Home
%3CLINGO-SUB%20id%3D%22lingo-sub-700136%22%20slang%3D%22en-US%22%3EPrioritize%20user%20investigations%20in%20Cloud%20App%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-700136%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20week%20we%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FIdentityThreatInvestigation%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eannounced%3C%2FA%3E%20a%20new%20Identity%20threat%20investigation%20experience%2C%20which%20correlates%20identity%20events%20from%20Microsoft%20Cloud%20App%20Security%2C%20Azure%20Advanced%20Threat%20Protection%2C%20and%20Azure%20Active%20Directory%20Identity%20Protection%20into%20a%20single%20investigation%20experience%20for%20security%20analysts%20and%20hunters%20alike.%3C%2FP%3E%0A%3CP%3EIf%20you%20are%20using%20Microsoft%20Cloud%20App%20Security%2C%20you%20will%20be%20able%20to%20access%20the%20new%20experience%20in%20the%20portal%20starting%20today%2C%20regardless%20of%20whether%20you%20are%20also%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fwhat-is-atp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Advanced%20Threat%20Protection%3C%2FA%3E%20and%2For%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fidentity-protection%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Active%20Directory%20Identity%20Protection%3C%2FA%3E.*%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20identity%20threat%20investigation%20experience%20combines%20user%20identity%20signals%20from%20on-premises%20and%20cloud%20services%20to%20close%20the%20gap%20between%20disparate%20signals%20in%20your%20environment%20and%20leverages%20state-of-the-art%20User%20and%20Entity%20Behavior%20Analytics%20(UEBA)%20capabilities%20to%20provide%20a%20risk%20score%20and%20rich%20contextual%20information%20for%20each%20user.%20It%20empowers%20security%20analysts%20to%20prioritize%20their%20investigations%20and%20reduce%20investigation%20times%2C%20ending%20the%20need%20to%20toggle%20between%20identity%20security%20solutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F119256i36D8CFEDC0BF562D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22secops.png%22%20title%3D%22secops.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMicrosoft%20Cloud%20App%20Security%20-%20A%20uniquely%20integrated%20CASB%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENew%20user%20investigation%20priority%20for%20users%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20%3CSTRONG%3E%3CEM%3ETop%20user%20%3C%2FEM%3E%3C%2FSTRONG%3Eview%20in%20the%20Microsoft%20Cloud%20App%20Security%20dashboard%20is%20shifting%20from%20an%20investigation%20model%20that%20is%20based%20on%20the%20number%20of%20total%20alerts%2C%20to%20a%20new%20user%20investigation%20priority%20which%20is%20determined%20by%20all%20recent%20user%20activities%20and%20alerts%20that%20indicate%20an%20active%20attack%20or%20insider%20threat.%20This%20now%20helps%20you%20immediately%20understand%20which%20users%20currently%20represent%20the%20highest%20risk%20within%20your%20organization%20and%20should%20be%20prioritized%20for%20further%20investigation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F119266i90AD0F6C585EFB38%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22secops1%20(2).png%22%20title%3D%22secops1%20(2).png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%201%3A%20Cloud%20App%20Security%20dashboard%3A%20Top%20user%20view%20by%20investigation%20priority%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENew%20user%20page%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20have%20also%20redesigned%20the%20existing%20user%20page%20to%20provide%20rich%20contextual%20information%20for%20how%20the%20risk%20score%20was%20determined%20and%20how%20a%20user%20compares%20to%20other%20across%20the%20organization.%20This%20will%20empower%20your%20SOC%20teams%20to%20address%20the%20users%20with%20the%20highest%20risk%2Fimpact%20ratio%20first%20and%20pivot%20from%20any%20scored%20activity%20into%20the%20deep%20dive%20alert%20investigation%20that%20you%E2%80%99re%20already%20familiar%20with.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F119260i147F3B17A6F8E2D6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22secops2.png%22%20title%3D%22secops2.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%202%3A%20New%20user%20page%20in%20the%20Cloud%20App%20Security%20portal%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFrom%20the%20new%20user%20page%2C%20you%20can%20then%20easily%20dive%20deeper%20into%20each%20one%20of%20the%20alerts%20or%20activities%20that%20you%20see%20on%20the%20timelines%20and%20pivot%20into%20the%20Cloud%20App%20Security%20investigation%20experience%20that%20you%E2%80%99re%20already%20familiar%20with.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F119262i834A957C1CD7BD2A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22secops3.png%22%20title%3D%22secops3.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%203%3A%20Deep%20dive%20investigation%20of%20alerts%20from%20the%20user%20timeline%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20new%20Identity%20threat%20investigation%20experience%20further%20enriches%20the%20Cloud%20App%20Security%20portal%20and%20available%20investigation%20capabilities%2C%20giving%20SecOps%20teams%20correlated%20and%20weighted%20information%20to%20make%20better%20decisions%2C%20save%20time%20and%20more%20effectively%20remediate%20user%20threats%20and%20risks.%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EMore%20info%20and%20feedback%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CP%3EGet%20started%20with%20our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Ftutorial-ueba%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etechnical%20documentation%3C%2FA%3E%20today.%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3EHaven%E2%80%99t%20tried%20Microsoft%20Cloud%20App%20Security%20yet%3F%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmcastrial%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EStart%20a%20free%20trial%20today%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EAs%20always%2C%20we%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Cloud-App-Security%2Fbd-p%2FMicrosoftCloudAppSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EFor%20more%20resources%20and%20information%20go%20to%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%2Fcloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewebsite%3C%2FA%3E.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E*The%20information%20available%20on%20the%20new%20user%20page%20can%20vary%20depending%20on%20the%20services%20that%20you%20are%20using%20(Azure%20Advanced%20Threat%20Protection%2C%20Azure%20AD%20Identity%20Protection)%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-700136%22%20slang%3D%22en-US%22%3E%3CP%3EIntroducing%20a%20new%20identity%20threat%20investigation%20experience%20for%20Microsoft's%20CASB%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-700136%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Advanced%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEnterprise%20Mobility%20%2B%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-712603%22%20slang%3D%22en-US%22%3ERe%3A%20Prioritize%20user%20investigations%20in%20Cloud%20App%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-712603%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F214%22%20target%3D%22_blank%22%3E%40Kim%20Kischel%3C%2FA%3E%26nbsp%3B-%20in%20image%201%2C%20Vivan%20Perez%20has%20an%20investigation%20priority%20of%20672.%20Once%20you%20have%20linked%20to%20the%20user%20page%20for%20Vivan%20in%20image%202%2C%20however%2C%20the%20investigation%20priority%20score%20shows%20as%20155%20(it's%20the%20same%20over%20here%20too%20-%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F20%2Finvestigating-identity-threats-hybrid-cloud-environments%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F06%2F20%2Finvestigating-identity-threats-hybrid-cloud-environments%2F%3C%2FA%3E).%20Are%20these%20real%20screen%20shots%2C%20and%20if%20yes%2C%20why%20the%20change%20from%20672%20to%20155%20please%3F%20Or%20perhaps%20they%20are%20not%20real%20screen%20shots%2C%20and%20I'm%20reading%20it%20too%20closely%20%3B-).%20I%20thought%20they%20would%20be%20the%20same%2C%20and%20I'm%20confused%20as%20to%20why%20they%20are%20not.%20Thanks%20for%20any%20insight%20...%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-719328%22%20slang%3D%22en-US%22%3ERe%3A%20Prioritize%20user%20investigations%20in%20Cloud%20App%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-719328%22%20slang%3D%22en-US%22%3E%3CP%3Enice%20one..%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22''%26lt%3BA%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttp%3A%2F%2Fbestheatedgloveslab.com%2Fbest-hiking-gloves-and-mittens%2F''%26gt%3Bbest-hiking-gloves-and-mittens%3C%2FA%3E%26gt%3B%3C%2FP%3E%3CP%3E%3CBR%20%2F%3E%3CA%20href%3D%22''%26lt%3BA%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttp%3A%2F%2Fbestheatedgloveslab.com%2Fbest-moisturizing-gloves%2F''%26gt%3Bbest-moisturizing-gloves%3C%2FA%3E%26gt%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

This week we announced a new Identity threat investigation experience, which correlates identity events from Microsoft Cloud App Security, Azure Advanced Threat Protection, and Azure Active Directory Identity Protection into a single investigation experience for security analysts and hunters alike.

If you are using Microsoft Cloud App Security, you will be able to access the new experience in the portal starting today, regardless of whether you are also using Azure Advanced Threat Protection and/or Azure Active Directory Identity Protection.*

 

The identity threat investigation experience combines user identity signals from on-premises and cloud services to close the gap between disparate signals in your environment and leverages state-of-the-art User and Entity Behavior Analytics (UEBA) capabilities to provide a risk score and rich contextual information for each user. It empowers security analysts to prioritize their investigations and reduce investigation times, ending the need to toggle between identity security solutions.

 

secops.pngMicrosoft Cloud App Security - A uniquely integrated CASB

New user investigation priority for users

The Top user view in the Microsoft Cloud App Security dashboard is shifting from an investigation model that is based on the number of total alerts, to a new user investigation priority which is determined by all recent user activities and alerts that indicate an active attack or insider threat. This now helps you immediately understand which users currently represent the highest risk within your organization and should be prioritized for further investigation.

 

secops1 (2).pngImage 1: Cloud App Security dashboard: Top user view by investigation priority

 

New user page

We have also redesigned the existing user page to provide rich contextual information for how the risk score was determined and how a user compares to other across the organization. This will empower your SOC teams to address the users with the highest risk/impact ratio first and pivot from any scored activity into the deep dive alert investigation that you’re already familiar with.

 

secops2.pngImage 2: New user page in the Cloud App Security portal

From the new user page, you can then easily dive deeper into each one of the alerts or activities that you see on the timelines and pivot into the Cloud App Security investigation experience that you’re already familiar with.

 

secops3.pngImage 3: Deep dive investigation of alerts from the user timeline

The new Identity threat investigation experience further enriches the Cloud App Security portal and available investigation capabilities, giving SecOps teams correlated and weighted information to make better decisions, save time and more effectively remediate user threats and risks.

 

More info and feedback

 

*The information available on the new user page can vary depending on the services that you are using (Azure Advanced Threat Protection, Azure AD Identity Protection)

 

 

 

2 Comments
Occasional Contributor

@Kim Kischel - in image 1, Vivan Perez has an investigation priority of 672. Once you have linked to the user page for Vivan in image 2, however, the investigation priority score shows as 155 (it's the same over here too - https://www.microsoft.com/security/blog/2019/06/20/investigating-identity-threats-hybrid-cloud-envir...). Are these real screen shots, and if yes, why the change from 672 to 155 please? Or perhaps they are not real screen shots, and I'm reading it too closely ;-). I thought they would be the same, and I'm confused as to why they are not. Thanks for any insight ...