Event banner

Defender for Endpoint AMA: The next evolution of automatic attack disruption

Event Ended
Tuesday, Oct 31, 2023, 09:00 AM PDT
In-Person

Event details

Defenders need every edge they can get in the fight against ransomware. We're excited to share that Microsoft Defender for Endpoint customers will now be able automatically to disrupt human-operated attacks like ransomware early in the kill chain without needing to deploy any other capabilities.

 

Join our AMA to ask questions on how you can use automatic attack disruption to stop a sophisticated attack early in the kill chain and how your organization can leverage unique protective capabilities offered exclusively by Microsoft 365 Defender.

 

An AMA is a live text-based online event similar to an "Ask Me Anything," on Reddit. This AMA gives you the opportunity to connect with members of the Defender for Endpoint product group who will be on hand to answer your questions and listen to feedback.

 

Feel free to post your questions about Defender for Endpoint anytime in the comments before the event starts, although the team will only be answering questions during the live hour.

Trevor_Rusher
Updated Oct 24, 2023

15 Comments

  • How can I assign an incident to a colleague for them to receive an email that an incident has been assigned to them so that they can start working on it? I can assign but they never receive an email about it. What am I doing wrong?
  • Trevor_Rusher's avatar
    Trevor_Rusher
    Icon for Community Manager rankCommunity Manager

    Hey all! I want to apologize for the inconvenience, but due to unforeseen circumstances, our Subject Matter Experts will not be able to make it today. In order to land the best event possible, we are going to have to reschedule this to the same time next week. Again, I am very sorry as I know everyone's time is valuable, but hope you all can attend then. Thanks.

  • C00kieMonster's avatar
    C00kieMonster
    Copper Contributor
    What causes inconsistency with smart screen? We're finding that sometimes smart screen works and blocks certain downloads, phishing sites, etc. immediately, and then within moments suddenly smart screen either doesn't work at all for those same situations, or takes much longer than expected to kick in. We can consistently reproduce smart screen's inconsistency with Microsoft's own demos at aka.ms/mde-demos.
  • grmccauley's avatar
    grmccauley
    Copper Contributor
    Can Incidents that trigger Attack Disruption (and their remediation events) be queried somehow in Advanced Hunting (or Sentinel)? I know that there is an "Attack Disruption" tag added to Incidents when viewed in the portal, but these tags don't seem to make it into the Advanced Hunting or Sentinel tables. My leadership would like a dashboard (workbook) showing all the incidents that trigged Attack Disruption and also all the remediation actions taken because of it, but I'm not able to find this info in the tables.
    • noam_hadash's avatar
      noam_hadash
      Icon for Microsoft rankMicrosoft
      thank you George for your question. we currently do not enable querying for initiated disruption actions in Advanced Hunting. However, we are working to enable email notifications for cases where attack disruption was initiated to enable to have notification to its generation We will work with the team to explore the option to expose this data in Advanced Hunting as well
  • C00kieMonster's avatar
    C00kieMonster
    Copper Contributor
    When will Defender for Endpoint be officially supported on Linux workstation distributions? We have a lot of RHEL 8 and 9 workstations (not just servers), but the Microsoft documentation indicates only Linux for server distros are supported. Unfortunately, we can not proceed with migrating our massive Linux footprint to MDE until Microsoft officially supports MDE on Linux workstations. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux?view=o365-worldwide#system-requirements
  • C00kieMonster's avatar
    C00kieMonster
    Copper Contributor
    When will the Microsoft Defender for Endpoint security configuration management feature be available in GCC tenants?
  • momkenanna's avatar
    momkenanna
    Copper Contributor

    Hi, can I know if there is any way to generate reports from the Microsoft 365 admin center portal, that can show device information to users who log in? I can't find such a report that has the device security status with the user who is logged in.

    usually, I can access the Device health reports from the security portal >> reports >> Device Health page >> Microsoft Defender Antivirus health 
    but am unable to find a user login to the related device.


    thanks and regards

    • yairts's avatar
      yairts
      Icon for Microsoft rankMicrosoft

       

      Hi Raja, this functionality does not exist today. However, you can generate a report from Microsoft 365 Defender by querying Advanced Hunting to identify which users have been logged to which devices.

      This information can be queried from either DeviceLogonEvents which are being logged by Microsoft Defender for Endpoint, or IdentityLogonEvents if you have Microsoft Defender for Identity in your environment.

       

      AH query example:

      DeviceLogonEvents
      | where ActionType == "LogonSuccess"
      | where AccountSid startswith "S-1-5-21" and DeviceName != AccountDomain // for domain users only
      | project Timestamp, DeviceId, DeviceName, LogonType, AccountSid, AccountDomain, AccountName

  • Trevor_Rusher's avatar
    Trevor_Rusher
    Icon for Community Manager rankCommunity Manager
    I'm very excited to share this upcoming AMA with the Defender for Endpoint team next week! Remember to please ask your questions down here in a new comment thread. You can ask them at any time leading up to or during the event but the team won't be answering questions until the live hour. Thanks!
Location
Microsoft Tech Community
Date and Time
Oct 31, 20239:00 AM - 10:00 AM PDT