Event banner
Defender for Endpoint AMA: The next evolution of automatic attack disruption
Event Ended
Tuesday, Oct 31, 2023, 09:00 AM PDTEvent details
Defenders need every edge they can get in the fight against ransomware. We're excited to share that Microsoft Defender for Endpoint customers will now be able automatically to disrupt human-operated attacks like ransomware early in the kill chain without needing to deploy any other capabilities.
Join our AMA to ask questions on how you can use automatic attack disruption to stop a sophisticated attack early in the kill chain and how your organization can leverage unique protective capabilities offered exclusively by Microsoft 365 Defender.
An AMA is a live text-based online event similar to an "Ask Me Anything," on Reddit. This AMA gives you the opportunity to connect with members of the Defender for Endpoint product group who will be on hand to answer your questions and listen to feedback.
Feel free to post your questions about Defender for Endpoint anytime in the comments before the event starts, although the team will only be answering questions during the live hour.
Trevor_Rusher
Updated Oct 24, 2023
15 Comments
Sort By
- DeletedHow can I assign an incident to a colleague for them to receive an email that an incident has been assigned to them so that they can start working on it? I can assign but they never receive an email about it. What am I doing wrong?
- Caroline_Lee
Microsoft
Hi all, we are super excited to participate in today's AMA, please keep in mind this AMA is focused on the most recent announcement on how Microsoft Defender for Endpoint can now disrupt human-operated attacks on its own." https://www.microsoft.com/en-us/security/blog/2023/10/11/microsoft-defender-for-endpoint-now-stops-human-operated-attacks-on-its-own/ Chat with you all in a few minutes! Thank you.- DeletedThis is awesome. Is this only available to Defender P2 license holders?
- Caroline_Lee
Microsoft
Great question. From a licensing perspective, this specific feature is available for MDE P2, Defender for Business and included in the ME5. For attack disruption all up, it is included in E5. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2?view=o365-worldwide, To start benefitting from this feature, ensure that your devices are onboarded to MDE and your OS version is updated from at least March 2023. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o365-worldwide#contain-user-from-the-network
- Trevor_Rusher
Community Manager
Hey all! I want to apologize for the inconvenience, but due to unforeseen circumstances, our Subject Matter Experts will not be able to make it today. In order to land the best event possible, we are going to have to reschedule this to the same time next week. Again, I am very sorry as I know everyone's time is valuable, but hope you all can attend then. Thanks.
- GRoetmanCopper ContributorThank you for the update.
- C00kieMonsterCopper ContributorWhat causes inconsistency with smart screen? We're finding that sometimes smart screen works and blocks certain downloads, phishing sites, etc. immediately, and then within moments suddenly smart screen either doesn't work at all for those same situations, or takes much longer than expected to kick in. We can consistently reproduce smart screen's inconsistency with Microsoft's own demos at aka.ms/mde-demos.
- grmccauleyCopper ContributorCan Incidents that trigger Attack Disruption (and their remediation events) be queried somehow in Advanced Hunting (or Sentinel)? I know that there is an "Attack Disruption" tag added to Incidents when viewed in the portal, but these tags don't seem to make it into the Advanced Hunting or Sentinel tables. My leadership would like a dashboard (workbook) showing all the incidents that trigged Attack Disruption and also all the remediation actions taken because of it, but I'm not able to find this info in the tables.
- noam_hadash
Microsoft
thank you George for your question. we currently do not enable querying for initiated disruption actions in Advanced Hunting. However, we are working to enable email notifications for cases where attack disruption was initiated to enable to have notification to its generation We will work with the team to explore the option to expose this data in Advanced Hunting as well
- C00kieMonsterCopper ContributorWhen will Defender for Endpoint be officially supported on Linux workstation distributions? We have a lot of RHEL 8 and 9 workstations (not just servers), but the Microsoft documentation indicates only Linux for server distros are supported. Unfortunately, we can not proceed with migrating our massive Linux footprint to MDE until Microsoft officially supports MDE on Linux workstations. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux?view=o365-worldwide#system-requirements
- C00kieMonsterCopper ContributorWhen will the Microsoft Defender for Endpoint security configuration management feature be available in GCC tenants?
- momkenannaCopper Contributor
Hi, can I know if there is any way to generate reports from the Microsoft 365 admin center portal, that can show device information to users who log in? I can't find such a report that has the device security status with the user who is logged in.
usually, I can access the Device health reports from the security portal >> reports >> Device Health page >> Microsoft Defender Antivirus health
but am unable to find a user login to the related device.
thanks and regards- yairts
Microsoft
Hi Raja, this functionality does not exist today. However, you can generate a report from Microsoft 365 Defender by querying Advanced Hunting to identify which users have been logged to which devices.
This information can be queried from either DeviceLogonEvents which are being logged by Microsoft Defender for Endpoint, or IdentityLogonEvents if you have Microsoft Defender for Identity in your environment.
AH query example:
DeviceLogonEvents| where ActionType == "LogonSuccess"| where AccountSid startswith "S-1-5-21" and DeviceName != AccountDomain // for domain users only| project Timestamp, DeviceId, DeviceName, LogonType, AccountSid, AccountDomain, AccountName
- Trevor_Rusher
Community Manager
I'm very excited to share this upcoming AMA with the Defender for Endpoint team next week! Remember to please ask your questions down here in a new comment thread. You can ask them at any time leading up to or during the event but the team won't be answering questions until the live hour. Thanks!
Location
Microsoft Tech Community