Adrian Grigorof(@AdiGri) 's Twitter Profileg
Adrian Grigorof

@AdiGri

CTO @ Managed Sentinel

ID:15334357

linkhttps://www.managedsentinel.com calendar_today06-07-2008 18:01:15

252 Tweets

435 Followers

122 Following

Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

Segregation of access to logging data is a crucial topic that arises during Microsoft Sentinel architecture sessions. This blog post provides some of the common ways to implement it.
BlueVoyant
managedsentinel.com/microsoft-sent…

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

Microsoft Sentinel introduced a significant number of new features and improvements of existing ones since our last diagram update. This one page diagram attempts to cover the core components and the integration with log sources.

managedsentinel.com/microsoft-sent…

Microsoft Sentinel introduced a significant number of new features and improvements of existing ones since our last diagram update. This one page diagram attempts to cover the core components and the integration with log sources. managedsentinel.com/microsoft-sent… #microsoftsentinel #siem
account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

2 new Microsoft Sentinel alert rule templates published:

- Workspace deletion activity from an infected device
- TI map IP entity to Network Session Events (ASIM Network Session schema)


BlueVoyant

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

2 new Microsoft Sentinel alert rule templates published:

BlueVoyant

Chia_Crypto_Mining IOC - June 2021
(Preview) TI map IP entity to DNS Events (ASIM DNS schema)

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

2 new Microsoft Sentinel alert rule templates published:

BlueVoyant

Front Door Premium WAF - SQLi Detection
Front Door Premium WAF - XSS Detection

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

2 new Microsoft Sentinel alert rule templates published:
@bluevoyant

Guest accounts added in AAD Groups other than the ones specified

Guest accounts changed user type from guest to members in AzureAD

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

New Microsoft Sentinel alert rule template published:

AD FS Abnormal EKU object identifier attribute

Uses Security events from the AD FS Auditing provider to detect suspicious object identifiers as part event ID 501 (from the Enhanced Key Usage attributes).

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

New Microsoft Sentinel alert rule published:
Title: New External User Granted Admin
Description: This query will detect instances where a newly invited external user is granted an administrative role.

account_circle
Adrian Grigorof(@AdiGri) 's Twitter Profile Photo

New Microsoft Sentinel alert rules published:
- PulseConnectSecure - CVE-2021-22893 Possible Pulse Connect Secure RCE Vulnerability Attack
- Hive Ransomware IOC - July 2022
- AV detections related to Hive Ransomware

account_circle