%3CLINGO-SUB%20id%3D%22lingo-sub-1170187%22%20slang%3D%22en-US%22%3EPut%20regulation%20fears%20to%20rest%20when%20deploying%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1170187%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20power%20of%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20lies%20in%20the%20intelligent%20analysis%20of%20the%20data.%20Using%20sophisticated%20detection%20and%20protection%20technologies%2C%20Microsoft%20Defender%20ATP%20maps%20known%20and%20unknown%20behaviors%20(such%20as%20writing%20to%20a%20certain%20point%20in%20the%20registry%20or%20trying%20to%20access%20the%20LSASS%20process)%20to%20data%20found%20on%20the%20clients%20and%20raises%20alerts%20as%20it%20observes%20suspicious%20activity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20data%20to%20be%20analyzed%2C%20Microsoft%20Defender%20ATP%20must%20collect%20this%20data%20in%20real-time.%20It%20acts%20like%20an%20airplane%20%E2%80%98flight%20recorder%E2%80%99%2C%20which%20keeps%20track%20of%20important%20flight%20data%20to%20facilitate%20the%20investigation%20of%20accidents%20and%20incidents.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20some%20countries%2C%20data%20collection%20can%20be%20a%20cause%20for%20concern.%20Organizations%20and%20roles%20such%20as%20German%20Workers%20Council%20and%20Data%20Protection%20Officers%20(DPO)%20want%20to%20know%20exactly%20what%20happens%20with%20the%20data%20found%20on%20an%20end-user%E2%80%99s%20computer.%20One%20of%20the%20main%20concerns%20of%20the%20Workers%20Council%20is%20that%20such%20technologies%20must%20%3CSTRONG%3Enot%20be%20used%3C%2FSTRONG%3E%20to%20%3CSTRONG%3Eanalyze%20user%20performance%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20address%20these%20concerns%2C%20it%E2%80%99s%20critical%20for%20the%20Workers%20Council%20and%20Data%20Protection%20Officers%20to%20understand%20what%20user%20data%20is%20being%20collected%2C%20how%20the%20user%20data%20is%20being%20analyzed%2C%20and%20how%20its%20protected.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20blog%20post%2C%20we%E2%80%99ll%20guide%20you%20in%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EDirecting%20the%20conversation%20around%20the%20critical%20role%20that%20Microsoft%20Defender%20ATP%20plays%20in%20protecting%20organizations%20and%20why%20it%E2%80%99s%20important%20to%20deploy%2C%3C%2FLI%3E%0A%3CLI%3EProviding%20the%20Workers%20Council%20and%20Data%20Protection%20Officers%20with%20definitive%20information%20about%20the%20data%20that%20the%20service%20collects%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EUltimately%2C%20the%20goal%20is%20to%20equip%20you%20with%20a%20clear%20path%20to%20address%20regulation%20concerns%20and%20help%20organizations%20see%20the%20value%20of%20deploying%20Microsoft%20Defender%20ATP.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFirst%3A%20%3CU%3Ebe%20as%20honest%20and%20transparent%20as%20possible.%3C%2FU%3E%20While%20this%20should%20be%20a%20general%20rule%20for%20trusted%20collaboration%2C%20it%20is%20especially%20important%20in%20this%20situation.%20From%20the%20non-IT%20side%2C%20all%20these%20solutions%20appear%20to%20be%20black%20holes%20%E2%80%93%20completely%20unknown%20and%20very%20suspicious.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEnsure%20that%20the%20Workers%20Council%20understands%20that%20modern%20security%20platforms%2C%20such%20as%20Microsoft%20Defender%20ATP%2C%20do%20not%20report%20on%20a%20user%E2%80%99s%20productivity%2C%20working%20hours%2C%20or%20time%20spent%20doing%20actual%20work.%20Help%20them%20understand%20the%20fact%20that%20security%20%2F%20IT%20teams%20are%20not%20using%20the%20data%20to%20perform%20such%20analyses%2C%20so%20that%20you%20can%20gain%20their%20trust.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20lack%20of%20transparency%20and%20ambiguity%20can%20potentially%20make%20the%20black%20hole%20experience%20worse%20for%20them%2C%20so%20it%E2%80%99s%20important%20that%20you%E2%80%99re%20completely%20honest%20and%20clear.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERole%20of%20Microsoft%20Defender%20ATP%20in%20protecting%20organizations%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EExplain%20to%20them%20how%20Microsoft%20Defender%20ATP%20works%20in%20a%20non-IT%20way.%20You%20can%20use%20the%20following%20examples%20to%20convey%20the%20critical%20role%20that%20Microsoft%20Defender%20ATP%20plays%20in%20protecting%20organizations%20and%20why%20it%E2%80%99s%20important%20to%20deploy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHere%20are%20two%20examples%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20brings%20two%20main%20innovations%20to%20improve%20a%20company's%20security%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EIn%20the%20past%2C%20antimalware%20software%20mainly%20was%20able%20to%20detect%20things%20it%20knew.%20For%20example%2C%20if%20a%20piece%20of%20malware%20looked%20the%20same%20as%20something%20that%20was%20already%20identified%20as%20malicious%20and%20detected%20before%20-%20it%20was%20clear%3A%20it's%20malware.%20It%20was%20as%20easy%20as%20this.%20Attackers%20have%20evolved%20over%20time%20and%20new%20malware%20appears%20completely%20different%20from%20one%20computer%20to%20another.