{"id":18423,"date":"2022-03-03T10:00:38","date_gmt":"2022-03-03T18:00:38","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/03\/news-12156\/"},"modified":"2022-03-03T10:00:38","modified_gmt":"2022-03-03T18:00:38","slug":"news-12156","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/03\/news-12156\/","title":{"rendered":"Secure your OT and IoT devices with Microsoft Defender for IoT and Quzara Cybertorch\u2122"},"content":{"rendered":"<p><strong>Credit to Author: Lauren Goodwin| Date: Thu, 03 Mar 2022 17:00:00 +0000<\/strong><\/p>\n<p><em>This blog post is part of the Microsoft Intelligent\u00a0Security Association\u00a0<a href=\"https:\/\/aka.ms\/MISAGuestBlog\" target=\"_blank\" rel=\"noreferrer noopener\">guest blog series<\/a>.\u00a0<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more about MISA<\/a>.<\/em><\/p>\n<p>In recent years, malicious actors have started attacking industrial control systems and key sectors of nations\u2019 critical infrastructure to inflict damage that transcends the cyber world and traditional IT assets. The risk to public safety cannot be overstated, as these types of cyberattacks have real-world potential to inflict harm on humans. These \u201cindustrial control systems\u201d that control the many facets of our nation\u2019s critical infrastructure are more commonly known as operational technology (OT) devices. The same goes for IoT devices and industrial internet of things (IIoT) devices. IoT is the network of physical objects that contain embedded technology to communicate, sense, or interact with the internal or external state of its environment. The public and private sectors have many OT and IoT devices in industries such as defense, power generation, robotics, chemical and pharmaceutical production, oil production, transportation, and mining\u2014to name a few. OT devices are hardware and software that monitor or control physical equipment, assets, and processes\u2014and they are being compromised at an increasing rate.<sup>1<\/sup><\/p>\n<p>Alarmingly, in 2021 there were two incidents of local water treatment plants in the US being a target of cyberattacks. One cyberattack occurred in the San Francisco Bay area in January 2021<sup>2<\/sup> and another occurred in February 2021 in Oldsmar, Florida.<sup>3<\/sup> In the Oldsmar, Florida cyberattack, the malicious actors attempted to increase the amount of sodium hydroxide in the water supply to potentially dangerous levels. Thankfully, the attack was thwarted by a plant supervisor who caught the act in real-time and reverted the changes. These cyberattacks occurred on OT devices used for critical infrastructure at local level, but similar cyberattacks are playing out in the real world on a national level as well.<\/p>\n<p>On May 7, 2021, Colonial Pipeline, an American oil pipeline system responsible for 45 percent of all fuel consumed on the US East Coast, suffered a ransomware cyberattack that crippled all pipeline operations for about six days.<sup>4<\/sup> The aftermath of this attack caused fuel shortages in six US states as well as the US capital, Washington D.C. <\/p>\n<p>These cyberattacks on OT devices may not be new, but they underscore how dangerous the threat is to our critical infrastructure, as well as how great the risk is to our overall public safety.<\/p>\n<p>The US government has taken notice of the increased threat against OT systems and has responded accordingly. Per the President\u2019s&nbsp;Executive Order on Improving the Nation\u2019s Cybersecurity&nbsp;issued on May 12, 2021, \u201cThe Federal Government must bring to bear the full scope of its authorities and resources to protect and secure its computer systems, whether they are cloud-based, on-premises, or hybrid.<sup>5<\/sup> The scope of protection and security must include systems that process data (information technology (IT)) and those that run the vital machinery that ensures our safety (operational technology (OT)).\u201d The Quzara Cybertorch<sup>TM<\/sup> solution, in conjunction with <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/iot-defender\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for IoT<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>, help agencies meet compliance with various aspects of this executive order. This includes, but is not limited to, providing agencies a means to monitor IT and OT operations and alerts, respond to attempted and actual cyber incidents, and facilitate logging, log retention, and log management.&nbsp;<\/p>\n<p>With the threat of cyberattacks impacting OT and IoT devices on the rise, it is important now more than ever for national, state, local governments, and their private sector partners to be vigilant in securing their OT and IoT devices that operate or assist critical infrastructure.<\/p>\n<h2 id=\"the-current-state-of-cybersecurity-in-ot-and-iot-environments\">The current state of cybersecurity in OT and IoT environments<\/h2>\n<p>While it is encouraging that the US Government is giving greater emphasis to secure OT and IoT infrastructure, they and private corporations with OT and IoT devices face an uphill battle. This is because many OT and IoT environments use outdated (and therefore, unsecure) operating systems and software. A comprehensive report from CyberX (acquired by Microsoft) in June 2020 titled <a href=\"https:\/\/cyberx-labs.com\/wp-content\/uploads\/2020\/09\/CYBX_2020_Risk-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Global IoT and ICS Risk Report<\/a> was compiled based on data gathered from <strong>1,821 production OT and IoT networks<\/strong> using passive, agentless monitoring with patented deep packet inspection (DPI) and network traffic analysis (NTA) algorithms. These production networks spanned diverse IoT and ICS systems\u2014including robotics, refrigeration, chemical, and pharmaceutical production, power generation, oil production, transportation, mining, and building management systems (heating, ventilation, and air conditioning (HVAC), closed-circuit television (CCTV), and more). These are the findings in the report:<\/p>\n<ul>\n<li>71 percent had outdated or unsupported operating systems.<\/li>\n<li>64 percent had unencrypted passwords.<\/li>\n<li>54 percent were remotely accessible.<\/li>\n<li>22 percent had indicators of threats.<\/li>\n<li>27 percent had direct internet connections.<\/li>\n<li>66 percent had no automatic updates.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"712\" height=\"576\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture1-6218d7164c67e.png\" alt=\"Cyber X report high-level findings spanned diverse I o T and I C S systems showing gaps in threat coverage.\" class=\"wp-image-107691\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture1-6218d7164c67e.png 712w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture1-6218d7164c67e-300x243.png 300w\" sizes=\"auto, (max-width: 712px) 100vw, 712px\" \/><\/figure>\n<p><em>Figure 1. CyberX report high-level findings.<\/em><\/p>\n<h2 id=\"securing-and-monitoring-ot-and-iot-devices\">Securing and monitoring OT and IoT devices<\/h2>\n<p>It is critical for national, state, local governments, and their private sector partners to secure their OT and IoT environments from cyberattacks\u2014but first, security must be made easier to incorporate. To make it easier for these entities to incorporate OT and IoT security, Quzara Cybertorch<sup>TM<\/sup>, a managed security service provider (MSSP), partnered up with Microsoft to leverage <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/iot-defender\/\">Microsoft Defender for IoT.<\/a> By leveraging Microsoft Defender for IoT, Quzara Cybertorch<sup>TM <\/sup>is able to discover all OT and IoT devices in an environment, identify vulnerabilities present on these devices, and provide continuous security monitoring of these devices.<\/p>\n<h3 id=\"automated-asset-inventory\">Automated asset inventory<\/h3>\n<p>Microsoft Defender for IoT is an agent-less solution that\u2014connecting to a mirroring port on a network\u2019s switch\u2014passively listens to real-time OT and IoT traffic in the industrial network. Quzara Cybertorch<sup>TM<\/sup> uses this tool to quickly create an \u201cAsset Inventory Map\u201d that shows all assets on the network, identifies which machines are interacting with each other, and at which layer of the Purdue model they operate.<sup>6<\/sup><\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1269\" height=\"812\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6218d76dd96d2.png\" alt=\"Auto-generated asset inventory map in purdue model layout displaying all assets on a network, identifying which machines are interacting with each other and at which layer of the Purdue model they operate.\" class=\"wp-image-107694\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6218d76dd96d2.png 1269w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6218d76dd96d2-300x192.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6218d76dd96d2-1024x655.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6218d76dd96d2-768x491.png 768w\" sizes=\"auto, (max-width: 1269px) 100vw, 1269px\" \/><\/figure>\n<p><em>Figure 2. Auto-generated Asset Inventory Map in Purdue model layout.<\/em><\/p>\n<p>By identifying which assets communicate with each other in a Purdue model format, valuable information is gathered that depicts which machines can communicate out to the internet from the OT network. These internet-connected machines are the ones we prioritize locking down and monitor more closely for suspicious traffic. Identifying internet-connected assets is just one example of what the Asset Inventory Map can display. The Asset Inventory Map also reveals any shadow devices that are on the OT and IoT network. In other words, by revealing all assets on the OT network, the Asset Inventory Map will identify any IT, OT, and IoT devices that the IT department may not be officially aware of. Furthermore, the Asset Inventory Map helps IT security teams identify \u201csingle points of failure\u201d in their environment based on the network topology and architecture. Quzara Cybertorch<sup>TM<\/sup> encourages hardening these assets that are \u201csingle points of failure\u201d and creating redundancy to ensure operations aren\u2019t disrupted if these assets were to ever go down unexpectedly.