Resource

How to Protect Against Business Email Compromise Phishing with Smart SOAR

What You’ll Learn

  • Using an all-Microsoft stack (Microsoft Sentinel, Entra ID, O365, Intune, Defender for Endpoint, 365 Defender) to investigate a suspicious email.
  • Investigating traces of a larger attack campaign with Zscaler, Okta, Microsoft Office 365, and Microsoft Defender for Endpoint.
  • Assessing compromised systems resulting from a successful attack using CrowdStrike Falcon Insight EDR, Fortinet FortiGate Next-Generation Firewall, and Microsoft Entra ID.

Download Resource

Powering the World’s Best SecOps Teams

Get Started with D3 Security