𝗦𝗢𝗺𝗽𝗹𝗢𝗳𝗢𝗲𝗱 π—±π—²π—½π—Ήπ—Όπ˜†π—Ίπ—²π—»π˜ π˜„π—Άπ˜π—΅ 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 π—œπ—±π—²π—»π˜π—Άπ˜π˜†

"Microsoft Defender for Identity is an essential part of a modern security practice, helping your organization protect against, and respond to, identity-based threats. In this blog we will show you the simple steps for deploying Microsoft Defender for Identity within your environment."

https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/simplified-deployment-with-defender-for-identity/ba-p/3966035

#defenderforidentity #mdi #microsoft #microsoftsecurity #defender #adfs #domaincontroller #activedirectory #itdr #azure #adfs #adcs #deployment

Simplified deployment with Defender for Identity

  In this blog we will show you the simple steps for deploying Microsoft Defender for Identity within your environment. Microsoft Defender for Identity is an..

TECHCOMMUNITY.MICROSOFT.COM

𝐌𝐒𝐜𝐫𝐨𝐬𝐨𝐟𝐭 πƒπžπŸπžπ§ππžπ« 𝐟𝐨𝐫 𝐈𝐝𝐞𝐧𝐭𝐒𝐭𝐲 𝐞𝐱𝐩𝐚𝐧𝐝𝐬 𝐒𝐭𝐬 𝐜𝐨𝐯𝐞𝐫𝐚𝐠𝐞 𝐰𝐒𝐭𝐑 𝐧𝐞𝐰 𝐀𝐃 𝐂𝐒 𝐬𝐞𝐧𝐬𝐨𝐫

Sensor that can be deployed on Active Directory Certificate Services (AD CS) servers. This new sensor builds on the existing detections for suspicious certificate usage available today and extends Defender for Identities capabilities and coverage more comprehensively across identity environments.

AD CS is a role in Windows Server that allows you to create and manage public key infrastructure (PKI) certificates.

New detections:

➑️Domain-controller certificate issuance for a non-DC

➑️Suspicious disable of audit logs of AD CS

➑️Suspicious deletion of the certificate database

➑️Suspicious modifications to the AD CS settings (coming soon)

https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/microsoft-defender-for-identity-expands-its-coverage-with-new-ad/ba-p/3894215

#defenderforidentity #xdr #mdi #azure #microsoft #micrsoftsecurity #soc #adcs #pki #windows #server #cybersecurity #microsoft365defender #cloudsecurity #identity

Microsoft Defender for Identity expands its coverage with new AD CS sensor!

We are happy to announce the availability of the Microsoft Defender for Identity sensor for Active Directory Certificates Services (AD CS) after successfully..

TECHCOMMUNITY.MICROSOFT.COM

New #DefenderforIdentity sensor for Active Directory Certificate Services (#ADCS):
https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/microsoft-defender-for-identity-expands-its-coverage-with-new-ad/ba-p/3894215

Can detect suspicious activity used by adversaries as well as detect insecure settings.

Microsoft Defender for Identity expands its coverage with new AD CS sensor!

We are happy to announce the availability of the Microsoft Defender for Identity sensor for Active Directory Certificates Services (AD CS) after successfully..

TECHCOMMUNITY.MICROSOFT.COM

Automatically disrupt adversary-in-the-middle (AiTM) attacks with Microsoft XDR

Microsoft announced expansion of automatic attack disruption to include adversary-in-the-middle attacks (AiTM) attacks, in an addition to the previously announced public preview for business email compromise (BEC) and human-operated ransomware attacks.

https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/automatically-disrupt-adversary-in-the-middle-aitm-attacks-with/ba-p/3821751

#microsoft #email #business #AiTM #bec #xdr #azure #soc #securityplatform #defender #defenderforidentity #defenderforcloudapps #defenderforendpoint #microsoft365defender #cloudsecurity #securityanalytst

Automatically disrupt adversary-in-the-middle (AiTM) attacks with XDR

Microsoft has been on a journey to harness the power of artificial intelligence to help security teams scale more effectively. Microsoft 365 Defender correlates millions of signals across endpoints, identities, emails, collaboration tools, and SaaS apps to identify active attacks and compromised ass...

TECHCOMMUNITY.MICROSOFT.COM
Honest question, what's the biggest difference between #DefenderForIdentity and regular #Defender (security.microsoft.com)? So far the only thing I've actually found different is #DFI has the User Access Control listed, and generates some reports. Am I missing something?