%3CLINGO-SUB%20id%3D%22lingo-sub-1528055%22%20slang%3D%22en-US%22%3EProtecting%20against%20insider%20risks%20in%20an%20uncertain%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1528055%22%20slang%3D%22en-US%22%3E%3CP%3ECountless%20security%20and%20compliance%20officers%20around%20the%20world%20are%20now%20asking%20themselves%2C%20%E2%80%9CIs%20my%20organization%20effectively%20prepared%20to%20identify%20and%20take%20action%20on%20ever%20increasing%20insider%20risks%3F%E2%80%9D%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20primary%20reason%20for%20this%20question%20is%20COVID-19%2C%20and%20the%20rapid%20digital%20transformation%20it%20has%20forced%20organizations%20to%20undertake.%20According%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.bcg.com%2Fpublications%2F2020%2Fcovid-remote-work-cyber-security.aspx%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ea%20recent%20survey%3C%2FA%3E%2C%20the%20lives%20of%20up%20to%20300%20million%20information%20workers%20worldwide%20have%20been%20upended%2C%20and%20many%20are%20now%20working%20remotely%20with%20limited%20resources%2C%20insecure%20wi-fi%20networks%20and%20increased%20stress.%20In%20addition%2C%20due%20to%20the%20rapid%20progression%20of%20the%20pandemic%2C%20many%20information%20workers%20are%20expected%20to%20use%20their%20home%20PCs%20or%20other%20shared%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERemote%20work%2C%20while%20protecting%20employees%20from%20exposure%20to%20the%20virus%2C%20increases%20the%20distractions%20they%20likely%20to%20face%2C%20such%20as%20shared%20home%20workspaces%20and%20remote%20learning%20for%20children.%20According%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.sei.cmu.edu%2Fnews-events%2Fnews%2Farticle.cfm%3FassetId%3D638958%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethe%20SEI%20CERT%20institute%3C%2FA%3E%2C%20user%20distractions%20are%20the%20cause%20for%20many%20accidental%20and%20non-malicious%20insider%20risks.%20Stressors%20such%20as%20potential%20job%20loss%20or%20safety%20concerns%20are%20also%20now%20heightened%2C%20which%20may%20lead%20some%20employees%20to%20participate%20in%20malicious%20activities%2C%20such%20as%20stealing%20intellectual%20property.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20February%20this%20year%2C%20we%20introduced%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FInsiderRIskManagementGA%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EInsider%20Risk%20Management%3C%2FA%3E%20from%20Microsoft%20365%2C%20helping%20organizations%20worldwide%20leverage%20the%20power%20of%20cloud%20scale%20combined%20with%20machine%20learning%20to%20identify%20insider%20risks%20and%20quickly%20take%20action%20with%20integrated%20collaboration%20workflows.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%20we%20are%20pleased%20to%20announce%20the%20public%20preview%20of%20several%20new%20features%20that%20further%20enhance%20the%20rich%20set%20of%20detection%20and%20remediation%20capabilities%20already%20offered%20in%20the%20solution.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIncreased%20visibility%20with%20a%20focus%20on%20signal%20quality%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20having%20broad%20visibility%20into%20end%20user%20activities%2C%20actions%2C%20or%20communications%20are%20important%2C%20when%20it%20comes%20to%20effectively%20identifying%20risks%2C%20the%20quality%20insights%20matters%20most.%20In%20this%20release%2C%20we%20are%20significantly%20expanding%20the%20quality%20of%20insights%20that%20Insider%20Risk%20Management%20delivers%20to%20intelligently%20flag%20potentially%20risky%20behavior.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20further%20enhancing%20our%20already%20rich%20native%20integration%20with%20Microsoft%20365%20to%20surface%20additional%20insights%20across%20Microsoft%20Teams%2C%20SharePoint%2C%20and%20Exchange%2C%20including%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ESharing%20files%2Ffolders%2Fsites%20from%20SharePoint%20Online%20to%20domains%20marked%20%E2%80%9Cunallowed%E2%80%9D%3C%2FLI%3E%0A%3CLI%3EDownloading%20content%20from%20Teams%3C%2FLI%3E%0A%3CLI%3EEmailing%20outside%20the%20organization%20to%20domains%20marked%20%E2%80%9Cunallowed%E2%80%9D%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%221-insider-risk-policy-indicators.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206149i5890BDC10D55237B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%221-insider-risk-policy-indicators.png%22%20alt%3D%22Insider%20Risk%20Management%20indicators%20selection%20page%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EInsider%20Risk%20Management%20indicators%20selection%20page%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOn%20devices%2C%20we%20continue%20to%20leverage%20the%20agentless%20capture%20of%20signals%20from%20Windows%2010%20endpoints%20to%20deliver%20new%20insights%20related%20to%20the%20obfuscation%2C%20exfiltration%2C%20or%20infiltration%20of%20sensitive%20information%2C%20including%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EUsing%20Edge%20to%20copy%20files%20to%20personal%20cloud%20storage%3C%2FLI%3E%0A%3CLI%3ECopying%20files%20to%20USB%3C%2FLI%3E%0A%3CLI%3EPrinting%20documents%3C%2FLI%3E%0A%3CLI%3ETransferring%20files%20to%20a%20network%20share%3C%2FLI%3E%0A%3CLI%3EUsing%20Edge%20to%20download%20content%20from%20an%20unallowed%20domain%3C%2FLI%3E%0A%3CLI%3EUsing%20Edge%20to%20download%20content%20from%20a%20third-party%20site%3C%2FLI%3E%0A%3CLI%3ERenaming%20files%20on%20device%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20those%20using%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(MDATP)%2C%20we%20can%20now%20provide%20insights%20into%20whether%20someone%20is%20trying%20to%20evade%20security%20controls%20by%20disabling%20multi-factor%20authentication%20or%20installing%20unwanted%20software%2C%20which%20may%20indicate%20potentially%20malicious%20behavior.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFinally%2C%20one%20of%20the%20key%20early%20indicators%20as%20to%20whether%20someone%20may%20choose%20to%20participate%20in%20malicious%20activities%20is%20disgruntlement.%20In%20this%20release%2C%20we%20are%20further%20enhancing%20our%20native%20HR%20connector%20to%20allow%20organizations%20to%20choose%20whether%20they%20want%20to%20use%20additional%20HR%20insights%20that%20might%20indicate%20disgruntlement%20to%20initiate%20a%20policy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMore%20detail%20on%20the%20breadth%20of%20new%20signals%20being%20captured%20can%20be%20found%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fcompliance%2Finsider-risk-management-settings%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Eour%20documentation%20site%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EQuickly%20getting%20started%20without%20complex%20configurations%20or%20agent%20deployments%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECustomers%20have%20told%20us%20one%20of%20the%20features%20they%20really%20appreciate%20in%20Insider%20Risk%20Management%20is%20the%20ability%20to%20leverage%20the%20built-in%20policy%20templates%20to%20quickly%20get%20started%20on%20identifying%20risks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBefore%20switching%20to%20Insider%20Risk%20Management%2C%20many%20Microsoft%20365%20customers%20we%20spoke%20to%20were%20using%20a%20fractured%20and%20expensive%20approach%20to%20identify%20insider%20risks.%20They%20captured%20signals%20using%20a%20User%20Activity%20Monitoring%20(UAM)%20solution%20and%20fed%20these%20signals%20into%20a%20separate%20User%20Entity%20Behavior%20Analytics%20(UEBA)%20solution%2C%20with%20the%20hopes%20of%20finding%20the%20insider%20risk%20needle%20in%20the%20haystack.%20We%20know%20from%20our%20own%20experience%20in%20attempting%20to%20deploy%20these%20complex%20types%20of%20solutions%20at%20Microsoft%2C%20that%20not%20only%20is%20this%20approach%20not%20scalable%2C%20but%20it%20often%20results%20in%20a%20lot%20of%20%E2%80%98noise%E2%80%99%20as%20it%20lacks%20enrichment%2C%20such%20as%20visibility%20into%20the%20sensitivity%20of%20the%20data%20and%20lack%20of%20broader%20context.%20In%20addition%2C%20deploying%20UAM%20and%20UEBA%20solutions%20takes%20considerable%20engineering%20resources%20to%20configure%20and%20maintain%20signal%20ingestion%20scripts%2C%20identify%20rules%2C%20and%20manage%20endpoint%20agents.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EInsider%20Risk%20Management%20from%20Microsoft%20365%20was%20developed%20%3CA%20href%3D%22https%3A%2F%2Fblogs.microsoft.com%2Fai%2Finsider-risk-management-microsoft-365%2F%3Futm_source%3Dpre-amp%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ein%20close%20collaboration%20with%20our%20internal%20digital%20security%20and%20risk%20engineering%20organization%3C%2FA%3E.%20We%20leveraged%20our%20deep%20learning%20and%20research%20in%20this%20space%20to%20design%20a%20solution%20that%20was%20easy%20to%20get%20started%20with.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20Insider%20Risk%20Management%2C%20there%20is%20no%20requirement%20to%20deploy%20and%20manage%20endpoint%20agents%20on%20Windows%2010%20devices%20or%20configure%20and%20maintain%20complex%20scripting%20to%20ingest%20signals.%20You%20just%20simply%20choose%20the%20policy%20template%20most%20appropriate%20for%20the%20risk%20you%20are%20concerned%20about%20and%20add%20the%20users%20you%20want%20to%20look%20at.%20In%20the%20backend%2C%20our%20cloud-based%20machine%20learning%20and%20AI%20engine%20reasons%20over%20billions%20of%20signals%20to%20identify%20the%20risks%20most%20relevant%20for%20you%20to%20act%20on.%3CBR%20%2F%3EIn%20this%20release%2C%20to%20help%20organizations%20identify%20an%20even%20broader%20variety%20of%20risks%2C%20we%20are%20introducing%20new%20policy%20templates%2C%20including%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EData%20leaks%20by%20priority%20users%3C%2FLI%3E%0A%3CLI%3EData%20leaks%20by%20disgruntled%20users%3C%2FLI%3E%0A%3CLI%3EGeneral%20security%20policy%20violations%3C%2FLI%3E%0A%3CLI%3ESecurity%20policy%20violations%20by%20departing%20users%3C%2FLI%3E%0A%3CLI%3ESecurity%20policy%20violations%20by%20priority%20users%3C%2FLI%3E%0A%3CLI%3ESecurity%20policy%20violations%20by%20disgruntled%20users%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222-insider-risk-policy-templates.