У нас вы можете посмотреть бесплатно Your Personal Security Expert: Jamf AI Assistant for Protect Alerts или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Transform security alert overload into confident incident response using Jamf AI Assistant as your on-demand security expert. Mike Levenick (Quality & Safety Engineer, AI, Jamf) demonstrates how retrieval-augmented generation (RAG) technology combined with Jamf Threat Labs expertise helps non-security admins understand, prioritize, and act on Jamf Protect alerts. Learn how the AI Assistant analyzes raw JSON alert data, pivots to telemetry streams to build attack timelines, and generates pre-configured remediation scripts scoped to specific machines—all without requiring security certifications or deep malware analysis skills. Discover how the AI Assistant leverages Jamf Threat Labs malware wiki and prompt engineering from security experts to identify sophisticated attacks including info stealers, time stomping (defense evasion), and cryptocurrency miners masquerading as system processes. See real demonstrations of comparing multiple alerts to determine relationships, translating technical security language for executive communication, and distinguishing legitimate testing from actual threats using process lineage and execution data analysis. What You'll Learn: ► Understanding behavior-based detections vs. telemetry data: high signal-to-noise alerts vs. comprehensive event streams ► How retrieval-augmented generation (RAG) reduces AI hallucinations by searching Jamf documentation and Threat Labs wiki ► Analyzing Jamf Protect alerts: AI fetches raw JSON via API and applies security expert-engineered prompts ► Pivoting to telemetry with configurable time windows (1-15 minutes) to build comprehensive attack timelines ► Generating remediation scripts with parameters: killing processes, quarantining files, removing persistence (launch agents/daemons) ► Human-in-the-loop safeguards: confirming script execution and monitoring via Jamf Pro policy execution logs ► Detecting info stealers: identifying credential harvesting attempts disguised as legitimate authentication prompts ► Time stomping detection: recognizing when malware modifies file timestamps for defense evasion ► Comparing multiple alerts to determine attack relationships using timestamps, users, and process hierarchy ► Communicating security incidents: drafting executive summaries and explaining like you're five (ELI5) #jamfai #jamfprotect #securityalert #aiassistant #threatmanagement #incidentresponse #rag #malwareanalysis #securityautomation Who This Video Is For: ► Mac admins managing security without dedicated security teams ► IT professionals overwhelmed by security alert volume ► Organizations without in-house threat labs or security operations centers ► Jamf administrators seeking to improve incident response times ► Teams needing to communicate security issues to non-technical stakeholders 0:00 Introduction: Security Alerts Without Security Expertise 2:30 Jamf Pro Policies vs. Configuration Profiles: Understanding the Difference 3:46 Jamf Protect: Behavior-Based Detection vs. Telemetry Data Streams 6:06 Jamf AI Assistant: Retrieval-Augmented Generation (RAG) Explained 8:36 Jamf Threat Labs: Security Experts Engineering AI Prompts 9:48 How AI Assistant Works: Fetching Alert JSON and Analyzing with Threat Labs Expertise 11:02 Telemetry Pivot: Building Attack Timelines from Thousands of Events 12:06 Remediation Script Generation: Pre-Configured Parameters for Killing Processes and Quarantining Files 13:37 Demo: Info Stealer Alert Analysis and ELI5 Explanation 16:00 Demo: Time Stomping Detection (Defense Evasion via File Timestamp Manipulation) 18:33 Comparing Multiple Alerts: Determining Attack Relationships 20:16 Demo: Cryptocurrency Miner Masquerading as Apple System Process 24:14 Tips for Success: Providing Context Not Conclusions to Avoid Misleading AI 25:31 Don't Assume Possibility: Let AI Search for Available Options 26:44 Be Verbose: More Context Improves AI Decision-Making 28:02 Trust But Verify: Using Source Citations to Confirm AI Recommendations 29:21 Future: Model Context Protocol (MCP) for Custom AI Integrations Key Technologies Covered: Jamf AI Assistant, Jamf Protect, retrieval-augmented generation (RAG), Jamf Threat Labs malware wiki, behavior-based detection, telemetry analysis, Jamf Pro policy remediation, process lineage analysis, MITRE ATT&CK framework, launch agents/daemons, defense evasion techniques Related Topics: Security alert triage, incident response automation, AI-powered threat analysis, cryptocurrency miner detection, info stealer identification, malware masquerading, defense evasion tactics, prompt engineering for security, human-in-the-loop automation