Defend Attacks with Microsoft XDR and SIEM
In this chapter, we delve deeper into the Microsoft’s unified XDR and SIEM detection capabilities and elaborate on how the security solutions can defend organizations from real-world attacks, as well as highlight some prevention strategies for them. In recent years, some of the attack scenarios have risen in popularity among adversaries. As a demonstration, we have selected a few of them to show you the power of Microsoft’s unified XDR and SIEM solutions. The scenarios are as follows:
- Identity-based supply chain attack in a cloud environment
- Business Email Compromise (BEC) attack
- Human-Operated Ransomware (HumOR)
This chapter will cover the following main topics:
- An attack kill chain in XDR and SIEM
- Microsoft Defender XDR’s automatic attack disruption
- Attack scenarios
- A case study analysis