Тёмный

Find attackers before they strike | Microsoft Defender Threat Intelligence 

Microsoft Mechanics
Подписаться 341 тыс.
Просмотров 5 тыс.
50% 1

With sophisticated cyber-attacks on the rise, get detailed and current intel on trending attacks with Microsoft Defender Threat Intelligence. Enrich investigations and contain threats before they impact your organization with exclusive access to the same raw attack signals our Microsoft Researchers have. Easily gauge the severity of a threat and seek specialist assistance with Threat Profiles that link threats and their methods to known threat actors.
Lou Manousos, Threat Intelligence expert and Microsoft Security CVP, joins Jeremy Chapman to share how to use raw data on active attacks as they unfold.
► QUICK LINKS:
00:00 - Introduction
01:33 - Track and understand attacks
03:39 - Native integration of Risk IQ data with Microsoft Defender
06:14 - Raw data in the Threat Intelligence portal
07:32 - How to see evolving threats
09:16 - Connect a threat actor to an active incident
11:28 - How to use raw data in an active incident
13:32 - Host pairs
15:29 - Wrap up
► Link References:
More on Threat Intelligence at aka.ms/mdti-tech
Access the most current 2 weeks of data for free at ti.defender.microsoft.com
► Unfamiliar with Microsoft Mechanics?
As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
• Subscribe to our RU-vid: / microsoftmechanicsseries
• Talk with other IT Pros, join us on the Microsoft Tech Community: techcommunity.microsoft.com/t...
• Watch or listen from anywhere, subscribe to our podcast: microsoftmechanics.libsyn.com...
► Keep getting this insider knowledge, join us on social:
• Follow us on Twitter: / msftmechanics
• Share knowledge on LinkedIn: / microsoft-mechanics
• Enjoy us on Instagram: / msftmechanics
• Loosen up with us on TikTok: / msftmechanics
#cybersecurity #MicrosoftSentinel #MicrosoftDefender #cyberattacks

Наука

Опубликовано:

 

5 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 1   
@srikark3532
@srikark3532 Год назад
Super!
Далее
Find and Remove hidden Attackers in your Network
14:53
КРУТОЙ ФОКУС С ШАРАМИ
00:35
Просмотров 495 тыс.
Day in the Life: cyber threat intelligence analyst
1:51
Install Kaspersky Network Agent for linux remotely
8:20
Choose a phone for your mom
0:20
Просмотров 5 млн
Сложная распаковка iPhone 15
1:01
Просмотров 13 тыс.
Сложная распаковка iPhone 15
1:01
Просмотров 13 тыс.