Threat Hunting in Microsoft 365 Environment

  Рет қаралды 8,668

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

SANS DFIR Summit 2022
Speakers: Thirumalai Natarajan Muthiah & Anurag Khanna
Threat Hunting
Over the last few years, Threat Actors have augmented their efforts in developing novel and sophisticated attack techniques to target Enterprise Cloud environments. Microsoft 365 is a cloud based software as a service provided by Microsoft and includes services like Exchange online, Flows, SharePoint online, Teams. Attackers consistently target M365 services in order to gain initial access, maintain persistence and perform data exfiltration. Several investigations have revealed that threat actors have not only been able to successfully compromise Cloud environments but also persist and move laterally. Organizations have found it increasingly difficult to protect Cloud services and detect threat actor activities. We will talk through ways of how blue teams can hunt for some of the techniques that threat actors use to target M365. Some of the areas that we will cover include,
1. Automated Email Forwarding
2. Delegation
3. Mailbox folder Permissions
4. OAuth Grants
5. Flows to automate Data Extraction
6. MFA Bypass Scenarios
7. Privileged roles
8. Suspicious Sign-in
9. Message Trace & eDiscovery
10. Hunting from Unified Audit Logs
View upcoming Summits: www.sans.org/u/DuS
Download the presentation slides (SANS account required) at www.sans.org/u...

Пікірлер: 4
Common misconceptions and mistakes made in Threat Hunting
31:22
SANS Digital Forensics and Incident Response
Рет қаралды 4,2 М.
Hunting backdoors in Active Directory Environment
31:28
SANS Digital Forensics and Incident Response
Рет қаралды 4,1 М.
An Unknown Ending💪
00:49
ISSEI / いっせい
Рет қаралды 41 МЛН
At the end of the video, deadpool did this #harleyquinn #deadpool3 #wolverin #shorts
00:15
Anastasyia Prichinina. Actress. Cosplayer.
Рет қаралды 19 МЛН
这三姐弟太会藏了!#小丑#天使#路飞#家庭#搞笑
00:24
家庭搞笑日记
Рет қаралды 123 МЛН
M365 Threat Hunting-How to Understand Attacker's TTPs in Your Tenant
44:24
NCSAM: Threat Hunting 101
1:02:59
Cisco Talos Intelligence Group
Рет қаралды 2,7 М.
Hunting Threat Actors Using OSINT
39:39
SANS Digital Forensics and Incident Response
Рет қаралды 13 М.
Incident Response: Malware Investigations | Virtual Ninja Training with Heike Ritter
33:56
Monitoring and Incident Response in Azure AD
41:31
SANS Cyber Defense
Рет қаралды 4,1 М.
DIY DNS DFIR: You’re Doing it WRONG: Threat Hunting Summit 2016
29:33
SANS Digital Forensics and Incident Response
Рет қаралды 8 М.
Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
45:45
SANS Digital Forensics and Incident Response
Рет қаралды 31 М.
Accelarate cloud incident response: Introducing our new acquisition tool
37:44
Invictus Incident Response
Рет қаралды 332
An Unknown Ending💪
00:49
ISSEI / いっせい
Рет қаралды 41 МЛН