New Blog Post | A guide to combatting human-operated ransomware: Part 2

%3CLINGO-SUB%20id%3D%22lingo-sub-2789277%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20A%20guide%20to%20combatting%20human-operated%20ransomware%3A%20Part%202%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2789277%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CLO20b_Sylvie_office_night_001-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F313152i619E0237E84417FF%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22CLO20b_Sylvie_office_night_001-900x360.jpg%22%20alt%3D%22CLO20b_Sylvie_office_night_001-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F09%2F27%2Fa-guide-to-combatting-human-operated-ransomware-part-2%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EA%20guide%20to%20combatting%20human-operated%20ransomware%3A%20Part%202%20%7C%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F09%2F20%2Fa-guide-to-combatting-human-operated-ransomware-part-1%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Epart%20one%3C%2FA%3E%3CSPAN%3E%26nbsp%3Bof%20this%20blog%20series%2C%20we%20described%20the%20process%20and%20execution%20used%20in%20our%20customer%20engagements%20to%20provide%20perspective%20on%20the%20unique%20issues%20and%20challenges%20regarding%20human-operated%20ransomware.%20We%20also%20explained%20how%20Microsoft%E2%80%99s%20Detection%20and%20Response%20Team%20(DART)%20leverages%20Microsoft%20solutions%20to%20help%20combat%20this%20threat.%20In%20this%20post%2C%20we%20will%20tackle%20the%20risks%20of%20human-operated%20ransomware%20and%20detail%20DART%E2%80%99s%20security%20recommendations%20for%20tactical%20containment%20actions%20and%20post-incident%20activities%20in%20the%20event%20of%20an%20attack.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2789277%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

CLO20b_Sylvie_office_night_001-900x360.jpg

A guide to combatting human-operated ransomware: Part 2 | Microsoft Security Blog

In part one of this blog series, we described the process and execution used in our customer engagements to provide perspective on the unique issues and challenges regarding human-operated ransomware. We also explained how Microsoft’s Detection and Response Team (DART) leverages Microsoft solutions to help combat this threat. In this post, we will tackle the risks of human-operated ransomware and detail DART’s security recommendations for tactical containment actions and post-incident activities in the event of an attack.

0 Replies
www.000webhost.com