Home
%3CLINGO-SUB%20id%3D%22lingo-sub-360850%22%20slang%3D%22en-US%22%3EUnified%20SecOps%20Investigation%20for%20Hybrid%20Environments%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-360850%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EThis%20post%20is%20authored%20by%20Yossi%20Basha%2C%20Senior%20Program%20Manager%2C%20Azure%20ATP%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%2081%20percent%20of%20security%20breaches%20caused%20by%20compromised%20user%20credentials%2C%20identity%20security%20is%20paramount%20for%20all%20organizations.%20Enterprise%20security%20operations%20(SecOps)%20analysts%20face%20an%20increasing%20volume%20and%20velocity%20of%20alerts%20and%20incidents%20across%20an%20ever-expanding%20surface%20area%20from%20on-premises%20to%20the%20cloud.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20analysts%20investigating%20compromised%20users%2C%20context%20is%20key.%20The%20ability%20to%20understand%20relationships%20between%20events%20and%20activities%20across%20multiple%20environments%20is%20central.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20has%20three%20identity-centric%20security%20products%20offering%20detection%20capabilities%20across%20on-premise%20and%20in%20the%20cloud%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAzure%20Advanced%20Threat%20Protection%20(Azure%20ATP)%20identifies%20on-premises%20attacks%3C%2FLI%3E%0A%3CLI%3EAzure%20Active%20Directory%20Identity%20Protection%20(Azure%20AD%20Identity%20Protection)%20detects%20and%20proactively%20prevents%20user%20and%20sign-in%20risks%20to%20identities%20in%20the%20cloud%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Cloud%20App%20Security%20(MCAS)%20identifies%20attacks%20within%20a%20cloud%20session%2C%20covering%20not%20only%20Microsoft%20products%20but%20also%20third-party%20applications%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EWe%20are%20happy%20to%20announce%20that%20we%20have%20brought%20these%20together%20in%20a%20unified%20SecOps%20experience%2C%20which%20focuses%20on%20identity-based%20alerts%20and%20activities%20for%20true%20hybrid%20identity%20threat%20protection.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1678759270%22%20id%3D%22toc-hId-1765566344%22%20id%3D%22toc-hId-1765566344%22%20id%3D%22toc-hId-1765566344%22%20id%3D%22toc-hId-1765566344%22%20id%3D%22toc-hId-1765566344%22%20id%3D%22toc-hId-1765566344%22%3E%3CSTRONG%3E%3CFONT%20size%3D%224%22%3EGrowing%20Risk%20of%20Hybrid%20Attacks%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBecause%20many%20organizations%20have%20hybrid%20environments%2C%20we%20see%20attacks%20that%20start%20in%20the%20cloud%20and%20then%20pivot%20to%20on-premises%2C%20meaning%20SecOps%20teams%20need%20to%20investigate%20these%20attacks%20from%20multiple%20places.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20974px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F85179i2AEEADDA17189EE4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Picture1.png%22%20title%3D%22Picture1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20combining%20signals%20from%20cloud%20and%20on-premises%20sources%2C%20Microsoft%20empowers%20security%20analysts%20by%20providing%20unified%20identity%20and%20user%20information%2C%20in%20a%20single%20console%2C%20ending%20the%20need%20to%20toggle%20between%20security%20solutions.%20This%20gives%20your%20SecOps%20teams%20more%20time%20and%20the%20right%20information%20to%20make%20better%20decisions%2C%20and%20actively%20remediate%20the%20real%20identity%20threats%20and%20risks.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--873397691%22%20id%3D%22toc-hId--786590617%22%20id%3D%22toc-hId--786590617%22%20id%3D%22toc-hId--786590617%22%20id%3D%22toc-hId--786590617%22%20id%3D%22toc-hId--786590617%22%20id%3D%22toc-hId--786590617%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-869412644%22%20id%3D%22toc-hId-956219718%22%20id%3D%22toc-hId-956219718%22%20id%3D%22toc-hId-956219718%22%20id%3D%22toc-hId-956219718%22%20id%3D%22toc-hId-956219718%22%20id%3D%22toc-hId-956219718%22%3E%3CSTRONG%3E%3CFONT%20size%3D%224%22%3EUnderstanding%20Top%20User%20Threats%20in%20Your%20Organization%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20the%20aggregated%20security%20awesomeness%2C%20we%20have%20simplified%20and%20boosted%20your%20ability%20to%20investigate%20with%20the%20new%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Finvestigationpriority%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInvestigation%20Priority%20Score%3C%2FA%3E%2C%20which%20provides%20you%20visibility%20into%20users%20that%20could%20pose%20the%20greatest%20risk%20to%20your%20organization%20should%20they%20be%20compromised.