Security News > 2021 > July > Microsoft 365 to let SecOps lock hacked Active Directory accounts
Microsoft is updating Microsoft Defender for Identity to allow security operations teams to block attacks by locking a compromised user's Active Directory account.
Microsoft Defender for Identity is a cloud security service that leverages on-premises Active Directory signals to detect and analyze advanced threats, compromised identities, and malicious insider activity targeting enrolled organizations.
After adding what the company named "Native 'response' actions" to the Defender for Identity, "SecOps will have the ability to directly lock the Active Directory account, or to prompt for the password to be reset, meaning more direct action can be taken when a user is compromised."
"Up until now, when a user is confirmed as compromised in Microsoft Defender for Identity, it's the Azure Active Directory account that is effected via a conditional access rule," as Redmond revealed on the Microsoft 365 roadmap.
Microsoft Defender for Identity is bundled with Microsoft 365 E5 and you can get a Security E5 trial right now to try this new feature as soon as it's released.
In January, Redmond also announced the addition of Attack Simulation Training in Microsoft Defender for Office 365 to help SecOps teams simulate real attacks for "Accurate and up-to-date detection of risky behavior."