Skip to content

Commit a65d7bd

Browse files
committed
Fall 2025 Update
1 parent a3c1cff commit a65d7bd

File tree

8 files changed

+25
-1
lines changed

8 files changed

+25
-1
lines changed

docs/entraid.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1761,6 +1761,9 @@
17611761

17621762
## Community Blogs
17631763

1764+
- [Disable Entra Connect Seamless SSO – Step-by-Step Guide](https://www.cloudcoffee.ch/microsoft-azure/disable-entra-connect-seamless-sso/)
1765+
- [Some policies I use in Conditional Access](https://conditionalaccess.uk/some-policies-i-use-in-conditional-access/)
1766+
- [Token Theft to Account Takeover: How a Stolen Entra ID Token Can Bypass Two-Factor Authentication (MFA)](https://medium.com/@benj_774/token-theft-to-account-takeover-how-a-stolen-entra-id-token-can-bypass-two-factor-authentication-7d3e37311134)
17641767
- [Detect threats using GraphAPIAuditEvents - Part 3](https://cloudbrothers.info/detect-threats-graphapiauditevents-part-3/)
17651768
- [Detect threats using Microsoft Graph activity logs - Part 2](https://cloudbrothers.info/detect-threats-microsoft-graph-logs-part-2/)
17661769
- [Detect threats using Microsoft Graph activity logs - Part 1](https://cloudbrothers.info/detect-threats-microsoft-graph-logs-part-1/)
@@ -1855,6 +1858,7 @@
18551858
- [AAGUIDs](https://aaguid.nicolasuter.ch/)
18561859
- [Microsoft 365 Message Center Archive](https://mc.merill.net/)
18571860
- [Tier 0 Table](https://github.com/SpecterOps/TierZeroTable/)
1861+
- [https://www.entradocumentation.com/](https://www.entradocumentation.com/)
18581862

18591863
## EntraOps Classification and Automation
18601864

docs/mdc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -352,6 +352,7 @@
352352

353353
## Community Blogs
354354

355+
- [Hunting Ransomware in Storage Accounts (When You Can't Afford Defender)](https://www.itprofessor.cloud/sentinel-storage-account-ransomware-hunting/)
355356
- [AI workload threat protection in Microsoft Defender for Cloud](https://jeffreyappel.nl/ai-workload-threat-protection-in-microsoft-defender-for-cloud/)
356357
- [AZURE PENTESTING — EXPLOITING THE ANONYMOUS ACCESS TO THE BLOB STORAGE — Draft Eng — Updated :)](https://braropad.medium.com/azure-pentesting-exploiting-the-anonymous-access-to-the-blob-storage-draft-english-d80f3831a590)
357358
- [Understanding Microsoft CNAPP: How Defender for Cloud Secures Your Multicloud Workloads](https://www.basevision.ch/understanding-microsoft-cnapp-how-defender-for-cloud-secures-your-multicloud-workloads/)

docs/mdca.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@
3434

3535
## Community Blogs
3636

37+
- [Mastering Policies in Defender for Cloud Apps: A Deep Dive for the SOC Trenches](https://www.itprofessor.cloud/defender-for-cloud-apps-policy-management-deep-dive/)
38+
- [A SOC Analyst's Introduction to Defender for Cloud Apps](https://www.itprofessor.cloud/defender-for-cloud-apps-shadow-it-guide/)
3739
- [How to check for OAuth apps with specific Graph permissions assigned](https://jeffreyappel.nl/how-to-check-for-oauth-apps-with-specific-graph-permissions-assigned/)
3840
- [How to secure OAuth apps with App Governance in Defender XDR](https://jeffreyappel.nl/how-to-secure-oauth-apps-with-app-governance-in-defender-xdr/)
3941
- [Block apps (discovered/ shadow IT) with Defender for Cloud Apps and Defender for Endpoint](https://jeffreyappel.nl/block-apps-discovered-shadow-it-with-defender-for-cloud-apps-and-defender-for-endpoint/)

docs/mde.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -263,6 +263,7 @@
263263

