<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/ct-p/microsoft-security-product</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Sun, 03 May 2026 01:13:46 GMT</pubDate>
    <dc:creator>microsoft-security-product</dc:creator>
    <dc:date>2026-05-03T01:13:46Z</dc:date>
    <item>
      <title>EDR coexistence by design: A practical starting point to Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/edr-coexistence-by-design-a-practical-starting-point-to-defender/ba-p/4515265</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;Co-authors: Kayla Rohde &amp;amp; &lt;SPAN data-teams="true"&gt;Kenneth Johnson&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Having multiple cybersecurity technologies, controls, systems, and stakeholders operating together without conflict is not a temporary inconvenience. It is how real environments operate and a practical way to make progress without disruption.&lt;/P&gt;
&lt;P&gt;Complexity exists because businesses are complex. Endpoint platforms already deployed, are relied upon 24/7. Moreover, contracts and operational dependencies make them challenging to change. On the other hand, many organizations already own Microsoft licensing that entitles them to Defender endpoint capabilities, including the ability to run Microsoft Defender for Endpoint in passive mode with EDR capabilities enabled.&lt;/P&gt;
&lt;P&gt;Increasingly, organizations are finding that coexistence can deliver meaningful security outcomes. In addition, when designed with purpose, coexistence allows teams to being realizing the value of their existing Microsoft licensing, strengthen detection and response, and build confidence in Defender under real-world operating conditions.&lt;/P&gt;
&lt;P&gt;In practice, once teams see the depth of signal, investigation quality, and platform integration that Defender provides, most will migrate over and use it as their primary endpoint security platform once the technical, operational, and economic timing makes sense.&lt;/P&gt;
&lt;H1&gt;Side-by-side is not standing still&lt;/H1&gt;
&lt;P&gt;A common assumption is that side by side deployment exists only as a short bridge to replacement. That assumption does not hold up in real environments.&lt;/P&gt;
&lt;P&gt;Experienced teams use coexistence as a controlled transition model that produces immediate security outcomes while preserving operational stability.&lt;/P&gt;
&lt;P&gt;Running Defender alongside an existing prevention platform allows organizations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Activate endpoint telemetry and behavioral detections already included in licensing&lt;/LI&gt;
&lt;LI&gt;Expand investigative depth without disrupting the current prevention layer&lt;/LI&gt;
&lt;LI&gt;Validate detection coverage before making enforcement changes&lt;/LI&gt;
&lt;LI&gt;Build operational familiarity with Defender workflows under real conditions&lt;/LI&gt;
&lt;LI&gt;Maintain visibility during periods of architectural change&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Coexistence is not about running two tools. It is about sequencing risk reduction with intent.&lt;/P&gt;
&lt;H1&gt;What Passive Mode actually means for your SOC&lt;/H1&gt;
&lt;P&gt;One of the most persistent points of confusion is what “passive mode” actually entails.&lt;/P&gt;
&lt;P&gt;When Defender operates in passive mode:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;It is not the real‑time blocking engine&lt;/LI&gt;
&lt;LI&gt;Another platform remains the primary prevention control&lt;/LI&gt;
&lt;LI&gt;EDR capabilities continue to collect telemetry, generate detections, and support investigation&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For seasoned practitioners, this distinction matters. Many of the most consequential security decisions happen after execution, when responders need clarity, context, and speed. Defender endpoint capabilities contribute directly in that phase, regardless of which tool owns real‑time blocking. This is why coexistence works. It preserves prevention continuity while materially improving detection and response.&lt;/P&gt;
&lt;H1&gt;Turning licensed capability into operational advantage&lt;/H1&gt;
&lt;P&gt;The real value of Defender for Endpoint in a coexistence model is not just what it observes on the endpoint. It is how that signal connects across the Microsoft security platform to produce a more complete picture of attacker behavior.&lt;/P&gt;
&lt;P&gt;Even in passive mode, MDE is not a standalone sensor. Endpoint telemetry feeds into a system that correlates identity, email, cloud, and data signals into a unified investigation experience. That is where the advantage compounds.&lt;/P&gt;
&lt;P&gt;As organizations begin to operationalize MDE in coexistence scenarios, endpoint telemetry does more than generate alerts. It enriches incidents with process level and device context, then ties that activity to identity signals such as risky sign ins, anomalous sessions, and lateral movement patterns. Email events and user interaction history align with execution timelines. Data access and sensitivity context introduce impact.&lt;/P&gt;
&lt;P&gt;The result is not more “noise”. It is better context. What changes is not just visibility. It is decision quality. Process execution is no longer evaluated in isolation. It is tied to a user, a session, an originating communication, and the data that may have been accessed or exposed. Investigations become faster, more confident, and more defensible.&lt;/P&gt;
&lt;P&gt;This is especially relevant for organizations already licensed for Microsoft 365 E5 or equivalent that have not enabled Defender for Endpoint. In those environments, coexistence is not introducing another tool. It is activating an intelligence layer that already exists and is not yet contributing signal.&lt;/P&gt;
&lt;P&gt;Once that signal is connected, a suspicious process execution becomes materially richer. It can be correlated to a user’s sign in risk posture, traced back to an originating email or phishing thread, enriched with device exposure and vulnerability context, and evaluated against sensitive data access.&lt;/P&gt;
&lt;P&gt;That is a fundamentally different investigation than what a siloed endpoint alert produces. Passive mode does not diminish this value. It enables it. Organizations can establish a unified detection and investigation layer while preserving their existing prevention controls. Isolated telemetry becomes an operational signal. Signal becomes a coordinated response.&lt;/P&gt;
&lt;P&gt;For teams that have not yet enabled MDE, the gap is not capability. It is visibility that is already licensed, already available, and not yet being used.&lt;/P&gt;
&lt;H1&gt;From entitlement to enforcement: A resilience arc&lt;/H1&gt;
&lt;P&gt;Cyber resilience is not about assuming controls never fail. It’s about maintaining visibility, decision quality, and response speed when they do.&lt;/P&gt;
&lt;P&gt;Using Defender Endpoint capabilities in a side‑by‑side model:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Improves resilience during periods of change&lt;/LI&gt;
&lt;LI&gt;Reduces dependency on a single control plane&lt;/LI&gt;
&lt;LI&gt;Allows teams to mature detection and response before altering enforcement ownership&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Over time, many organizations choose to simplify. Layering builds resilience while teams learn. Platform consolidation sustains it once confidence is earned.&lt;/P&gt;
&lt;P&gt;We focused on coexistence because it reflects where many organizations begin, not because it is where they should end. Many teams already have endpoint protection in place and licensing that entitles them to Defender Endpoint Capabilities. Coexistence allows those capabilities to be turned on, understood, and used effectively without forcing premature decisions or unnecessary disruption. It creates a practical on‑ramp that lets teams build confidence, improve detection and response, and establish operational muscle before making broader platform choices.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more: MDE side-by-side guidance:&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/mde-side-by-side" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/defender-endpoint/mde-side-by-side&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 17:27:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/edr-coexistence-by-design-a-practical-starting-point-to-defender/ba-p/4515265</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2026-04-30T17:27:14Z</dc:date>
    </item>
    <item>
      <title>Ask Microsoft Anything: Purview Data Security Investigations Part 3</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/ask-microsoft-anything-purview-data-security-investigations-part/ec-p/4515211#M2531</link>
      <description>&lt;H2&gt;AMA: What’s New in Microsoft Purview Data Security Investigations&lt;/H2&gt;
&lt;P&gt;Join us to learn about the latest updates to &lt;STRONG&gt;Microsoft Purview Data Security Investigations (DSI)&lt;/STRONG&gt;—including new capabilities like the &lt;STRONG&gt;agentic credential scan in the Data Security Posture Agent&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;DSI helps security teams quickly uncover, investigate, and mitigate sensitive data risks hidden across their environment using &lt;STRONG&gt;AI‑powered deep content analysis&lt;/STRONG&gt;. Whether responding to an active data security incident or proactively assessing data exposure, DSI enables teams to identify investigation‑relevant data, analyze it at scale with AI, and mitigate risk—all within a single, unified solution.&lt;/P&gt;
&lt;P&gt;By streamlining complex and time‑consuming investigative workflows, DSI helps organizations move from &lt;STRONG&gt;signal to insight in hours instead of weeks&lt;/STRONG&gt;, giving security teams the speed, clarity, and confidence needed to address today’s evolving threat landscape.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Join this AMA with the product team behind Microsoft Purview Data Security Investigations&lt;/STRONG&gt; to hear about what’s new, see what’s coming next, and get your questions answered live.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 20:19:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/ask-microsoft-anything-purview-data-security-investigations-part/ec-p/4515211#M2531</guid>
      <dc:creator>Trevor_Rusher</dc:creator>
      <dc:date>2026-04-27T20:19:51Z</dc:date>
    </item>
    <item>
      <title>Short survey: Feedback on Sensitivity Label Suggestions in Microsoft 365 Apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security/short-survey-feedback-on-sensitivity-label-suggestions-in/m-p/4514710#M9962</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I’m looking to gather feedback on user experiences with &lt;STRONG&gt;Sensitivity Label suggestions in Microsoft 365 apps&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;This short survey aims to understand how label recommendations are working in practice and where improvements may be needed. Your responses will help identify common challenges and opportunities to make the &lt;STRONG&gt;label recommendation process more accurate, useful, and seamless for users&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Survey link: &lt;A href="https://forms.office.com/r/Mfh7NiHA7S" target="_blank"&gt;Experience with Recommended Sensitivity Labels in Microsoft 365 – Fill out form&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The survey takes &lt;STRONG&gt;around 3 minutes&lt;/STRONG&gt; to complete.&lt;BR /&gt;Your feedback will directly help us better understand real-world experiences with label suggestions.&lt;/P&gt;
&lt;P&gt;Thank you very much for taking the time to contribute.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 13:42:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security/short-survey-feedback-on-sensitivity-label-suggestions-in/m-p/4514710#M9962</guid>
      <dc:creator>krisingh</dc:creator>
      <dc:date>2026-04-25T13:42:21Z</dc:date>
    </item>
    <item>
      <title>Security Copilot Agents in Defender XDR: where things actually stand</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security/security-copilot-agents-in-defender-xdr-where-things-actually/m-p/4514689#M9961</link>
      <description>&lt;P&gt;With RSAC 2026 behind us and the E5 inclusion now rolling out between April 20 and June 30, anyone planning SOC workflows or sitting on a capacity budget needs to get a clear picture of what is GA, what is preview, and what was just announced. The marketing pages tend to blur those lines.&lt;/P&gt;&lt;P&gt;This is my sober look at the current state, with the operational details that matter for adoption decisions.&lt;/P&gt;&lt;H4&gt;What is actually shipping right now&lt;/H4&gt;&lt;P&gt;The Phishing Triage Agent is GA. It only handles user-reported phish through Defender for Office 365 P2, but for most SOCs that is a meaningful chunk of the L1 queue. Verdicts come with a natural-language rationale rather than just a label, which is the part that determines whether analysts will trust it. The agent learns from analyst confirmations and overrides, so the feedback loop matters more than the initial setup.&lt;/P&gt;&lt;P&gt;There is a setup detail that is easy to miss: the agent will not classify alerts that have already been suppressed by alert tuning. The built-in rule "Auto-Resolve - Email reported by user as malware or phish" needs to be off, and any custom tuning rules that touch this alert type need review. If you skip this, the agent runs on an empty queue and you wonder why nothing is happening.&lt;/P&gt;&lt;P&gt;The Threat Intelligence Briefing Agent is also GA. It produces tenant-tailored intel briefings on a regular cadence. Useful, but lower operational impact than the triage agents.&lt;/P&gt;&lt;P&gt;Copilot Chat in Defender went GA with the April 2026 update. Conversational Q&amp;amp;A inside the portal, grounded in your incident and entity data. This is the lowest-risk way to get value out of Security Copilot and probably where most teams should start.&lt;/P&gt;&lt;H4&gt;Public preview, worth watching&lt;/H4&gt;&lt;P&gt;The &lt;STRONG&gt;Dynamic Threat Detection Agent&lt;/STRONG&gt; is the most technically interesting one. It runs continuously in the Defender backend, correlates across Defender and Sentinel telemetry, generates its own hypotheses, and emits a dynamic alert when the evidence converges. Detection source on the alert is Security Copilot. Each alert includes the structured fields (severity, MITRE techniques, remediation) plus a narrative explaining the reasoning.