4.9 • 696 Ratings
🗓️ 3 August 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, August 3rd edition of the Santonet Stormsendor's Stormcast. |
0:06.4 | My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida. |
0:12.4 | Greek Diary from Brad today pointing your attention at Seek and Defender Endpoint. |
0:19.4 | In early this year, Microsoft announced that they'll be actively sort of supporting SEAC and |
0:24.8 | integrating it into Defender Endpoint. |
0:27.6 | Tom has a quick diary now showing you some of the capabilities you're gaining here. |
0:32.3 | If you're not familiar with SEAC, it's sort of a great behavioral analysis, network |
0:37.1 | intrusion detection system, |
0:38.3 | so it does focus on network traffic in modern networks with home users and such. It becomes |
0:45.7 | more and more difficult to actually collect great network logs. Now, this is exactly where |
0:51.8 | Seek fits in with Defender endpoint. |
0:54.8 | You can install it on your endpoints. |
0:57.5 | So even if users are working from home and such, collect the SEG network data |
1:02.6 | and then include it in your Hunts and Incent response, |
1:06.7 | which is exactly what Tom is talking about a bit here. |
1:11.2 | And imagine that we do have yet another remote unauthenticated API access vulnerability |
1:17.9 | in Ivanti's Mobile Iron Core. |
1:21.4 | Yesterday, I think it was just that I mentioned the second vulnerability, which was not really |
1:27.3 | all that severe. It was this arbitrary |
1:29.0 | file right vulnerability after you have admin access. Of course, for the last week or two, |
1:36.0 | we have had lots of stories about hosts getting compromised using the original unauthenticate |
1:42.7 | API access vulnerability. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.