264264
## Community Blogs
265265

266+
- [Guidance on how to manage products updates for Defender for Server on Linux distributions](https://vertho.tech/2025/08/27/guidance-on-how-to-manage-products-updates-for-defender-for-server-on-linux-distributions/)
266267
- [Tracking a device’s IP assignments with MDE’s DeviceNetworkInfo table](https://medium.com/@cybureauocracy/tracking-a-devices-ip-assignments-with-mde-s-devicenetworkinfo-table-430270ca539e)
267268
- [MDE’s DeviceNetworkEvents table [Part 2 — Connection* ActionTypes]](https://medium.com/@cybureauocracy/mdes-devicenetworkevents-table-part-2-connection-actiontypes-1c5ee20d2fc4)
268269
- [Understanding MDE’s DeviceNetworkEvents table for SOC analysts [Part 1 — Overview]](https://medium.com/@cybureauocracy/mdes-devicenetworkevents-table-for-soc-analysts-part-1-overview-094ca99b50c9)
@@ -365,3 +366,9 @@
365366
- [Powershell Digital Forensics & Incident Response](https://github.com/Bert-JanP/Incident-Response-Powershell)
366367
- [Defender for Endpoint docs](https://github.com/MicrosoftDocs/defender-docs/tree/public/defender-endpoint)
367368
- [Microsoft Vulnerable Driver Block Lists](https://github.com/Cyb3r-Monk/Microsoft-Vulnerable-Driver-Block-Lists)
369+
- [Deploying Defender for Endpoint for macOS using Microsoft Intune](https://github.com/yujiaoMSFT/Microsoft-Defender-For-Endpoint/blob/main/macOS/Deploy-MDE-macOS-with-Intune/readme.md)
370+
- [MDE Monitoring App](https://github.com/chlaplan/MDE-Monitoring-App)
371+
372+
## Simulations
373+
374+
- [Microsoft Defender for Endpoint - demonstration scenarios](https://learn.microsoft.com/en-us/defender-endpoint/defender-endpoint-demonstrations)

docs/mdi.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77

88
## Microsoft Tech Community Blogs
99

10+
- [Announcing General Availability: Unified identity and endpoint sensor](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/announcing-general-availability-unified-identity-and-endpoint-sensor/4463585)
1011
- [Monthly news - October 2025](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/monthly-news---october-2025/4458349)
1112
- [How Microsoft Defender helps security teams detect prompt injection attacks in Microsoft 365 Copilot](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/how-microsoft-defender-helps-security-teams-detect-prompt-injection-attacks-in-m/4457047)
1213
- [Announcing General Availability: Unified identity and endpoint sensor](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/announcing-general-availability-unified-identity-and-endpoint-sensor/4463585)

docs/mdxdr.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@
99

1010
## Microsoft Tech Community Blogs
1111

12+
- [Custom detections are now the unified experience for creating detections in Microsoft Defender](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/custom-detections-are-now-the-unified-experience-for-creating-detections-in-micr/4463875)
13+
- [How Microsoft Defender helps security teams detect prompt injection attacks in Microsoft 365 Copilot](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/how-microsoft-defender-helps-security-teams-detect-prompt-injection-attacks-in-m/4457047)
1214
- [Protect Copilot Studio AI Agents in Real Time with Microsoft Defender](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/protect-copilot-studio-ai-agents-in-real-time-with-microsoft-defender/4446560)
1315
- [Protect against OAuth Attacks in Salesforce with Microsoft Defender](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/protect-against-oauth-attacks-in-salesforce-with-microsoft-defender/4450584)
1416
- [Custom detection rules get a boost—explore what’s new in Microsoft Defender](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/custom-detection-rules-get-a-boost%E2%80%94explore-what%E2%80%99s-new-in-microsoft-defender/4443602)
@@ -103,6 +105,7 @@
103105

