Introducing the integrated Microsoft Threat Protection solution (public preview)
Published Dec 10 2019 04:18 PM 34.5K Views
Microsoft

 

Every day, attackers compromise endpoints, identities, and email to infiltrate and quickly expand their foothold in an organization. Customers need protection across these attack vectors to defend against evolving threats. Microsoft Threat Protection is an integrated solution that’s built on our best-in-class Microsoft 365 security suite: Microsoft Defender Advanced Threat Protection (ATP) for endpoints, Office 365 ATP for email and collaboration tools, Azure ATP for identity-based threats, and Microsoft Cloud App Security (MCAS) for SaaS applications.  

 

Within the suite we’ve been expanding our threat detection and automated investigation and response capabilities, as well as adding cross-product visibility, with additions such as automated incident response in Office 365 ATP, integration of MCAS and Microsoft Defender ATP for deep insight into cloud app usage, integration of Azure ATP with Microsoft Defender ATP, and more.  

 

Starting today, across the threat landscape security teams can correlate alerts to focus on what matters most, automate investigation and response and self-heal affected assets, and simplify hunting for indicators of attack unique to an organization. They can also use Microsoft Threat Protection to centrally view all detections, impacted assets, automated actions taken, and related evidence. 

 

Move from alerts to incidents

We are introducing the concept of “incidents, previously available only for endpoints. These incidents correlate alerts across threat vectors to determine the full scope of the threat across Microsoft 365 products.

 

For example, we can correlate the following attack sequence: Office 365 ATP observes a malicious email attachment. That attachment contains a weaponized Word document that is opened on the endpoint and observed by Microsoft Defender ATP. The attack then launches queries to the domain controller in search of user accounts to abuse, which is observed by Azure ATP. And, finally, corporate data is exfiltrated to a personal OneDrive account, which is observed by Microsoft Cloud App Security.   

 

MTP1.png

All related alerts across the suite products presented as a single incident (alerts view) 

 MTP2.png

Cross-product incident (Incident overview) 

 

Automate threat response

Critical threat information is shared in real time between Microsoft Threat Protection products to help stop the progression of an attack. The central Microsoft Threat Protection logic orchestrates and triggers actions on the individual products. This includes blocking malicious entities and initiating automatic investigation and remediation. 

 

For example, if a malicious file is detected on an endpoint protected by Microsoft Defender ATP, it will instruct Office 365 ATP to scan and remove the file from all e-mail messages. The file will be blocked on sight by the entire Microsoft 365 security suite. 

 

Self-heal compromised devices, user identities, and mailboxes

Leveraging the capabilities of the suite products, the integrated solution uses AI-powered automatic actions and playbooks to return all impacted assets to a secure state. Within the portal security teams can use the Action Center to centrally view results of all automated investigations and self-healing actions and approve or undo specific actions.

 

MTP3.pngAction Center – see pending and historical actions taken by analysts 

 

Cross-product threat hunting

Security teams can leverage their unique organizational knowledge like proprietary indicators of compromise, org-specific behavioral patterns, or free-form research to hunt for signs of compromise by creating custom queries over raw data. Microsoft Threat Protection provides query-based access to 30 days of historic raw signals and alert data across endpoint and Office 365 data.  

 

MTP4.pngQuery-based hunting on top of email and endpoint raw data 

 

Security professionals and customers with Microsoft 365 Security E5 and all M365 E5 licenses are invited to explore the integrated Microsoft Threat Protection solution public preview. (Eligibility Requirements).  

 

Visit http://aka.ms/EnableMTP today to learn more. 

11 Comments
Silver Contributor

Looking forward to working with this and see how the integration works for us.

Just testing it and looks really promising and easy to use and react to all kind of security issues. Great work to everyone!

 

Only one feedback for now. You should use clear color labeling for some issues. For example Intune compliance seems now:

 

  • Compliant - Orange
  • Non Compliant - Yellow
  • In Grace Period - Green
  • Not Evaluated - Grey

More better will be:

 

  • Compliant - Green
  • Non Compliant - Red
  • In Grace Period - Orange
  • Not Evaluated - Grey

Thanks for consider.

Brass Contributor

This is an interesting approach, as we've constantly provided feedback in regards to the msft fragmentation of security products.

I was hoping we'll have a single product, but a single view across the landscape will do. Good work! :upside_down_face::thumbs_up:

Custom investigations and automated responses / actions are definitely highlights!

Steel Contributor

Awesome! I hope we see more functionality moving into the security.microsoft.com portal and in the end see deprecation of other miscellaneous portals.

Bronze Contributor

Can we get these alerts through the Graph?

Iron Contributor

Why is MTP only available to M365 E5 customer?

Brass Contributor

@Jean-Philippe Breton 

I hear you. I think it will change... we've been advocating with #msft to shift premium security features within base subscriptions for a while.

I guess one of the reasons atm would be the fact that m365 covers os/endpoint, while o365 does not.

To get coordinated signal intelligence working, one needs to receive them from all layers ...

Copper Contributor

@Jean-Philippe Breton and @SpartanWaycomau 

The new integrated Microsoft Threat Protection (MTP) solution is available for any customer with at least one E5 product.

It can be Office 365 E5, Enterprise Mobility + Security E5, Windows E5, but you will benefit the most from MTP if you have M365 E5 (all up) because of the integration that it provides between security solutions. 

Brass Contributor

@Douglas Santos 

Thank you. Yes, we know. However, keeping the ecosystem secured should see #msft embedding such security even in the free tiers.

It's in everyone's interest: Microsoft's, end users, and professionals like us.

Microsoft

What about EDU customers with M365 A5 or EMS A5 licensing?  Are they eligible for the public preview?

Copper Contributor

Should MTP be available for the following licenses? The settings gear is missing and going directly to settings page via security.microsoft.com/settings is blank.

 

clipboard_image_0.png

Version history
Last update:
‎May 11 2021 03:14 PM
Updated by: