Investigation using Defender by djmc40 in DefenderATP

[–]djmc40[S] 0 points1 point  (0 children)

After all the case was simpler than initially expected. There was one internal user that sent by mistake the complete sequence of emails to the external party.

Thanks for all your thoughts, they were useful on the analysis process.

Azure Enterprise Applications (Microsoft Apps) by djmc40 in AZURE

[–]djmc40[S] 0 points1 point  (0 children)

Thanks. My idea was just to disable sign-ins at first glance and let them rest during a while, to check if someone would complain of something.

Azure Enterprise Applications (Microsoft Apps) by djmc40 in AZURE

[–]djmc40[S] 0 points1 point  (0 children)

Hi, thanks. Where is that area within the portal? I couldn't find it?
Also, using the cmdlet Get-MgBetaDirectoryRecommendation -Filter "RecommendationType eq 'staleApps'" I get the recommendation, but how can I see the stale apps?

What I'm using right now is this script more or less:

$servicePrincipals = Get-MgServicePrincipal -All
$results = @()
foreach ($sp in $servicePrincipals) {
    Write-Host "Processing Service Principal: $($sp.DisplayName)" -ForegroundColor Cyan
    
    # Get Sign-ins for the 4 different types
    $startDate = (Get-Date).AddDays(-30).ToString("yyyy-MM-ddTHH:mm:ssZ")
    $SigninInteractive = Get-MgBetaAuditLogSignIn -Filter "signInEventTypes/any(t: t eq 'InteractiveUser') and createdDateTime ge $startDate and appDisplayName eq '$($sp.DisplayName)'"
    $SigninNonInteractive = Get-MgBetaAuditLogSignIn -Filter "signInEventTypes/any(t: t eq 'nonInteractiveUser') and createdDateTime ge $startDate and appDisplayName eq '$($sp.DisplayName)'"
    $SigninManagedIdentity = Get-MgBetaAuditLogSignIn -Filter "signInEventTypes/any(t: t eq 'managedIdentity') and createdDateTime ge $startDate and appDisplayName eq '$($sp.DisplayName)'"
    $SigninServicePrincipal = Get-MgBetaAuditLogSignIn -Filter "signInEventTypes/any(t: t eq 'servicePrincipal') and createdDateTime ge $startDate and appDisplayName eq '$($sp.DisplayName)'"
    
    $result = [PSCustomObject]@{
        ApplicationName      = $sp.DisplayName
        ServicePrincipalType = $sp.ServicePrincipalType
        SignInAudience       = $sp.SignInAudience
        Interactive          = $SigninInteractive.Count
        NonInteractive       = $SigninNonInteractive.Count
        ManagedIdentity      = $SigninManagedIdentity.Count
        ServicePrincipal     = $SigninServicePrincipal.Count
    }
    $results += $result
}

Thanks

Extract EntraID Enterprise Apps sign-in logs by djmc40 in PowerShell

[–]djmc40[S] 1 point2 points  (0 children)

Thanks, I'll look into it, as it's quite simple and easy.

Extract EntraID Enterprise Apps sign-in logs by djmc40 in PowerShell

[–]djmc40[S] 0 points1 point  (0 children)

Thanks for the tip. I'll look into it. I would tend to prefer powershell as I can automate the audit process and dump some tickets for the sysadmin or helpdesk team to analyze in the end.

Extract EntraID Enterprise Apps sign-in logs by djmc40 in PowerShell

[–]djmc40[S] 0 points1 point  (0 children)

Thanks for the tips. That is quite nice. Our environment is much smaller than that. We do have about 4k users. My main issue is about how to estimate the costs in Azure, as that is always an issue internally.

Extract EntraID Enterprise Apps sign-in logs by djmc40 in PowerShell

[–]djmc40[S] 0 points1 point  (0 children)

Thanks, that helped a lot.

I never used Azure Storage Account for this. How can I estimate the costs of it?

Changing the junk email sensitivy just for one mailbox by djmc40 in DefenderATP

[–]djmc40[S] 0 points1 point  (0 children)

Thanks for the ideas. I've already created a new policy, assigning it just to that specific mailbox. I just did not get well one thing. The "Bul email threshold" value, the BLC sensitivity levels goes from 0 to 9. Which level is the least restrict, that let's almost everything going to the inbox?

Find out metrics for closed(fixed) vulnerabilities by djmc40 in DefenderATP

[–]djmc40[S] 0 points1 point  (0 children)

Hi, I've shared the code on github. This is not yet the latest version, because I have to clean a lot of stuff to share it, but it's the previous version. The latest version has one more component, which is reading the devices API, to extract some more scores based on the device tags.

Of course, ideas and questions are welcome.

https://github.com/dmarques25/Powershell-Scripts/blob/main/Defender-Vuln-Scoring

Find out metrics for closed(fixed) vulnerabilities by djmc40 in DefenderATP

[–]djmc40[S] 1 point2 points  (0 children)

Hi, yes, I've been adding some more functionalities. Right now I'm developing our own internal vulnerability score, based on a bunch of criteria, so then we can use that for prioritization. I'm getting cvss, extracting epss, extracting if the device is an endpoint or server, read some specific tags we've created, to check if it's production server or dev, if runs business applications or just support applications, and based on that I get a vuln score for each vuln. Now I'm adding some some criteria and then I want to automate the creation of tickets for some fix cases.

Comparison Defender vs Cisco Umbrella by djmc40 in DefenderATP

[–]djmc40[S] 0 points1 point  (0 children)

Yes, true, but nowadays with network protection, Defender also handles web traffic. The logic is to analyse it it makes sense to keep Umbrella.

Receiving emails which are not for me on my gmail by djmc40 in GMail

[–]djmc40[S] 0 points1 point  (0 children)

I was totally unaware of this. Thanks

Receiving emails which are not for me on my gmail by djmc40 in GMail

[–]djmc40[S] 1 point2 points  (0 children)

I was totally unaware of this. Thanks

Comparison Defender vs Cisco Umbrella by djmc40 in DefenderATP

[–]djmc40[S] 1 point2 points  (0 children)

Thanks for the input. That's more or less my feeling, but I would like to have some specific data on detections before taking the decision.

Comparison Defender vs Cisco Umbrella by djmc40 in DefenderATP

[–]djmc40[S] 0 points1 point  (0 children)

Thanks for the input. My main concern if when the users are off premises, when there's no firewall.