Blog

Why Aren’t My Microsoft Sentinel Playbooks Working?

Solutions to some common Playbook pitfalls.   Some of the error messages that appear in Playbooks are either very cryptic or simply unexplained because many Microsoft Sentinel Logic App components are in preview. Security analysts that are deploying Microsoft Sentinel Playbooks for the first time may see esoteric error messages like the example below and get […]

Read More about Why Aren’t My Microsoft Sentinel Playbooks Working?

Advanced Threat Hunting in Microsoft Sentinel.

When Existing Data isn’t Enough, Look for Metadata.   Microsoft Sentinel has a constantly expanding list of advanced hunting queries that Microsoft has gathered from around the community to help with finding useful information when investigating cybersecurity incidents. As of the last count, there are 200+ queries available out-of-the-box in Microsoft Sentinel. It is worthwhile […]

Read More about Advanced Threat Hunting in Microsoft Sentinel.

Investigating with Microsoft Defender for Endpoints (MDE)

Use a focused methodology to resolve multi-stage incidents quickly and effectively Microsoft Defender for Endpoints (MDE) uses AI and analytics to correlate alerts to create an incident, and it is not shy about showing all the alerts that could potentially be involved with the incident. If a security analyst expands a multistage incident, they may […]

Read More about Investigating with Microsoft Defender for Endpoints (MDE)

Using Microsoft MCAS Effectively

How to Investigate Cloud Incidents in Microsoft MCAS  Microsoft Cloud App Security (MCAS) is a Cloud Access Security Broker (CASB) service that manages security activity in the cloud. When security analysts see cybersecurity alerts from MCAS, it can be often confusing to investigate these alerts because of the user interface (UI) design. Instead of seeing traditional […]

Read More about Using Microsoft MCAS Effectively

Are You Challenged with the Microsoft Sentinel Investigation Graph?

Use a focused methodology to avoid getting lost.  Microsoft Sentinel’s investigation graph uses nodes to represent security data, and those nodes can be expanded to view all the related entities. If a security analyst expands the investigation graph information just once for each node, the investigation graph looks like the example image below. Therein lies […]

Read More about Are You Challenged with the Microsoft Sentinel Investigation Graph?

Accelerating Zero Trust Security (ZTS) – Part 2

How to prioritize your zero trust security (ZTS) initiatives In part 1 of this blog post on zero trust security (ZTS), we discussed the trends that are accelerating digitization and why CIO/CISOs need to adapt their cybersecurity posture as a result.  We’d submit to you that Zero Trust Security is arguably the most important development […]

Read More about Accelerating Zero Trust Security (ZTS) – Part 2

Accelerating Zero Trust Security – Part 1

How to prioritize your zero trust security initiatives We’re seeing major technological shifts such as work-from-home, automation, robotics, IoT, etc. accelerate due to the recent health and ensuing economic disruptions. Reality is that digitization was already facilitating these trends, and now CIO/CISOs must take the helm in enabling their organizations to make the transition toward […]

Read More about Accelerating Zero Trust Security – Part 1

Is threat hunting a waste of time?

It can be unless you incorporate these strategies Many organizations are adopting regular cybersecurity threat hunting exercises as part of routine SOC operations. However, odds are that your threat hunting exercises aren’t very productive. The main reasons most threat hunting exercises are ineffectual range from the complexity of the threat landscape to lack of analytical/statistical […]

Read More about Is threat hunting a waste of time?

Is zero trust security an approach, architecture or new tech?

Yes—and how to unravel it for your organization Lately, the topic of zero-trust Security (ZTS) is one that we at CyberMSI have been discussing quite a bit with CIO/CISOs. In case you’re not familiar with ZTS, you can reference how the industry—and Microsoft in particular—defines ZTS here. Like so many of the other major shifts […]

Read More about Is zero trust security an approach, architecture or new tech?
Scroll to Top