{"id":1144,"date":"2015-07-27T10:35:45","date_gmt":"2015-07-27T08:35:45","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=1144"},"modified":"2015-07-24T13:38:39","modified_gmt":"2015-07-24T11:38:39","slug":"microsoft-advanced-threat-analytics-ata-disponible-en-aout","status":"publish","type":"post","link":"https:\/\/les2t.fr\/en_us\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/","title":{"rendered":"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt"},"content":{"rendered":"<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1145 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png\" alt=\"ATA_Logo\" width=\"75\" height=\"60\" \/><\/a><\/p>\n<p>Microsoft vient d\u2019annoncer la disponibilit\u00e9 en Aout de Microsoft Advanced Threat Analytics. C\u2019est une solution on-premises pour identifier les attaques de s\u00e9curit\u00e9 avanc\u00e9es avant qu\u2019elles ne causent des dommages \u00e0 l\u2019entreprise. Elle est construite sur l\u2019analyse du comportement combin\u00e9 avec la d\u00e9tection en temps r\u00e9el des tactiques, Techniques et Proc\u00e9dures des attaquants.<\/p>\n<p><!--more--><\/p>\n<p>Jean-S\u00e9bastien DUCHENE, dans son billet nous d\u00e9crit Le fonctionnement d\u2019ATA, un article \u00e0 ne pas manquer.<br \/>\nPour le lire, rendez-vous <a href=\"http:\/\/microsofttouch.fr\/default\/b\/js\/archive\/2015\/07\/23\/microsoft-advanced-threat-analytics-ata-disponible-en-ao-t\" target=\"_blank\">ICI<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Microsoft vient d\u2019annoncer la disponibilit\u00e9 en Aout de Microsoft Advanced Threat Analytics. C\u2019est une solution on-premises pour identifier les attaques de s\u00e9curit\u00e9 avanc\u00e9es avant qu\u2019elles ne causent des dommages \u00e0 l\u2019entreprise. Elle est construite sur l\u2019analyse du comportement combin\u00e9 avec la d\u00e9tection en temps r\u00e9el des tactiques, Techniques et Proc\u00e9dures des attaquants.<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[63],"tags":[36,60,61],"class_list":["post-1144","post","type-post","status-publish","format-standard","hentry","category-securite","tag-microsoft","tag-outil","tag-outils"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/en_us\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt - Les2T\" \/>\n<meta property=\"og:description\" content=\"Microsoft vient d\u2019annoncer la disponibilit\u00e9 en Aout de Microsoft Advanced Threat Analytics. C\u2019est une solution on-premises pour identifier les attaques de s\u00e9curit\u00e9 avanc\u00e9es avant qu\u2019elles ne causent des dommages \u00e0 l\u2019entreprise. Elle est construite sur l\u2019analyse du comportement combin\u00e9 avec la d\u00e9tection en temps r\u00e9el des tactiques, Techniques et Proc\u00e9dures des attaquants.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/en_us\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-27T08:35:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/\",\"url\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/\",\"name\":\"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png\",\"datePublished\":\"2015-07-27T08:35:45+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/en_us\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/en_us\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt - Les2T","og_description":"Microsoft vient d\u2019annoncer la disponibilit\u00e9 en Aout de Microsoft Advanced Threat Analytics. C\u2019est une solution on-premises pour identifier les attaques de s\u00e9curit\u00e9 avanc\u00e9es avant qu\u2019elles ne causent des dommages \u00e0 l\u2019entreprise. Elle est construite sur l\u2019analyse du comportement combin\u00e9 avec la d\u00e9tection en temps r\u00e9el des tactiques, Techniques et Proc\u00e9dures des attaquants.","og_url":"https:\/\/les2t.fr\/en_us\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/","og_site_name":"Les2T","article_published_time":"2015-07-27T08:35:45+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TRARBACH Jean-Yves"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/","url":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/","name":"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png","datePublished":"2015-07-27T08:35:45+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/07\/ATA_Logo.png"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/microsoft-advanced-threat-analytics-ata-disponible-en-aout\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"Microsoft Advanced Threat Analytics (ATA) disponible en ao\u00fbt"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/en_us\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/posts\/1144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/comments?post=1144"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/posts\/1144\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/media?parent=1144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/categories?post=1144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/tags?post=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}