Unemployable Graduate
Advertisement
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
No Result
View All Result
Home Public Policy

CISA, OMB, ONCD and Microsoft collaborate on new logging playbook for Federal agencies

February 22, 2024
in Public Policy
0
CISA, OMB, ONCD and Microsoft collaborate on new logging playbook for Federal agencies
190
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Related articles

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

April 10, 2024


As part of our efforts to increase security defaults and follow the principle of secure by design, we are happy to share that a feature change initiated by Microsoft engineering will enable more logging capabilities for Purview Audit (Standard). We have worked closely with the Executive Office of the President (EOP), the Office of the National Cyber Director (ONCD), and the Cybersecurity and Infrastructure Security Agency (CISA) to prioritize this effort for U.S. government customers. This data will provide new telemetry to assist in meeting OMB 21-31 logging requirements for customers without E5 capability. This data enhances threat hunting capabilities for business email compromise (BEC), advanced nation-state threat activities, and possible insider risk scenarios. We are striving to ensure your organization can leverage these additional audit capabilities as quickly as possible. To assist in this, Microsoft and CISA will also be providing the Microsoft Expanded Cloud Log Implementation Playbook which will provide an in-depth look at each of the new log events and how they can be used to support hunting and incident response operations at your organization.  

 

CRITICAL INFORMATION: 

There are no prerequisite actions for your organization. These added logging capabilities will be enabled by default (excluding SearchQueryInitiatedExchange and SearchQueryInitiatedSharePoint, see below).    

 

  1. Unified Audit Log (UAL) Ingestion Size 
    1. The expanded logging capabilities will significantly increase (up to 10x) the data flowing into your SIEM or other security appliance if you are currently ingesting Office 365 Unified Audit Logs (UAL) 
    2. Your organization should plan accordingly during your Extract, Transform, and Load (ETL) processes to ensure no unexpected expenses occur for your SIEM 
  2. Retention  
    1. At a minimum, Microsoft will log and store on your behalf for 180 days in Purview Compliance and no additional action is required for that change. 
    2. This is an increase from 90 days for previous Audit Standard customers 
  3. SearchQueryInitiatedExchange and SearchQueryInitiatedSharePoint: 
    1. These are critical log events necessary for capturing threat actor behavior outlined in the Microsoft Expanded Cloud Log Implementation Playbook 
    2. These log events are not enabled by default – it is strongly recommended to enable them as outlined in the Microsoft Expanded Cloud Log Implementation Playbook and in Step 4: Enable Audit (Premium) events. 

 

BACKGROUND:  

Vasu Jakkal recently announced an expansion of Microsoft’s cloud logging accessibility in her blog post Expanding Cloud Logging to Give Customers Deeper Security Visibility. This message was reinforced by Rudra Mitra in a follow-up blog post Expanding Audit Logging and Retention within Microsoft Purview for Increased Security Visibility. If you have not done so, please take a moment to read about the changes, this blog covers at a high level the context for the initiative. This change will impact government departments & agencies who do not currently have access to Microsoft Purview Audit Premium (E5/G5/Compliance Mini-Suite). And for those that do have Audit Premium, they will retain the additional capabilities of intelligent insights and extended retention periods, in addition to higher bandwidth and prioritized access to the API. 

 

The new logging capabilities will now offer government Microsoft M365 E3 customers the ability to gain insights into detailed logs pertaining to the access of email (via MailItemsAccessed), and to the user entered search strings in both SharePoint and Exchange (via UserSearchQueries) if configured.  This data will provide you with powerful insights to hunt for and detect both business email compromise (BEC), advanced nation state threats, and insider risks that seek to gain access to your organization’s most sensitive information.  

 

To aid in operationalizing these added capabilities, Microsoft has partnered with CISA to jointly publish the Microsoft Expanded Cloud Log Implementation Playbook. The intent of this playbook is to provide cyber defenders with an overview of the critical logging events that have been added, including descriptions, data fields, and insights on their usability from a forensics and incident response perspective. The playbook also highlights key instructions for enabling SearchQueryInitiatedExchange and SearchQueryInitiatedSharePoint and ensuring that other log events have not been inadvertently disabled (including instructions for re-enabling). Lastly, the playbook provides a threat actor behavior driven approach for leveraging the added logging capabilities in detecting even the most advanced state-sponsored activities. These behaviors include Credential Access, Exfiltration, and Impact providing both proactive and reactive analytical methodologies for each. In addition, the playbook provides cyber defenders with KQL-based Advanced Hunting queries which can be used as a template for detecting the threat actor behaviors described in the scenario. Although it is not an all-encompassing document, this playbook is designed to be a force multiplier for our U.S. government partners, ensuring they are leveraging this data to the fullest extent possible.    

 

This shift to provide increased logging for all customers worldwide will take time. A phased rollout approach will be utilized to ensure that backplane capacities and other performance metrics are closely monitored. However, we have prioritized our federal customers, and we are striving to ensure those who are not currently leveraging an E5 license receive this logging expansion as quickly as possible. This communication is to inform our government partners that all remaining customers in GCC, GCC-H, and DoD environments will be receiving these expanded logging capabilities in a staggered deployment over the next 30 days.  

 

 

About the Author 

 

Casey Kahsen is an accomplished information security professional with over 15 years of experience across government, international, critical infrastructure, and private sectors. Specializing in malware analysis, digital forensics, incident response, and cyber threat intelligence, Casey has effectively enhanced national cybersecurity measures and international partnerships. His expertise in leading technical teams through the full spectrum of onsite hunt and incident response engagements demonstrates a strategic balance of operational excellence, innovation, and skill development.

In his career, Casey has been instrumental in executing high-impact incident response and proactive hunt operations within significant U.S. Federal entities, managing complex environments of over 250,000 endpoints. Including a pioneering a methodology for nation-state cyber campaign documentation and tracking, which was leveraged by U.S. departments and shared with international allies for improved cyber defensive strategies.

In his current role at Microsoft, Casey is part of the Federal Security team, where he is a Sr. Technical Specialist focusing on incident response, threat hunting, and critical infrastructure. In this role, he supports the US Federal Government in their most complex cybersecurity challenges. Ensuring effective communication, collaboration, and problem solving skills are applied to combating our nation’s most persistent cyber threats.

 

 





Source link

Share76Tweet48

Related Posts

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
0

By Leah McCabe Women’s movements often play a crucial role in highlighting the problem of violence against women and girls...

Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

April 10, 2024
0

Leading telecommunications company SFR has partnered with Europ Assistance to introduce a brand new self-monitoring offer, “Maison Sécurisée”. This innovative...

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

April 10, 2024
0

By Shiva StellaApril 9, 2024 Today, Motion Picture Association Chairman and CEO Charles Rivkin delivered remarks confirming the organization is...

Discover VerifEye, the App That Sees Through Your Lies

Discover VerifEye, the App That Sees Through Your Lies

April 9, 2024
0

Free app VerifEye, developed by Converus, purports to detect dishonesty with an impressive 80% success rate, already making waves in...

AI Gone Rogue: Sparks of War from Fake News

AI Gone Rogue: Sparks of War from Fake News

April 9, 2024
0

April 5, 2024, marked a significant incident in the realm of digital misinformation when a fake news story about an...

Load More
  • Trending
  • Comments
  • Latest
Hilarious video explains principles of economics

Hilarious video explains principles of economics

August 21, 2022
HVAC Maintenance Checklist Templates: Download & Print for Free!

HVAC Maintenance Checklist Templates: Download & Print for Free!

May 18, 2023
Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

April 10, 2024
Policy & Politics Journal Blog

Policy & Politics Journal Blog

August 14, 2022
Policy & Politics Journal Blog

Policy & Politics Journal Blog

0
Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

0
Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

0
Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

0
Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

April 11, 2024
Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024

Recent News

Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024

Categories

  • Economics
  • Education
  • Public Policy
  • Videos
  • Workforce

Newsletter

© 2022 All right reserved by unemployablegraduate.com

No Result
View All Result
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us

© 2022 All right reserved by unemployablegraduate.com

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT