Microsoft 365 Defender Ninja Training: January 2021 update

Published Jan 27 2021 05:47 PM 7,128 Views
Microsoft

To usher in the new year, we are happy to announce a change in the blog name to Microsoft 365 Defender Ninja Training to coincide with the product name change.

Also, in addition to several updates to Microsoft 365 Defender Ninja training, we've included a dedicated section focusing on the Solorigate cyberattack to help you defend your environment against this and future supply chain attacks.

 

If you want to refresh your knowledge and get updated, here is what has been added since the last update:

 

Legend:

vid.png Product videos

webcast.png Webcast recordings

TechCommunity.png Tech Community

docs.png Docs on Microsoft

blogs.png Blogs on Microsoft

GitHub.png GitHub

⤴ External

InteractiveGuides.png Interactive guides

 

 

Module

What's new

Security Operations Fundamentals

Module 1. Technical overview

Security Operations Fundamentals

Module 2. Getting started 

Security Operations Fundamentals

Module 3. Investigation – Incident 

Security Operations Intermediate

Module 2. Investigation 

Security Operations Intermediate:

Module 3. Advanced hunting 

 

The following is not part of the Ninja training, but definitely worth a read:

 

Solorigate

2 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-2255561%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20365%20Defender%20Ninja%20Training%3A%20January%202021%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2255561%22%20slang%3D%22en-US%22%3E%3CP%3ELooking%20forward%20for%20new%20features!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2103073%22%20slang%3D%22en-US%22%3EMicrosoft%20365%20Defender%20Ninja%20Training%3A%20January%202021%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2103073%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20usher%20in%20the%20new%20year%2C%20we%20are%20happy%20to%20announce%20a%20change%20in%20the%20blog%20name%20to%20Microsoft%20365%20Defender%20Ninja%20Training%20to%20coincide%20with%20the%20product%20name%20change.%3C%2FP%3E%0A%3CP%3EAlso%2C%20in%20addition%20to%20several%20updates%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fm365dninja%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20365%20Defender%20Ninja%20training%3C%2FA%3E%2C%20we've%20included%20a%20dedicated%20section%20focusing%20on%20the%20Solorigate%20cyberattack%20to%20help%20you%20defend%20your%20environment%20against%20this%20and%20future%20supply%20chain%20attacks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20want%20to%20refresh%20your%20knowledge%20and%20get%20updated%2C%20here%20is%20what%20has%20been%20added%20since%20the%20last%20update%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELegend%3A%3C%2FP%3E%0A%3CTABLE%20border%3D%221%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22vid.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205057i34B332A44C6F17B2%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22vid.png%22%20alt%3D%22vid.png%22%20%2F%3E%3C%2FSPAN%3E%20Product%20videos%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22webcast.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205058iFD24F42AC1504A48%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22webcast.png%22%20alt%3D%22webcast.png%22%20%2F%3E%3C%2FSPAN%3E%20Webcast%20recordings%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TechCommunity.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205059iE2A42D8A7F13D7BC%2Fimage-dimensions%2F17x19%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22TechCommunity.png%22%20alt%3D%22TechCommunity.png%22%20%2F%3E%3C%2FSPAN%3E%20Tech%20Community%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22docs.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205061iC265623042FF4E62%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22docs.png%22%20alt%3D%22docs.png%22%20%2F%3E%3C%2FSPAN%3E%20Docs%20on%20Microsoft%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3BBlogs%20on%20Microsoft%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22GitHub.png%22%20style%3D%22width%3A%2018px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205065i083675CF15D6F1EF%2Fimage-dimensions%2F18x18%3Fv%3Dv2%22%20width%3D%2218%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22GitHub.png%22%20alt%3D%22GitHub.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3BGitHub%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%E2%A4%B4%20External%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22InteractiveGuides.png%22%20style%3D%22width%3A%2018px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205067iF93A500E533F67FB%2Fimage-dimensions%2F18x18%3Fv%3Dv2%22%20width%3D%2218%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22InteractiveGuides.png%22%20alt%3D%22InteractiveGuides.