&lt;/P&gt;&lt;P&gt;For EU tenants the residency point is worth confirming with whoever owns data protection in your org: the service runs region-local, so customer data and required telemetry stay inside the designated geographic boundary.&lt;/P&gt;&lt;P&gt;During public preview it is enabled by default for eligible customers and is free. At GA, currently targeted for late 2026, it transitions to the SCU consumption model and can be disabled.&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;Threat Hunting Agent&lt;/STRONG&gt; is also in public preview. Natural language to KQL with guided hunting. Lower stakes, but useful for teams without deep KQL expertise on hand.&lt;/P&gt;&lt;H4&gt;Announced at RSAC, still preview&lt;/H4&gt;&lt;P&gt;Two agents got the headlines in March:&lt;/P&gt;&lt;P&gt;The Security Alert &lt;STRONG&gt;Triage &lt;/STRONG&gt;Agent extends the agentic triage approach beyond phishing into identity and cloud alerts. The longer-term direction is consolidating phishing, identity, and cloud triage under a single agent. Rollout is from April 2026, in preview.&lt;/P&gt;&lt;P&gt;The Security &lt;STRONG&gt;Analyst &lt;/STRONG&gt;Agent is the multi-step investigation agent. Deeper context across Defender and Sentinel, prioritised findings, transparent reasoning trace. Preview since March 26.&lt;/P&gt;&lt;P&gt;Both look promising on paper, but Microsoft's history of preview features that take a long time to mature is well-documented. I would not plan production workflows around either of them yet.&lt;/P&gt;&lt;H2&gt;What you actually get with the E5 inclusion&lt;/H2&gt;&lt;P&gt;This is the licensing change most people are dealing with right now. Security Copilot has been part of the E5 product terms since January 1, 2026. Tenant rollout is phased between April 20 and June 30, 2026, with a 7-day notification before activation.&lt;/P&gt;&lt;P&gt;The numbers:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;400 SCUs per month for every 1,000 paid user licenses&lt;/LI&gt;&lt;LI&gt;Capped at 10,000 SCUs per month, which you hit at around 25,000 seats&lt;/LI&gt;&lt;LI&gt;Linear scaling below that, so a 3,000-seat tenant gets 1,200 SCUs per month&lt;/LI&gt;&lt;LI&gt;No rollover, the pool resets monthly&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What is included: chat, promptbooks, agentic scenarios across Defender, Entra, Intune, Purview, and the standalone portal. Agent Builder and the Graph APIs are in. If you also run Sentinel, the included SCUs apply to Security Copilot scenarios there.&lt;/P&gt;&lt;P&gt;What is not included: Sentinel data lake compute and storage. Those still run through Azure on the regular meters. Beyond the included pool you pay 6 USD per SCU pay-as-you-go, with 30 days notice before that mode kicks in.&lt;/P&gt;&lt;H2&gt;Practical things worth knowing before activation&lt;/H2&gt;&lt;P&gt;A few details that are easy to miss in the docs:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Under System &amp;gt; Settings &amp;gt; Copilot in Defender &amp;gt; Preferences&lt;/EM&gt;, switch from Auto-generate to Generate on demand. Auto-generate will burn SCUs on incidents nobody is going to look at. Generate on demand gives you direct control.&lt;/P&gt;&lt;P&gt;In the Security Copilot portal workspace settings, check the data storage location and the data sharing toggle. Data sharing is on by default, which means Microsoft uses interaction data for product improvement. If your compliance position does not allow that, change it before agents start running. Changing it requires the Capacity Contributor role.&lt;/P&gt;&lt;P&gt;Agent runs are not equivalent to the same number of analyst chat prompts. A triage agent processing fifty alerts in one run consumes meaningfully more SCUs than fifty manual prompts on the same data. If you have a high-volume phishing pipeline, model that out before you flip the switch broadly. The usage dashboard in the Security Copilot portal breaks down consumption by day, user, and scenario.&lt;/P&gt;&lt;P&gt;Output quality depends on telemetry quality. Flaky connectors, gaps in log sources, or a high baseline of misconfigured alerts will produce verdicts that match. Connector health monitoring (the SentinelHealth table in Advanced Hunting is a sensible starting point) is a precondition.&lt;/P&gt;&lt;P&gt;The agents only improve if analysts feed the override loop. If your team treats the verdicts as background noise rather than confirming or correcting them, the feedback signal is lost and calibration stays where it shipped. That is a process problem, not a product problem, but it determines whether any of this is worth the SCUs.&lt;/P&gt;&lt;H2&gt;A reasonable adoption order&lt;/H2&gt;&lt;P&gt;A rough sequence that minimises capacity surprises:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Copilot Chat in Defender first. Lowest risk, immediate value through natural language Q&amp;amp;A in the investigation context.&lt;/LI&gt;&lt;LI&gt;Phishing Triage Agent on a controlled subset, with a review cadence in place. Check the built-in tuning rules first.&lt;/LI&gt;&lt;LI&gt;Watch the SCU dashboard for the first month before adding anything else.&lt;/LI&gt;&lt;LI&gt;Let the Dynamic Threat Detection Agent run while it is in public preview, since it is default-on and free anyway. Compare its alerts against existing Sentinel detections.&lt;/LI&gt;&lt;LI&gt;Security Alert Triage Agent for identity and cloud once the phishing baseline is stable.&lt;/LI&gt;&lt;LI&gt;Establish a monthly review covering agent decisions, false-positive rate, SCU cost, and MTTD/MTTR trends.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Technically, agentic triage is moving past phishing into identity and cloud, and the Dynamic Threat Detection Agent represents a genuine attempt at the false-negative problem rather than just another rule engine. Lizenziell, the E5 inclusion removes the biggest barrier to adoption that previously existed.&lt;/P&gt;&lt;P&gt;The risk is enabling everything at once. Agents that nobody reviews are agents that consume capacity without delivering value, and the SCU dashboard is the only thing that will tell you that is happening. One agent, one use case, a 30-day baseline, then the next one. The order matters more than the speed.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 08:44:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security/security-copilot-agents-in-defender-xdr-where-things-actually/m-p/4514689#M9961</guid>
      <dc:creator>Marcel_Graewer</dc:creator>
      <dc:date>2026-04-25T08:44:48Z</dc:date>
    </item>
    <item>
      <title>Intent‑Aware Static Inspection for Agent and Skill Packages</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/intent-aware-static-inspection-for-agent-and-skill-packages/ba-p/4514315</link>
      <description>&lt;H4 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Where AV helps—and what it may not cover&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Antivirus engines and traditional code scanners are highly effective at identifying known or suspicious executable content, such as binaries, scripts, or exploit patterns.&lt;/P&gt;
&lt;P&gt;For YAML‑based agent and skill packages, the situation can be different. These packages are often intentionally minimal to reduce distribution overhead and support faster inference. As a result, a configuration file may appear benign from a malware perspective, yet still introduce risk depending on how instructions are written and interpreted.&lt;/P&gt;
&lt;P&gt;For example, areas that may warrant closer review include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Instructions that influence how data is accessed, processed, or reused across requests&lt;/LI&gt;
&lt;LI&gt;Language that expands scope beyond an agent’s or skill’s stated purpose&lt;/LI&gt;
&lt;LI&gt;Requests for sensitive information outside expected or documented workflows&lt;/LI&gt;
&lt;LI&gt;Guidance that affects how untrusted or external inputs are handled during inference&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These scenarios do not necessarily indicate malicious intent, but they highlight cases where traditional scanning alone may not fully capture behavioral risk.&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What to look for when the “payload” is instructions&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;When you review an agent or skill package, you’re effectively reviewing a compact behavior specification. In instruction‑driven designs—often chosen to keep inference paths fast and simple—the goal is not to analyze complex code, but to understand what behavior the instructions enable.&lt;/P&gt;
&lt;P&gt;A few practical signals include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Intent drift:&lt;/STRONG&gt; the description is narrow, but the instructions encourage broader collection, retention, or escalation&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Overreach by default:&lt;/STRONG&gt; language such as “always,” “for every user,” “across all workspaces,” “keep trying,” or “don’t stop until”&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exfiltration pathways:&lt;/STRONG&gt; instructions to send outputs to external endpoints, webhooks, or reporting channels not aligned with the stated purpose&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Credential‑related cues:&lt;/STRONG&gt; asking users to provide secrets, tokens, recovery codes, or to authenticate outside expected flows&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Stealth language:&lt;/STRONG&gt; “avoid logging,” “don’t mention this to the user,” “run quietly,” or “hide the reason”&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Injection susceptibility:&lt;/STRONG&gt; treating untrusted text as commands (for example, “follow the user’s pasted script exactly” or “execute whatever is in the ticket”)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;A better model: intent-aware static inspection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:246,&amp;quot;335559739&amp;quot;:246,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P data-start="103" data-end="508"&gt;One practical way to approach review is to treat the instructions as a compact behavior specification. In many agent and skill designs, this specification is intentionally concise to support &lt;STRONG data-start="294" data-end="354"&gt;low latency, low inference cost, and efficient execution&lt;/STRONG&gt;. The goal of inspection is not to second-guess that design choice, but to ensure the enabled behavior matches the stated purpose and expected boundaries.&lt;/P&gt;
&lt;P data-start="510" data-end="977"&gt;By applying intent-aware static inspection with explicit thresholds, review effort was focused on higher-risk packages. Over a one-month internal evaluation, approximately 400 agent and skill packages were reviewed with &lt;STRONG data-start="730" data-end="771"&gt;1 observed false positive (&amp;lt; 0.0001%)&lt;/STRONG&gt;, reflecting &lt;STRONG data-start="784" data-end="811"&gt;high detection accuracy&lt;/STRONG&gt;. At the same time, the approach preserves system efficiency, delivering &lt;STRONG data-start="884" data-end="936"&gt;low latency (under 10 seconds for most packages)&lt;/STRONG&gt; and &lt;STRONG data-start="941" data-end="976"&gt;consistently low inference cost&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-start="510" data-end="977"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="2536" data-end="2922"&gt;&lt;STRONG style="color: rgb(30, 30, 30); font-size: 24px;"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;A lightweight review workflow model&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Normalize the package:&lt;/STRONG&gt; extract human‑readable fields (descriptions, system prompts, tool instructions, examples) and ignore structural YAML details&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Summarize intended behavior:&lt;/STRONG&gt; describe what the agent or skill is expected to do in plain language, independent of implementation&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Check for higher‑risk actions:&lt;/STRONG&gt; broad data access, external sharing, credential requests, persistence, or stealth behavior&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Decide with thresholds:&lt;/STRONG&gt; route low‑risk, narrowly scoped packages differently from those with broader reach or reuse&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Keep an audit trail:&lt;/STRONG&gt; retain a brief summary of extracted intent and review rationale to support iteration over time&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="2"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Final thoughts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:261,&amp;quot;335559739&amp;quot;:261,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;YAML‑based agent and skill packages are not inherently risky; they are often chosen precisely because they enable simpler distribution and faster inference. The key consideration is how instruction‑defined behavior aligns with expectations and boundaries as packages evolve and are reused.&lt;/P&gt;
&lt;P&gt;Combining traditional scanning with lightweight, intent‑aware inspection helps teams preserve the benefits of fast, instruction‑driven systems while improving confidence in how those systems behave in practice.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/intent-aware-static-inspection-for-agent-and-skill-packages/ba-p/4514315</guid>
      <dc:creator>nirwandogra</dc:creator>
      <dc:date>2026-04-24T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Protect and govern every tenant with Microsoft Entra Tenant Governance</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/protect-and-govern-every-tenant-with-microsoft-entra-tenant/ec-p/4514244#M2530</link>
      <description>&lt;P&gt;As organizations scale, tenant sprawl becomes inevitable. Legacy test tenants, employee‑created environments, and forgotten tenants create blind spots for security and identity teams.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Get to know Microsoft Entra Tenant Governance, a new Entra capability that provides centralized visibility and control across multi‑tenant environments. We'll cover how Tenant Governance enables tenant discovery, secure governance relationships, configuration monitoring, and governed tenant creation from day one. You'll see how organizations can apply consistent security baselines, detect configuration drift, and reduce operational overhead all while maintaining autonomy across teams. Walk away with a clear framework for bringing order, visibility, and governance to your multi‑tenant identity landscape.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar, then sign in to the Tech Community and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:48:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/protect-and-govern-every-tenant-with-microsoft-entra-tenant/ec-p/4514244#M2530</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2026-04-23T20:48:45Z</dc:date>
    </item>
    <item>
      <title>Stop identity attacks in real time with Microsoft Entra ID Protection</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/stop-identity-attacks-in-real-time-with-microsoft-entra-id/ec-p/4514242#M2529</link>
      <description>&lt;P&gt;Modern identity security means stopping attacks before they escalate and extending protection beyond human users to apps and agentic identities across your identity fabric.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Learn how Microsoft Entra ID Protection delivers premium, real-time identity protection with adaptive risk remediation, comprehensive detections, and expanded coverage for human and non-human identities. Powered by trillions of Microsoft Security signals and natively integrated with Microsoft Defender and Security Copilot workflows, Entra ID Protection enables faster and more accurate Conditional Access decisions that stop threats like lateral movement and privilege escalation before they spread.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;We'll show you how identity and security operations teams scale risk remediation with Entra ID, and how these capabilities extend across your broader identity security portfolio to strengthen protection in both cloud and hybrid environments.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;To learn more, read the &lt;A href="https://aka.ms/IDProtectionReport" target="_blank"&gt;Microsoft Entra ID Protection report&lt;/A&gt;.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar, then sign in to the Tech Community and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:45:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/stop-identity-attacks-in-real-time-with-microsoft-entra-id/ec-p/4514242#M2529</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2026-04-23T20:45:28Z</dc:date>
    </item>
    <item>
      <title>Strengthen your security posture with Microsoft Entra Conditional Access</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-events/strengthen-your-security-posture-with-microsoft-entra/ec-p/4514237#M2527</link>
      <description>&lt;P&gt;Learn how Microsoft Entra Conditional Access, our Microsoft Zero Trust policy engine, protects access for your workforce and for agents by enforcing real‑time adaptive access policies that continuously assess risk signals and use AI‑driven automation to dynamically allow, challenge, or block access for every identity.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Join Microsoft experts as they walk through real‑world scenarios and share practical guidance to help your identity team address policy sprawl, enforce consistent Conditional Access policies, and strengthen security posture across your environment.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar, then sign in to the Tech Community and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 23:54:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-events/strengthen-your-security-posture-with-microsoft-entra/ec-p/4514237#M2527</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2026-04-23T23:54:06Z</dc:date>
    </item>
    <item>
      <title>The Unified SecOps Transition — Why It Is a Security Architecture Decision, Not Just a Portal Change</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/the-unified-secops-transition-why-it-is-a-security-architecture/ba-p/4513815</link>
      <description>&lt;P&gt;Microsoft will retire the standalone Azure Sentinel portal on &lt;A href="https://learn.microsoft.com/en-us/unified-secops/whats-new" target="_blank" rel="noopener"&gt;March 31, 2027&lt;/A&gt;. Most of the conversation around this transition focuses on cost optimization and portal consolidation. That framing undersells what is actually happening.&lt;/P&gt;
&lt;P&gt;The unified Defender portal is not a new interface for the same capabilities. It is the platform foundation for a fundamentally different SOC operating model — one built on a 2-tier data architecture, graph-based investigation, and AI agents that can hunt, enrich, and respond at machine speed. Partners who understand this will help customers build security programs that match how attackers actually operate. Partners who treat it as a portal migration will be offering the same services they offered five years ago.&lt;/P&gt;
&lt;P&gt;This document covers four things:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;What the unified platform delivers&lt;/STRONG&gt; — the security capabilities that do not exist in standalone Sentinel and why they matter against today’s threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What the transition really involves&lt;/STRONG&gt; - is not data migration, but it is a data architecture project that changes how telemetry flows, where it lives, and who queries it.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where the partner opportunity lives&lt;/STRONG&gt; — a structured progression from professional services (transactional, transition execution, and advisory) to ongoing managed security services.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Why does the unified platform win competitively&lt;/STRONG&gt; — factual capability advantages that give partners a defensible position against third-party SIEM alternatives.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;STRONG&gt;The Bigger Picture: Preparing for the Agentic SOC&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Before getting into transition mechanics, partners need to understand where the industry is headed — because the platform decisions made during this transition will determine whether a customer’s SOC is ready for what comes next.&lt;/P&gt;
&lt;P&gt;The security industry is moving from human-driven, alert-centric workflows to an operating model built on three pillars:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Intellectual Property&lt;/STRONG&gt; — the detection logic, hunting hypotheses, response playbooks, and domain expertise that differentiate one security team from another.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Human Orchestration&lt;/STRONG&gt; — the judgment, context, and decision-making that humans bring to complex incidents. Humans set strategy, validate findings, and make containment decisions. They do not manually triage every alert.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AI Agents&lt;/STRONG&gt; - built agents that execute repeatable work: enriching incidents, hunting across months of telemetry, validating security posture, drafting response actions, and flagging anomalies for human review.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The SOC of 2027 will not be scaled by hiring more analysts. It will be scaled by deploying agents that encode institutional knowledge into automated workflows — orchestrated by humans who focus on the decisions that require judgment.&lt;/P&gt;
&lt;P&gt;This transformation requires a platform that provides three things:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Deep telemetry&lt;/STRONG&gt; — agents need months of queryable data to analyze behavioral patterns, build baselines, and detect slow-moving threats. The Sentinel Data Lake provides this at a cost point that makes long-retention feasible.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Relationship context&lt;/STRONG&gt; — agents need to understand how entities connect. Which accounts share credentials? What is the blast radius of a compromised service principle? What is the attack path from a phished user to domain admin? Sentinel Graph provides this.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Extensibility&lt;/STRONG&gt; — partners and customers need to build and deploy their own agents without waiting for Microsoft to ship them. The MCP framework and Copilot agent architecture provide this.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;None of these exist in standalone Azure Sentinel. All three ship with the unified platform.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The urgency goes beyond the March 2027 deadline.&lt;/STRONG&gt; Organizations are deploying AI agents, copilots, and autonomous workflows across their businesses — and every one of those creates a new attack surface. Prompt injection, data poisoning, agent hijacking, cross-plugin exploitation — these are not theoretical risks. They are in the wild today. Defending against AI-powered attacks requires a security platform that is itself AI Agent-ready. The unified Defender portal is that platform.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What the Unified Platform Actually Delivers&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The original framing — “single pane of glass for SIEM and XDR” — is accurate but insufficient. Here is what the unified platform delivers that standalone Sentinel does not.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Cross-Domain Incident Correlation&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Defender correlation engine does not just group alerts by time proximity. It builds multi-stage incident graphs that link identity compromise to lateral movement to data exfiltration across SIEM and XDR telemetry — automatically.&lt;/P&gt;
&lt;P&gt;Consider a token theft chain: an infostealer harvests browser session cookies (endpoint telemetry), the attacker replays the token from a foreign IP (Entra ID sign-in logs), creates a mailbox forwarding rule (Exchange audit logs), and begins exfiltrating data (DLP alerts). In standalone Sentinel, these are four separate alerts in four different tables. In the unified platform, they are one correlated incident with a visual attack timeline.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;2-Tier Data Architecture&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel Data Lake introduces a second storage tier that changes the economics and capabilities of security telemetry:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Analytics Tier&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Data Lake&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Real-time detection rules, SOAR, alerting&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hunting, forensics, behavioral analysis, AI agent queries&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Latency&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sub-5-minute query and alerting&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Minutes to hours acceptable&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cost&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;~$4.30/GB PAYG ingestion (~$2.96 at 100 GB/day commitment)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;~$0.05/GB ingestion + $0.10/GB data processing (at least 20x cheaper)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Retention&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;90 days default (expensive to extend)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Up to 12 years at low cost&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Best for&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High-signal, low-volume sources&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High-volume, investigation-critical sources&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;The architecture decision is not “which tier is cheaper.” It is “which tier gives me the right detection capability for each data source.”&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Analytics tier candidates:&lt;/STRONG&gt; Entra ID sign-in logs, Azure activity, audit logs, EDR alerts, PAM events, Defender for Identity alerts, email threat detections. These need sub-5-minute alerting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Lake candidates:&lt;/STRONG&gt; Raw firewall session logs, full DNS query streams, proxy request logs, Sysmon process events, NSG flow logs. These drive hunting and forensic analysis over weeks or months.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Dual-ingest sources:&lt;/STRONG&gt; Some sources need both tiers. Entra ID sign-in logs are the canonical example — analytics tier for real-time password spray detection, Data Lake for graph-based blast radius analysis across months of authentication history. Implementation is straightforward: a single Data Collection Rule (DCR) transformation handles the split. One collection point, two routing destinations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The right framing: &lt;STRONG&gt;“Right data in the right tier = better detections AND lower cost.”&lt;/STRONG&gt; Cost savings are a side effect of good security architecture, not the goal.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Sentinel Graph&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-graph-overview?tabs=defender" target="_blank" rel="noopener"&gt;Sentinel Graph&lt;/A&gt; enables SOC teams and AI agents to answer questions that flat log queries cannot:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What is the blast radius of this compromised account?&lt;/LI&gt;
&lt;LI&gt;Which service principals share credentials with the breached identity?&lt;/LI&gt;
&lt;LI&gt;What is the attack path from this phished user to domain admin?&lt;/LI&gt;
&lt;LI&gt;Which entities are connected to this suspicious IP across all telemetry sources?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Graph-based investigation turns isolated alerts into context-rich intelligence. It is the difference between knowing “this account was compromised” and understanding “this account has access to 47 service principals, 3 of which have written access to production Key Vault.”&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Copilot Integration&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/copilot/security/triage-alert-with-enriched-threat-intel" target="_blank" rel="noopener"&gt;Security Copilot&lt;/A&gt; embedded in the unified portal helps analysts summarize incidents, generate hunting queries, explain attacker behavior, and draft response actions. For complex multi-stage incidents, it reduces the time from “I see an alert” to “I understand the full scope” from hours to minutes. With &lt;A href="https://learn.microsoft.com/en-us/copilot/security/security-copilot-inclusion" target="_blank" rel="noopener"&gt;free SCUs available with Microsoft 365 E5&lt;/A&gt;, teams can apply AI to the highest-effort investigation work without adding incremental cost.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;MCP and the Agent Framework&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-get-started" target="_blank" rel="noopener"&gt;Model Context Protocol (MCP)&lt;/A&gt; and Copilot agent architecture let partners and customers build purpose-built security agents. A concrete example: an MCP-enabled agent can automatically enrich a phishing incident by querying email metadata, checking the sender against threat intelligence, pulling the user’s recent sign-in patterns, correlating with Sentinel Graph for lateral risk, and drafting a containment recommendation — in under 60 seconds.&lt;/P&gt;
