CISA releases free tool for detecting malicious activity in Microsoft cloud environments

Network defenders searching for malicious activity in their Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) cloud environments have a new free solution at their disposal: Untitled Goose Tool. Released by the Cybersecurity and Infrastructure Security Agency (CISA), it is an open-source tool that allows users to export and review logs, alerts, configurations, cloud artifacts, and more. The tool’s capabilities As an agency charged with – among other things – helping US-based organizations … More

The post CISA releases free tool for detecting malicious activity in Microsoft cloud environments appeared first on Help Net Security.

This article has been indexed from Help Net Security

Read the original article: