Today I am excited to tell you that Microsoft Advanced Threat Analytics (ATA) is generally available.
In our last
, Idan shared his thoughts about why we need a new approach for identifying cyber-security incidents, and how Microsoft ATA is designed to help you detect suspicious user and entity activities, known malicious attacks and security issues. He also provided information about the network topology and listed all the new capabilities we added for general availability.
Idan's team has spent a ton of design and development time to make sure ATA has a simple, straightforward and fast deployment process. This video shows you just how easy it's to deploy ATA in your environment and provides you step-by-step guidance:
You can download the
GA evaluation bits
and implement ATA in your organization. We have a
where you can post your questions and feedback. We will respond to you as quickly as possible.
If you are interested in the latest updates or improvements, you should make sure to follow Idan on Twitter:
. You can also email him questions or feedback
, or send your feedback directly to the
. Going forward, we will post updates and releases about Advanced Threat Analytics at the
dedicated ATA blog
We know how much pain cyber-security attacks are causing you. As a team, our goal is to innovate and help you protect your organization from these advanced attacks.
And as always, we're looking forward to receiving any feedback or suggestions you have.