Disclaimer: The information posted in this blog and on this website are not necessarily reflective of the views or recommendations of Microsoft. Though I am an employee of Microsoft, this is considered a personal project of mine that is not intended to be a recommendation or guide from Microsoft the company. I take no responsibilityContinue reading “Automate MDE Custom Indicators with PowerShell”
Category Archives: Microsoft Defender for Endpoint
Automate IOC Expiry Reports with Power Automate and Microsoft Defender for Endpoint
Disclaimer: The information posted in this blog and on this website are not necessarily reflective of the views or recommendations of Microsoft. Though I am an employee of Microsoft at the time of writing, this is considered a personal project of mine that is not intended to be a recommendation or guide from Microsoft the company.Continue reading “Automate IOC Expiry Reports with Power Automate and Microsoft Defender for Endpoint”
MDE Kit – A PowerShell Module for Microsoft Defender for Endpoint
Disclaimer: The information posted in this blog and on this website are not necessarily reflective of the views or recommendations of Microsoft. Though I am an employee of Microsoft, this is considered a personal project of mine that is not intended to be a recommendation or guide from Microsoft the company. I take no responsibilityContinue reading “MDE Kit – A PowerShell Module for Microsoft Defender for Endpoint”
Creating Custom Email Reports with Advanced Hunting and Power Automate
Disclaimer: The information posted in this blog and on this website are not necessarily reflective of the views or recommendations of Microsoft. Though I am an employee of Microsoft, this is considered a personal project of mine that is not intended to be a recommendation or guide from Microsoft the company. Introduction In this blog postContinue reading “Creating Custom Email Reports with Advanced Hunting and Power Automate”
Taking Actions on MDE Devices via PowerShell and MDE API
Disclaimer: The information posted in this blog and on this website are not necessarily reflective of the views or recommendations of Microsoft. Though I am an employee of Microsoft, this is considered a personal project of mine that is not intended to be a recommendation or guide from Microsoft the company. I take no responsibility forContinue reading “Taking Actions on MDE Devices via PowerShell and MDE API”
Advanced Hunting with the M365 Defender API
This blog describes how to use the Microsoft 365 Defender API to programmatically run advanced hunting queries in PowerShell and includes working code. The Microsoft 365 Defender API can be confusing to many people and creating a script such as the one described in this blog is often difficult to do without a proper understandingContinue reading “Advanced Hunting with the M365 Defender API”
5 Powerful Advanced Hunting Queries
Advanced Hunting is a powerful, query-based, threat-hunting tool included in the Microsoft 365 Defender platform. When utilized properly, advanced hunting can uncover initial access of a threat actor, lateral movement, exfiltration, insider threats, and so much more. In this post, I will be going through Microsoft’s Community GitHub repo containing advanced hunting queries and showingContinue reading “5 Powerful Advanced Hunting Queries”
How to Simulate a Phishing Campaign with Defender for Office 365
In my last post, we created a free lab and simulated a ransomware attack with Microsoft Defender for Endpoint (MDE). To continue that theme, we will now simulate a phishing campaign to harvest credentials in your lab environment! This is a feature offered by Microsoft 365 Defender which allows IT and security departments to sendContinue reading “How to Simulate a Phishing Campaign with Defender for Office 365”
Create a Free Lab with Microsoft Defender for Endpoint and Simulate a Ransomware Attack
Microsoft’s Defender for Endpoint (MDE) is a cloud-based security platform that empowers the largest enterprises in the world with Threat & Vulnerability Management, Endpoint Detection & Response, Attack Surface Reduction, and so much more. You can take advantage of Microsoft’s free trial (no credit card needed) to learn about this technology in a testing environmentContinue reading “Create a Free Lab with Microsoft Defender for Endpoint and Simulate a Ransomware Attack”
View post to subscribe to site newsletter.