Hacker hunting and built-in protections with Microsoft Azure

Created by Saima Farheen, Modified on Tue, 30 Jun, 2020 at 8:21 PM by Saima Farheen

Join Shain Wray from the MSTIC security team as he demonstrates the work of Microsoft's intelligence groups to hunt for and protect against malicious activity in Azure -- and how this leads to the hardening of the controls and defenses available to you. Watch as he helps you to use the detections in Azure to hunt for and to uncover attack vectors that can lead to broader exploits starting with: the OS layer with brute force attacks spanning Windows via Remote Desktop Protocol and Linux-based machines using SSH-based attacks; the app layer; SQL brute force attacks and more. 




For more tips like this, check out the working remotely playlist at www.youtube.com/FoetronAcademy . Also, if you need any further assistance then you can raise a support ticket and get it addressed.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article