AI‑Driven Red–Blue Operations: Detection, Investigation & Automatic Attack Disruption with Microsoft Defender XDR, Sentinel & Copilot

Introduction: The Reality of Modern Attacks
• Identity-first threats and living-off-the-land attacks
• Why Red/Blue collaboration is critical
• Unified SecOps as the response model

2. Red Team Scenario: Adversary Kill Chain Walkthrough
• Initial access & execution (fileless, LOLBins, phishing payloads)
• Defender for Endpoint visibility on early compromise
• Privilege escalation & credential theft (LSASS, token abuse)
• Lateral movement across endpoints (PsExec, WMI, RDP, SMB)
• Persistence mechanisms (scheduled tasks, registry keys, cloud identity app registrations)

3. Blue Team Response in Unified SecOps
• Defender XDR incident correlation (endpoint + identity + email + cloud)
• Sentinel analytics and threat intel enrichment
• Unified investigation timeline & entity-based view
• How analysts trace the attacker’s lateral movement and persistence

4. Automatic Attack Disruption
• What it is and how it activates during identity compromise or lateral movement
• How Defender XDR automatically isolates compromised devices and blocks users
• Realistic example based on the Red Team scenario

5. Threat Hunting & Copilot for Security
• KQL-driven hunts for lateral movement, persistence, and identity abuse
• How Copilot accelerates:
– Incident summarization
– Query generation
– Recommended remediation
• Practical SOC benefits (speed, accuracy, context)

6. Key Takeaways & SOC Modernization Steps
• How unified incidents reduce alert fatigue
• Why AI + automation are essential for the modern SOC
• What organizations can implement immediately

Demo Scenario

“Adversary in Motion – From Compromise to Disruption”
A realistic Red/Blue walkthrough demonstrating an identity‑based compromise progressing through execution, privilege escalation, lateral movement, persistence, and culminating in Automatic Attack Disruption inside Unified SecOps.

Predavač/ica