<\/p>\n<h3 id=\"vulnerability-management-of-ot-and-iot-devices\">Vulnerability management of OT and IoT devices<\/h3>\n<p>Quzara Cybertorch<sup>TM<\/sup> can identify known vulnerabilities on OT and IoT devices by leveraging Microsoft Defender for IoT. Microsoft Defender for IoT proactively identifies vulnerabilities such as unpatched devices, unauthorized Internet connections, and subnet connections. Beyond identifying vulnerabilities, Microsoft Defender for IoT also identifies changes to device configurations, programmable logic controller (PLC) code, and firmware. Quzara Cybertorch<sup>TM<\/sup> consolidates all this information and generates executive summary reports listing out all the vulnerabilities for all OT and IoT devices in a network\u2014which includes prioritized remediation steps. Prioritized remediation steps may include prioritizing fixes based on risk scoring (for example, through common vulnerability scoring system (CVSS) scores and other factors) and automated threat modeling. These reports contain an overall security score for the OT and IoT devices on the network. As remediation occurs, continuous improvement can be measured by subsequent reports showing the overall security score improving.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"933\" height=\"838\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture3-6218d7da74ef8.png\" alt=\"Report example showing vulnerabilities present on an O T workstation.\" class=\"wp-image-107697\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture3-6218d7da74ef8.png 933w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture3-6218d7da74ef8-300x269.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture3-6218d7da74ef8-768x690.png 768w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><\/figure>\n<p><em>Figure 3. Vulnerabilities present on an OT workstation.<\/em><\/p>\n<h3 id=\"continuous-monitoring-for-ot-and-iot-devices\">Continuous monitoring for OT and IoT devices<\/h3>\n<p id=\"continuous-monitoring-for-ot-and-iot-devices\">Quzara Cybertorch<sup>TM<\/sup> is a security operations center as a service that leverages <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\">Microsoft Sentinel<\/a> to continuously monitor IT environments as well as OT and IoT environments. Microsoft Sentinel is a security information and event management (SIEM) tool with security orchestration, automation, and response (SOAR) capabilities. Microsoft Sentinel has native interoperability with Microsoft Defender for IoT and is cloud native. Using Microsoft Sentinel, Quzara Cybertorch<sup>TM<\/sup> can ingest logs from IT, OT, and IoT devices, creating a unified bird\u2019s-eye view across IT and OT boundaries and empowering our security operations center (SOC) analysts to then analyze for signs of malicious activity.<\/p>\n<p>When using other products, typically a lot of work and expertise is required to create rules that aggregate disparate alerts into consolidated incidents. Quzara Cybertorch<sup>TM<\/sup> greatly reduces the work that is required to create targeted rules for OT and IoT incidents, as Microsoft Sentinel has pre-built analytics rules for OT and IoT devices when used in conjunction with Microsoft Defender for IoT. Functionality also exists to create custom rules and playbooks from these OT and IoT alerts. This functionality empowers our SOC analysts to help detect, alert, and assist personnel in mitigating vulnerabilities on OT and IoT devices.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"855\" height=\"800\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture4-6218d8f1e612b.png\" alt=\"View of Microsoft Defender for I o T analytics rules in Microsoft Sentinel.\" class=\"wp-image-107700\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture4-6218d8f1e612b.png 855w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture4-6218d8f1e612b-300x281.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture4-6218d8f1e612b-768x719.png 768w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\" \/><\/figure>\n<p><em>Figure 4. Microsoft Defender for IoT analytics rules in Microsoft Sentinel.<\/em><\/p>\n<p>If your team, company, or clients have an OT or IoT environment and are interested in obtaining an OT or IoT cybersecurity risk assessment, please reach out to <a href=\"https:\/\/cybertorch.com\/#schedule\" target=\"_blank\" rel=\"noreferrer noopener\">Quzara Cybertorch<sup>TM<\/sup><\/a> or by <a href=\"mailto:info@quzara.com\" target=\"_blank\" rel=\"noreferrer noopener\">email here<\/a>. <\/p>\n<h2 id=\"about-quzara-cybertorch\">About Quzara Cybertorch<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/h2>\n<p>Quzara Cybertorch<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> is a security operations center as a service and managed detection and response (MDR) purpose-built to meet the needs of U.S. Civilian, Department of Defense (DoD), and Defense Industrial Base (DIB) customers for extended detection and response (XDR), Vulnerability Management, OT and IoT monitoring, and security monitoring needs. Their security operations center as a service, vulnerability management, and XDR capabilities are based on the National Institute of Standards and Technology (NIST) 800-53 FedRAMP HIGH controls. Their entire technology stack leverages FedRAMP HIGH Authorized systems. Quzara Cybertorch&#8217;s<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> team of Security Analysts are all based and operate within the US, with emphasis on security clearances and government support experience. Explore <a href=\"https:\/\/cybertorch.