One of the most sought-after features of a modern SIEM is the ability to read data from various Internet-based sources and use it to enrich the analysis of the raw logs. Such resources could come in various “packages” – they could be freely downloadable files or they may require authentication tokens/paid subscriptions, some are CSV, […]
Author: Emily Young
Microsoft Security Stack Coverage
Contact us for full walk-through of this diagram and a review of Microsoft Graph Security integration with the overall Microsoft security stack.
Azure Security Center Design
This post is a second iteration on Azure Security Center (ASC), part of our effort to provide one-page diagrams for Microsoft’s M365/Defender (aka XDR) components. In our first post on ASC, we mentioned how one of the most common questions that we are receiving about Azure Sentinel is about its functionality compared with Azure Security […]
Microsoft Security Products vs. Other Cloud Security Products
In recent years, Microsoft has emerged as a market leader for a wide range of security areas, with a high focus on the hybrid infrastructure. In the diagram below, we are attempting to map each of the Microsoft security products to products to other vendors that have a significant market presence. Some of them are […]
Using KQL to Estimate Log Ingestion Volume In Azure Sentinel
Azure Sentinel pricing model is driven by the amount of data ingested for security analytics that is stored in the related Log Analytics workspace. Given the costs of the cloud resources, it is important to be able to estimate future logs space consumption and consider any budget-related implications. Basing the analysis on the past data, […]
Microsoft Graph Security Components & API
Microsoft Graph, the Security component was born as a way to represent the threat intelligence information in a form that is closer to the way they attackers approach their targets, as a graph of interconnected systems, with complex relationships between themselves and 3rd party entities. Inside the graph, Microsoft is using their substantial analytical power […]
Microsoft 365 Defender for Endpoints
Formerly known as Defender ATP, Microsoft Defender for Endpoints is now a critical component of Microsoft XDR line of security controls. Defender for Endpoints is starting to go past its newly found fame as the “new kid on the block”, with a meteoric rise in Gartner’s Magic Quadrant for endpoint protection. It is now becoming […]
Using Kusto Query Language (KQL) in Azure Sentinel to calculate IIS session times
User sessions are an important aspect of identifying the behavior of web users. In many cases there is a lot of effort on ensuring that a user spends as much time visiting a website as it increase the chance of consuming the services offered by that particular website, be that advertising material, sales, etc. Onboarding […]
Extended Microsoft MDR Service Components
Understanding the components of an extended Microsoft MDR service by Adrian Grigorof, CISSP, CISM, CRISC, CCSK , Marius Mocanu, CISSP, CISM, CEH, SCF October 22, 2020 During our engagements with customers we are always in a situation where we have to explain the differences between various flavors of MDR services and sometimes even the difference […]
Detecting and Mitigating EDoS attacks in Azure Sentinel
Cloud computing is emerging or one would rather say has long time emerged as the panacea for on-demand scalability and elasticity of IT resources and organizations around the world are taking advantage of it at an unprecedented speed. Such scalability comes with a price and cloud resources that are not managed properly can add up […]