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206150i97EC1CDFF254DCC3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222-insider-risk-policy-templates.png%22%20alt%3D%22Insider%20Risk%20Management%20policy%20templates%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EInsider%20Risk%20Management%20policy%20templates%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20also%20now%20introducing%20the%20powerful%20ability%20to%20customize%20policy%20templates.%20With%20policy%20customization%2C%20you%20can%20change%20the%20thresholds%20of%20the%20various%20indictors%20each%20policy%20reasons%20over%20to%20meet%20the%20unique%20needs%20of%20your%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%223-insider-risk-customize-indicators.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F206151i7A2C6E5047837898%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%223-insider-risk-customize-indicators.png%22%20alt%3D%22Policy%20indicators%20thresholds%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EPolicy%20indicators%20thresholds%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMore%20detail%20on%20these%20new%20templates%20and%20policy%20customization%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fcompliance%2Finsider-risk-management-policies%23policy-settings%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Eon%20our%20documentation%20page%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EExpanding%20extensibility%20into%20existing%20organizational%20systems%20and%20processes%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMany%20organizations%20are%20already%20leveraging%20existing%20Security%20Orchestration%2C%20Automation%20and%20Response%20(SOAR)%20systems%20to%20log%20and%20classify%20incidents%20by%20impact%20and%20urgency%20to%20prioritize%20actions%20for%20those%20assigned%20to%20them.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20this%20release%2C%20we%20are%20integrating%20with%20ServiceNow%20APIs%2C%20which%20will%20provide%20the%20ability%20for%20Insider%20Risk%20Management%20case%20managers%20to%20directly%20create%20ServiceNow%20tickets%20for%20incident%20managers.%20These%20tickets%20can%20be%20customized%20to%20add%20information%20about%20the%20description%20of%20the%20incident%20and%20will%20also%20contain%20a%20link%20back%20to%20the%20case%20in%20Insider%20Risk%20Management%20for%20more%20detailed%20insights.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20we%20are%20also%20pushing%20Insider%20Risk%20Management%20alerts%20to%20the%20Office%20365%20Management%20Activity%20API.%20These%20alerts%20will%20contain%20information%20such%20as%20alert%20severity%20and%20status%20(active%2C%20investigating%2C%20resolved%2C%20dismissed).%20These%20alerts%20can%20then%20be%20consumed%20by%20Security%20Incident%20Event%20Management%20(SIEM)%20systems%20like%20Azure%20Sentinel%20to%20take%20further%20actions%20such%20as%20disabling%20user%20access%20or%20linking%20back%20to%20Insider%20Risk%20Management%20for%20further%20investigation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGet%20started%20today%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20new%20features%20in%20Insider%20Risk%20Management%20will%20start%20rolling%20out%20to%20customer%E2%80%99s%20tenants%20in%20the%20coming%20days%20and%20weeks.%20Insider%20Risk%20Management%20is%20one%20of%20several%20products%20from%20Microsoft%20365%20E5%2C%20including%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Ffoster-a-culture-of-inclusion-and-safety-with-microsoft-teams%2Fba-p%2F1530254%22%20target%3D%22_self%22%3ECommunication%20Compliance%3C%2FA%3E%2C%20Information%20Barriers%20and%20Privileged%20Access%20Management%2C%20that%20help%20organizations%20mitigate%20insider%20risks%20and%20policy%20violations.%20You%20can%20sign%20up%20for%20a%20%5B%23%24dp158%5Dtrial%20of%20Microsoft%20365%20E5%20or%20navigate%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FM365E5ComplianceTrial%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3C%2FA%3E%3CA%20href%3D%22https%3A%2F%2Fcompliance.microsoft.com%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20365%20compliance%20center%3C%2FA%3E%20to%20get%20started.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELearn%20more%20about%20what%E2%80%99s%20new%20with%20Insider%20Risk%20Management%20and%20how%20to%20get%20started%20and%20configure%20policies%20in%20your%20tenant%20in%20this%20%5B%23%24dp39%5D%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fcompliance%2Finsider-risk-management-plan%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Esupporting%20documentation%3C%2FA%3E.%20We%20look%20forward%20to%20hearing%20your%20feedback.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThank%20you%2C%3CBR%20%2F%3ETalhah%20Mir%2C%20Principal%20Program%20Manager%2C%20Microsoft%20365%20Security%20and%20Compliance%20Engineering%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1528055%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInsider%20Risk%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Countless security and compliance officers around the world are now asking themselves, “Is my organization effectively prepared to identify and take action on ever increasing insider risks?”