&lt;P&gt;This is where partner intellectual property becomes competitive advantage. The agent framework is the mechanism for encoding proprietary detection logic, response playbooks, and domain expertise into automated workflows that run at machine speed.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Security Store&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H6&gt;&lt;A href="https://learn.microsoft.com/en-us/security/store/" target="_blank" rel="noopener"&gt;Security Store&lt;/A&gt; allows partners to evolve from one‑time transition projects into repeatable, scalable offerings—supporting professional services, managed services, and agent‑based IP that align with the customer’s unified SecOps operating model. As part of the transition, the&amp;nbsp;&lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Security Store&lt;/A&gt; becomes the extension layer for the unified SecOps platform—allowing partners to deliver differentiated agents, SaaS, and security services natively within Defender and Sentinel, instead of building and integrating in isolation&lt;/H6&gt;
&lt;H4&gt;&lt;STRONG&gt;The 4 Investigation Surfaces: A Customer Maturity Ladder&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Sentinel Data Lake exposes four distinct investigation surfaces, each representing a step toward the Agentic SOC — and a partner service opportunity:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Surface&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Capability&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Maturity Level&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Partner Opportunity&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/kusto/query/tutorials/common-tasks-microsoft-sentinel?view=microsoft-sentinel" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;KQL Query&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Ad-hoc hunting, forensic investigation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Basic — “we can query”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hunting query libraries; KQL training&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-graph-overview?tabs=defender" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Graph Analytics&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Blast radius, attack paths, entity relationships&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Intermediate — “we understand relationships”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Graph investigation training; attack path workshops&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/notebooks" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Notebooks (PySpark)&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Statistical analysis, behavioral baselines, ML models&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Advanced — “we predict behaviors”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Custom notebook development; anomaly scoring&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-mcp-get-started" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Agent/MCP Access&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Autonomous hunting, triage, response at machine speed&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Agentic SOC — “we automate”&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Custom agent development; MCP integration&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;The customer who starts with “help us hunt better” ends up at “build us agents that hunt autonomously.” That is the progression from professional services to managed services.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What the Transition Actually Involves&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;It is not a data migration — customers’ underlying log data and analytics remain in their existing Log Analytics workspaces. That is important for partners to communicate clearly.&lt;/P&gt;
&lt;P&gt;But partners should not set the expectation that nothing changes except the URL. Microsoft’s &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender" target="_blank" rel="noopener"&gt;official transition guide&lt;/A&gt; documents significant operational changes — including &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender#configure-automation-rules-and-playbooks" target="_blank" rel="noopener"&gt;automation rules and playbooks&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender#configure-analytics-rules" target="_blank" rel="noopener"&gt;analytics rule&lt;/A&gt;, RBAC restructuring to the new unified model (URBAC), API schema changes that break ServiceNow and Jira integrations, analytics rule transitions where the Fusion engine is replaced by the Defender XDR correlation engine, and data policy shifts for regulated industries. Most customers cannot navigate this complexity without professional help.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; Transitioning to the Defender portal has no extra cost - estimate the billing with the new &lt;A href="https://www.microsoft.com/en-us/security/pricing/microsoft-sentinel/cost-estimator" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Sentinel Cost Estimator&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Optimizing the unified platform means making deliberate changes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Adding dual-ingest&lt;/STRONG&gt; for critical sources that need both real-time detection and long-horizon hunting.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Moving high-volume telemetry&lt;/STRONG&gt; to the Data Lake — enabling hunting at scale that was previously cost-prohibitive.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Retiring redundant data copies&lt;/STRONG&gt; where Defender XDR already provides the investigation capability.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Updating RBAC, automation, and integrations&lt;/STRONG&gt; for the unified portal’s consolidated schema and permission structure.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Training analysts&lt;/STRONG&gt; on new investigation workflows, Sentinel Graph navigation, and Copilot-assisted triage.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Threat Coverage: The Detection Gap Most Organizations Do Not Know They Have&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This transition is an opportunity to quantify detection maturity — and most organizations will not like what they find.&lt;/P&gt;
&lt;P&gt;Based on real-world breach analysis — infostealers, business email compromise, human-operated ransomware, cloud identity abuse, vulnerability exploitation, nation-state espionage, and other prevalent threat categories — organizations running standalone Sentinel with default configurations typically have significant detection gaps. Those gaps cluster in three areas:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross-domain correlation gaps&lt;/STRONG&gt; — attacks that span identity, endpoint, email, and cloud workloads. These require the Defender correlation engine because no single log source tells the complete story.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Long-retention hunting gaps&lt;/STRONG&gt; — threats like command-and-control beaconing and slow data exfiltration that unfold over weeks or months. Analytics-tier retention at 90 days is too expensive to extend and too short for historical pattern analysis.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Graph-based analysis gaps&lt;/STRONG&gt; — lateral movement, blast radius assessment, and attack path analysis that require understanding entity relationships rather than flat log queries.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The unified platform with proper log source coverage across Microsoft-native sources can materially close these gaps — but only if the transition includes a detection coverage assessment, not just a portal cutover.&lt;/P&gt;
&lt;P&gt;Partners should use MITRE ATT&amp;amp;CK as the common framework for measuring detection maturity. Map existing detections to ATT&amp;amp;CK tactics and techniques before and after transition — a measurable, defensible improvement that justifies advisory fees and ongoing managed services.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Partner Opportunity: Professional Services to Managed Services&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The USX transition creates a structured progression for all partner types — from professional services that build trust and surface findings, to managed security services that deliver ongoing value. The key insight most partners miss: do not jump from “transition assessment” to “managed services pitch.” Customers are not ready for that conversation until they have experienced the value of professional services. The bridge engagement — whether transactional, transition execution, or advisory — builds trust, demonstrates the expertise, and surfaces the findings that make the managed services conversation a logical next step.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Professional Services&lt;/STRONG&gt; (transactional + transition execution + advisory) → &lt;STRONG&gt;Managed Security Services&lt;/STRONG&gt; (MSSP)&lt;/P&gt;
&lt;P&gt;The USX transition is the ideal professional services entry point because it combines a mandatory deadline (March 2027) with genuine technical complexity (analytics rule, automation behavioral changes, RBAC restructuring, API schema shifts) that most customers cannot navigate alone. Every engagement produces findings — detection gaps, automation fragility, staffing shortfalls — that are the most credible possible evidence for managed services.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Professional Services&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;Transactional Partners&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Offer&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Customer Value&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Key Deliverables&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Transition&lt;/STRONG&gt; &lt;STRONG&gt;Readiness Assessment&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Risk-mitigated transition with clear scope&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sentinel deployment inventory; Defender portal compatibility check; transition roadmap with timeline; MITRE ATT&amp;amp;CK detection coverage baseline&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Transition&lt;/STRONG&gt; &lt;STRONG&gt;Execution and Enablement&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Accelerated time-to-value, minimal disruption&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Workspace onboarding; RBAC and automation updates; Dual-portal testing and validation; SOC team training on unified workflows&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Security Posture and Detection Optimization&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Better detections and lower cost&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Data ingestion and tiering strategy; Dual-ingest implementation for critical sources; Detection coverage gap analysis; Automation and Copilot/MCP recommendations&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H5&gt;&lt;STRONG&gt;Advisory Partners&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Offer&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Customer Value&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Key Deliverables&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Executive and Strategy Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Leadership alignment on why this transition matters&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Unified SecOps vision and business case; Zero Trust and SOC modernization alignment; Stakeholder alignment across security, IT, and leadership&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Architecture and Design Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Future-ready architecture optimized for the Agentic SOC&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Target-state 2-tier data architecture; Dual-ingest routing decisions mapped to MITRE tactics; RBAC, retention, and access model design&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Detection Coverage and Gap Analysis&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Measurable detection maturity improvement&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Current-state MITRE ATT&amp;amp;CK coverage mapping; Gap analysis against 24 threat patterns; Detection improvement roadmap with priority recommendations&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;SOC Operating Model Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Smooth analyst adoption with clear ownership&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Redesigned SOC workflows for unified portal; Incident triage and investigation playbooks; RACI for detection engineering, hunting, and platform ops&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Agentic SOC Readiness&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Preparation for AI-driven security operations&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;MCP and agent architecture assessment; Custom agent development roadmap; &lt;A href="https://microsoftpartners.powerappsportals.com/Microsoft-Security-Partners/Modern-SecOps/" target="_blank" rel="noopener"&gt;IP&lt;/A&gt; + Human Orchestration + Agent operating model design&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cost, Licensing and Value Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Transparent cost impact with strong business case&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Current vs.