Detect threats using Microsoft Graph activity logs - Part 2

In part one I focused mostly on detecting offensive security tools like AzureHound, GraphRunner, and PurpleKnight. In part two I will go into more depth how you can use the now available information for hunting and how to correlate it with other datasets to gain deeper insights. Correlate Graph activities with other log sources While the MicrosoftGraphActivityLogs alone is a trove of information, correlating it with other logs makes it an even more interesting data source.

原始链接: https://cloudbrothers.info/detect-threats-microsoft-graph-logs-part-2/
侵权请联系站方: [email protected]

相关推荐

换一批