YoVDO

BECs and Beyond - Investigating and Defending Office 365

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Cybersecurity Courses Microsoft Office 365 Courses Cloud Security Courses Log Analysis Courses

Course Description

Overview

Explore the evolving landscape of cloud security in this 49-minute conference talk focusing on Microsoft Office 365. Analyze two real-world attack case studies targeting Office 365, examining the tactics, techniques, and procedures (TTPs) of financially and information-motivated threat actors. Learn how to optimize Office 365 for investigations, understand available log sources and their limitations, and discover recommendations for enhancing Office 365 security. Gain insights from Douglas Bienstock, a Mandiant professional experienced in Incident Response and Red Team work, as he shares lessons learned from investigations to help organizations stay ahead of cyber threats.

Syllabus

Intro
Roadmap
Introduction
Modern vs Legacy Authentication
Core Logs
Unified Audit Log
Mailbox Audit Log
Admin Audit Logs
Remain undetected
Find the rules!
Change banking information
Attacker logs in
Access other Mailboxes
Azure AD PowerShell
OAuth Abuse
Exchange Online message read auditing
Exchange Online Sessions
What did we learn?


Taught by

0xdade

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera