filmov
tv
Using Microsoft 365 Defender to Protect Against Solorigate
Показать описание
Quick Links:
00:00:00 Introduction
01:20 Understanding supply chain attacks
03:03 The Solorigate attack
05:51 Tracking the cross-domain Solorigate attack from endpoint to the cloud
11:42 Detecting and blocking malware and malicious behavior on endpoints
16:08 Detecting hands-on keyboard activity within an on-premises environment
26:38 Detecting the hands-on-keyboard activity within the cloud environment
31:04 Resources
00:00:00 Introduction
01:20 Understanding supply chain attacks
03:03 The Solorigate attack
05:51 Tracking the cross-domain Solorigate attack from endpoint to the cloud
11:42 Detecting and blocking malware and malicious behavior on endpoints
16:08 Detecting hands-on keyboard activity within an on-premises environment
26:38 Detecting the hands-on-keyboard activity within the cloud environment
31:04 Resources