<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Microsoft Defender XDR on justinverstijnen.nl</title><link>https://projectkaasplank.justinverstijnen.nl/blog/microsoft-defender-xdr/</link><description>Recent content in Microsoft Defender XDR on justinverstijnen.nl</description><generator>Hugo</generator><language>en</language><atom:link href="https://projectkaasplank.justinverstijnen.nl/blog/microsoft-defender-xdr/index.xml" rel="self" type="application/rss+xml"/><item><title>Penetration testing Defender for Identity and Active Directory</title><link>https://projectkaasplank.justinverstijnen.nl/penetration-testing-defender-for-identity-and-active-directory/</link><pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate><guid>https://projectkaasplank.justinverstijnen.nl/penetration-testing-defender-for-identity-and-active-directory/</guid><description>&lt;p&gt;In this guide, i will show how to do some popular Active Directory attacking tests and show how Defender for Identity (MDI) will alert you about the attacks.&lt;/p&gt;
&lt;p&gt;Not everyting detected by Defender for Identity will be directly classified as potential attack. When implementing the solution, it will learn during the first 30 days what normal behaviour in the network is.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="requirements"&gt;Requirements&lt;a class="td-heading-self-link" href="#requirements" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;At least one Microsoft Defender for Identity running
&lt;ul&gt;
&lt;li&gt;For a step by step guide of this, &lt;a href="https://justinverstijnen.nl/how-to-defend-your-active-directory-with-defender-for-identity"&gt;refer this guide&lt;/a&gt;!&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A domain controller (vm-jv-mdi)&lt;/li&gt;
&lt;li&gt;A workstation (ws-jv-mdi)&lt;/li&gt;
&lt;li&gt;Around 30 minutes of your time&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id="starting-out"&gt;Starting out&lt;a class="td-heading-self-link" href="#starting-out" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;So i want to mention, that most of the attacks to Active Directory can be easily prevented if everybody locks their computer everytime they walk away from it and also use good enough authentication methods. Some other attacks cannot always be prevented but we can do the most of it detecting them and acting in a greatly manner.&lt;/p&gt;</description></item><item><title>How to monitor your Active Directory with Defender for Identity</title><link>https://projectkaasplank.justinverstijnen.nl/how-to-defend-your-active-directory-with-defender-for-identity/</link><pubDate>Sat, 15 Feb 2025 00:00:00 +0000</pubDate><guid>https://projectkaasplank.justinverstijnen.nl/how-to-defend-your-active-directory-with-defender-for-identity/</guid><description>&lt;p&gt;When it comes to security, it is great to secure every perimeter. In the Zero Trust model, it has been stated that we have to verify everything, everytime, everywhere. So why consider not monitoring and defending your traditional Active Directory that is still in use because of some legacy applications?&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="requirements"&gt;Requirements&lt;a class="td-heading-self-link" href="#requirements" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;An Microsoft 365 tenant&lt;/li&gt;
&lt;li&gt;A traditional Active Directory (AD DS) environment which meets &lt;a href="https://learn.microsoft.com/en-us/defender-for-identity/deploy/prerequisites#sensor-requirements-and-recommendations"&gt;the system requirements&lt;/a&gt; and is Server 2016+&lt;/li&gt;
&lt;li&gt;A license that has Defender for Identity included, like;
&lt;ul&gt;
&lt;li&gt;Enterprise Mobility &amp;amp; Security E5&lt;/li&gt;
&lt;li&gt;E5 or E5 security add-on&lt;/li&gt;
&lt;li&gt;Standalone Defender for Identity license&lt;/li&gt;
&lt;li&gt;F5 Security add-on with F1 or F3 license already in place&lt;/li&gt;
&lt;li&gt;Source: &lt;a href="https://learn.microsoft.com/en-us/defender-for-identity/deploy/prerequisites#licensing-requirements"&gt;https://learn.microsoft.com/en-us/defender-for-identity/deploy/prerequisites#licensing-requirements&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Around 60 minutes of your time&lt;/li&gt;
&lt;li&gt;A drink of your choice&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id="what-is-microsoft-defender-for-identity-mdi"&gt;What is Microsoft Defender for Identity (MDI)?&lt;a class="td-heading-self-link" href="#what-is-microsoft-defender-for-identity-mdi" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Microsoft Defender for Identity (MDI for short) is a comprehensive security and monitoring tool which is part of the Microsoft XDR suite that defends your Windows Server-based &lt;strong&gt;Active Directory&lt;/strong&gt; (AD DS). This does it by installing agents on every domain controller and so monitoring every authentication request.&lt;/p&gt;</description></item><item><title>Microsoft Defender External Attack Surface Management (EASM)</title><link>https://projectkaasplank.justinverstijnen.nl/microsoft-defender-external-attack-surface-management/</link><pubDate>Sun, 01 Dec 2024 00:00:00 +0000</pubDate><guid>https://projectkaasplank.justinverstijnen.nl/microsoft-defender-external-attack-surface-management/</guid><description>&lt;p&gt;&lt;strong&gt;Microsoft Defender External Attack Surface Management (EASM)&lt;/strong&gt; is a security solution for an organization&amp;rsquo;s external attack surfaces. It operates by monitoring security and operational integrity across the following assets:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Websites&lt;/li&gt;
&lt;li&gt;IP addresses&lt;/li&gt;
&lt;li&gt;Domains&lt;/li&gt;
&lt;li&gt;SSL certificates&lt;/li&gt;
&lt;li&gt;Other digital assets&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition to these components, EASM can also forward all relevant information and logs to SIEM solutions such as Microsoft Sentinel.&lt;/p&gt;
&lt;p&gt;It is also possible to manually input company-specific data, such as all domain names and IP addresses associated with its services.&lt;/p&gt;</description></item><item><title>The MITRE ATTACK Framework</title><link>https://projectkaasplank.justinverstijnen.nl/the-mitre-attck-framework/</link><pubDate>Mon, 25 Nov 2024 00:00:00 +0000</pubDate><guid>https://projectkaasplank.justinverstijnen.nl/the-mitre-attck-framework/</guid><description>&lt;p&gt;The MITRE ATTACK (ATT&amp;amp;CK) Framework is a framework which describes all stages and methods cyberattacks attacks are launched on companies in the last 15 years. The main purpose of the framework is to help Red and Blue security teams to harden their systems and to provide a library of known attacks to help mitigate them.&lt;/p&gt;
&lt;p&gt;MITRE is the organization who is in charge of this community-driven framework and is a non-profit organization. ATT&amp;amp;CK stands for:&lt;/p&gt;</description></item></channel></rss>