At the minute a lot of defenders at orgs are looking at ZDnet stories and reading threat intelligence company briefings (which often just link ZDnet). ZDnet is great, but having a real picture of your own environment and risk is better.
-
-
Prikaži ovu nit
-
One of the recurring themes I see across orgs is they don’t understand their own posture - they usually think it’s better than it is due to folk lore IT knowledge. Pulling in real configuration and vulnerability data into threat protection ispic.twitter.com/RDUSLoGWWx
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
How do you generate that dude?
-
If you have Defender ATP, go to the Defender portal thingy website
Kraj razgovora
Novi razgovor -
-
-
Kevin where does one get this report?
-
Need defender ATP to get the context of your environment. Report is in the defender security center
Kraj razgovora
Novi razgovor -
-
-
That looks awesome
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
This is awesome
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
I use this at my org, and its turned into a really valuable tool. There is an impressive amount of information, and depending on the threat, the "advanced hunting" category shown on that page provides various methods used to uncover-identify that particular threat in your env.
-
To clarify and for example, here are some advanced hunting queries one can use to proactively find "Doppelpaymer" ransomware.pic.twitter.com/e7gFi5smOq
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.