&amp;nbsp;future cost analysis; Data tiering optimization recommendations; TCO and ROI modeling for leadership&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;The conversion to managed services is evidence-based.&lt;/STRONG&gt; Every professional services engagement produces findings — detection gaps, automation fragility, staffing shortfalls. Those findings are the most credible possible case for ongoing managed services.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Managed Security Services&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The unified platform changes the managed security conversation. Partners are no longer selling “we watch your alerts 24/7.” They are selling an operating model where proprietary AI agents handle the repeatable work — enrichment, hunting, posture validation, response drafting — and human experts focus on the decisions that require judgment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This is where the competitive moat forms.&lt;/STRONG&gt; The formula: &lt;A href="https://microsoftpartners.powerappsportals.com/Microsoft-Security-Partners/Modern-SecOps/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;IP&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; + Human Orchestration + AI Agents = differentiated managed security.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The unified platform enables this through:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Multi-tenancy&lt;/STRONG&gt; — the built-in multitenant portal eliminates the need for third-party management layers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel Data Lake&lt;/STRONG&gt; — agents can query months of customer telemetry for behavioral analysis without cost constraints.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel Graph&lt;/STRONG&gt; — agents can traverse entity relationships to assess blast radius and map attack paths.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MCP extensibility&lt;/STRONG&gt; — partners can build agents that integrate with proprietary tools and customer-specific systems.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Partners who build proprietary agents encoding their detection logic into the MCP framework will differentiate from partners who rely on out-of-box capabilities.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;The Securing AI Opportunity&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Organizations are deploying AI agents, copilots, and autonomous workflows across their businesses at an accelerating pace. Every AI deployment creates a new attack surface — prompt injection, data poisoning, agent hijacking, cross-plugin exploitation, unauthorized data access through agentic workflows. These are not theoretical risks. They are in the wild today.&lt;/P&gt;
&lt;P&gt;Partners who can help customers secure their AI deployments while also using AI to strengthen their SOC will command premium positioning. This requires a security platform that is itself AI Agent-ready — one that can deploy defensive agents at the same pace organizations deploy business AI. The unified Defender portal is that platform. Partners who position USX as “preparing your SOC for AI-driven security operations” will differentiate from partners who position it as “moving to a new portal.”&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Cost and Operational Benefits&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Better security architecture also costs less. This is not a contradiction — it is the natural result of putting the right data in the right tier.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Benefit&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;How It Works&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Eliminate low-value ingestion&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identify and remove log sources that are never used for detections, investigations, or hunting. Immediately lowers analytics-tier costs without impacting security outcomes.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Right-size analytics rules&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Disable unused rules, consolidate overlapping detections, and remove automation that does not reduce SOC effort. Pay only for processing that delivers measurable security value.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Avoid SIEM/XDR duplication&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Many threats can be investigated directly in Defender XDR without duplicating telemetry into Sentinel. Stop re-ingesting data that Defender already provides.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Tier data by detection need&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Store high-volume, hunt-oriented telemetry in the Data Lake at at least 20x lower cost. Promote only high-signal sources to the analytics tier. Full data fidelity preserved in both tiers.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Reduce operational overhead&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Unified SIEM+XDR workflows in a single portal reduce tool switching, accelerate investigations, simplify analyst onboarding, and enable SOC teams to scale without proportional headcount increases.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Improve detection quality&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;The Defender correlation engine produces higher-fidelity incidents with fewer false positives. SOC teams spend less time triaging noise and more time on real threats.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H3&gt;&lt;STRONG&gt;Competitive Positioning&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Partners need defensible talking points when customers evaluate third-party SIEM alternatives. The following advantages are factual, sourced from &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/move-to-defender" target="_blank" rel="noopener"&gt;Microsoft’s transition documentation&lt;/A&gt; and platform capabilities — not marketing claims.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;No extra cost&lt;/STRONG&gt; for transitioning — even for non-E5 customers. Third-party SIEM migrations involve licensing, data migration, detection rewrite, and integration rebuild costs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Native cross-domain correlation&lt;/STRONG&gt; across Sentinel + Defender products into multi-stage incident graphs. Third-party SIEMs receive Microsoft logs as flat events — they lack the internal signal context, entity resolution, and product-specific intelligence that powers cross-domain correlation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Custom detections across SIEM + XDR&lt;/STRONG&gt; — query both Sentinel and Defender XDR tables without ingesting Defender data into Sentinel. Eliminates redundant ingestion cost.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Alert tuning extends to Sentinel&lt;/STRONG&gt; — previously Defender-only capability, now applicable to Sentinel analytics rules. Net-new noise reduction.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Unified entity pages&lt;/STRONG&gt; — consolidated user, device, and IP address pages with data from both Sentinel and Defender XDR, plus global search across SIEM and XDR. Third-party SIEMs provide entity views from ingested data only.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Built-in multi-tenancy for MSSPs&lt;/STRONG&gt; — multitenant portal manages incidents, alerts, and hunting across tenants without third-party management layers. Try out the new&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/unified-secops/governance-relationships" target="_blank" rel="noopener"&gt;GDAP capabilities in Defender portal&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Industry validation: Microsoft’s SIEM+XDR platform has been recognized as a Leader by both &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/06/24/microsoft-is-named-a-leader-in-the-forrester-wave-security-analytics-platforms-2025/" target="_blank" rel="noopener"&gt;Forrester&lt;/A&gt; (Security Analytics Platforms, 2025) and &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/10/16/microsoft-named-a-leader-in-the-2025-gartner-magic-quadrant-for-siem/" target="_blank" rel="noopener"&gt;Gartner&lt;/A&gt; (SIEM Magic Quadrant, 2025).&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Summary: What Partners Should Take Away&lt;/STRONG&gt;&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Topic&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Key Message&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Framing&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;USX is a security architecture transformation, not a portal transition. Lead with detection capability, not cost savings.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Platform foundation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Sentinel Data Lake + Sentinel Graph + MCP/Agent Framework = the platform for the Agentic SOC.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;4 investigation surfaces&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;KQL → Graph → Notebooks → Agent/MCP. A maturity ladder from “we can query” to “we automate at machine speed.”&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Architecture&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;2-tier data model (analytics + Data Lake) with dual-ingest for critical sources. Cost savings are a side effect of good architecture.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Transition complexity&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Analytics rules and automation rules. API schema changes. RBAC restructuring. Most customers need professional help.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Partner engagement model&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Professional Services (transactional + transition execution + advisory) → Managed Services (MSSP).&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Competitive positioning&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;No extra cost. Native correlation. Cross-domain detections. Built-in multi-tenancy. Capabilities third-party SIEMs cannot replicate.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Partner differentiation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;A href="https://microsoftpartners.powerappsportals.com/Microsoft-Security-Partners/Modern-SecOps/" target="_blank" rel="noopener"&gt;&lt;U&gt;IP&lt;/U&gt;&lt;/A&gt; + Human Orchestration + AI Agents. Partners who build proprietary agents on MCP have competitive advantage.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Timeline&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;March 31, 2027. Start now — phased transition with one telemetry domain first, then scale.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/the-unified-secops-transition-why-it-is-a-security-architecture/ba-p/4513815</guid>
      <dc:creator>Mohit_Kumar1</dc:creator>
      <dc:date>2026-04-23T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Introducing the New Microsoft Security Community Home!</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/introducing-the-new-microsoft-security-community-home/ba-p/4513463</link>
      <description>&lt;H3&gt;We are excited to introduce the new home of the Microsoft Security Community!&lt;/H3&gt;
&lt;P&gt;At &lt;A class="lia-external-url" href="https://aka.ms/securitycommunity" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;aka.ms/securitycommunity&lt;/STRONG&gt;&lt;/A&gt;, you can explore upcoming events, access technical content, and find new ways to connect with Microsoft experts and peers across the security ecosystem.&lt;/P&gt;
&lt;P&gt;The Microsoft Security Community Home is designed to help you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Discover live and on-demand community events&lt;/LI&gt;
&lt;LI&gt;Access technical resources and learning opportunities&lt;/LI&gt;
&lt;LI&gt;Connect with peers and Microsoft product teams&lt;/LI&gt;
&lt;LI&gt;Stay up to date on Microsoft Security announcements&lt;/LI&gt;
&lt;LI&gt;Get involved through our community programs, including opportunities to share feedback that helps shape Microsoft Security products and features&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Whether you are looking to build your expertise, join discussions, or influence the future direction of Microsoft Security solutions, this is your starting point.&lt;/P&gt;
&lt;P&gt;👉 Visit the Microsoft Security Community Home: &lt;A class="lia-external-url" href="https://aka.ms/securitycommunity" target="_blank" rel="noopener"&gt;aka.ms/securitycommunity&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 18:22:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/introducing-the-new-microsoft-security-community-home/ba-p/4513463</guid>
      <dc:creator>emilyfalla</dc:creator>
      <dc:date>2026-04-21T18:22:33Z</dc:date>
    </item>
    <item>
      <title>Safeguarding Sensitive Data in Microsoft 365 Copilot Interactions: DLP for Microsoft 365 Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/safeguarding-sensitive-data-in-microsoft-365-copilot/ba-p/4512497</link>
      <description>&lt;P&gt;Microsoft 365 Copilot is redefining how organizations work, bringing the power of generative AI directly into our secure productivity tools. As Copilot adoption accelerates, we’ve heard that you want more control over how your sensitive data can be used in interactions with Copilot. At Ignite 2025, Microsoft announced a major enhancement: &lt;STRONG&gt;Microsoft Purview Data Loss Prevention for Microsoft 365 Copilot to safeguard Microsoft 365 Copilot and Copilot Chat prompts&lt;/STRONG&gt;, now entering General Availability. Even better, this capability is included for all users of Microsoft 365 Copilot and Copilot Chat.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Why DLP for Copilot Prompts Is a Game-Changer&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;As organizations adopt Copilot, their ways of sharing, creating, and interacting with data expand. With just a prompt, users can have Copilot summarize documents, analyze spreadsheets, or help brainstorm presentations. However, it raises an important question: &lt;STRONG&gt;what if the prompt includes sensitive information, like project code names, financial account numbers, health records, or other sensitive data?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Over the last 2 years, Microsoft has been building a set of Data Loss Prevention (DLP) controls specifically designed for Copilot. Below is a quick overview of these related capabilities — ranging from already available to newly in preview — before we dive deep into today's GA announcement:&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-10"&gt;Prevent Copilot processing of files &amp;amp; emails based on sensitivity labels&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;In November 2024, Microsoft introduced the ability to create a DLP policy to restrict Microsoft 365 Copilot and Copilot Chat from processing sensitive files and emails using Sensitivity Labels for grounding data. This capability gives you control over whether content with the sensitivity labels you specify is restricted from being used in Microsoft 365 Copilot and Copilot Chat to generate summaries and responses.&lt;/P&gt;
&lt;H6&gt;&lt;SPAN class="lia-text-color-10"&gt;&lt;STRONG&gt;Prevent web searches for prompts containing Sensitive Information Types (SITs)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;The latest feature entering Public Preview is &lt;STRONG&gt;DLP for Microsoft 365 Copilot and Copilot Chat to prevent web searches for prompts containing sensitive data&lt;/STRONG&gt;. This real-time control helps organizations mitigate data leakage and oversharing risks by preventing Microsoft 365 Copilot and agents from using sensitive data for external web searches. &lt;STRONG&gt;If a sensitive information type (SIT) is detected in a user prompt, Copilot can still leverage your enterprise data to form a response without sending the sensitive data to external search engines for web grounding. This capability extends to Microsoft 365 Copilot and agents built in Copilot Studio that are published to Microsoft 365 Copilot.&lt;/STRONG&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN class="lia-text-color-10"&gt;&lt;STRONG&gt;DLP to Safeguard Copilot Prompts with Sensitive Information Types (SITs)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;The rest of this blog focuses on a key addition to this capability set: &lt;STRONG&gt;DLP for Microsoft 365 Copilot + Copilot Chat prompts to prevent processing of prompts containing sensitive information&lt;/STRONG&gt;, now entering General Availability. Unlike the web search capability above, which prevents sensitive data from being sent externally during a web query, this capability evaluates the user’s text input directly, before processing occurs, to determine whether both enterprise data and web grounding can proceed.&lt;/P&gt;
&lt;P&gt;This feature uses &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/purview/sit-sensitive-information-type-learn-about" target="_blank" rel="noopener"&gt;Sensitive Information Types (SITs)&lt;/A&gt; as a condition within a Purview DLP policy to assess whether a user prompt sent to Copilot contains sensitive data, even if the data is unlabeled. With DLP for Copilot prompts, a user’s text input is scanned in real time for SITs, whether built-in (like Social Security Numbers, credit card numbers, etc.) or custom-defined by your organization (such as confidential terms or project names). If a text prompt contains one of the SITs you specify, Copilot restricts processing, halts any Graph or web grounding, and displays a clear message to the end user that the request cannot be completed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;A user enters a prompt in Microsoft 365 Copilot Chat containing sensitive information.&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Microsoft 365 Copilot Chat detects a SIT within the user prompt and restricts a response. &lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;How DLP for Copilot Protects Prompts: Real-Time, Intelligent Protection&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The new DLP capability integrates seamlessly with Microsoft Purview, leveraging its powerful data classification &amp;amp; detection engine for sensitive information types. Here’s how it works:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Input&lt;/STRONG&gt;: When a user submits a prompt, Copilot checks the prompt for sensitive information using built-in or organization-defined sensitive information types (SITs).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Immediate Action&lt;/STRONG&gt;: If a SIT is detected, Copilot restricts the prompt from being processed. No AI response is generated, and no data is sent for Graph or web grounding.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Output&lt;/STRONG&gt;: Users receive a clear notification that their request cannot be completed due to company policies.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This real-time protection ensures that sensitive data is not leaked or overshared, even as users explore new ways to work with AI.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Overview of how the feature works.&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;Setting Up DLP for Copilot Prompts: Data Security Admin Experience&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The easiest way to get started is through the new Microsoft Purview &lt;STRONG&gt;Data Security Posture Management (DSPM)&lt;/STRONG&gt; portal, which provides a guided, one-click setup experience:&lt;/P&gt;
&lt;P&gt;1. In Purview, go to &lt;STRONG&gt;Solutions &amp;gt; DSPM (preview)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2. Select the "&lt;STRONG&gt;Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions&lt;/STRONG&gt;" objective.&lt;/P&gt;
&lt;P&gt;3. Follow the guided workflow and apply the recommended &lt;STRONG&gt;one-click DLP policy&lt;/STRONG&gt;. The policy starts in simulation mode so you can review activity before enforcing it.&lt;/P&gt;
&lt;P&gt;Alternatively, you can configure and customize this policy directly from the Purview &lt;STRONG&gt;DLP portal Policies&lt;/STRONG&gt; page or enable it from the &lt;STRONG&gt;Microsoft 365 Admin Center.&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Navigate to the Data Security Posture Management (Preview) portal Objectives tab. View the objective, “Prevent data exposure in Microsoft 365 Copilot and Microsoft Copilot interactions” and click the button, &lt;STRONG&gt;view the remediation plan&lt;/STRONG&gt;. &lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;View the remediation plan details and estimated impact on risk pattern. &lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Click the button, &lt;STRONG&gt;view policy details&lt;/STRONG&gt; and review. Then click the button, &lt;STRONG&gt;create a custom policy&lt;/STRONG&gt; &lt;STRONG&gt;in DLP&lt;/STRONG&gt; simulation mode to protect sensitive data referenced in Microsoft 365 Copilot and Microsoft Copilot.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;IT and AI admins can enable DLP protection for Copilot prompts directly from the Security section of the Microsoft 365 Admin Center using a simplified setup experience.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;To configure polices in DLP, navigate to the Purview DLP portal. Then select the Policies tab to create a new policy.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Create a DLP Custom policy.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Choose where to apply the policy (Microsoft 365 Copilot and Copilot Chat).&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Create a rule with a name and optional description.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Add Sensitive Information Types as part of the conditions.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Select the desired Sensitive Information Types (built-in or custom).&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Identify&lt;/EM&gt;&lt;EM&gt; the confidence level and instance count. &lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Add the action to restrict Copilot from processing content and complete the policy configuration.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt;Confirm the rule was set up correctly by testing it out.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Practical Scenarios: Protecting What Matters Most&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Protect PII, financial data, and intellectual property&lt;/STRONG&gt;: Financial institutions can block prompts containing deal terms, account numbers, or other sensitive data, preventing leaks through AI interactions. Similarly, healthcare organizations can safeguard patient information, and manufacturers can secure intellectual property and trade secrets from exposure, along with many other practical use cases. Once the prompt is detected and blocked, Microsoft Graph grounding and Bing web grounding is restricted.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Safeguard sensitive non-public information&lt;/STRONG&gt;: Imagine an organization involved in a confidential merger. By using DLP for Copilot prompts, administrators can set up a custom SIT that includes the project’s code name. If a user asks Copilot about the merger using the project’s code name, their request will be blocked, keeping sensitive information secure and protected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Visibility into DLP for M365 Copilot Prompts&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;When a user’s prompt triggers a DLP policy, notifications and alerts are surfaced directly in the Microsoft Purview and Defender portals for security administrators. These alerts provide detailed information about which policy was activated, the type of sensitive information detected, and the context of the attempted Copilot interaction.&lt;/P&gt;
&lt;P&gt;Using these alert queues in Purview and Defender XDR, administrators can efficiently track policy activity, investigate potential incidents, and refine DLP rules to better align with organizational needs. The ability to review historical alerts and track ongoing enforcement empowers admins to maintain strong data security and proactively safeguard sensitive information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;DLP policy alert within the Alerts page.&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Defender XDR portal investigation of prompt DLP based incident.&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;Takeaways&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The introduction of this latest enhancement to DLP for Copilot represents a key advancement in secure Copilot deployment and adoption. By empowering organizations to block sensitive data at the prompt level, Microsoft is helping customers unlock the full potential of Copilot, without compromising security or compliance.&lt;/P&gt;
&lt;P&gt;This innovation reflects Microsoft’s commitment to responsible AI, continuous improvement, and customer-driven development. As Copilot evolves, so will the tools to protect your data, ensuring that productivity and security go hand in hand.&lt;/P&gt;
&lt;P&gt;For more details, stay tuned for updates to the Product Roadmap and Learn documentation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/dlp-microsoft365-copilot-location-learn-about" target="_blank" rel="noopener"&gt;Learn about using DLP to protect interactions with Microsoft 365 Copilot and Copilot Chat&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/dlp-microsoft365-copilot-location-default-policy" target="_blank" rel="noopener"&gt;Learn about the default DLP policy for Microsoft 365 Copilot location | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/dlp-microsoft365-copilot-location-learn-about#permissions" target="_blank" rel="noopener"&gt;Permissions to create or edit a DLP policy to safeguard Microsoft 365 Copilot and Copilot Chat&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/data-security-posture-management-learn-about" target="_blank" rel="noopener"&gt;Learn about the new Microsoft Purview Data Security Posture Management (DSPM) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/microsoft-365/roadmap?id=515945" target="_blank" rel="noopener"&gt;Roadmap Item: DLP for Microsoft 365 Copilot to safeguard prompts&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/microsoft-365/roadmap?id=548671" target="_blank" rel="noopener"&gt;Roadmap Item: DLP to safeguard web search in Microsoft 365 Copilot&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 18:13:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/safeguarding-sensitive-data-in-microsoft-365-copilot/ba-p/4512497</guid>
      <dc:creator>Aaron_Thorp</dc:creator>
      <dc:date>2026-04-21T18:13:10Z</dc:date>
    </item>
    <item>
      <title>Detecting Plain‑Text Password Exposure Using Custom Regex in Microsoft Purview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/detecting-plain-text-password-exposure-using-custom-regex-in/ba-p/4513022</link>
      <description>&lt;P&gt;Strong authentication controls like MFA significantly reduce account compromise — but they don’t eliminate the risk of password exposure.&lt;BR /&gt;In many organizations, users still interact with legacy systems, third‑party tools, or service accounts that rely on password‑only authentication. When those credentials are shared or stored in plain text — whether accidentally or out of convenience — they introduce a serious security risk.&lt;/P&gt;
&lt;P&gt;Microsoft Purview helps organizations identify and protect sensitive information using Sensitive Information Types (SITs). While built‑in detections provide a solid foundation, certain scenarios benefit from organization‑specific context and policy‑driven patterns.&lt;/P&gt;
&lt;P&gt;This post walks through how to extend password detection using a custom regex pattern — allowing you to identify strong passwords stored in plain text and respond before exposure turns into an incident.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;The Challenge: Passwords Still Appear in Everyday Content&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Despite user awareness training and improved security posture, passwords still surface in places like:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Emails shared for “quick access”&lt;/LI&gt;
&lt;LI&gt;Documents stored in collaboration sites&lt;/LI&gt;
&lt;LI&gt;Notes created during troubleshooting&lt;/LI&gt;
&lt;LI&gt;Spreadsheets used for credential tracking&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Even a single exposed password — especially for non‑MFA‑protected systems — can lead to unauthorized access or data leakage.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Extending Password Detection to Align with Organizational Policies&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Microsoft Purview includes built‑in patterns to detect generic password formats. These offer a strong baseline and are effective for broad protection scenarios.&lt;/P&gt;
&lt;P&gt;However, many organizations define specific password standards and want detection logic that reflects how passwords are referenced according to their organization policy. For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enforcing minimum and maximum password length&lt;/LI&gt;
&lt;LI&gt;Requiring complexity (letters, digits, special characters)&lt;/LI&gt;
&lt;LI&gt;Detecting passwords only when explicitly referenced, such as near the word &lt;EM&gt;password&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;Reducing false positives from random strong strings (API keys, hashes, tokens)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In these cases, custom regex‑based Sensitive Information Types allow organizations to &lt;EM&gt;build on&lt;/EM&gt; existing protection and apply targeted, high‑confidence detection.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Detection Requirements for This Scenario&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;In this example, we want to identify passwords that meet all of the following criteria:&lt;/P&gt;
&lt;P&gt;✔ Minimum length: 10 characters&lt;BR /&gt;✔ Maximum length: 20 characters&lt;BR /&gt;✔ Must contain:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;At least one alphabet character&lt;/LI&gt;
&lt;LI&gt;At least one digit&lt;/LI&gt;
&lt;LI&gt;At least one special character&lt;BR /&gt;✔ Must appear in close proximity (within 2 characters) to a keyword such as:&lt;/LI&gt;
&lt;LI&gt;password&lt;/LI&gt;
&lt;LI&gt;pwd&lt;/LI&gt;
&lt;LI&gt;passcode&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This ensures we’re detecting intentional password disclosures, not unrelated strong strings.&lt;/P&gt;
&lt;P&gt;In this scenario, the detection logic is intentionally split across three components:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Primary element – Detects password length and structure&lt;/LI&gt;
&lt;LI&gt;First supporting element – Validates password complexity rules&lt;/LI&gt;
&lt;LI&gt;Second supporting element (keywords) – Adds human context using proximity&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This structured design ensures that detection aligns closely with real‑world password disclosure patterns.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Detection Architecture Overview&lt;/STRONG&gt;&lt;/H5&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Component&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Purpose&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Primary Element&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identifies candidate password strings&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Supporting Element (Complexity)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Confirms password strength&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Supporting Element (Keywords)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Confirms contextual intent&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H5&gt;&lt;STRONG&gt;Primary Element: Password Length Identification&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The primary element focuses purely on identifying potential password strings based on length.&lt;/P&gt;
&lt;P&gt;Regex Pattern&lt;/P&gt;
&lt;P&gt;\S{10,20}&lt;/P&gt;
&lt;P&gt;What this enforces&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;No whitespace characters&lt;/LI&gt;
&lt;LI&gt;Minimum length: 10 characters&lt;/LI&gt;
&lt;LI&gt;Maximum length: 20 characters&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Proximity Configuration&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Distance between Primary and Supporting Element: 1 character&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This ensures that the supporting complexity patterns evaluate directly against the same string, rather than unrelated values nearby.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;First Supporting Element: Password Complexity Validation&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The first supporting element ensures that the detected string meets organizational password complexity requirements.&lt;/P&gt;
&lt;P&gt;All the following patterns are grouped within the same supporting element, and no internal proximity is configured (as they evaluate the same primary value).&lt;/P&gt;
&lt;P&gt;Complexity Patterns Included&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Requirement&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Regex Pattern&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;At least one uppercase letter&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;[A-Z]&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;At least one lowercase letter&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;[a-z]&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;At least one digit&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;[0-9]&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Allowed character set&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;[A-Za-z0-9!@#$%^&amp;amp;*()_+\-=]{10,}&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;At least one special character&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;[!@#$%&amp;amp;*+=]&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This approach avoids relying on a single large regex, making the detection more readable, maintainable, and auditable.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Second Supporting Element: Keyword Context (Human Intent)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;To further improve accuracy, a second supporting element is used to ensure the password appears in a meaningful, human context.&lt;/P&gt;
&lt;P&gt;Keyword List (Case‑Insensitive)&lt;/P&gt;
&lt;P&gt;credential&lt;/P&gt;
&lt;P&gt;password&lt;/P&gt;
&lt;P&gt;pwd&lt;/P&gt;
&lt;P&gt;pswd&lt;/P&gt;
&lt;P&gt;Keywords are configured in case‑insensitive mode to match variations such as Password, PWD, or Pswd.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;(You can change the keyword and Proximity Character as per the need)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Proximity Configuration&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Proximity value: 30 characters&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Why 30 Characters?&lt;/P&gt;
&lt;P&gt;This value accounts for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Maximum keyword length: 10 characters&lt;/LI&gt;
&lt;LI&gt;Maximum password length: 20 characters&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;This ensures the keyword and password must appear within the same meaningful sentence or fragment, for example:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Password: P@ssW0rd123!&lt;/P&gt;
&lt;P&gt;credential=Adm1n#Secure&lt;/P&gt;
&lt;P&gt;pwd -&amp;gt; Qwerty@2024!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;It avoids triggering on:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;RandomStrongString123!&lt;/P&gt;
&lt;P&gt;API_KEY = A9$kLmZpQw&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How This Comes Together in Microsoft Purview&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;When implemented as a custom Sensitive Information Type:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The primary element detects candidate passwords&lt;/LI&gt;
&lt;LI&gt;The first supporting element confirms password strength&lt;/LI&gt;
&lt;LI&gt;The second supporting element confirms user intent via keywords&lt;/LI&gt;
&lt;LI&gt;Proximity rules ensure all components relate to the same disclosure&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This SIT can then be used across:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Data Loss Prevention (DLP)&lt;/LI&gt;
&lt;LI&gt;Endpoint DLP&lt;/LI&gt;
&lt;LI&gt;Auto‑labelling&lt;/LI&gt;
&lt;LI&gt;Email and collaboration workload protection&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why This Design Is Effective&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;This structured approach allows organizations to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Detect real password disclosures with high confidence&lt;/LI&gt;
&lt;LI&gt;Align detection with internal password policy&lt;/LI&gt;
&lt;LI&gt;Reduce false positives from random strong strings&lt;/LI&gt;
&lt;LI&gt;Apply protection consistently across Microsoft 365 workloads&lt;/LI&gt;
&lt;LI&gt;Maintain a clean, auditable detection design&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Most importantly, it extends Microsoft Purview’s native capabilities without changing the underlying security model.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Final Takeaway&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Even in environments with strong authentication controls, password exposure remains a real risk — especially for legacy and third‑party systems.&lt;/P&gt;
&lt;P&gt;By combining length validation, complexity enforcement, and contextual keyword proximity, Microsoft Purview enables precise and scalable password detection, helping organizations identify and protect sensitive credentials before they are misused.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 16:55:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/detecting-plain-text-password-exposure-using-custom-regex-in/ba-p/4513022</guid>
      <dc:creator>samsul_ahamed</dc:creator>
      <dc:date>2026-04-20T16:55:05Z</dc:date>
    </item>
    <item>
      <title>When the shield becomes the sword: How misconfigured PAM bridges the tiering model</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/when-the-shield-becomes-the-sword-how-misconfigured-pam-bridges/ba-p/4509392</link>
      <description>&lt;P&gt;In the world of identity security, few tools promise as much peace of mind as Privileged Access Management (PAM). It is often referred to as the "vault" that locks away your kingdom's keys. However, in Microsoft Incident Response – the Detection and Response Team (DART) engagements, we frequently encounter a paradox: the tool used to secure Tier 0 often becomes a quick path for threat actors to compromise it.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;In a recent DART engagement, a&amp;nbsp;threat actor&amp;nbsp;moved from a compromised helpdesk workstation to full domain compromise in under four hours. They&amp;nbsp;didn't&amp;nbsp;use a zero-day. They used the organization's PAM server.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We have seen this story play out in real-time. An organization invests heavily in&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model" target="_blank"&gt;Active Directory (AD) Tiering&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and a premium PAM solution. They feel secure. Yet, during an incident, we trace the&amp;nbsp;threat&amp;nbsp;actor’s&amp;nbsp;path and find they&amp;nbsp;didn't&amp;nbsp;burn a zero-day or crack a complex algorithm. They simply walked across a bridge the organization built themselves: a PAM server positioned in Tier 1 that held the keys to Tier 0.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This&amp;nbsp;isn't&amp;nbsp;a failure of the product;&amp;nbsp;it's&amp;nbsp;a failure of&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;positioning&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;. This post shares what DART sees on the front lines, why "intermediaries" are the most critical link in your chain, and how to deploy PAM without rolling out a red carpet for threat actors.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;The foundation: A quick refresher on tiering&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; model&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; and PAM, PIM, and PAW concepts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Before we dive into the&amp;nbsp;threat&amp;nbsp;actor’s&amp;nbsp;tactics&amp;nbsp;and techniques,&amp;nbsp;let’s&amp;nbsp;revisit the ground rules&amp;nbsp;and define a few key concepts. The Active Directory Tiering Model is built on a simple premise:&amp;nbsp;prevent&amp;nbsp;&lt;STRONG&gt;credential&amp;nbsp;theft propagation&lt;/STRONG&gt;; ensuring that credentials&amp;nbsp;with&amp;nbsp;administrative&amp;nbsp;access&amp;nbsp;to higher-tier systems are never exposed on lower-tier systems where a&amp;nbsp;threat actor&amp;nbsp;may already have a foothold.&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tier 0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is your control plane:&amp;nbsp;Domain Controllers, PKI,&amp;nbsp;and the identities that manage&amp;nbsp;your authentication plane.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tier 1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;houses your application servers and data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tier 2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;high-risk environment&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&amp;nbsp;user workstations and devices&amp;nbsp;exposed to the internet.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The golden&amp;nbsp;rule&amp;nbsp;of tiering is&amp;nbsp;strictly one-way:&amp;nbsp;higher tier admins must never expose their credentials to lower tier systems,&amp;nbsp;and lower tiers must never have management access to higher tiers.&amp;nbsp;The core purpose of this separation is to ensure that a compromised workstation cannot yield Domain Admin credentials. However, operational tools that bridge these tiers often inadvertently break this definitional boundary.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-gb/security/business/security-101/what-is-privileged-access-management-pam" target="_blank"&gt;&lt;STRONG&gt;PAM (Privileged Access Management):&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Solutions designed to securely vault credentials and broker administrative sessions, ensuring access to critical systems is&amp;nbsp;monitored&amp;nbsp;and controlled.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-privileged-identity-management-pim" target="_blank"&gt;&lt;STRONG&gt;PIM (Privileged Identity Management):&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Tools that manage the lifecycle of elevated roles, typically by enforcing time-bound, Just-In-Time (JIT) access to&amp;nbsp;eliminate&amp;nbsp;standing privileges.