Home / Threat Defense / Threat Management / Microsoft Sentinel and Microsoft 365 Defender
Microsoft Sentinel and Microsoft 365 Defender

Microsoft Sentinel and Microsoft 365 Defender

Microsoft Sentinel and Microsoft 365 Defender

What is Microsoft Sentinel and Microsoft 365 Defender

An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

Welcome to the Unified Microsoft Sentinel and Microsoft 365 Defender Repository

Welcome to the unified Microsoft Sentinel and Microsoft 365 Defender repository! This repository offers a variety of resources, including out-of-the-box detections, exploration queries, hunting queries, workbooks, playbooks, and much more. These tools are designed to help you quickly get started with Microsoft Sentinel and provide essential security content to protect your environment and effectively hunt for threats.

The hunting queries also include additional resources

The hunting queries also include Microsoft 365 Defender hunting queries that are designed for advanced hunting scenarios in both Microsoft 365 Defender and Microsoft Sentinel. Additionally, you can submit issues for any samples or resources you would like to see included here as you begin your onboarding process with Microsoft Sentinel.

This Repository Welcomes Contributions and Provides Guidance

This repository encourages contributions. Please refer to the wiki associated with this repository to get started.

For Questions and Feedback, Please Reach Out

If you have any questions or feedback, please feel free to contact us at [email protected]. Resources: - Microsoft Sentinel documentation - Microsoft 365 Defender documentation - Security Community Webinars - Getting started with GitHub We truly value your feedback. Here are some avenues to raise your questions or share your thoughts: - General product-specific Q&A for SIEM and SOAR - Participate in discussions within the Microsoft Sentinel Tech Community - General product-specific Q&A for XDR
 

Microsoft Sentinel and Microsoft 365 Defender Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with Microsoft Sentinel and Microsoft 365 Defender tool and help others make informed decisions.

Featured

Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development

Similar Tools

Vectra AI
Free

Vectra AI View Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises. Vectra uses AI to detect threats early and accurately across hybrid and multi-cloud attack surfaces. The Vectra threat detection & response platform captures packets and logs across your public cloud, SaaS, federated identity and data center networks. It applies patented security-led AI to surface, and prioritize threats and integrates into your security stack for rapid response. The Vectra Platform extracts hundreds of metadata elements from captured data and applies security-led AI to detect attacker methods in every domain. This gets attributed to relevant accounts or hosts to prioritize the entities and provide a unified view of threats across your hybrid and multi-cloud environment.

QFunction
Free

QFunction View QFunction

QFunction revolutionizes cybersecurity by leveraging cutting-edge AI and machine learning to identify anomalies and threats within your existing data. Designed for medium-sized businesses and CISO's, QFunction augments your current security stack, empowering you to proactively hunt for threats by distinguishing unusual patterns rather than relying on pre-defined signatures. This approach reduces noise, enhances threat detection, and enables you to identify and neutralize attacks before they escalate, without the need for additional, disparate security tools.

AI/ML-driven anomaly detection
Augments existing security stack
Proactive threat hunting
PolySwarm
Free

PolySwarm View PolySwarm

PolySwarm is a cutting-edge, crowdsourced threat intelligence marketplace designed to empower organizations with faster, more accurate detection, analysis, and response to emerging cyber threats. By aggregating a diverse network of specialized and general threat detection engines, PolySwarm uncovers previously undetected and rare malware, filling critical gaps in traditional security defenses and providing superior protection against the evolving threat landscape.

Crowdsourced Threat Intelligence Marketplace
Next-Generation Malware Detection
Specialized and Broad Engine Coverage
Pixm
Free

Pixm View Pixm

Pixm revolutionizes phishing defense by employing state-of-the-art computer vision to analyze web pages from a human perspective, effectively identifying deceptive elements that traditional security tools often overlook. This AI-powered solution, designed for everyday users and backed by ManageEngine's commitment to flexible business solutions, provides unparalleled protection against the most prevalent cyber threats.

Computer Vision Analysis
Human-like Visual Scanning
Deceptive Element Detection
Packet Storm
Free

Packet Storm View Packet Storm

Packet Storm is a comprehensive threat intelligence feed dedicated to empowering the information security industry with critical vulnerability data and free tooling. We provide timely and relevant details for seasoned professionals while offering foundational insights into emerging threats and exploitation methods for those new to the field. Our mission is to equip security professionals with the extensive data necessary to make informed decisions for robust domain protection.

Real-time vulnerability data feed
Extensive collection of security advisories
Free security tooling and resources
Mitre ATT&CK
Free

Mitre ATT&CK View Mitre ATT&CK

MITRE ATT&CK™ is a globally recognized, empirically-based knowledge base detailing adversary tactics and techniques observed in real-world cyberattacks. It serves as a foundational framework for developing robust threat models, defensive strategies, and cybersecurity solutions across various sectors, including private industry, government, and the cybersecurity product and service community. By fostering collaboration and providing open access, ATT&CK empowers organizations to enhance their cybersecurity posture and build a safer digital world.

Comprehensive knowledge base of adversary tactics and techniques
Based on real-world observations and cyberattack data
Enables development of threat models and defensive strategies