5
Defend Attacks with Microsoft XDR and SIEM
In this chapter, we delve deeper into the Microsoft’s unified XDR and SIEM detection capabilities and elaborate on how the security solutions can defend organizations from real-world attacks, as well as highlight some prevention strategies for them. In recent years, some of the attack scenarios have risen in popularity among adversaries. As a demonstration, we have selected a few of them to show you the power of Microsoft’s unified XDR and SIEM solutions. The scenarios are as follows:
- Identity-based supply chain attack in a cloud environment
- Business Email Compromise (BEC) attack
- Human-Operated Ransomware (HumOR)
This chapter will cover the following main topics:
- An attack kill chain in XDR and ...
Get Microsoft Unified XDR and SIEM Solution Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.