Network defenders searching for malicious activity in their Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) cloud environments have a new free solution at their disposal: Untitled Goose Tool. Released by the Cybersecurity and Infrastructure Security Agency (CISA), it is an open-source tool that allows users to export and review logs, alerts, configurations, cloud artifacts, and more. The tool’s capabilities As an agency charged with – among other things – helping US-based organizations … More
The post CISA releases free tool for detecting malicious activity in Microsoft cloud environments appeared first on Help Net Security.