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYour%20SecOps%20team%20can%20immediately%20understand%20the%20real%20top%20user%20threats%20to%20your%20organization%20by%20Investigation%20Priority%20Score%2C%20directly%20verify%20their%20business%20impact%20and%20investigate%20all%20related%20activities%20%E2%80%93%20no%20matter%20whether%20they%20are%20compromised%2C%20exfiltrating%20data%20or%20acting%20as%20insider%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20calculate%20the%20Investigation%20Priority%2C%20we%20assess%20the%20investigation%20urgency%20of%20each%20specific%20user%2C%20using%20security%20alerts%2C%20abnormal%20activities%2C%20and%20potential%20business%20and%20asset%20impact%20related%20to%20each%20user.%26nbsp%3B%20For%20every%20Azure%20Active%20Directory%20user%2C%20we%20then%20build%20a%20dynamic%20Investigation%20Priority%20Score%2C%20based%20on%20intelligence%20%3CSPAN%3Ebuilt%20from%20Azure%20ATP%2C%20Microsoft%20Cloud%20App%20Security%20as%20well%20as%20Azure%20AD%20Identity%20Protection%20%3C%2FSPAN%3E%E2%80%93%20which%20is%20continually%20updated%20based%20on%20recent%20behavior%20and%20impact.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20897px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F85180iF3EBA77F2E23866A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Picture2.png%22%20title%3D%22Picture2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Investigation%20Priority%20Score%20helps%20in%20identifying%20top%20users%20to%20investigate%20and%20surfacing%20those%20users%20that%20we%20recommend%20for%20review%20based%20on%20the%20user%20analytics%20engine.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1682744317%22%20id%3D%22toc-hId--1595937243%22%20id%3D%22toc-hId--1595937243%22%20id%3D%22toc-hId--1595937243%22%20id%3D%22toc-hId--1595937243%22%20id%3D%22toc-hId--1595937243%22%20id%3D%22toc-hId--1595937243%22%3E%3CSTRONG%3E%3CFONT%20size%3D%224%22%3ENew%20investigation%20capabilities%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20unified%20portal%20also%20brings%20significant%20new%20investigation%20capabilities%20for%20cloud%20and%20on-premises%20information.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20974px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F85181iA3571D45B1FFDC3D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Picture3.png%22%20title%3D%22Picture3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EEnabling%20security%20analysts%20to%20perform%20threat%20hunting%20with%20greater%20context%20over%20both%20cloud%20and%20on-premises%20resources.%3C%2FLI%3E%0A%3CLI%3EIntegrated%20user%20pages%20featuring%20all%20the%20information%20we%20know%20about%20the%20user%20coupled%20with%20everything%20we%20know%20about%20suggested%20investigation%20and%20next%20steps.%3C%2FLI%3E%0A%3CLI%3EFull%20visibility%20and%20management%20of%20Azure%20AD%20user%20risk%20levels%20-%20incorporating%20the%20ability%20to%20confirm%20compromised%20user%20status%20which%20changes%20the%20Azure%20AD%20User%20Risk%20level%20to%20High%2C%20based%20on%20Azure%20AD%20conditional%20access%20policies.%3C%2FLI%3E%0A%3CLI%3EEnhanced%20automation%20through%20Microsoft%20Flow%20integration%20for%20alerts%20(cloud%20and%20on-prem)%2C%20as%20well%20task%20automation.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3EParticipate%20in%20the%20evolution%20of%20the%20Unified%20SecOps%20Experience%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%E2%80%99re%20one%20of%20the%20many%20enterprise%20customers%20already%20using%20Azure%20ATP%2C%20MCAS%2C%20or%20Azure%20AD%20Identity%20Protection%20(or%20a%20combination%20of%20these)%20and%20want%20to%20experience%20this%20new%20functionality%2C%20join%20our%20expanding%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funifiedpreview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epreview%20program%3C%2FA%3E%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3EGet%20Started%20Today%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20are%20just%20starting%20your%20journey%2C%20begin%20trials%20of%20the%20Microsoft%20Threat%20Protection%20services%20today%20to%20experience%20the%20benefits%20of%20the%20most%20comprehensive%2C%20integrated%2C%20and%20secure%20threat%20protection%20solution%20for%20the%20modern%20workplace%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwinatpregistration-prd.trafficmanager.net%2FUserAgreement%3Fwt.mc_id%3DAID702266_QSG_245679%26amp%3Bocid%3DAID702266_QSG_245679%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20Defender%20ATP%20trial%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fsignup.microsoft.com%2Fsignup%2Flogout%3FOfferId%3D101bde18-5ffb-4d79-a47b-f5b2c62525b3%26amp%3Bdl%3DENTERPRISEPREMIUM%26amp%3Bculture%3Den-US%26amp%3Bcountry%3DUS%26amp%3Bali%3D1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20365%20E5%20trial%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fportal.office.com%2Fsignup%2Flogout%3FOfferId%3D87dd2714-d452-48a0-a809-d2f58c4f68b7%26amp%3Bali%3D1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnterprise%20Mobility%20Suite%20(EMS)%20E5%20trial%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faccount.azure.com%2Fsignup%3Foffer%3Dms-azr-0044p%26amp%3BappId%3D102%26amp%3Bref%3Dazureplat-generic%26amp%3BredirectURL%3Dhttps%253a%252f%252fazure.microsoft.com%252fen-us%252fget-started%252fwelcome-to-azure%252f%26amp%3Bl%3Den-us%26amp%3BcorrelationId%3D27471f9c-5084-45dc-8dd7-8e967de58165%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%20trial%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-360850%22%20slang%3D%22en-US%22%3E%3CP%3EWith%2081%20percent%20of%20security%20breaches%20caused%20by%20compromised%20user%20credentials%2C%20identity%20security%20is%20paramount%20for%20all%20organizations.%20Enterprise%20security%20operations%20(SecOps)%20analysts%20face%20an%20increasing%20volume%20and%20velocity%20of%20alerts%20and%20incidents%20across%20an%20ever-expanding%20surface%20area%20from%20on-premises%20to%20the%20cloud.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-360850%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Advanced%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-680501%22%20slang%3D%22en-US%22%3ERe%3A%20Unified%20SecOps%20Investigation%20for%20Hybrid%20Environments%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-680501%22%20slang%3D%22en-US%22%3E%3CP%3EIt%20has%20become%20very%20simple%20to%20bypass%20Microsoft%20MFA%20via%20Phishing%20campaigns.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3EWhat%20is%20Microsoft%20doing%20to%20stop%20this%3F%3C%2FLI%3E%3CLI%3EHow%20does%20Microsoft%20protect%20itself%20from%20these%20types%20of%20attacks%3F%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELiterature%20and%20samples%20below%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dk4bq5A-icBw%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dk4bq5A-icBw%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3399858%2Fphishing-attacks-that-bypass-2-factor-authentication-are-now-easier-to-execute.html%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.csoonline.com%2Farticle%2F3399858%2Fphishing-attacks-that-bypass-2-factor-authentication-are-now-easier-to-execute.html%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-719461%22%20slang%3D%22en-US%22%3ERe%3A%20Unified%20SecOps%20Investigation%20for%20Hybrid%20Environments%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-719461%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20have%20ATP%20and%20MCAS%20.%20How%20do%20i%20access%20the%20unified%20Secops%20portal.%20Is%20there%20a%20URL.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3CP%3EAnand%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-721543%22%20slang%3D%22en-US%22%3ERe%3A%20Unified%20SecOps%20Investigation%20for%20Hybrid%20Environments%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-721543%22%20slang%3D%22en-US%22%3EHi%20Anand%2C%20Investigation%20priority%20is%20already%20available%20for%20all%20MCAS%20customers.%20The%20integration%20of%20Azure%20ATP%20and%20MCAS%20is%20made%20available%20on%20top%20of%20MCAS%2C%20to%20connected%20Azure%20ATP%20to%20MCAS%20please%20follow%20this%20article%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Faatp-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Faatp-integration%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-871292%22%20slang%3D%22en-US%22%3ERe%3A%20Unified%20SecOps%20Investigation%20for%20Hybrid%20Environments%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-871292%22%20slang%3D%22en-US%22%3E%3CP%3ETi%20Japim%20Paqen%20Botes%20!%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

This post is authored by Yossi Basha, Senior Program Manager, Azure ATP

 

With 81 percent of security breaches caused by compromised user credentials, identity security is paramount for all organizations. Enterprise security operations (SecOps) analysts face an increasing volume and velocity of alerts and incidents across an ever-expanding surface area from on-premises to the cloud.

 

For analysts investigating compromised users, context is key. The ability to understand relationships between events and activities across multiple environments is central.

 

Microsoft has three identity-centric security products offering detection capabilities across on-premise and in the cloud:

  • Azure Advanced Threat Protection (Azure ATP) identifies on-premises attacks
  • Azure Active Directory Identity Protection (Azure AD Identity Protection) detects and proactively prevents user and sign-in risks to identities in the cloud
  • Microsoft Cloud App Security (MCAS) identifies attacks within a cloud session, covering not only Microsoft products but also third-party applications

We are happy to announce that we have brought these together in a unified SecOps experience, which focuses on identity-based alerts and activities for true hybrid identity threat protection.

 

Growing Risk of Hybrid Attacks

 

Because many organizations have hybrid environments, we see attacks that start in the cloud and then pivot to on-premises, meaning SecOps teams need to investigate these attacks from multiple places.

Picture1.png

 

By combining signals from cloud and on-premises sources, Microsoft empowers security analysts by providing unified identity and user information, in a single console, ending the need to toggle between security solutions. This gives your SecOps teams more time and the right information to make better decisions, and actively remediate the real identity threats and risks.

 

Understanding Top User Threats in Your Organization

 

In addition to the aggregated security awesomeness, we have simplified and boosted your ability to investigate with the new Investigation Priority Score, which provides you visibility into users that could pose the greatest risk to your organization should they be compromised.

 

Your SecOps team can immediately understand the real top user threats to your organization by Investigation Priority Score, directly verify their business impact and investigate all related activities – no matter whether they are compromised, exfiltrating data or acting as insider threats.

 

To calculate the Investigation Priority, we assess the investigation urgency of each specific user, using security alerts, abnormal activities, and potential business and asset impact related to each user.  For every Azure Active Directory user, we then build a dynamic Investigation Priority Score, based on intelligence built from Azure ATP, Microsoft Cloud App Security as well as Azure AD Identity Protection – which is continually updated based on recent behavior and impact.


Picture2.png

 

The Investigation Priority Score helps in identifying top users to investigate and surfacing those users that we recommend for review based on the user analytics engine.

 

New investigation capabilities

 

The unified portal also brings significant new investigation capabilities for cloud and on-premises information.

 

Picture3.png

 

  • Enabling security analysts to perform threat hunting with greater context over both cloud and on-premises resources.
  • Integrated user pages featuring all the information we know about the user coupled with everything we know about suggested investigation and next steps.
  • Full visibility and management of Azure AD user risk levels - incorporating the ability to confirm compromised user status which changes the Azure AD User Risk level to High, based on Azure AD conditional access policies.
  • Enhanced automation through Microsoft Flow integration for alerts (cloud and on-prem), as well task automation.

 

Participate in the evolution of the Unified SecOps Experience

 

If you’re one of the many enterprise customers already using Azure ATP, MCAS, or Azure AD Identity Protection (or a combination of these) and want to experience this new functionality, join our expanding preview program.

 

 

Get Started Today

 

If you are just starting your journey, begin trials of the Microsoft Threat Protection services today to experience the benefits of the most comprehensive, integrated, and secure threat protection solution for the modern workplace:

4 Comments
Regular Visitor

It has become very simple to bypass Microsoft MFA via Phishing campaigns.

 

  1. What is Microsoft doing to stop this?
  2. How does Microsoft protect itself from these types of attacks?

 

Literature and samples below

 

https://www.youtube.com/watch?v=k4bq5A-icBw

https://www.csoonline.com/article/3399858/phishing-attacks-that-bypass-2-factor-authentication-are-n...

Occasional Visitor

We have ATP and MCAS . How do i access the unified Secops portal. Is there a URL. 

 

Thanks

Anand

Microsoft
Hi Anand, Investigation priority is already available for all MCAS customers. The integration of Azure ATP and MCAS is made available on top of MCAS, to connected Azure ATP to MCAS please follow this article: https://docs.microsoft.com/en-us/cloud-app-security/aatp-integration
Occasional Visitor

Ti Japim Paqen Botes !