%20For%20companies%2C%20that%20means%20they%20need%20new%20solutions%20with%20new%20detection%20techniques%20-%20so%20called%20behavioral%20analysis.%20These%20techniques%20do%20not%20need%20to%20know%20how%20malware%20looks%20like%2C%20rather%2C%20it%20looks%20at%20how%20it%20behaves.%20That%E2%80%99s%20what%20Microsoft%20Defender%20ATP%20does%2C%20it%20looks%20at%20behaviors%20and%20raises%20alerts%20for%20suspicious%20activities.%20%3CBR%20%2F%3E%26nbsp%3B%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3COL%20start%3D%222%22%3E%0A%3CLI%3EOne%20of%20the%20biggest%20entryways%20into%20our%20computers%20for%20malware%20are%20still%20vulnerabilities%20on%20unpatched%20systems.%20Everyone%20continuously%20hears%3A%20patch%20your%20systems%20and%20you%20are%20good.%20The%20problem%20here%20is%20that%20most%20companies%20do%20not%20know%20what%20software%20is%20installed%20on%20their%20clients%20and%20the%20associated%20vulnerabilities%20that%20software%20has.%20Microsoft%20Defender%20ATP%20reports%20on%20that%20and%20tells%20you%20exactly%20how%20vulnerable%20the%20computers%20are%20in%20your%20organization%20and%20what%20you%20should%20patch%20where.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20reiterate%3A%20To%20be%20able%20to%20provide%20this%20analysis%20and%20reporting%2C%20Microsoft%20Defender%20ATP%20needs%20to%20collect%20the%20appropriate%20data.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPresenting%20this%20information%20helps%20the%20Workers%20Council%20and%20Data%20Protection%20Officers%20understand%20how%20Microsoft%20Defender%20ATP%20works%20and%20why%20it%20is%20necessary%20to%20collect%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDefinitive%20information%20about%20the%20data%20being%20collected%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20next%20thing%20you%20should%20explain%20is%20the%20exact%20data%20being%20collected%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ERegistry%20Events%3C%2FLI%3E%0A%3CLI%3EFile%20Creation%20Events%3C%2FLI%3E%0A%3CLI%3ENetwork%20Events%3C%2FLI%3E%0A%3CLI%3ELogon%20Events%3C%2FLI%3E%0A%3CLI%3EInstalled%20Application%20Information%3C%2FLI%3E%0A%3CLI%3EMachine%20Information%3C%2FLI%3E%0A%3CLI%3EKernel%20Events%3C%2FLI%3E%0A%3CLI%3EMemory%20Events%3C%2FLI%3E%0A%3CLI%3EHardware%20Changes%3C%2FLI%3E%0A%3CLI%3ESystem%20API%20Calls%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMore%20information%20about%20compliance%20can%20be%20found%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fdata-storage-privacy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fdata-storage-privacy%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EActions%20that%20can%20be%20taken%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20dig%20deeper%20into%20a%20security%20issue%20or%20to%20respond%20to%20it%2C%20designated%20security%20analysts%20%2F%20security%20operations%20members%20%2F%20administrators%20(depending%20on%20their%20permission)%20can%20take%20the%20following%20actions%20on%20computers%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EIsolate%20machine%20(User%20gets%20notified%20-%20no%20connection%20to%20the%20Internet%20and%20the%20local%20network%20possible)%3C%2FLI%3E%0A%3CLI%3ERestrict%20app%20execution%20(only%20certified%20apps%20can%20run%20afterwards)%3C%2FLI%3E%0A%3CLI%3ETrigger%20an%20antivirus%20scan%3C%2FLI%3E%0A%3CLI%3ECollect%20an%20investigation%20package%20(collect%20more%20data%20from%20the%20client%20such%20as%20a%20list%20of%20all%20running%20processes%2C%20security%20event%20log%2C%20etc)%3C%2FLI%3E%0A%3CLI%3EInitiate%20a%20live%20response%20session%20(remote%20command%20shell)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EImportant%3A%3C%2FSTRONG%3E%20Every%20response%20action%20is%20logged%20and%20will%20be%20audited%20in%20the%20Action%20center.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EData%20location%20and%20retention%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20data%20is%20stored%20for%20a%20maximum%20of%20180%20days%20and%20can%20be%20stored%20in%20the%20United%20States%2C%20United%20Kingdom%2C%20or%20Europe.%20The%20customer%20organization%20defines%20the%20data%20storage%20duration%20and%20the%20data%20location%20during%20the%20initial%20setup.%20Check%20with%20your%20CISO%20%E2%80%93%20they%20usually%20want%20to%20keep%20the%20data%20as%20long%20as%20possible.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EData%20access%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMake%20it%20clear%20that%20only%20a%20dedicated%20and%20educated%20group%20of%20security%20people%20has%20access%20to%20this%20data.%20This%20group%20can%20also%20be%20asked%20to%20sign%20a%20statement%20that%20explains%20that%20they%20can%20only%20use%20the%20data%20for%20threat%20hunting%20and%20not%20for%20%22employee%20performance%20monitoring%22%20or%20the%20like.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMaintaining%20transparency%20and%20collaboration%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAnother%20good%20way%20to%20maintain%20transparency%20is%20to%20continue%20the%20communication%20and%20collaboration%20with%20the%20Workers%20Council%20and%20Data%20Protection%20Officers%20as%20soon%20as%20Microsoft%20Defender%20ATP%20is%20deployed.%20Continuously%20report%20on%20security%20incidents%20and%20your%20response%20to%20those%20incidents.%20Don%E2%80%99t%20drop%20them%20back%20into%20the%20black%20hole%20they%20feared%20at%20the%20beginning.%20Keep%20being%20transparent%20and%20include%20them%20to%20maintain%20their%20trust.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlso%2C%20there%20might%20be%20other%20departments%20in%20your%20organization%20that%20have%20the%20same%20interests%20as%20you%20%E2%80%93%20depending%20on%20what%20your%20role%20is%20%E2%80%93%20team%20up%20with%20the%20others!%20Include%20IT%20Security%2C%20'Information%20Security'%20(or%20the%20CISO)%20and%20ask%20them%20to%20join%20meetings%20around%20these%20topics%2C%20to%20have%20a%20lively%20discussion%20in%20which%20all%20interests%20of%20the%20organization%20are%20covered.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20let%20us%20know%20how%20your%20experience%20with%20your%20Data%20Protection%20Officers%20or%20the%20Workers%20Council%20is%20or%20was%20and%20share%20your%20recommendation%20to%20help%20them%20overcome%20their%20regulatory%20concerns.%3C%2FP%3E%0A%3CP%3EThanks%20to%20%3CA%20href%3D%22https%3A%2F%2Femptydc.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EJan%20Geisbauer%3C%2FA%3E%20from%20%3CA%20href%3D%22https%3A%2F%2Fglueckkanja.com%2Fde%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGl%C3%BCck%20%26amp%3B%20Kanja%3C%2FA%3E%20and%20%E2%80%9C%3CA%20href%3D%22https%3A%2F%2Fanchor.fm%2Fhairlessinthecloud%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehairless%20in%20the%20cloud%3C%2FA%3E%E2%80%9D%20for%20putting%20together%20this%20great%20content!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EJan%20Geisbauer%20%26amp%3B%20Heike%20Ritter%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1170187%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22PreviewImage%20(1).png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F171027i776925FD677691B5%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22PreviewImage%20(1).png%22%20alt%3D%22PreviewImage%20(1).png%22%20%2F%3E%3C%2FSPAN%3EIn%20some%20countries%2C%20data%20collection%20can%20be%20a%20cause%20for%20concern%20for%20organizations%20and%20roles%20such%20as%20German%20Workers%20Council%20and%20Data%20Protection%20Officers.%20The%20goal%20of%20this%20blog%20is%26nbsp%3Bto%20equip%20you%20with%20a%20clear%20path%20to%20address%20regulation%20concerns%20and%20help%20organizations%20see%20the%20value%20of%20deploying%20Microsoft%20Defender%20ATP.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1262374%22%20slang%3D%22en-US%22%3ERe%3A%20Put%20regulation%20fears%20to%20rest%20when%20deploying%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1262374%22%20slang%3D%22en-US%22%3E%3CP%3EHeike%2C%20Jan%2C%3C%2FP%3E%3CP%3Ethanks%20for%20sharing%20this%20very%20useful%20article.%20I%20fully%20agree%20with%20your%20first%20%22advice%22%20%3CU%3Ebe%20as%20honest%20and%20transparent%20as%20possible%22.%3C%2FU%3E%20That%20is%20something%20that%20counts%20for%20both%20sites%20of%20the%20table.%20In%20this%20case%2C%20especially%20for%20the%20IT%20and%20Leadership%20site.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%3C%2FP%3E%3CP%3EMartin%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1442831%22%20slang%3D%22en-US%22%3ERe%3A%20Put%20regulation%20fears%20to%20rest%20when%20deploying%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1442831%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20post.%20As%20to%20suggestions%2C%20avoid%20the%20use%20of%20the%20words%20behavioral%20analysis.%20If%20you%20can't%20stress%20that%20it's%20about%20analysing%20the%20behavior%20of%20software%20not%20the%20behavior%20of%20the%20user%20using%20that%20software.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1583004%22%20slang%3D%22en-US%22%3ERe%3A%20Put%20regulation%20fears%20to%20rest%20when%20deploying%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1583004%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F63582%22%20target%3D%22_blank%22%3E%40Heike%20Ritter%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20are%20implementing%20an%20MDATP%20solution%20in%20one%20of%20our%20client%20environments.%20The%20client%20has%20the%20data%20residency%20constraint%20that%20all%20the%20data%20has%20to%20be%20stored%20and%20processed%20from%20within%20the%20Canada%20region.%20We%20just%20want%20to%20understand%20what%20exactly%20is%20the%20MDATP%20data%20that%20will%20be%20stored%20and%20if%20it%20will%20be%20subject%20to%20data%20residency%20constraints%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3ESmita%20Kulkarni%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1587874%22%20slang%3D%22en-US%22%3ERe%3A%20Put%20regulation%20fears%20to%20rest%20when%20deploying%20Microsoft%20Defender%20ATP%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1587874%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F756482%22%20target%3D%22_blank%22%3E%40smitak13%3C%2FA%3E%26nbsp%3B-%20please%20wait%20for%20Richard%20from%20the%20partner%20team%20to%20get%20back%20to%20you%20(you%20emailed%20him%20with%20the%20same%20request)%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

