The November 2024 edition of Microsoft's monthly blog post highlights product updates and new features across their Defender products. Notably, the Microsoft Defender XDR & Microsoft Sentinel have been unified into a single Security Operations Platform. The update also includes improvements to advanced hunting in the Microsoft Defender portal, with users now able to use the arg() operator for Azure Resource Graph queries without needing to go to Log Analytics in Microsoft Sentinel. Other enhancements include added Unified RBAC roles with new permission levels for Threat Experts customers, Insider Risk Management insights integrated into Defender XDR, and an updated training video on how to use the Alert page.

Microsoft has also introduced several new features for its Sentinel platform including matching analytics for threat detection and a Use Cases Mapper workbook. They've completely updated their Ninja Training program which now points you towards official MS Learning paths so you can earn badges upon completion. There are strategies outlined on how you can save money on your Sentinel ingestion costs by reducing data volume while still collecting necessary information. Additionally, they discuss Cowrie honeypot integration with Microsoft Sentinel and deploying Sentinel using Bicep among other things. To learn more about these updates and others not mentioned here, check out the full article.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-november-2024/ba-p/4286159

Monthly news - November 2024

  Microsoft Defender XDR Monthly news November 2024 Edition   This is our monthly "What's new" blog post, summarizing product updates and various..

TECHCOMMUNITY.MICROSOFT.COM

The article discusses the importance of understanding and mitigating data exfiltration risks in today's complex security landscape. It highlights the integration of Insider Risk Management (IRM) insights into Microsoft's Defender XDR user page, which provides enhanced visibility into insider risk severity and exfiltration activities. This integration allows Security Operations Center (SOC) teams to detect and respond more effectively to insider threats, distinguishing between external and internal attacks.

Microsoft Purview Insider Risk Management adds value by identifying potential insider risks such as data leaks or intellectual property theft. The system detects unusual employee behavior, manages data exfiltration risks from insiders performing risky activities, and differentiates between external and internal attacks. By integrating IRM insights on the XDR user page, SOC analysts gain a deeper understanding of a user’s behavior and risk profile. If you're interested in learning more about how this technology can help protect your organization from both internal and external threats, check out the full article.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/demystify-potential-data-leaks-with-insider-risk-management/ba-p/4269184

Demystify potential data leaks with Insider Risk Management insights in Defender XDR

Bringing Insider Risk Management insights to the heart of the SOC investigation experience.

TECHCOMMUNITY.MICROSOFT.COM

The October 2024 edition of Microsoft's monthly blog post highlights the latest updates and improvements across their Defender products. Notable enhancements include the general availability of global search for entities in the Microsoft Defender portal, which centralizes results from all entities. The Copilot feature in Defender now includes an identity summary capability that provides instant insights into a user's risk level, sign-in activity, and more. Other significant updates include new features to detect browser anomalies and disrupt attacks early, view featured threat intelligence articles on the home page of Microsoft Defender portal, submit inquiries and view responses from Microsoft Defender Experts, defend against crypto mining attacks with cloud workload alerts integration into Defender XDR.

To learn more about these exciting developments as well as other product updates like advanced hunting context panes available in more experiences or research analysis ensuring Android security update adoption among others - do check out this comprehensive blog post by Microsoft! It also offers valuable insights into automatic attack disruption strategy via 'Defender for Identity' along with guidance on proactive risk management through 'Microsoft Security Exposure Management'. So don't miss out!
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-october-2024/ba-p/4258305

Monthly news - October 2024

  Microsoft Defender XDR Monthly news October 2024 Edition   This is our monthly "What's new" blog post, summarizing product updates and various..

TECHCOMMUNITY.MICROSOFT.COM

In the ever-evolving world of cybersecurity, security operation centers (SOCs) are often overwhelmed by a high volume of incidents that require time-consuming manual investigation. To help tackle this issue, Microsoft has introduced Copilot for Security guided response - an AI-driven system designed to assist analysts in efficiently navigating these incidents. The system provides real-time recommendations for investigation, triaging and remediation which helps reduce downtime and prevent potential breaches. However, implementing such a system comes with its own set of challenges including complexity of security incidents, high precision requirements, scalability issues and adaptability to SOC preferences.

Microsoft's Copilot guided response introduces advanced AI-driven features to streamline the incident response process. It enhances three critical aspects: incident triaging, remediation action recommendation and similar incident investigation. By using historical data and machine learning techniques it reduces manual workload on SOC analysts while improving response times and increasing precision in both triaging and remediation efforts. This not only improves detection speed but also ensures that analysts have relevant information at every stage of the investigation process. For more insights into how Microsoft is transforming security responses with AI technology through their Copilot guided response tool, you can read up on their post.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/ai-driven-guided-response-for-socs-with-microsoft-copilot-for/ba-p/4257138

AI-Driven Guided Response for SOCs with Microsoft Copilot for Security

In this blog, learn about the Copilot's guided response capabilities that help Defenders easily navigate incidents by providing real-time recommendations..

TECHCOMMUNITY.MICROSOFT.COM

Microsoft has introduced a new feature for its Copilot for Security, the Identity Summary skill. Available within Microsoft Defender XDR and Copilot for Security portals, this tool provides a natural language summary of user behavioral anomalies and potential misconfigurations. It helps security teams to uncover discrepancies and security gaps in real-time, thereby enhancing an organization's overall security posture.

The Identity Summary is designed to offer insights into identity behavior and misconfigurations, helping organizations quickly identify and resolve potential security issues. The feature can be triggered within the Defender Experience by navigating to a user page. It covers various aspects like login locations, role changes, devices used by the user, failed login attempts, authentication methods used by the user etc., providing a comprehensive view of identities. To learn more about how you can integrate this feature into your security practices to strengthen your defenses against evolving cybersecurity threats visit the original post.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/identity-summary-new-security-copilot-skill-within-defender-xdr/ba-p/4236668

Identity Summary: New Security Copilot skill within Defender XDR

Today, we are excited to share details on the new Identity Summary skill, available within the Microsoft Defender XDR and Copilot for Security portals, it..

TECHCOMMUNITY.MICROSOFT.COM

Detecting browser anomalies is key to identifying and preventing cyber threats early on. These detections can spot unusual session activities, helping to prevent attackers from impersonating legitimate users and gaining access to user credentials. Microsoft Defender XDR offers a variety of tools for detecting these anomalies and automatically disrupting attacks, minimizing their impact by isolating compromised assets. The blog post provides insights into using browser anomalies and malicious sign-in traits for attack disruption at the earliest stages.

The systematic approach used by Microsoft Defender XDR includes data collection, baseline establishment, real-time monitoring and anomaly detection, as well as correlating threat intelligence. This robust system helps identify potential threats via browser anomalies through thorough analysis of patterns in browser-related information during user sign-in events. If you're interested in enhancing your organization's security measures against cyber threats like Adversary-in-the-Middle attacks or Business Email Compromise (BEC), this article is definitely worth a read.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/detecting-browser-anomalies-to-disrupt-attacks-early/ba-p/4246459

Detecting browser anomalies to disrupt attacks early

Uncover the secrets of early attack disruption with browser anomaly detections! This blog post explores how Microsoft Defender XDR leverages advanced..

TECHCOMMUNITY.MICROSOFT.COM

Microsoft Defender XDR is fighting back against increasingly sophisticated cyber-threats with its automatic attack disruption feature. This AI-powered tool uses correlated signals to stop and prevent further damage from in-progress attacks, recognizing the intent of an attacker and predicting their next move with high confidence. The benefits include disrupting attacks at machine speed (average time of 3 minutes), reducing the impact of attacks by limiting lateral movement within your network, and enhancing security operations by allowing teams to focus on other potential threats.

The role of Microsoft Defender for Identity is also crucial in this process as it delivers critical identity signals and response actions to the platform. It helps protect through identity-specific posture recommendations, detections, and response actions. In terms of attack disruption, it enables user specific responses like disabling compromised accounts or forcing password resets when credentials have been compromised. To learn more about how Microsoft Defender XDR's automatic disruption capability can enhance your cybersecurity strategy, check out the full article.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/microsoft-defender-for-identity-the-critical-role-of-identities/ba-p/4236688

Microsoft Defender for Identity: the critical role of identities in automatic attack disruption

Microsoft Defender XDR's automatic disruption capability is a game-changer in the world of cybersecurity. Powered by Microsoft Security intelligence and..

TECHCOMMUNITY.MICROSOFT.COM

The article discusses the importance of integrating XDR and cloud security insights to defend against advanced attacks like cryptojacking and IaaS resource theft. It highlights how Microsoft Defender for Cloud, integrated into Microsoft Defender XDR, enhances the ability to detect, investigate, and respond to sophisticated threats across hybrid and multi-cloud environments. The piece also presents a case study on defeating a crypto mining attack that started with a phishing email and ended in cloud resource exploitation.

The case study demonstrates how the integration of Defender for Cloud strengthens native signals in Defender XDR enabling organizations to effectively defend against complex attacks traversing entire attack surfaces including cloud infrastructure. This seamless correlation of alerts ensures swift threat mitigation. In conclusion, this integration represents significant advancement in cybersecurity as it enables understanding and stopping sophisticated threats before they cause harm. To learn more about this powerful integration that keeps IT and cloud environments resilient against evolving threats, check out the full post.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/unlocking-real-world-security-defending-against-crypto-mining/ba-p/4228815

Unlocking Real-World Security: Defending against Crypto mining attacks

In this anonymized case study, we explore a crypto mining attack that starts with a password spray, escalates through privilege abuse, and culminates in cloud..

TECHCOMMUNITY.MICROSOFT.COM

Microsoft has released its September 2024 edition of the monthly news for Defender XDR, summarizing product updates and new assets across their Defender products. The company announced that Microsoft Sentinel data is now available with Defender XDR data in Microsoft Defender multitenant management, which shows security information and event management (SIEM) data from one Microsoft Sentinel workspace per tenant. In addition to this, they have also discussed new management settings for multitenant management. They've also revealed that Defender for Endpoint and Defender for Identity now support local data residency in India.

In other updates, a webinar exploring OT security is coming up on September 11th where attendees will learn about digital transformation's impact on security challenges in industrial processes and critical infrastructure as well as how Defender XDR is changing the way we safeguard critical assets. Furthermore, enhancements have been made to vulnerability prioritization with asset context and EPSS while predefined Identity classifications were added to the critical assets list under Security Exposure Management. Lastly, Global exclusions for Linux are now publicly previewed along with Network Protection feature being enabled by default on Android devices among others. To get more detailed insights into these updates visit the original post.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-september-2024/ba-p/4235266

Monthly news - September 2024

  Microsoft Defender XDR Monthly news September 2024 Edition   This is our monthly "What's new" blog post, summarizing product updates and..

TECHCOMMUNITY.MICROSOFT.COM

Microsoft has introduced a new sensor for its Defender for Identity service on Entra Connect servers, aimed at enhancing security across hybrid identity environments. The sensor is designed to help organizations better prevent, detect and remediate credential theft and privilege escalation attacks that are often initiated against Entra Connect. This comes as part of Microsoft's ongoing commitment to expanding Defender for Identity’s coverage, given that identities are one of the most targeted attack vectors by cyber-criminals.

The new sensor provides comprehensive monitoring of synchronization activities between Entra Connect and Active Directory, offering crucial insights into potential security threats and unusual activities. It also offers specific security alerts and posture recommendations related to Entra Connect. Furthermore, it includes additional improvements like enhanced accuracy for DC sync attack detection, extended monitoring for security alerts among others. To learn more about how this tool can enhance your organization's cybersecurity measures, check out the full article.
Post generated with the help of Azure OpenAI GPT4 πŸ€– #msftadvocate #M365Defender #DefenderXDR https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/protect-and-detect-microsoft-defender-for-identity-expands-to/ba-p/4226165

Protect and Detect: Microsoft Defender for Identity Expands to Entra Connect Server

We are excited to announce a new Microsoft Defender for Identity sensor for Entra Connect servers. This addition is a significant step in our ongoing..

TECHCOMMUNITY.MICROSOFT.COM