У нас вы можете посмотреть бесплатно Introduction to Threat Hunting with Network Metadata или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
The network metadata the Vectra platform produces can be valuable for threat investigåations. Have you wondered how you could make use of same metadata to proactively hunt for threats? In this webinar, Vectra Sidekick MDR analysts will describe techniques to identify three common attacker behaviors in your environment. Sidekick analysts will walk you through the specific workflows for each attack technique, provide best practices for hunting in your own environment, and answer questions about how to threat hunt using the Vectra platform. Recall will be used for this webinar. However, the same methodologies can be applied to network metadata obtained from Stream. In this video you will learn how to: ► Hunt for three commonly utilized attack techniques ► Leverage multiple metadata types to uncover attack behavior ► Build custom Recall dashboards for your environment More information: www.vectra.ai ► Website: https://www.vectra.ai/solutions/mitre... ► Ask a question on MITRE: https://support.vectra.ai/s/article/K... ► Blog: https://www.vectra.ai/blogpost/achiev... ► Solution Brief: How Vectra Supports the MITRE Enterprise ATT&CK Framework https://www.vectra.ai/resources/cb-mi... 00:00 Introduction to Threat Hunting with Network Metadata 02:13 Why should you hunt? 03:19 why hunt with network metadata? 04:38 What is Vectra Recall? 05:32 List of metadata streams 06:06 Common attributes to all metadata streams 06:40 What is DCSync? 09:43 Hunting for DCSync 10:20 Hunting for DCShadow 20:20 Hunting for PCExec