope you keep posting more stuff so i can continue sharpening my skills
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Thank you for your nice words Shmaxy, hit that subscribe button to be notified of new content :-)
@simple-security
@simple-security 2 года назад
I'm happy to say ADX is no longer needed for Sentinel. Long live the archive feature! ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-z9HDLUJwo1A.html
@antoneandrade5358
@antoneandrade5358 2 года назад
Hell Yeah × ∞ Is that enough Hell Yeahs? :D
@CraigCloudITPro
@CraigCloudITPro 2 года назад
More hell yeahs required to achieve maximum level 😆
@Knalkop123
@Knalkop123 2 года назад
@@CraigCloudITPro Hell yeah
@David-du2fd
@David-du2fd 2 года назад
Thanks 👍
@CraigCloudITPro
@CraigCloudITPro 2 года назад
You’re welcome
@antoneandrade5358
@antoneandrade5358 2 года назад
8:32am, whiskey in hand, ready to get pretty damn juicy
@CraigCloudITPro
@CraigCloudITPro 2 года назад
😂😂😂 what kind of whiskey 🧐🥃
@vrajsoni7610
@vrajsoni7610 2 года назад
Can you please tell the command to upload a JSON file instead of a csv. Thanks
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Hello, so the command let I used was Upload-AzMonitorLog, this is only for CSV, you’ll need to create your own to parse and send json data to Sentinel
@george-jb
@george-jb 2 года назад
I told my nan
@CraigCloudITPro
@CraigCloudITPro 2 года назад
What did she think? 😂😂😂
@george-jb
@george-jb 2 года назад
@@CraigCloudITPro she now works at Oracle as a Security Engineer
@CraigCloudITPro
@CraigCloudITPro 2 года назад
😂😂😂😂
@antoneandrade5358
@antoneandrade5358 2 года назад
Thank you for this! Excellent job!
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Thank you Antone :)
@antoneandrade5358
@antoneandrade5358 2 года назад
Excellent content sir. Thanks again!
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Thank you Antone :) again hehe
@antoneandrade5358
@antoneandrade5358 2 года назад
Dude, you have no idea how much you've helped me by making this video. Preciecly what I have been asked to do as a project at work. Thank you so much!
@CraigCloudITPro
@CraigCloudITPro 2 года назад
I’m glad I could help Antone :) thanks for watching, I hope you subscribed and told your friends :-D
@JackSmith-oy7rx
@JackSmith-oy7rx 2 года назад
at 16.59 for the log analytics query logs table, do you mean the Activity log for the LA resource?
@CraigCloudITPro
@CraigCloudITPro 2 года назад
Hey Jack, so the LA query logs table is for SOC users that are running queries inside the specified Log Analytics Workspace
@CraigCloudITPro
@CraigCloudITPro 2 года назад
You can audit activities with Azure Activity of course, but the LA query logs is specified at which table and queries were ran, I hope that helps :)