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3BInteractive%20guides%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22209.333px%22%20height%3D%2228px%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2228px%22%3E%3CP%3E%3CEM%3E%3CSTRONG%3EModule%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2228px%22%3E%3CP%3E%3CSTRONG%3E%3CEM%3EWhat's%20new%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2266px%22%3E%3CP%3ESecurity%20Operations%20Fundamentals%3C%2FP%3E%0A%3CP%3EModule%201.%20Technical%20overview%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2266px%22%3E%3CUL%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22vid.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205057i34B332A44C6F17B2%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22vid.png%22%20alt%3D%22vid.png%22%20%2F%3E%3C%2FSPAN%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4HcEU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ENew%20value%20for%20Microsoft%20Defender%20for%20Identity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22vid.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205057i34B332A44C6F17B2%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22vid.png%22%20alt%3D%22vid.png%22%20%2F%3E%3C%2FSPAN%3E%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4HhT6%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ENew%20value%20for%20Microsoft%20Defender%20for%20Office%20365%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2254px%22%3E%3CP%3ESecurity%20Operations%20Fundamentals%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EModule%202.%20Getting%20started%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2254px%22%3E%3CUL%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22vid.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205057i34B332A44C6F17B2%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22vid.png%22%20alt%3D%22vid.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20style%3D%22font-family%3A%20inherit%3B%22%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4LWeP%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EProvide%20your%20feedback%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2281px%22%3E%3CP%20data-unlink%3D%22true%22%3ESecurity%20Operations%20Fundamentals%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EModule%203.%20Investigation%20%E2%80%93%20Incident%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2281px%22%3E%3CUL%3E%0A%3CLI%3E%3CSPAN%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fimproved-incident-queue-in-microsoft-365-defender%2Fba-p%2F1872084%22%20target%3D%22_blank%22%3EImproved%20incident%20queue%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20style%3D%22font-family%3A%20inherit%3B%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fget-email-notifications-on-new-incidents-from-microsoft-365%2Fba-p%2F2012518%22%20target%3D%22_blank%22%3EGet%20email%20notifications%20on%20new%20incidents%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22vid.png%22%20style%3D%22width%3A%2017px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205057i34B332A44C6F17B2%2Fimage-dimensions%2F17x18%3Fv%3Dv2%22%20width%3D%2217%22%20height%3D%2218%22%20role%3D%22button%22%20title%3D%22vid.png%22%20alt%3D%22vid.png%22%20%2F%3E%3C%2FSPAN%3E%20%26nbsp%3B%3CA%20style%3D%22font-family%3A%20inherit%3B%22%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4LHJq%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EClassification%20of%20incidents%20%26amp%3B%20alerts%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2266px%22%3E%3CP%20data-unlink%3D%22true%22%3ESecurity%20Operations%20Intermediate%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EModule%202.%20Investigation%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2266px%22%3E%3CUL%3E%0A%3CLI%3E%3CSPAN%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fmicrosoft-defender-for-office-365-investigation-improvements%2Fba-p%2F1947236%22%20target%3D%22_blank%22%3EInvestigation%20improvements%20for%20Microsoft%20Defender%20for%20Office%20365%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22200px%22%3E%3CP%20data-unlink%3D%22true%22%3ESecurity%20Operations%20Intermediate%3A%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EModule%203.%20Advanced%20hunting%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22200px%22%3E%3CUL%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fhunt-across-cloud-app-activities-with-microsoft-365-defender%2Fba-p%2F1893857%22%20target%3D%22_blank%22%3EHunt%20across%20cloud%20app%20activities%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fadditional-email-data-in-advanced-hunting%2Fba-p%2F1985849%22%20target%3D%22_blank%22%3EUse%20additional%20email%20data%20in%20your%20hunting%20queries%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fazure-active-directory-audit-logs-now-available-in-advanced%2Fba-p%2F1999523%22%20target%3D%22_blank%22%3EUse%20Azure%20Active%20Directory%20audit%20log%20data%20in%20advanced%20hunting%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blogs.png%22%20style%3D%22width%3A%2019px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F205062i0E592B86DF2C2CCF%2Fimage-dimensions%2F19x19%3Fv%3Dv2%22%20width%3D%2219%22%20height%3D%2219%22%20role%3D%22button%22%20title%3D%22blogs.png%22%20alt%3D%22blogs.