104106
## Community Blogs
105107

108+
- [The ultimate Defender XDR RBAC visualization](https://vertho.tech/2025/09/29/the-ultimate-defender-xdr-rbac-visualization/)
106109
- [Remove old or orphaned Sentinels from the XDR Streaming API](https://cloudbrothers.info/remove-orphaned-sentinels-xdr-streaming-api/)
107110
- [Detect security policy changes](https://www.lousec.be/ad/detect-security-policy-changes/)
108111
- [Windows Defender: Threat Hunting Campaign Ideas](https://www.linkedin.com/pulse/windows-defender-threat-hunting-campaign-ideas-adair-collins-lefze/)
@@ -137,6 +140,7 @@
137140
- [EDR Telemetry](https://www.edr-telemetry.com/index.html)
138141
- [GraphWeaver: Billion-Scale Cybersecurity Incident Correlation](https://arxiv.org/abs/2406.01842)
139142
- [(Microsoft XDR table schema](https://xdrinternals.com/)
143+
- [Defender XDR RBAC](https://vertho.tech/rbac-xdr/)
140144

141145
## Attack Simulations & Testing
142146

docs/sentinel.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88

99
## Microsoft Tech Community Blogs
1010

11+
- [Using Microsoft Sentinel MCP Server with GitHub Copilot for AI-Powered Threat Hunting](https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/using-microsoft-sentinel-mcp-server-with-github-copilot-for-ai-powered-threat-hu/4464980)
1112
- [Introducing Microsoft Sentinel graph (Public Preview)](https://techcommunity.microsoft.com/blog/microsoft-security-blog/introducing-microsoft-sentinel-graph-public-preview/4456368)
1213
- [Microsoft Sentinel data lake is now generally available](https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsoft-sentinel-data-lake-is-now-generally-available/4456342)
1314
- [New bi-directional export for TI in Microsoft Sentinel and strategic Cyware partnership](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/new-bi-directional-export-for-ti-in-microsoft-sentinel-and-strategic-cyware-part/4457947)
@@ -579,6 +580,9 @@
579580

580581
## Community Blogs
581582

583+
- [Boost Your TI: Integrating Free AlienVault OTX IOCs into Microsoft Sentinel](https://medium.com/@benj_774/boost-your-ti-integrating-free-alienvault-otx-iocs-into-microsoft-sentinel-02d6a743ddb9)
584+
- [Sentinel Watchlists: A Diamond in the rough](https://medium.com/@benj_774/sentinel-watchlists-a-diamond-in-the-rough-16f214f24416)
585+
- [The KQL User Audit Playbook: Your Template for Investigations](https://www.itprofessor.cloud/kql-user-audit-playbook/)
582586
- [Protecting Your Microsoft Sentinel Solution from Deletion or Corruption](https://cybermohr.ghost.io/2025/05/28/protecting-your-microsoft-sentinel-solution-from-deletion-or-corruption/)
583587
- [SentinelCodeGuard: A Journey from Concept to VS Code Plugin](https://sentinel.blog/sentinelcodeguard-a-journey-from-concept-to-vs-code-plugin/)
584588
- [SentinelCodeGuard: Revolutionising Microsoft Sentinel Rule Development](https://sentinel.blog/sentinelcodeguard-revolutionizing-microsoft-sentinel-rule-development/)

docs/social.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,11 +91,12 @@
9191
- [Ru Campell](https://twitter.com/rucam365)
9292
- [Sami Lamppu](https://twitter.com/samilamppu)
9393
- [Thijs](@thijslecomte)
94+
- [Thomas Kurth](https://twitter.com/ThomasKurth_ch)
9495
- [Thomas Naunheim](https://www.linkedin.com/in/thomasnaunheim/)
96+
- [Thomas Verheyden](https://x.com/ThomasVrhydn)
9597
- [Yiannis](https://twitter.com/Sec_GroundZero)
9698
- [Dylan 👾AttacktheSOC](https://twitter.com/dylaninfosec)
9799
- [Samik Roy](https://twitter.com/roy_samik)
98-
- [Thomas Kurth](https://twitter.com/ThomasKurth_ch)
99100
- [Kenneth van Surksum](https://x.com/kennethvs)
100101
- [Daniel Chronlund](https://twitter.com/DanielChronlund)
101102
- [Joe Stocker](https://twitter.com/ITguySoCal)

0 commit comments

Comments
 (0)