The power of Microsoft Defender Advanced Threat Protection (ATP) lies in the intelligent analysis of the data. Using sophisticated detection and protection technologies, Microsoft Defender ATP maps known and unknown behaviors (such as writing to a certain point in the registry or trying to access the LSASS process) to data found on the clients and raises alerts as it observes suspicious activity.

 

For data to be analyzed, Microsoft Defender ATP must collect this data in real-time. It acts like an airplane ‘flight recorder’, which keeps track of important flight data to facilitate the investigation of accidents and incidents.

 

In some countries, data collection can be a cause for concern. Organizations and roles such as German Workers Council and Data Protection Officers (DPO) want to know exactly what happens with the data found on an end-user’s computer. One of the main concerns of the Workers Council is that such technologies must not be used to analyze user performance.

 

To address these concerns, it’s critical for the Workers Council and Data Protection Officers to understand what user data is being collected, how the user data is being analyzed, and how its protected.

 

In this blog post, we’ll guide you in:

  • Directing the conversation around the critical role that Microsoft Defender ATP plays in protecting organizations and why it’s important to deploy,
  • Providing the Workers Council and Data Protection Officers with definitive information about the data that the service collects

Ultimately, the goal is to equip you with a clear path to address regulation concerns and help organizations see the value of deploying Microsoft Defender ATP.

 

First: be as honest and transparent as possible. While this should be a general rule for trusted collaboration, it is especially important in this situation. From the non-IT side, all these solutions appear to be black holes – completely unknown and very suspicious.

 

Ensure that the Workers Council understands that modern security platforms, such as Microsoft Defender ATP, do not report on a user’s productivity, working hours, or time spent doing actual work. Help them understand the fact that security / IT teams are not using the data to perform such analyses, so that you can gain their trust.

 

The lack of transparency and ambiguity can potentially make the black hole experience worse for them, so it’s important that you’re completely honest and clear.

