New Blog | Microsoft Security Exposure Management Graph: unveiling the power
Introduction
In the complicated and rapidly evolving realm of cybersecurity, Exposure Management plays a pivotal role in fortifying organization’s defenses against potential threats. To empower security teams, Microsoft Security Exposure Management has unveiled two new powerful tables within
Advanced Hunting: ExposureGraphNodes and ExposureGraphEdges.
The introduction of these tables opens novel capabilities for security teams. It enables efficient investigation of security posture across organizational assets. This is the first in a series of posts where we will present the tables and share investigation scenarios (along with relevant queries) for Advanced Hunting. These queries unlock capabilities that were previously unattainable. We’ll provide screenshots and Kusto Query Language snippets to guide you through your reading.
Understanding the tables
As John Lambert’s saying that is well-known in the security domain goes, ‘Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.’ By exposing the context around each asset, relations between assets and the graph-based toolset for exploring them, we hope to start changing this.
Read the full post here: Microsoft Security Exposure Management Graph: unveiling the power
By Andrey Karpovsky
Introduction
In the complicated and rapidly evolving realm of cybersecurity, Exposure Management plays a pivotal role in fortifying organization’s defenses against potential threats. To empower security teams, Microsoft Security Exposure Management has unveiled two new powerful tables within Advanced Hunting: ExposureGraphNodes and ExposureGraphEdges.
The introduction of these tables opens novel capabilities for security teams. It enables efficient investigation of security posture across organizational assets. This is the first in a series of posts where we will present the tables and share investigation scenarios (along with relevant queries) for Advanced Hunting. These queries unlock capabilities that were previously unattainable. We’ll provide screenshots and Kusto Query Language snippets to guide you through your reading.
Understanding the tables
As John Lambert’s saying that is well-known in the security domain goes, ‘Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.’ By exposing the context around each asset, relations between assets and the graph-based toolset for exploring them, we hope to start changing this.
Read the full post here: Microsoft Security Exposure Management Graph: unveiling the power Read More