AzureTracks.com investigating using Microsoft Sentinel, KQL, and logs.

Find Actions Taken by an Administrator in Azure Logs

In this post, join me in exploring how to find meaningful actions taken by an administrator in your environment. We will take a look at how to find what changes were made by an individual account. Join me as we dive into auditing logs in Azure and determine if the administrator account is responsible for actions in our environment.

Posted on 7:18 am

Incident Response Foundations – Identity

In today’s post I talk about responding to a compromised identity in Microsoft Entra ID. There is a lot of advice floating around on what to do and how to respond; I’m bringing experiences and existing guidelines together to provide a solid foundational starting point for identity based incident response in this post.

Posted on 7:12 am

Fortifying Your Cyber Defenses: Preventing Unmanaged Device Compromises

In the evolving landscape of cyber threats, ransomware operators are increasingly targeting unmanaged devices. These devices, including personal devices used for work-related tasks, often lack the robust security measures found in managed systems. Understanding these evolving threats and taking proactive steps to protect your organization is paramount. Today, our article delves into the challenges posed by unmanaged device compromises and offers comprehensive, actionable measures to bolster your defenses.

Posted on 7:23 am
Malinois IT Security Ninja

Strengthening Cyber Defenses Against Modern Threats

In today’s digital age, cyber threats have evolved into sophisticated attacks that exploit vulnerabilities on an unprecedented scale. It’s crucial to understand these threats and take proactive steps to protect your organization. In this article, we explore the evolving landscape of cybercrime and provide actionable measures to safeguard your digital assets. Today, we continue our journey through Microsoft’s Digital Defense Report 2023 and look at some actionable steps that can be taken to improve your organization’s security posture.

Posted on 8:18 am

Strengthening Cybersecurity: Protecting Against 99% of Attacks

In the ever-evolving landscape of cybersecurity, one undeniable truth stands out—implementing fundamental security hygiene practices can thwart the vast majority of cyberattacks. By adhering to these minimum-security standards, it is possible to protect against over 99 percent of attacks. In this article, we’ll delve into these essential practices and explore how they can fortify your defenses.

Continuing the theme of exploring highlights from the Microsoft Digital Defense Report #MDDR 2023, today we walk through the top 5 security fundamentals to better enhance all organizations digital defenses.

Posted on 2:20 pm