One of my earliest posts was āBuilding a functionā. It was my attempt at teaching people to build a function in Powershell. Itās a bit outdated now, but I still think itās a decent read - however, the time has come to revisit the topic of Powershell-functions. This time, in...
[Read More]
Share your work!
How to get started sharing what you create and a book-review, of sorts.
Early on in my career I had this weird aversion for people who wrote blogs. Iām pretty sure at least part of it was a result of the nordic phenomenon called the Law of Jante, which can be summarized as a code of conduct used colloquially to denote a social...
[Read More]
Security Monitoring - Developing Use Cases
Some thoughts on developing use cases and the importance of detection engineering
In this blog post Iāll be writing about developing use cases for security monitoring. Iāll be using Microsoft Sentinel as an example, but the same principles apply to any SIEM or security monitoring platform.
[Read More]
Figuring out MISP2Sentinel Event Filters
How they work, how to use them and some (hopefully not horrible) examples.
MISP is becoming a popular open source option for managing threat intelligence at the operational level by sharing indicators of compromise (IOCs) and contextualizing them with other data. It can, however, be a bit daunting to figure out how to use the event filters. In this post Iāll go through...
[Read More]
Use Update Indicators API to push Threat Intelligence from MISP to Microsoft Sentinel
A quick intro on how to set up MISP, Azure Functions and Sentinel to push threat intelligence from MISP to Sentinel
An updated guidance on how to set up the MISP2Sentinel Azure Function to push threat intelligence from MISP to Microsoft Sentinel using the new Upload Indicators API.
[Read More]