 

The primary reason for this question is COVID-19, and the rapid digital transformation it has forced organizations to undertake. According to a recent survey, the lives of up to 300 million information workers worldwide have been upended, and many are now working remotely with limited resources, insecure wi-fi networks and increased stress. In addition, due to the rapid progression of the pandemic, many information workers are expected to use their home PCs or other shared devices.

 

Remote work, while protecting employees from exposure to the virus, increases the distractions they likely to face, such as shared home workspaces and remote learning for children. According to the SEI CERT institute, user distractions are the cause for many accidental and non-malicious insider risks. Stressors such as potential job loss or safety concerns are also now heightened, which may lead some employees to participate in malicious activities, such as stealing intellectual property.

 

In February this year, we introduced Insider Risk Management from Microsoft 365, helping organizations worldwide leverage the power of cloud scale combined with machine learning to identify insider risks and quickly take action with integrated collaboration workflows.

 

Today we are pleased to announce the public preview of several new features that further enhance the rich set of detection and remediation capabilities already offered in the solution.

 

Increased visibility with a focus on signal quality

 

While having broad visibility into end user activities, actions, or communications are important, when it comes to effectively identifying risks, the quality insights matters most. In this release, we are significantly expanding the quality of insights that Insider Risk Management delivers to intelligently flag potentially risky behavior.

 

We are further enhancing our already rich native integration with Microsoft 365 to surface additional insights across Microsoft Teams, SharePoint, and Exchange, including:

 

  • Sharing files/folders/sites from SharePoint Online to domains marked “unallowed”
  • Downloading content from Teams
  • Emailing outside the organization to domains marked “unallowed”

 

Insider Risk Management indicators selection pageInsider Risk Management indicators selection page

 

On devices, we continue to leverage the agentless capture of signals from Windows 10 endpoints to deliver new insights related to the obfuscation, exfiltration, or infiltration of sensitive information, including:

 

  • Using Edge to copy files to personal cloud storage
  • Copying files to USB
  • Printing documents
  • Transferring files to a network share
  • Using Edge to download content from an unallowed domain
  • Using Edge to download content from a third-party site
  • Renaming files on device

 

For those using Microsoft Defender Advanced Threat Protection (MDATP), we can now provide insights into whether someone is trying to evade security controls by disabling multi-factor authentication or installing unwanted software, which may indicate potentially malicious behavior.

