From 5a948bdc6f1c52b02c628446147782fb1eaf2dfb Mon Sep 17 00:00:00 2001 From: Alex Verboon Date: Thu, 12 Sep 2024 19:52:27 +0200 Subject: [PATCH] Update mid-September 2024 --- docs/mde.md | 1 + docs/mdi.md | 1 + docs/mdo.md | 1 + docs/sentinel.md | 2 ++ docs/xspm.md | 5 +++++ 5 files changed, 10 insertions(+) diff --git a/docs/mde.md b/docs/mde.md index 676c24e..c8a8169 100644 --- a/docs/mde.md +++ b/docs/mde.md @@ -251,6 +251,7 @@ ## Community Blogs +- [Microsoft Defender for Endpoint Deployment rings](https://github.com/mattnovitsch/M365/wiki/Microsoft-Defender-for-Endpoint-Deployment-rings) - [Common mistakes during Microsoft Defender for Endpoint deployments](https://jeffreyappel.nl/common-mistakes-during-microsoft-defender-for-endpoint-deployments/) - [Analyzing MDE Network Inspections](https://hybridbrothers.com/analyzing-mde-network-inspections/) - [How to check for a healthy Defender for Endpoint environment?](https://jeffreyappel.nl/how-to-check-for-a-healthy-defender-for-endpoint-environment/) diff --git a/docs/mdi.md b/docs/mdi.md index f0ce9e7..921f50c 100644 --- a/docs/mdi.md +++ b/docs/mdi.md @@ -7,6 +7,7 @@ ## Microsoft Tech Community Blogs +- [Microsoft Defender for Identity: the critical role of identities in automatic attack disruption](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/microsoft-defender-for-identity-the-critical-role-of-identities/ba-p/4236688) - [Protect and Detect: Microsoft Defender for Identity Expands to Entra Connect Server](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/protect-and-detect-microsoft-defender-for-identity-expands-to/ba-p/4226165) - [Defender for Identity PowerShell module update](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/defender-for-identity-powershell-module-update/ba-p/4208525) - [Introducing the new PowerShell Module for Microsoft Defender for Identity](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/introducing-the-new-powershell-module-for-microsoft-defender-for/ba-p/4028734) diff --git a/docs/mdo.md b/docs/mdo.md index d274b8d..79ce768 100644 --- a/docs/mdo.md +++ b/docs/mdo.md @@ -7,6 +7,7 @@ ## Microsoft Tech Community Blogs +- [How your submissions to Defender for Office 365 are processed behind-the-scenes](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/how-your-submissions-to-defender-for-office-365-are-processed/ba-p/4231551) - [Secure architecture design – How Defender for Office 365 protects against EchoSpoofing](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-architecture-design-how-defender-for-office-365-protects/ba-p/4225358) - [Automate Tenant Allow/Block List entries](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automate-tenant-allow-block-list-entries/ba-p/4213201) - [Announcing Microsoft Defender for Office 365 API’s for retrieving threat data and remediating emails](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/announcing-microsoft-defender-for-office-365-api-s-for/ba-p/4199777) diff --git a/docs/sentinel.md b/docs/sentinel.md index 3c8918f..8c98ba9 100644 --- a/docs/sentinel.md +++ b/docs/sentinel.md @@ -7,6 +7,7 @@ ## Microsoft Tech Community Blogs +- [Hunting with Microsoft Graph activity logs](https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-with-microsoft-graph-activity-logs/ba-p/4234632) - [What's new: Multi-tenancy in the unified security operations platform experience in Public Preview](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-multi-tenancy-in-the-unified-security-operations/ba-p/4225658) - [Comprehensive coverage and cost-savings with Microsoft Sentinel’s new data tier](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/comprehensive-coverage-and-cost-savings-with-microsoft-sentinel/ba-p/4223293) - [Revolutionizing log collection with Azure Monitor Agent](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/revolutionizing-log-collection-with-azure-monitor-agent/ba-p/4218129) @@ -525,6 +526,7 @@ ## Community Blogs +- [Microsoft Sentinel Summary KQL deep dive (From Beginner to Advanced KQL)](https://modernsecops.com/p/microsoft-sentinel-summary-kql-deep-dive?utm_source=linkedin&utm_medium=organic_post&utm_campaign=summary_kql) - [Sentinel Automation Part 2: Automate CISA Known Exploited Vulnerability Notifications](https://kqlquery.com/posts/automatic-cisa-vulnerability-notifications/) - [Optimize Microsoft Sentinel Log Retention with Azure Data Explorer](https://charbelnemnom.com/optimize-microsoft-sentinel-log-retention-adx/?utm_content=cmp-true) - [Ingest Firewall logs into Sentinel Auxiliary Logs tier using Logstash with only $0.10/GB](https://www.linkedin.com/pulse/ingest-firewall-logs-sentinel-auxiliary-tier-using-logstash-lauren-57djf/) diff --git a/docs/xspm.md b/docs/xspm.md index 23b287e..ff4cb34 100644 --- a/docs/xspm.md +++ b/docs/xspm.md @@ -1,7 +1,12 @@ # Microsoft Security Exposure Management +- [Microsoft Security Exposure Management](https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-security-exposure-management) +- [Microsoft Security Exposure Management](https://learn.microsoft.com/en-us/security-exposure-management/) +- [What's new in Microsoft Security Exposure Management?](https://learn.microsoft.com/en-us/security-exposure-management/whats-new) + ## Microsoft Tech Community Blogs +- [Microsoft Security Exposure Management Graph: Prioritization is the king](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-security-exposure-management-graph-prioritization-is/ba-p/4160316) - [Critical Cloud Assets: Identifying and Protecting the Crown Jewels of your Cloud](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/critical-cloud-assets-identifying-and-protecting-the-crown/ba-p/4222198) - [Introducing Microsoft Security Exposure Management](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/introducing-microsoft-security-exposure-management/ba-p/4080907) - [Microsoft Security Exposure Management Graph: unveiling the power](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-security-exposure-management-graph-unveiling-the-power/ba-p/4148546)