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Quzara Cybertorch <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/a> and visit the Quzara Cybertorch <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> listing in the <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps?search=quzara&amp;page=1\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft commercial marketplace<\/a>.<\/p>\n<h2 id=\"learn-more\">Learn more<\/h2>\n<ul>\n<li>Explore <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/iot-defender\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for IoT<\/a>.<\/li>\n<li>Start using&nbsp;<a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>&nbsp;today.<\/li>\n<\/ul>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA),&nbsp;<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>&nbsp;where you can learn about the MISA program, product integrations, and find MISA members. Visit the&nbsp;<a href=\"https:\/\/aka.ms\/MISAIntegrationVideos\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a>&nbsp;to learn about the strength of member&nbsp;integrations&nbsp;with Microsoft products.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noreferrer noopener\">visi<\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\">t <\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noreferrer noopener\">our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.mandiant.com\/resources\/increasing-low-sophistication-operational-technology-compromises\" target=\"_blank\" rel=\"noreferrer noopener\">Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises<\/a>, Mandiant, May 25, 2021.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.newsweek.com\/san-francisco-water-plant-hack-cyber-attack-poison-supply-1601798#:~:text=A%20hacker%20accessed%20the%20system%20of%20a%20California,deleted%20several%20programs%20used%20to%20treat%20drinking%20water\" target=\"_blank\" rel=\"noreferrer noopener\">Hackers Tried to Poison California Water Supply in Major Cyber Attack<\/a>, News Week, June 18, 2021.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.darktrace.com\/en\/blog\/the-florida-water-plant-attack-signals-a-new-era-of-digital-warfare-its-time-to-fight-back\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Florida water plant attack signals a new era of digital warfare\u2014it&#8217;s time to fight back<\/a>, Darktrace, February 16, 2021.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.npr.org\/2021\/05\/08\/995040240\/cybersecurity-attack-shuts-down-a-top-u-s-gasoline-pipeline?t=1645794568399\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware Attack Shuts Down A Top U.S. Gasoline Pipeline<\/a>, NPR, May 9, 2021.<\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Executive Order on Improving the Nation\u2019s Cybersecurity<\/a>, The White House. May 12, 2021.<\/p>\n<p><sup>6<\/sup><a href=\"https:\/\/www.zscaler.com\/resources\/security-terms-glossary\/what-is-purdue-model-ics-security\" target=\"_blank\" rel=\"noreferrer noopener\">The \u201cPurdue Model\u201d is a structural model for industrial control system security<\/a> concerning physical processes, systems, and the IT machines that manage or interact with them.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/03\/secure-your-ot-and-iot-devices-with-microsoft-defender-for-iot-and-quzara-cybertorch\/\">Secure your OT and IoT devices with Microsoft Defender for IoT and Quzara Cybertorch\u2122<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/03\/secure-your-ot-and-iot-devices-with-microsoft-defender-for-iot-and-quzara-cybertorch\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Lauren Goodwin| Date: Thu, 03 Mar 2022 17:00:00 +0000<\/strong><\/p>\n<p>In recent years, malicious actors have started attacking industrial control systems and key sectors of nations\u2019 critical infrastructure to inflict damage that transcends the cyber world and traditional IT assets. The risk to public safety cannot be overstated, as these types of cyberattacks have real-world potential to inflict harm on humans.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/03\/secure-your-ot-and-iot-devices-with-microsoft-defender-for-iot-and-quzara-cybertorch\/\">Secure your OT and IoT devices with Microsoft Defender for IoT and Quzara Cybertorch\u2122<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,22745,24738,24739],"class_list":["post-18423","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-microsoft-intelligent-security-association-misa","tag-microsoft-sentinel","tag-misa"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18423"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18423\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18423"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}