Automated Incident Response Playbooks with Windows Event Logs, MS Defender, and Crowdstrike for Beginner SOC Analysts
Master the fundamentals of automated incident response by leveraging Windows Event Logs, Microsoft Defender, and Crowdstrike to build effective playbooks for a proactive security posture.
...
Introduction to Automated Incident Response in the SOC
Unit 1: Understanding Incident Response
Unit 2: Key Components of Automated Incident Response
Unit 3: Automated Incident Response Workflow
Windows Event Log Fundamentals for Security
Unit 1: Understanding Windows Event Logs
Unit 2: Security-Relevant Event Logs
Unit 3: Configuring Event Log Settings
Centralized Event Log Collection and Forwarding
Unit 1: Fundamentals of Centralized Event Log Collection
Unit 2: Configuring and Securing Windows Event Forwarding
Unit 3: Advanced Topics and Troubleshooting
Microsoft Defender for Endpoint Integration
Unit 1: Introduction to Microsoft Defender for Endpoint
Unit 2: Configuring Defender for Optimal Threat Detection
Unit 3: Microsoft Defender API Deep Dive
Automated Actions with Microsoft Defender
Unit 1: Isolating Infected Machines
Unit 2: Automated Scans
Unit 3: Customizing and Managing Actions
Crowdstrike Falcon Real Time Response (RTR) Integration
Unit 1: Introduction to Crowdstrike Falcon and RTR
Unit 2: Configuring and Using Crowdstrike Falcon RTR
Unit 3: Security Considerations and Integration
Forensic Data Gathering with Crowdstrike RTR
Unit 1: Introduction to Forensic Data Gathering with Crowdstrike RTR