Overview
Explore threat hunting techniques within the Office 365 ecosystem in this informative 34-minute talk by David Stubley of 7Elements. Gain insights into O365 audit log analysis, learn to identify failed and successful login attempts, and understand data exfiltration indicators. Examine a real-world case study of an O365 compromise, enhancing your ability to detect and respond to potential threats in cloud-based environments.
Syllabus
About the Speaker
Agenda
0365 Audit Log Primer [2]
Failed Login
Successful Login
Data Exfiltration [2]
Case Study - 0365 Compromise
Questions
Taught by
The Cyber Academy