Blog

Deploy Microsoft Sentinel Analytic Rules from 3rd Party Sources

Deploy analytic rules from sources all over the web. The cybersecurity community is constantly developing and sharing analytics that can be used to detect potentially malicious activity. Cybersecurity analysts working with Microsoft Sentinel can take these shared analytics and turn them into analytic rules. The only issue is that there is not a clear set […]

Read More about Deploy Microsoft Sentinel Analytic Rules from 3rd Party Sources

Which Connection Should I Use for Playbooks?

Give out permissions with the right balance of security and manageability. With the release of the managed identity option for Microsoft Sentinel playbooks, there are now 3 viable options for connecting playbooks to an identity that has the needed permissions. Information about these connection types is difficult to find in Microsoft documentation, so deciding which […]

Read More about Which Connection Should I Use for Playbooks?

What to Expect in the Microsoft SC-200 Exam

An exam built specifically for cloud security analysts. Microsoft recently released a new SC series of exams that are designed for more specific security domains in Microsoft cloud security products. The SC-200 is an exam for cybersecurity analysts who are using the Microsoft cloud EDR and SIEM solutions. This exam is very useful for testing […]

Read More about What to Expect in the Microsoft SC-200 Exam

What Are Administrative Units and How Do I Use Them?

Give out subscription level permissions for only a specific set of users. Microsoft recently released the new administrative units feature for Azure Active Directory (AD). Good folks over at Microsoft were so excited about the new feature that they instantly added it as a section in the AZ-500 cloud security exam. However, we at CyberMSI […]

Read More about What Are Administrative Units and How Do I Use Them?

Advanced Threat Hunting in Microsoft 365 Security

Discover useful information from all 4 Microsoft 365 Defender menus. All the logs available in Microsoft 365 Defender products can be found in the Hunting menu in Microsoft 365 Security. If the user knows KQL, they can find all sorts of useful information about their cloud products like cloud app activity, device activity, and information […]

Read More about Advanced Threat Hunting in Microsoft 365 Security

Implementing Ingestion Delay Correction in Microsoft Sentinel

Improve your analytic rule detection rate with a quick change. Microsoft Sentinel analytic rules do not correct for ingestion delay on their own, so this prompted the Microsoft Tech Community to post a blog about creating your own ingestion delay solution. The solution seems a bit convoluted, but it makes sense once you wrap your […]

Read More about Implementing Ingestion Delay Correction in Microsoft Sentinel

What to Look for in a Cloud Security Analyst.

Find high potential candidates in your recruiting pool. CyberMSI has gone through 1,000s of resumes, and we are always seeking capable cloud security professionals. We look for some specific attributes that we know from experience will make a candidate successful as a cloud security analyst. In this blog, we discuss the features that we believe […]

Read More about What to Look for in a Cloud Security Analyst.

Endpoint Investigation, Invasive or Invaluable?

Give analysts agency wihout losing availability. Microsoft Defender for Endpoint (MDE) has live response options that allow security analysts using the EDR system to take actions on a connected system. This is exciting for security departments that are using the tool, but this may raise concerns for the rest of the IT departments. MDE offers […]

Read More about Endpoint Investigation, Invasive or Invaluable?

Is “Always Encrypted” Actually Always Encrypted?

Secure your data with functionally always encrypted. Azure allows their database users to encrypt their data with “always encrypted”. This is a system that uses transparent data encryption in combination with other encryption methods to ensure that data is always encrypted in every state it is being used. In this blog, we will answer the […]

Read More about Is “Always Encrypted” Actually Always Encrypted?
Scroll to Top