 

Role of Microsoft Defender ATP in protecting organizations

Explain to them how Microsoft Defender ATP works in a non-IT way. You can use the following examples to convey the critical role that Microsoft Defender ATP plays in protecting organizations and why it’s important to deploy.

 

Here are two examples:

 

Microsoft Defender ATP brings two main innovations to improve a company's security posture.

 

  1. In the past, antimalware software mainly was able to detect things it knew. For example, if a piece of malware looked the same as something that was already identified as malicious and detected before - it was clear: it's malware. It was as easy as this. Attackers have evolved over time and new malware appears completely different from one computer to another. For companies, that means they need new solutions with new detection techniques - so called behavioral analysis. These techniques do not need to know how malware looks like, rather, it looks at how it behaves. That’s what Microsoft Defender ATP does, it looks at behaviors and raises alerts for suspicious activities.
     
  1. One of the biggest entryways into our computers for malware are still vulnerabilities on unpatched systems. Everyone continuously hears: patch your systems and you are good. The problem here is that most companies do not know what software is installed on their clients and the associated vulnerabilities that software has. Microsoft Defender ATP reports on that and tells you exactly how vulnerable the computers are in your organization and what you should patch where.

 

To reiterate: To be able to provide this analysis and reporting, Microsoft Defender ATP needs to collect the appropriate data.  

 

Presenting this information helps the Workers Council and Data Protection Officers understand how Microsoft Defender ATP works and why it is necessary to collect data.

 

Definitive information about the data being collected

The next thing you should explain is the exact data being collected:

 

  • Registry Events
  • File Creation Events
  • Network Events
  • Logon Events
  • Installed Application Information
  • Machine Information
  • Kernel Events
  • Memory Events
  • Hardware Changes
  • System API Calls

 

More information about compliance can be found here: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/data-stor...

 

Actions that can be taken

 

To dig deeper into a security issue or to respond to it, designated security analysts / security operations members / administrators (depending on their permission) can take the following actions on computers:

 

  • Isolate machine (User gets notified - no connection to the Internet and the local network possible)
  • Restrict app execution (only certified apps can run afterwards)
  • Trigger an antivirus scan
  • Collect an investigation package (collect more data from the client such as a list of all running processes, security event log, etc)
  • Initiate a live response session (remote command shell)

 

 

Important: Every response action is logged and will be audited in the Action center.

 

Data location and retention

Microsoft Defender ATP data is stored for a maximum of 180 days and can be stored in the United States, United Kingdom, or Europe. The customer organization defines the data storage duration and the data location during the initial setup. Check with your CISO – they usually want to keep the data as long as possible.  

 

Data access

Make it clear that only a dedicated and educated group of security people has access to this data. This group can also be asked to sign a statement that explains that they can only use the data for threat hunting and not for "employee performance monitoring" or the like.

 

Maintaining transparency and collaboration 

Another good way to maintain transparency is to continue the communication and collaboration with the Workers Council and Data Protection Officers as soon as Microsoft Defender ATP is deployed. Continuously report on security incidents and your response to those incidents. Don’t drop them back into the black hole they feared at the beginning. Keep being transparent and include them to maintain their trust.

 

Also, there might be other departments in your organization that have the same interests as you – depending on what your role is – team up with the others! Include IT Security, 'Information Security' (or the CISO) and ask them to join meetings around these topics, to have a lively discussion in which all interests of the organization are covered.  

 

Please let us know how your experience with your Data Protection Officers or the Workers Council is or was and share your recommendation to help them overcome their regulatory concerns.

Thanks to Jan Geisbauer from Glück & Kanja and “hairless in the cloud” for putting together this great content!

 

Jan Geisbauer & Heike Ritter

4 Comments
Senior Member

Heike, Jan,

thanks for sharing this very useful article. I fully agree with your first "advice" be as honest and transparent as possible". That is something that counts for both sites of the table. In this case, especially for the IT and Leadership site.

 

Regards

Martin

Great post. As to suggestions, avoid the use of the words behavioral analysis. If you can't stress that it's about analysing the behavior of software not the behavior of the user using that software. 

New Contributor

Hi @Heike Ritter 

 

We are implementing an MDATP solution in one of our client environments. The client has the data residency constraint that all the data has to be stored and processed from within the Canada region. We just want to understand what exactly is the MDATP data that will be stored and if it will be subject to data residency constraints?

 

Regards,

Smita Kulkarni

Microsoft

Hi @smitak13 - please wait for Richard from the partner team to get back to you (you emailed him with the same request)