Aura Botnet, the Django-based C2 server botnet framework
inet infosec

Aura Botnet, the Django-based C2 server botnet framework

The Aura Botnet is an excellent portable botnet framework, with a Django-based C2 server. The client is written ...
Read More
infosec

New malware appears as a trading application and deceives users

Trend Micro researchers have discovered that a new Mac Trojan is being launched, aimed at stealing user information. The...
Read More
infosec

TOP Fake GPS apps to protect your privacy!

Every day most of us use GPS apps for many reasons. From moving in and out of the city, ...
Read More
infosec

The most frequently violated passwords are not due to user error

The German computer security firm Avira has released a press release on the least secure passwords for smartphones and devices ...
Read More
infosec

Experts recommend using appropriate internet routing tools!

Routers use the Border Gateway Protocol (BGP) to inform each other of the best possible ways ...
Read More
Latest Posts

Microsoft presents a safer Office 365 for businesses

In an effort to help them security experts To address the critical security alerts they receive daily, Microsoft has activated its Automated Incident Response in Office 365 Advanced Threat Protection (ATP) for business customers.

The colossus automation feature is designed to help security analysts respond to alerts faster and more systematically.

Office 365

In a recent post, Microsoft announced that it has two categories of automated incident response to its customers. The first category is for automated surveys triggered in response to new alerts that appear when users report phishing emails, click on a malicious link or when malicious emails or emails are detected "fishing»In mailboxes.

The second category consists of surveys that start manually and use Microsoft's 'automated playbook' sequences to reach the source of different scenarios and types attack.

microsoft

Rich security manuals

Microsoft automation follows rich security lists, which are essentially a series of carefully recorded steps that security teams can use to thoroughly investigate a warning. They also offer a number of recommended actions to limit and mitigate a risk.

Company manuals associate similar emails sent or received within an organization to detect suspicious activity for users. Microsoft gives some examples of flagged activities on its website, citing mail forwarding, mail forwarding, Office 365 Office 365 Data Loss Prevention (DLP), and suspicious email templates.

As part of Microsoft Threat Protection, these manuals also incorporate alerts and scans from Microsoft Cloud App Security and Microsoft Defender ATP.

The organizations having either an Office 365 ATP Plan 2 plan or an Office 365 Enterprise E5 program can benefit from the company's automated response capabilities.

How useful was this post?

Average rating / 5. Vote count:

Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by
Hack Unamatata

About Hack Unamatata

Take great photos, someone is stalking you

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *