%3CLINGO-SUB%20id%3D%22lingo-sub-1467697%22%20slang%3D%22en-US%22%3ENew%20partnerships%20with%20innovative%20leaders%20helps%20you%20fight%20advanced%20threats!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1467697%22%20slang%3D%22en-US%22%3E%3CP%3EDesigned%20to%20deliver%20best-of-breed%20security%2C%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20has%20crafted%20a%20highly%20extensible%20platform%20with%20a%20vast%20set%20of%20APIs%20that%20allows%20both%20customers%20and%20partners%20to%20extend%20the%20power%20of%20their%20combined%20solutions.%3CSPAN%3E%3CBR%20%2F%3E%3C%2FSPAN%3EWe%E2%80%99re%20thrilled%20to%20announce%20our%20latest%20integration%20with%20Splunk%20Enterprise%20and%20ServiceNow%20Security%20Operations%2C%20aimed%20to%20optimize%20your%20existing%20processes%20and%20workflows%20and%20maximize%20the%20efforts%20of%20your%20overworked%20security%20staff!%3C%2FP%3E%0A%3CP%3EIn%20this%20blog%20we%E2%80%99ll%20cover%20our%20latest%20partner%20integrations.%20In%20addition%20to%20these%20new%20partners%2C%20the%20latest%20applications%20to%20be%20featured%20in%20the%20Microsoft%20Defender%20ATP%20partner%20application%20catalogue%20improve%20threat%20protection%20against%20sophisticated%20attacks%20while%20addressing%20new%20use%20cases.%20The%20catalogue%20now%20includes%20new%20partners%20for%20network%20threat%20detection%20and%20response%2C%20network%20modeling%20and%20risk%20prioritization%2C%20advanced%20forensics%20collection%2C%20healthcare%20visibility%20and%20security.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EWe%20encourage%20you%20to%20explore%20the%20new%20innovative%20%26nbsp%3BMicrosoft%20Defender%20ATP%20partner%20application%20catalogue%20that%20is%20part%20of%20the%20broader%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3CSPAN%3E%5B%23%24dp7%5D%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fintelligent-security-association%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Intelligent%20Security%20Association%20(MISA)%3C%2FA%3E%3C%2FSPAN%3E%3C%2FSPAN%3E.%20Outlined%20below%20are%20the%20specifics%20of%20these%20integrations%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CSTRONG%3E%3CBR%20%2F%3ESplunk%20Enterprise%20%7C%20Security%20information%20and%20event%20management%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.splunk.com%2Fen_us%2Fsoftware%2Fenterprise-security.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESplunk%3C%2FA%3E%20is%20a%20market%20leader%20in%20analyzing%20machine%20data%20designed%20to%20investigate%2C%20monitor%2C%20analyze%2C%20and%20act%20on%20data%20at%20any%20scale.%20Splunk%20recently%20partnered%20with%20Microsoft%20Defender%20ATP%20to%20develop%20a%20new%20add-on%20that%20allows%20our%20joint%20customers%20to%20easily%20integrate%20security%20alerts%20in%20Splunk%20Enterprise.%20Security%20alerts%20and%20related%20evidence%20ingested%20through%20this%20add-on%20are%20mapped%20to%20the%20Splunk%20Common%20Information%20Model%2C%20which%20allows%20you%20to%20easily%20integrate%20the%20alerts%20into%20your%20existing%20processes%20and%20dashboards.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESplunk%20Apps%20and%20add-ons%20extend%20Splunk%E2%80%99s%20extensive%20user%20interface%20to%20include%20information%20and%20capabilities%20from%20Microsoft%20Defender%20ATP.%20This%20enables%20security%20teams%20to%20work%20through%20a%20single%20streamlined%20solution%20that%20incorporates%20data%20from%20multiple%20sources%20to%20provide%20comprehensive%20visualizations%20and%20insights%20into%20your%20overall%20security%20posture.%20Follow%20the%20setup%20and%20configuration%20steps%20in%20the%20'Details'%20tab%20of%20%22%3CA%20href%3D%22https%3A%2F%2Fsplunkbase.splunk.com%2Fapp%2F4959%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethe%20Microsoft%20Defender%20ATP%20add-on%20for%20Splunk.%3C%2FA%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20another%20popular%20add-on%20developed%20by%20our%20community%20members%20enables%20you%20to%20onboard%20telemetry%20via%20Microsoft%20Defender%20ATP%20advanced%20hunting%20API%20for%20further%20correlation%20in%20Splunk.%20Learn%20more%20about%20the%20technology%20add-on%20%3CA%20href%3D%22https%3A%2F%2Fsplunkbase.splunk.com%2Fapp%2F4623%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E(TA)%20for%20Microsoft%20defender%20ATP%20hunting%20API%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EServiceNow%20Security%20Operations%20%7C%20Orchestration%20and%20Automation%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurity%20teams%20today%20are%20inundated%20with%20alerts%20and%20information%20from%20siloed%20point%20solutions%20that%20aren%E2%80%99t%20connected%20with%20each%20other.%20Furthermore%2C%20manual%20processes%20and%20cross-team%20handoffs%20hinder%20the%20security%20team%E2%80%99s%20ability%20to%20efficiently%20respond%20to%20attacks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20help%20solve%20this%20challenge%2C%20ServiceNow%C2%AE%20and%20Microsoft%20have%20developed%20a%20connection%20with%20multiple%20Microsoft%20security%20technologies%20including%20Microsoft%20Defender%20ATP%20via%20the%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fgraphsecuritydocs%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Graph%20Security%20API%3C%2FA%3E.%20This%20enables%20customers%20to%20bring%20rich%20insights%20into%20ServiceNow%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.servicenow.com%2Fproducts%2Fsecurity-operations.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20Operations%3C%2FA%3E%20solution.%20Customers%20can%20manage%20and%20respond%20to%20security%20alerts%20centrally%20from%20within%20the%20Now%20Platform.%20We%20invite%20you%20to%20try%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Fstore.servicenow.com%2Fsn_appstore_store.do%23!%2Fstore%2Fapplication%2F92712ec3c7000010c20eb5a827c26059%2F10.0.6%3Freferer%3D%252Fstore%252Fapplication%252F92712ec3c7000010c20eb5a827c26059%252F10.0.6%253Freferer%253D%25252Fstore%25252Fsearch%25253Fapptype%25253Dallintegrations%252525253Bnonintegrations%252526q%25253Dgraph%25252520security%2526sl%253Dsh%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Graph%20Security%20API%20alert%20ingestion%20integration%20for%20security%20operations%3C%2FA%3E%20.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EVectra%20%7C%20Network%20Threat%20Detection%20and%20Response%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EVectra%C2%AE%20is%20an%20artificial%20intelligence%20company%20transforming%20cybersecurity.%20Vectra%E2%80%99s%20Cognito%20platform%20provides%20native%20integration%20with%20Microsoft%20Defender%20ATP%20combining%20the%20bird%E2%80%99s%20eye%20view%20of%20network%20detection%20and%20response%20NDR%20(Vectra)%20with%20the%20surgical%20precision%20of%20EDR%20(Microsoft%20Defender%20ATP).%20This%20integration%20includes%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EStreamlined%20threat%20investigation%20with%20contextual%20host%20information%20from%20Microsoft%20Defender%20ATP%20leveraged%20and%20displayed%20by%20Vectra%E2%80%99s%20Cognito%20platform%3C%2FLI%3E%0A%3CLI%3EAutomated%20remediation%20by%20isolation%20of%20hosts%20upon%20specific%20detections%3C%2FLI%3E%0A%3CLI%3EOne-click%20pivot%20from%20Vectra%E2%80%99s%20Cognito%20platform%20to%20Microsoft%20Defender%20ATP%20for%20investigating%20and%20isolating%20suspicious%20hosts%20and%20pausing%20attack%20progression.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fcontent.vectra.ai%2Frs%2F748-MCE-447%2Fimages%2FMSFT-Vectra_SOC_Triad.pdf%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20the%20integration%26nbsp%3B%3C%2FA%3Eand%20watch%20this%20%3CA%20href%3D%22https%3A%2F%2Fvimeo.com%2F416516493%2Fadb56c8948%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EVectra%20-%20Microsoft%20Defender%20ATP%20Demo%3C%2FA%3E%20for%20details.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECyberMDX%20%7C%20Visibility%20and%20Security%20for%20Connected%20Healthcare%20Assets%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ECyberMDX%2C%20a%20leading%20healthcare%20cybersecurity%20provider%20delivering%20visibility%2C%20threat%20prevention%2C%20and%20operational%20efficiency%20for%20medical%20devices%2C%20IoT%2C%20and%20clinical%20networks%2C%20has%20recently%20integrated%20with%20Microsoft%20Defender%20ATP.%20Coupling%20CyberMDX%20asset%20insight%20and%20detection%20capabilities%20with%20the%20Microsoft%20Defender%20ATP%20view%20of%20managed%20networks%2C%20healthcare%20organizations%20are%20equipped%20with%20unmatched%20cross-platform%20and%20device%20visibility%2C%20classification%2C%20and%20incident%20response%20capabilities.%20Microsoft%20enterprise%20customers%20using%20Microsoft%20Defender%20ATP%20will%20benefit%20from%20rich%20network%20security%20and%20device%20function%20context%20provided%20by%20CyberMDX%20and%20streamlined%20into%20Microsoft%20Defender%20ATP%E2%80%99s%20incident%20response%2C%20investigation%2C%20and%20hunting%20workflows.%20Learn%20more%20about%20the%20integration%20%3CA%20href%3D%22https%3A%2F%2Fwww.cybermdx.com%2Fnews%2Fcybermdx-integrates-with-mdatp%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--623757926%22%20id%3D%22toc-hId--623757926%22%20id%3D%22toc-hId--623757926%22%3E%3CSTRONG%3E%3CBR%20%2F%3ECymulate%20%7C%20Continuous%20security%20validation%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3ECymulate%20enables%20to%20validate%20the%20effectiveness%20of%20security%20controls%3B%20it%20is%20a%20SaaS%20based%20platform%20used%20by%20security%20teams%20to%20optimize%20the%20efficiency%20of%20their%20security%20operations.%20By%20running%20customized%20and%20out-of-the-box%20attack%20scenarios%2C%20SOC%20teams%20can%20simulate%20adversaries%20using%20the%20latest%20threats%20and%20attack%20techniques%20to%20discover%20security%20gaps%20and%20remediate%20them.%20Integration%20with%20Microsoft%20Defender%20ATP%20correlates%20EDR%20findings%20with%20simulated%20attacks%20to%20validate%20accurate%20detection%20and%20effective%20response%20actions.%20The%20integration%20also%20spans%20across%20threat%20and%20vulnerability%20management%20and%20provides%20attack%20context%20to%20vulnerable%20assets%20and%20their%20business%20criticality%20in%20order%20to%20prioritize%20remediation.%20Learn%20more%20about%20the%20integration%26nbsp%3B%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fblog.cymulate.com%2Fcymulate-integration-microsoft-defender-atp%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FSPAN%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-1863754907%22%20id%3D%22toc-hId-1863754907%22%20id%3D%22toc-hId-1863754907%22%3E%3CSTRONG%3ESkyBox%20%7C%20Network%20Modeling%20and%20Risk%20Prioritization%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.skyboxsecurity.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESkybox%C2%AE%26nbsp%3BSecurity%3C%2FA%3E%2C%20a%20global%20leader%20in%20cybersecurity%20management%2C%20recently%20announced%20its%20partnership%20with%20Microsoft%20Defender%20ATP.%20This%20partnership%20will%20strengthen%20Skybox%E2%80%99s%20vulnerability%20detection%20capabilities%20with%20the%20inclusion%20of%20critical%20data%20from%20threat%20and%20vulnerability%20management.%20It%20thereby%20expands%20Skybox%E2%80%99s%20vulnerability%20management%20for%20enterprises%20that%20continue%20to%20deploy%20workloads%20across%20hybrid%20and%20cloud%20network%20environments.%20%3CA%20href%3D%22https%3A%2F%2Fwww.skyboxsecurity.com%2Fnews%2Fenhanced-vulnerability-management-powered-by-microsoft%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20the%20integration%26nbsp%3B%3C%2FA%3Eand%20watch%20this%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUmDFB2QtIrs%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Evideo%3C%2FA%3E%20for%20details.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-56300444%22%20id%3D%22toc-hId-56300444%22%20id%3D%22toc-hId-56300444%22%3E%3CSTRONG%3ETHOR%20%7C%20Forensics%20collection%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3ETHOR%20Scanner%20extends%20Microsoft%20Defender%20ATP%E2%80%99s%20real-time%20monitoring%20by%20intense%20local%20scans%20to%20allow%20a%20full%20on-demand%20compromise%20assessment.%20THOR%20is%20a%20forensic%20scanner%20that%20integrates%20into%20Microsoft%20Defender%20ATP%20to%20scan%20the%20local%20filesystem%2C%20registry%2C%20logs%20and%20other%20elements%20for%20traces%20of%20hacking%20activity%20using%2010%2C000%20hand-written%20YARA%20rules%20and%20thousands%20of%20filename%2C%20C2%2C%20hash%2C%20mutex%20and%20named%20pipe%20IOCs%20to%20them.%20This%20live%20forensic%20scan%20reduces%20the%20work%20of%20your%20forensic%20analysts%20to%20a%20minimum%20and%20generates%20results%20as%20fast%20as%20possible%20for%20you%20to%20react%20in%20a%20timely%20manner.%20%3CA%20href%3D%22https%3A%2F%2Fwww.nextron-systems.com%2Fthor-cloud%2Fmicrosoft-defender-atp%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELearn%20more%20about%20the%20integration%3C%2FA%3E.%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-45797340%22%20id%3D%22toc-hId-45797340%22%20id%3D%22toc-hId-45797340%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH4%20id%3D%22toc-hId-736358814%22%20id%3D%22toc-hId-736358814%22%20id%3D%22toc-hId-736358814%22%3E%26nbsp%3B%3C%2FH4%3E%0A%3CH4%20id%3D%22toc-hId--1071095649%22%20id%3D%22toc-hId--1071095649%22%20id%3D%22toc-hId--1071095649%22%3E%3CSTRONG%3EWhat%20else%3F%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20offers%20partners%20the%20opportunity%20to%20extend%20their%20existing%20security%20offerings%20on%20top%20of%20the%20open%20framework%20and%20a%26nbsp%3Brich%20complete%20set%20of%20APIs%2C%20allowing%20them%20to%20build%20extensions%20and%20integrations%20to%20our%20endpoint%20security%20platform.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3ESecurity%20vendors%20interested%20in%20connecting%20to%20Microsoft%20Defender%20ATP%20can%20use%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fget-started-partner-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethe%20step-by-step%20guide%20on%20becoming%20a%20Microsoft%20Defender%20ATP%20partner%20%3C%2FA%3Eto%20get%20started%20on%20developing%20an%20integration.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1467697%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3ENew%20partners%20including%20%3CSTRONG%3ESplunk%20Enterprise%2C%26nbsp%3BServiceNow%20Security%20Operations%2C%26nbsp%3BVectra%2C%26nbsp%3BCyberMDX%2C%26nbsp%3B%3C%2FSTRONG%3E%3CSTRONG%3ECymulate%2C%20SkyBox%2C%20%3C%2FSTRONG%3Eand%20%3CSTRONG%3ETHOR%20%3C%2FSTRONG%3Eare%26nbsp%3B%3C%2FEM%3E%3CEM%3Eutilizing%20the%20rich%20telemetry%20and%20powerful%20APIs%20of%20the%20Microsoft%20Defender%20ATP%20to%20help%20you%20%3CSPAN%3Efight%20advanced%20threats%3C%2FSPAN%3E!%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Better%20together.png%22%20style%3D%22width%3A%20537px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F199037i9F0C7551D5CC3C36%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Better%20together.png%22%20alt%3D%22Better%20together.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1468865%22%20slang%3D%22en-US%22%3ERe%3A%20New%20partnerships%20with%20innovative%20leaders%20helps%20you%20fight%20advanced%20threats!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1468865%22%20slang%3D%22en-US%22%3E%3CP%3EMore%20improvements%20in%20ATP%3CSPAN%20class%3D%22lia-unicode-emoji%22%20title%3D%22%3Athumbs_up%3A%22%3E%3Cspan%20class%3D%22lia-unicode-emoji%22%20title%3D%22%3Athumbs_up%3A%22%3E%F0%9F%91%8D%F0%9F%8F%BD%3C%2Fspan%3E%3Cspan%20class%3D%22lia-unicode-emoji%22%20title%3D%22%3Athumbs_up%3A%22%3E%F0%9F%91%8D%F0%9F%8F%BD%3C%2Fspan%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-unicode-emoji%22%20title%3D%22%3Athumbs_up%3A%22%3E%20%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Designed to deliver best-of-breed security, Microsoft Defender Advanced Threat Protection (ATP) has crafted a highly extensible platform with a vast set of APIs that allows both customers and partners to extend the power of their combined solutions.

We’re thrilled to announce our latest integration with Splunk Enterprise and ServiceNow Security Operations, aimed to optimize your existing processes and workflows and maximize the efforts of your overworked security staff!

In this blog we’ll cover our latest partner integrations. In addition to these new partners, the latest applications to be featured in the Microsoft Defender ATP partner application catalogue improve threat protection against sophisticated attacks while addressing new use cases. The catalogue now includes new partners for network threat detection and response, network modeling and risk prioritization, advanced forensics collection, healthcare visibility and security.


We encourage you to explore the new innovative  Microsoft Defender ATP partner application catalogue that is part of the broader Microsoft Intelligent Security Association (MISA). Outlined below are the specifics of these integrations:

 
Splunk Enterprise | Security information and event management

Splunk is a market leader in analyzing machine data designed to investigate, monitor, analyze, and act on data at any scale. Splunk recently partnered with Microsoft Defender ATP to develop a new add-on that allows our joint customers to easily integrate security alerts in Splunk Enterprise. Security alerts and related evidence ingested through this add-on are mapped to the Splunk Common Information Model, which allows you to easily integrate the alerts into your existing processes and dashboards.

 

Splunk Apps and add-ons extend Splunk’s extensive user interface to include information and capabilities from Microsoft Defender ATP. This enables security teams to work through a single streamlined solution that incorporates data from multiple sources to provide comprehensive visualizations and insights into your overall security posture. Follow the setup and configuration steps in the 'Details' tab of "the Microsoft Defender ATP add-on for Splunk.

In addition, another popular add-on developed by our community members enables you to onboard telemetry via Microsoft Defender ATP advanced hunting API for further correlation in Splunk. Learn more about the technology add-on (TA) for Microsoft defender ATP hunting API.


ServiceNow Security Operations | Orchestration and Automation

Security teams today are inundated with alerts and information from siloed point solutions that aren’t connected with each other. Furthermore, manual processes and cross-team handoffs hinder the security team’s ability to efficiently respond to attacks.

 

To help solve this challenge, ServiceNow® and Microsoft have developed a connection with multiple Microsoft security technologies including Microsoft Defender ATP via the Microsoft Graph Security API. This enables customers to bring rich insights into ServiceNow Security Operations solution. Customers can manage and respond to security alerts centrally from within the Now Platform. We invite you to try out the Microsoft Graph Security API alert ingestion integration for security operations .

 

Vectra | Network Threat Detection and Response

Vectra® is an artificial intelligence company transforming cybersecurity. Vectra’s Cognito platform provides native integration with Microsoft Defender ATP combining the bird’s eye view of network detection and response NDR (Vectra) with the surgical precision of EDR (Microsoft Defender ATP). This integration includes:

  • Streamlined threat investigation with contextual host information from Microsoft Defender ATP leveraged and displayed by Vectra’s Cognito platform
  • Automated remediation by isolation of hosts upon specific detections
  • One-click pivot from Vectra’s Cognito platform to Microsoft Defender ATP for investigating and isolating suspicious hosts and pausing attack progression.

Learn more about the integration and watch this Vectra - Microsoft Defender ATP Demo for details.

 

CyberMDX | Visibility and Security for Connected Healthcare Assets

CyberMDX, a leading healthcare cybersecurity provider delivering visibility, threat prevention, and operational efficiency for medical devices, IoT, and clinical networks, has recently integrated with Microsoft Defender ATP. Coupling CyberMDX asset insight and detection capabilities with the Microsoft Defender ATP view of managed networks, healthcare organizations are equipped with unmatched cross-platform and device visibility, classification, and incident response capabilities. Microsoft enterprise customers using Microsoft Defender ATP will benefit from rich network security and device function context provided by CyberMDX and streamlined into Microsoft Defender ATP’s incident response, investigation, and hunting workflows. Learn more about the integration here.


Cymulate | Continuous security validation

Cymulate enables to validate the effectiveness of security controls; it is a SaaS based platform used by security teams to optimize the efficiency of their security operations. By running customized and out-of-the-box attack scenarios, SOC teams can simulate adversaries using the latest threats and attack techniques to discover security gaps and remediate them. Integration with Microsoft Defender ATP correlates EDR findings with simulated attacks to validate accurate detection and effective response actions. The integration also spans across threat and vulnerability management and provides attack context to vulnerable assets and their business criticality in order to prioritize remediation. Learn more about the integration here. 

SkyBox | Network Modeling and Risk Prioritization

Skybox® Security, a global leader in cybersecurity management, recently announced its partnership with Microsoft Defender ATP. This partnership will strengthen Skybox’s vulnerability detection capabilities with the inclusion of critical data from threat and vulnerability management. It thereby expands Skybox’s vulnerability management for enterprises that continue to deploy workloads across hybrid and cloud network environments. Learn more about the integration and watch this video for details. 

 

THOR | Forensics collection

THOR Scanner extends Microsoft Defender ATP’s real-time monitoring by intense local scans to allow a full on-demand compromise assessment. THOR is a forensic scanner that integrates into Microsoft Defender ATP to scan the local filesystem, registry, logs and other elements for traces of hacking activity using 10,000 hand-written YARA rules and thousands of filename, C2, hash, mutex and named pipe IOCs to them. This live forensic scan reduces the work of your forensic analysts to a minimum and generates results as fast as possible for you to react in a timely manner. Learn more about the integration.

 

 

What else?

Microsoft Defender ATP offers partners the opportunity to extend their existing security offerings on top of the open framework and a rich complete set of APIs, allowing them to build extensions and integrations to our endpoint security platform. 


Security vendors interested in connecting to Microsoft Defender ATP can use the step-by-step guide on becoming a Microsoft Defender ATP partner to get started on developing an integration.

1 Comment
Senior Member

More improvements in ATP👍🏽👍🏽