{"id":8094,"date":"2020-06-19T14:42:43","date_gmt":"2020-06-19T12:42:43","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=8094"},"modified":"2022-03-25T14:15:44","modified_gmt":"2022-03-25T13:15:44","slug":"webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/","title":{"rendered":"Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_row _builder_version=&#8221;4.4.8&#8243; column_structure=&#8221;2_5,3_5&#8243;][et_pb_column _builder_version=&#8221;4.4.8&#8243; type=&#8221;2_5&#8243;][et_pb_text _builder_version=&#8221;4.4.8&#8243; hover_enabled=&#8221;0&#8243;]<\/p>\n<p>In our recent webinar with Joe Stocker from <a href=\"https:\/\/www.patriotconsultingtech.com\/\">Patriot Consulting<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/mattsoseman\/\">Matt Soseman<\/a> from Microsoft, we had the chance to showcase the integration of THOR into Microsoft Defender ATP.\u00a0<\/p>\n<p>You can register and watch the webinar <a href=\"https:\/\/patriotconsulting.eventbuilder.com\/event\/24088\">here<\/a>.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.4.8&#8243; type=&#8221;3_5&#8243;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/06\/Screenshot-2020-06-16-at-12.34.08.png&#8221; _builder_version=&#8221;4.4.8&#8243; title_text=&#8221;Screenshot 2020-06-16 at 12.34.08&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/06\/Screenshot-2020-06-18-at-20.38.22.png&#8221; _builder_version=&#8221;4.4.8&#8243; title_text=&#8221;Screenshot 2020-06-18 at 20.38.22&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/06\/Screenshot-2020-06-19-at-14.34.02.png&#8221; _builder_version=&#8221;4.4.8&#8243; title_text=&#8221;Screenshot 2020-06-19 at 14.34.02&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our recent webinar with Joe Stocker from Patriot Consulting and Matt Soseman from Microsoft, we had the chance to showcase the integration of THOR into Microsoft Defender ATP.\u00a0 You can register and watch the webinar here.\u00a0<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-8094","post","type-post","status-publish","format-standard","hentry","category-nextron"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR\",\"datePublished\":\"2020-06-19T12:42:43+00:00\",\"dateModified\":\"2022-03-25T13:15:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/\"},\"wordCount\":179,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"articleSection\":[\"Nextron\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/\",\"name\":\"Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2020-06-19T12:42:43+00:00\",\"dateModified\":\"2022-03-25T13:15:44+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR","datePublished":"2020-06-19T12:42:43+00:00","dateModified":"2022-03-25T13:15:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/"},"wordCount":179,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"articleSection":["Nextron"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/","url":"https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/","name":"Webinar: Mitigating Persistent Threats using Microsoft Defender ATP and THOR - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2020-06-19T12:42:43+00:00","dateModified":"2022-03-25T13:15:44+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2020\/06\/19\/webinar-mitigating-persistent-threats-using-microsoft-defender-atp-and-thor\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/8094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=8094"}],"version-history":[{"count":5,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/8094\/revisions"}],"predecessor-version":[{"id":8103,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/8094\/revisions\/8103"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=8094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=8094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=8094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}