 

Finally, one of the key early indicators as to whether someone may choose to participate in malicious activities is disgruntlement. In this release, we are further enhancing our native HR connector to allow organizations to choose whether they want to use additional HR insights that might indicate disgruntlement to initiate a policy.

 

More detail on the breadth of new signals being captured can be found on our documentation site.

 

Quickly getting started without complex configurations or agent deployments

 

Customers have told us one of the features they really appreciate in Insider Risk Management is the ability to leverage the built-in policy templates to quickly get started on identifying risks.

 

Before switching to Insider Risk Management, many Microsoft 365 customers we spoke to were using a fractured and expensive approach to identify insider risks. They captured signals using a User Activity Monitoring (UAM) solution and fed these signals into a separate User Entity Behavior Analytics (UEBA) solution, with the hopes of finding the insider risk needle in the haystack. We know from our own experience in attempting to deploy these complex types of solutions at Microsoft, that not only is this approach not scalable, but it often results in a lot of ‘noise’ as it lacks enrichment, such as visibility into the sensitivity of the data and lack of broader context. In addition, deploying UAM and UEBA solutions takes considerable engineering resources to configure and maintain signal ingestion scripts, identify rules, and manage endpoint agents.

 

Insider Risk Management from Microsoft 365 was developed in close collaboration with our internal digital security and risk engineering organization. We leveraged our deep learning and research in this space to design a solution that was easy to get started with.

 

With Insider Risk Management, there is no requirement to deploy and manage endpoint agents on Windows 10 devices or configure and maintain complex scripting to ingest signals. You just simply choose the policy template most appropriate for the risk you are concerned about and add the users you want to look at. In the backend, our cloud-based machine learning and AI engine reasons over billions of signals to identify the risks most relevant for you to act on.
In this release, to help organizations identify an even broader variety of risks, we are introducing new policy templates, including:

 

  • Data leaks by priority users
  • Data leaks by disgruntled users
  • General security policy violations
  • Security policy violations by departing users
  • Security policy violations by priority users
  • Security policy violations by disgruntled users

 

Insider Risk Management policy templatesInsider Risk Management policy templates

 

We are also now introducing the powerful ability to customize policy templates. With policy customization, you can change the thresholds of the various indictors each policy reasons over to meet the unique needs of your organization.

 

Policy indicators thresholdsPolicy indicators thresholds

 

More detail on these new templates and policy customization can be found on our documentation page.

 

Expanding extensibility into existing organizational systems and processes

 

Many organizations are already leveraging existing Security Orchestration, Automation and Response (SOAR) systems to log and classify incidents by impact and urgency to prioritize actions for those assigned to them.

 

With this release, we are integrating with ServiceNow APIs, which will provide the ability for Insider Risk Management case managers to directly create ServiceNow tickets for incident managers. These tickets can be customized to add information about the description of the incident and will also contain a link back to the case in Insider Risk Management for more detailed insights.

 

In addition, we are also pushing Insider Risk Management alerts to the Office 365 Management Activity API. These alerts will contain information such as alert severity and status (active, investigating, resolved, dismissed). These alerts can then be consumed by Security Incident Event Management (SIEM) systems like Azure Sentinel to take further actions such as disabling user access or linking back to Insider Risk Management for further investigation.

 

Get started today

 

The new features in Insider Risk Management will start rolling out to customer’s tenants in the coming days and weeks. Insider Risk Management is one of several products from Microsoft 365 E5, including Communication Compliance, Information Barriers and Privileged Access Management, that help organizations mitigate insider risks and policy violations. You can sign up for a trial of Microsoft 365 E5 or navigate to the Microsoft 365 compliance center to get started.

 

Learn more about what’s new with Insider Risk Management and how to get started and configure policies in your tenant in this supporting documentation. We look forward to hearing your feedback.

 

Thank you,
Talhah Mir, Principal Program Manager, Microsoft 365 Security and Compliance Engineering