CISA Releases Free Detection Tool for Azure/M365 Environment
You are subscribed to National Cyber
Awareness System Current Activity for Cybersecurity and Infrastructure
Security Agency. This information has recently been updated, and is now
available.
CISA has created a free tool for
detecting unusual and potentially malicious activity that threatens users and
applications in an Azure/Microsoft O365 environment. The tool is intended for
use by incident responders and is narrowly focused on activity that is
endemic to the recent identity- and authentication-based attacks seen in
multiple sectors.
CISA strongly encourages users and
administrators to visit the following GitHub page for additional information and detection
countermeasures.
This email was sent to jferron@interactivesecuritytraining.com using GovDelivery Communications Cloud,
on behalf of: Cybersecurity and Infrastructure Security Agency · 707 17th
St, Suite 4000 · Denver, CO 80202