Page cover image

Welcome

The Cloud Threat Hunting Field Manual: Microsoft 365 is your essential companion for mastering proactive cybersecurity strategies within Microsoft's cloud platform.

Whether you're new to cloud security or an experienced practitioner, this guide equips you with the knowledge and skills needed to safeguard Azure deployments against evolving cyber threats.

Jump Right In

Cover

Provides an overview of M365 and setting up a tenant.

Cover

Learn basic Powershell concepts and the M365 related CMDlets.

Cover

Learn about the Unified Audit Logs, how to enable, and key references.

Cover

Learn about Exchange Online, common threats, hunting scenarios, and audit logging.

Cover

Learn about OneDrive, common threats, hunting scnearios, and audit logging.

Cover

Learn about security controls in context to OneDrive and SharePoint

Cover

Learn about Microsoft Purview and data proteection

Cover

Learn about Defender for Office 365 and detecting file based threats.

Cover

Learn about MS Cloud App Security and how to protect data in workloads.

Cover

Simulate attacks within M365 to emulate adversaries and train staff.

This is also useful in learning log samples.

Cover

Learn how to manage devices within M365 whether using Intune or Basic Mobility.

Cover

Learn about secure score and how it assess's tenant security. This is useful when understanding threats in a given tenant/environment.

Cover

Learn about Defender XDR and how it can be utilized to protect sensitive data.

Cover

Learn the theory of threat hunting, MITRE Att&ck, and more.

Cover

Section dedicated to relevant blog posts and threat research related to Microsoft 365.

Last updated