The CyRay Post
Grid Field – DB Entry Mirroring​
SOAR
Grid Field – DB Entry Mirroring​
Grid Field – DB Entry Mirroring This post is the 2nd part, of a two-part use case on Grid Field in SOAR, written by our SOAR expert Ben Aviv.
0
213
0
SOAR
Grid Field – DB Entry Mirroring​
Grid Field – DB Entry Mirroring This post is the 2nd part, of a two-part use case on Grid Field in SOAR, written by our SOAR expert Ben Aviv.
0
213
0
Remote Code Execution Vulnerability CVE-2021-40444
SIEM system
Remote Code Execution Vulnerability CVE-2021-40444
About CVE-2021-40444 Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows.
0
82
0
SIEM system
Remote Code Execution Vulnerability CVE-2021-40444
About CVE-2021-40444 Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows.
0
82
0
How to use a Grid Field​
SOAR
How to use a Grid Field​
How to use a grid field In this post, our SOAR expert, Mr.Ben Aviv, will demonstrate how to use a grid field in XSOAR (Demisto).
0
120
0
SOAR
How to use a Grid Field​
How to use a grid field In this post, our SOAR expert, Mr.Ben Aviv, will demonstrate how to use a grid field in XSOAR (Demisto).
0
120
0
Best practices
“It’s good to be the king” – is that so?
September 9, 2021
SIEM system
Advanced Linux threats Monitoring
August 30, 2021
Use cases
2021-34527 (CVE-2021-1675) PrintNightmare – Detection by SIEM Guide
February 7, 2021
Active List With Dynamic TTL
Arcsight tools
Active List With Dynamic TTL
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
38
0
CVE-2020-16898 – Bad Neighbor – Monitoring By SIEM
Arcsight
CVE-2020-16898 – Bad Neighbor – Monitoring By SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
36
0
CVE-2019-0708 – BlueKeep – Monitoring By SIEM
Arcsight
CVE-2019-0708 – BlueKeep – Monitoring By SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
32
0


CVE-2020-1350 – SigRed – Monitoring By SIEM
Arcsight
CVE-2020-1350 – SigRed – Monitoring By SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
41
0
Arcsight
CVE-2020-1350 – SigRed – Monitoring By SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
41
0
CVE-2020-1472 – ZeroLogon – Monitoring by SIEM
Arcsight
CVE-2020-1472 – ZeroLogon – Monitoring by SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
34
0
Arcsight
CVE-2020-1472 – ZeroLogon – Monitoring by SIEM
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
34
0
How to prevent your SIEM from being blind
Best practices
How to prevent your SIEM from being blind
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
34
0
Best practices
How to prevent your SIEM from being blind
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
34
0
Arcsight tools
CSV to ActiveList
November 13, 2019
Arcsight tools
ArcSight Rule Action – Telegram Message
October 29, 2019
Use cases
Nested Groups in Active Directory
October 23, 2019
CSV to ActiveList
Arcsight tools
CSV to ActiveList
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
47
0
ArcSight Rule Action – Telegram Message
Arcsight tools
ArcSight Rule Action – Telegram Message
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
43
0
Nested Groups in Active Directory
Use cases
Nested Groups in Active Directory
We should pay attention to each and every nested group that is a member of our sensitive groups, to ensure that we will know about every user that inherits these kinds of permissions.
0
39
0