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fhunt-for-azure-active-directory-sign-in-events%2Fba-p%2F2040278%22%20target%3D%22_blank%22%3EHunt%20for%20Azure%20Active%20Directory%20sign-in%20events%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20following%20is%20not%20part%20of%20the%20Ninja%20training%2C%20but%20definitely%20worth%20a%20read%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CP%3ESolorigate%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F12%2F28%2Fusing-microsoft-365-defender-to-coordinate-protection-against-solorigate%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUsing%20Microsoft%20365%20Defender%20to%20protect%20against%20Solorigate%20-%20Microsoft%20Security%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fsolarwinds-post-compromise-hunting-with-azure-sentinel%2Fba-p%2F1995095%22%20target%3D%22_blank%22%3ESolarWinds%20Post-Compromise%20Hunting%20with%20Azure%20Sentinel%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F12%2F21%2Fadvice-for-incident-responders-on-recovery-from-systemic-identity-compromises%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAdvice%20for%20incident%20responders%20on%20recovery%20from%20systemic%20identity%20compromises%3C%2FA%3E%26nbsp%3B%E2%80%AF%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fiot-security%2Flatest-threat-intelligence-15-december-2020-fireeye-and%2Fm-p%2F1999394%22%20target%3D%22_blank%22%3ELatest%20Threat%20Intelligence%20(15%20December%2C%202020)%20-%20FireEye%20and%20SolarWinds%20Events%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F12%2F18%2Fanalyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAnalyzing%20Solorigate%2C%20the%20compromised%20DLL%20file%20that%20started%20a%20sophisticated%20cyberattack%2C%20and%20how%20Microsoft%20Defender%20helps%20protect%20customers%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.microsoft.com%2Fon-the-issues%2F2020%2F12%2F17%2Fcyberattacks-cybersecurity-solarwinds-fireeye%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EA%20moment%20of%20reckoning%3A%20the%20need%20for%20a%20strong%20and%20global%20cybersecurity%20response%3C%2FA%3E%3CU%3E%26nbsp%3B%3C%2FU%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F12%2F15%2Fensuring-customers-are-protected-from-solorigate%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnsuring%20customers%20are%20protected%20from%20Solorigate%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.microsoft.com%2Fon-the-issues%2F2020%2F12%2F13%2Fcustomers-protect-nation-state-cyberattacks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EImportant%20steps%20for%20customers%20to%20protect%20themselves%20from%20recent%20nation-state%20cyberattacks%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fmsrc-blog.microsoft.com%2F2020%2F12%2F13%2Fcustomer-guidance-on-recent-nation-state-cyber-attacks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECustomer%20Guidance%20on%20Recent%20Nation-State%20Cyber%20Attacks%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F10%2F16%2Fguarding-against-supply-chain-attacks-part-1-big-picture%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGuarding%20against%20supply%20chain%20attacks%E2%80%94Part%201%3A%20The%20big%20picture%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fnew-threat-analytics-report-shares-the-latest-intelligence-on%2Fba-p%2F2001095%22%20target%3D%22_blank%22%3ENew%20Threat%20analytics%20report%20shares%20the%20latest%20intelligence%20on%20recent%20nation-state%20cyber%20attacks%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2103073%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EGet%20an%20update%20about%20the%20latest%20additions%20we%20made%20to%20the%20Microsoft%20365%20Defender%20Ninja%20training%20since%20it%20was%20launched%20in%20October%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22JanNinja.PNG%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F250131iE28343966DD2E1CF%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JanNinja.PNG%22%20alt%3D%22JanNinja.PNG%22%20%2F%3E%3C%2FSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2103073%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ENInja%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ENinja%20blog%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ENinja%20Training%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EXDR%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2117189%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20365%20Defender%20Ninja%20Training%3A%20January%202021%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2117189%22%20slang%3D%22en-US%22%3E%3CP%3EI%20would%20expect%20an%20announcement%20about%20new%20functionality%20to%20include%20the%20new%20names%2C%20the%20%22New%20Value%20for%20Defender%20for%20Identity%22%20video%20in%20module%201%20was%20recorded%204%20months%20ago%20and%20includes%20all%20of%20the%20old%20product%20names%20as%20data%20sources.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Aug 04 2021 10:57 AM
Updated by: