Security News > 2021 > July > Microsoft 365 to let SecOps lock hacked Active Directory accounts

Microsoft 365 to let SecOps lock hacked Active Directory accounts
2021-07-06 16:53

Microsoft is updating Microsoft Defender for Identity to allow security operations teams to block attacks by locking a compromised user's Active Directory account.

Microsoft Defender for Identity is a cloud security service that leverages on-premises Active Directory signals to detect and analyze advanced threats, compromised identities, and malicious insider activity targeting enrolled organizations.

After adding what the company named "Native 'response' actions" to the Defender for Identity, "SecOps will have the ability to directly lock the Active Directory account, or to prompt for the password to be reset, meaning more direct action can be taken when a user is compromised."

"Up until now, when a user is confirmed as compromised in Microsoft Defender for Identity, it's the Azure Active Directory account that is effected via a conditional access rule," as Redmond revealed on the Microsoft 365 roadmap.

Microsoft Defender for Identity is bundled with Microsoft 365 E5 and you can get a Security E5 trial right now to try this new feature as soon as it's released.

In January, Redmond also announced the addition of Attack Simulation Training in Microsoft Defender for Office 365 to help SecOps teams simulate real attacks for "Accurate and up-to-date detection of risky behavior."


News URL

https://www.bleepingcomputer.com/news/security/microsoft-365-to-let-secops-lock-hacked-active-directory-accounts/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Microsoft 365 50 1369 2820 161 4400