Automated Incident Response Playbooks with Windows Event Logs, MS Defender, and Crowdstrike for Beginner MSSP SOC Analysts
Master automated incident response using Windows Event Logs, MS Defender, and Crowdstrike to build effective playbooks for a proactive security posture in a multi-tenant MSSP environment.
...
Introduction to Incident Response in an MSSP Environment
Unit 1: MSSP Incident Response Fundamentals
Unit 2: Tools of the Trade: An Overview
Unit 3: Lab Setup and Configuration
Configuring Windows Event Log Forwarding for MSSP Clients
Unit 1: Windows Event Log Forwarding Fundamentals
Unit 2: Configuring WEF for MSSP Clients
Unit 3: Advanced WEF Configuration and Troubleshooting
Microsoft Defender for Endpoint Playbook Fundamentals
Unit 1: MDE Core Concepts and Capabilities
Unit 2: Playbook Creation and Customization
Unit 3: Testing, Validation, and Advanced Techniques
Customizing Defender Playbooks for MSSP Clients
Unit 1: Understanding Client-Specific Needs
Unit 2: Implementing Client-Specific Configurations
Unit 3: Managing and Maintaining Playbooks
Integrating CrowdStrike Falcon for Enhanced Incident Response
Unit 1: CrowdStrike Falcon Fundamentals
Unit 2: Integrating Falcon with Incident Response Workflows
Unit 3: CrowdStrike Falcon API and Real Time Response (RTR)
Automated Remediation and Containment Across Client Environments
Unit 1: Automated Remediation Fundamentals
Unit 2: Windows Event Log Triggered Playbooks
Unit 3: MS Defender and Crowdstrike Playbooks
Unit 4: MSSP Client Considerations
Role-Based Access Control and Compliance in MSSP Incident Response