Bug #1283

Microsoft 365 Defender

Added by Rachel Gomez 6 months ago.

Target version:
Start date:
Due date:
% Done:


Estimated time:


MS 365 Defender services protect:
Endpoints with Defender for Endpoint - Defender for Endpoint is a unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response.
Email and collaboration with Defender for Office 365 - Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.

1. Identities with Defender for Identity and Azure Active Directory (Azure AD) Identity Protection - Defender for Identity uses your on-premises Active Directory Domain Services (AD DS) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Azure AD Identity Protection automates the detection and remediation of identity-based risks in your cloud-based Azure AD.
2. Applications with Microsoft Defender for Cloud Apps - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.

Microsoft 365 Defender's unique cross-product layer augments the individual service components to:

1. Help protect against attacks and coordinate defensive responses across the services through signal sharing and automated actions.
2. Narrate the full story of the attack across product alerts, behaviors, and context for security teams by joining data on alerts, suspicious events and impacted assets to 'incidents'.
3. Automate response to compromise by triggering self-healing for impacted assets through automated remediation.
4. Enable security teams to perform detailed and effective threat hunting across endpoint and Office data.

Microsoft 365 Defender cross-product features include:

Cross-product single pane of glass in the Exchange 365 Defender portal - A central view for all information on detections, impacted assets, automated actions taken, and related evidence in a single queue and a single pane in Exchange 365 Defender portal.

Combined incidents queue - To help security professionals focus on what is critical by ensuring the full attack scope, impacted assets and automated remediation actions are grouped together and surfaced in a timely manner.
Automatic response to threats - Critical threat information is shared in real time between the Micro Defender data. Wait a few seconds and try to cut or copy again. products to help stop the progression of an attack.

For example, if a malicious file is detected on an endpoint protected by Defender for Endpoint, it will instruct Defender for Office 365 to scan and remove the file from all e-mail messages. The file will be blocked on sight by the entire Microsoft 365 security suite.

Self-healing for compromised devices, user identities, and mailboxes - Microsoft 365 Defender uses AI-powered automatic actions and playbooks to remediate impacted assets back to a secure state. Microsoft 365 Defender leverages automatic remediation capabilities of the suite products to ensure all impacted assets related to an incident are automatically remediated where possible.

Cross-product threat hunting - Security teams can leverage their unique organizational knowledge to hunt for signs of compromise by creating their own custom queries over the raw data collected by the various protection products. Microsoft 365 Defender provides query-based access to 30 days of historic raw signals and alert data across endpoint and Defender for Office 365 data.

To learn about Exchange online MDM visit O365cloudexperts.

No data to display

Also available in: Atom PDF