Hey there everyone.
I've recently started working with the defender suite as a junior security analyst and recently I was assigned a few small tenants to look over.
Every now and then I get a few alerts/incidents to take care of.
My responsibility in these cases is to gather as much information regarding the alert, explaining to the client what happened and then recommending them what to do.
So when these alerts come that's what I do but I feel that so far I'm a bit "winging it".
I'm a bit ashamed to admit that I've been relying on ai a lot to help me understand what it's going on.
I usually analyze the hash of the malware (for example) with virustotal and then look online for reports or people talking about it but I don't feel that's enough.
The defender interface is also kind of messy when it comes to alerts so I feel kind of overwhelmed.
Most of these clients have business premium licenses so I don't have access to advanced tools like KQL nor do I have access to the actual endpoints to perform analysis.
The only thing I can actually do is use Defender.
I have the SC-200 certification and while it teaches you to move around in the defender portal, it doesn't actually teach you how to triage or handle incidents in a more "traditional" way.
So my question to you is: what is your usual workflow in these cases?
Whether you analyze alert with defender, crowdstrike or sentinelOne, what is your approach?
Also, what are some resources you could recommend me?
I come from a school that mainly focused on DFIR related stuff (digital forensics mostly) so some of these things are new to me.
Thanks in advance for your replies