Главная
Study mode:
on
1
Intro
2
Roadmap
3
Introduction
4
Modern vs Legacy Authentication
5
Core Logs
6
Unified Audit Log
7
Mailbox Audit Log
8
Admin Audit Logs
9
Remain undetected
10
Find the rules!
11
Change banking information
12
Attacker logs in
13
Access other Mailboxes
14
Azure AD PowerShell
15
OAuth Abuse
16
Exchange Online message read auditing
17
Exchange Online Sessions
18
What did we learn?
Description:
Explore the evolving landscape of cloud security in this 49-minute conference talk focusing on Microsoft Office 365. Analyze two real-world attack case studies targeting Office 365, examining the tactics, techniques, and procedures (TTPs) of financially and information-motivated threat actors. Learn how to optimize Office 365 for investigations, understand available log sources and their limitations, and discover recommendations for enhancing Office 365 security. Gain insights from Douglas Bienstock, a Mandiant professional experienced in Incident Response and Red Team work, as he shares lessons learned from investigations to help organizations stay ahead of cyber threats.

BECs and Beyond - Investigating and Defending Office 365

0xdade
Add to list
0:00 / 0:00