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-devices" target="_blank"&gt;&lt;STRONG&gt;PAW (Privileged Access Workstation):&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Highly hardened, dedicated devices used exclusively for sensitive administrative tasks, physically or logically isolating tier admins from high-risk activities like email and web browsing.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;Figure 1: Administration with dedicated tiered accounts&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&lt;SPAN data-contrast="auto"&gt;The front-line reality: the shared intermediary trap&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Imagine this scenario: A threat actor compromises a standard workstation (Tier 2) through a phishing email. Their goal is the Domain Controller (Tier 0). In a properly tiered environment, this path is blocked; there are no credentials on the workstation to steal, and no direct privilege escalation route to the Domain Controller.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;But then the&amp;nbsp;threat actor&amp;nbsp;finds&amp;nbsp;an intermediary system.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In many environments, we see a single PAM session host used by&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;everyone&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. The Tier 1 admins use it to manage application servers, and the Tier 0 admins use it to manage Domain Controllers. This convergence creates a&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;"Shared" or "Dirty" Intermediary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;The attack path&lt;/SPAN&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The foothold:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The&amp;nbsp;threat actor&amp;nbsp;compromises a&amp;nbsp;standard&amp;nbsp;Tier 2 workstation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;The escalation:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;threat actor&amp;nbsp;moves laterally and escalates privileges&amp;nbsp;by exploiting common lower-tier misconfigurations (such as Helpdesk scenarios or exposed&amp;nbsp;privileged&amp;nbsp;service accounts) to compromise a Tier 1 administrator account who has full control over the Tier 1 PAM Host.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The pivot:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Because the PAM Session Host&amp;nbsp;resides&amp;nbsp;in Tier 1, the&amp;nbsp;threat actor&amp;nbsp;uses those compromised Tier 1 admin rights to seamlessly gain full control of the underlying operating system of the PAM host itself.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The compromise:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The&amp;nbsp;threat actor&amp;nbsp;simply waits for a Tier 0 admin to&amp;nbsp;initiate&amp;nbsp;a session. Because the&amp;nbsp;threat actor&amp;nbsp;already has full administrative control over the underlying server, it is a given that they can extract the Tier 0 credentials the moment that session begins.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Note:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;A threat actor at this stage does not need to exploit any weakness in the PAM software itself. Because the&amp;nbsp;session&amp;nbsp;host logically&amp;nbsp;resides&amp;nbsp;within the Tier 1 boundary, any identity or system with administrative rights over that tier holds ultimate authority over the host. This administrative control provides the means to&amp;nbsp;modify&amp;nbsp;the&amp;nbsp;host's&amp;nbsp;configuration, bypass security agents, and disable runtime protections before a privileged session ever begins. Once this foundational control is&amp;nbsp;established, credential material processed by the operating system for outbound privileged sessions becomes accessible. This is not a PAM product failure; it is an architectural placement failure&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Game over:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;The&amp;nbsp;threat actor&amp;nbsp;replays those credentials to take over the Domain Controller.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Here is how that&amp;nbsp;compromise&amp;nbsp;looks architecturally:&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 2: Single PAM host architecture&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;The core concept: PAM is an intermediary&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To understand why the scenario above happens, we&amp;nbsp;have to&amp;nbsp;look at how Microsoft defines&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Privileged Access Intermediaries&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As detailed in our&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-intermediaries" target="_blank"&gt;Privileged access intermediaries guidance&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, an intermediary is any system that stands between a user and a target resource. This includes VPNs, Jump Servers, and PAM solutions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-15"&gt;The Golden Rule of intermediaries&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;EM&gt;The security assurance of the target is only as good as the security assurance of the intermediary.&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559738&amp;quot;:100,&amp;quot;335572083&amp;quot;:12,&amp;quot;335572084&amp;quot;:12,&amp;quot;335572085&amp;quot;:11957550,&amp;quot;469789810&amp;quot;:&amp;quot;single&amp;quot;}"&gt;&lt;SPAN data-contrast="auto"&gt;If you manage a Tier 0 asset (like a Domain Controller) through a PAM server,&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;that PAM server becomes a Tier 0 asset&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;If that PAM server allows logins from Tier 1 users or is&amp;nbsp;reachable from Tier 2 workstations, you have effectively downgraded your Domain Controllers to the security level of a workstation.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You cannot have a "Tier 1" server managing "Tier 0" assets.&amp;nbsp;The math&amp;nbsp;simply&amp;nbsp;doesn't&amp;nbsp;work.&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Each type of intermediary serves a different role, so the security controls won’t be identical.&amp;nbsp;However,&amp;nbsp;some basics apply to all of them,&amp;nbsp;like quickly patching appliances, firmware, operating systems, and applications.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Figure 3: Security impact of different PAM approaches&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Third-party PIM/PAM&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;solutions &lt;/STRONG&gt;are often deployed on-premises or as a&amp;nbsp;Virtual Machine (VM)&amp;nbsp;in an&amp;nbsp;Infrastructure as a Service (IaaS)&amp;nbsp;environment&amp;nbsp;and are usually reachable only from internal (intranet) systems. Even if they&amp;nbsp;aren’t&amp;nbsp;exposed to the internet, one stolen credential could let a&amp;nbsp;threat&amp;nbsp;actor&amp;nbsp;reach them through VPN or other remote access methods.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{}"&gt;The hidden risk: the "master key" service account&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The attack path above assumes&amp;nbsp;a&amp;nbsp;threat&amp;nbsp;actor&amp;nbsp;waits for a human administrator to arrive. But there is a second, more direct&amp;nbsp;risk&amp;nbsp;and it&amp;nbsp;doesn’t&amp;nbsp;require patience at all.&amp;nbsp;It’s&amp;nbsp;not just about where users log in;&amp;nbsp;it’s&amp;nbsp;about the power the software&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;holds&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Consider the Password Reset scenario. A key feature of PAM is automatically rotating Domain Admin passwords,&amp;nbsp;so human admins never need to know them;&amp;nbsp;credentials are simply injected into the session. However, to perform this action, the PAM Service Account&amp;nbsp;itself requires massive privileges (typically Domain Admin or equivalent) to reset those target passwords.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here is the trap: If your PAM Core or Vault&amp;nbsp;resides&amp;nbsp;in Tier 1 (or is treated as such) but manages Tier 0 credentials, you have effectively granted Domain Admin rights to a Tier 1 asset.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A&amp;nbsp;threat actor&amp;nbsp;doesn't&amp;nbsp;even need to wait for a human administrator to log in. If they compromise the underlying server where the PAM service runs, they can extract the Service Account’s credentials. Since this account has the power to reset Domain Admin passwords, the&amp;nbsp;threat actor&amp;nbsp;instantly elevates to Tier 0;&amp;nbsp;no session&amp;nbsp;required, no waiting, no noise&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;This reinforces the golden rule:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;If a Service Account manages Tier 0, the system it&amp;nbsp;runs on&amp;nbsp;is Tier 0.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The two attack vectors:&amp;nbsp;hijacking a session and stealing the service account.&amp;nbsp;Both stem from the same root cause: architectural misplacement. Fix the placement, and you&amp;nbsp;eliminate&amp;nbsp;both.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559738&amp;quot;:100,&amp;quot;335572083&amp;quot;:12,&amp;quot;335572084&amp;quot;:12,&amp;quot;335572085&amp;quot;:11957550,&amp;quot;469789810&amp;quot;:&amp;quot;single&amp;quot;}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559738&amp;quot;:100,&amp;quot;335572083&amp;quot;:12,&amp;quot;335572084&amp;quot;:12,&amp;quot;335572085&amp;quot;:11957550,&amp;quot;469789810&amp;quot;:&amp;quot;single&amp;quot;}"&gt;Practical checklist: are you exposed?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In&amp;nbsp;DART&amp;nbsp;engagements, we use this checklist to rapidly assess if a PAM deployment is a security asset or a liability.&amp;nbsp;Use this to&amp;nbsp;validate&amp;nbsp;your own environment:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The intermediary check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Does any server used to manage Domain Controllers allow inbound RDP, SMB&amp;nbsp;or other management connections from standard workstations or Tier 1 servers?&amp;nbsp;(If yes, you are bridged).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The identity check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Do you use the same "Admin" account to log into the PAM portal for both Tier 0 and Tier 1 tasks? (If yes, you are exposing&amp;nbsp;credentials).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The reachability check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Can your PAM Vault/Core be reached from the general user network? (It should only be reachable from management zones).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The isolation check:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Are your Tier 0 Session Hosts logically and technically treated as Tier 0 assets?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;What good looks like: The tiered PAM architecture&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;How do we fix this? We&amp;nbsp;don't&amp;nbsp;throw away PAM; we align it with the&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-intermediaries" target="_blank"&gt;Enterprise Access Model&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In DART, we advocate for a &lt;STRONG&gt;t&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;iered PAM deployment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;.&lt;/STRONG&gt; This&amp;nbsp;doesn't&amp;nbsp;necessarily mean buying three different PAM vaults. It means strictly segregating the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;session&amp;nbsp;hosts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;control plane&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;The architecture of isolation&lt;/SPAN&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Tier 0 Control Plane:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;The core of your PAM (the Vault, the Policy Manager) holds the keys to the kingdom. Therefore, it must be treated as Tier 0. It should only be manageable by Tier 0 admins from Tier 0 workstations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Segregated Session Hosts:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;You must have separate&amp;nbsp;session host&amp;nbsp;infrastructure for each tier.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Tier 1 Session Host:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Accessible from Tier 1, manages Tier 1.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Blocked&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from talking to Domain&amp;nbsp;Controllers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Tier 0 Session Host:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Accessible&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;only&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from Tier 0 PAWs, manages Tier 0.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Totally isolated&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;from the rest of the network.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This diagram illustrates a PAM deployment that respects the tiering model:&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Figure 4: Separate PAM host architecture&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;F&lt;SPAN data-contrast="auto"&gt;or a deeper dive into reconciling these paradigms,&amp;nbsp;review&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-intermediaries" target="_blank"&gt;Intermediaries in Securing Privileged Administration&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and Microsoft's guide on&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-identity-manager/pam/tier-model-for-partitioning-administrative-privileges" target="_blank"&gt;Partitioning Administrative Privileges&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:320,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:320,&amp;quot;335559740&amp;quot;:240}"&gt;FAQ: Clearing the confusion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: Does PAM always belong&amp;nbsp;in&amp;nbsp;Tier 0?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;If the PAM system manages Tier 0 credentials or provides access to Tier 0 assets,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;yes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;The components that touch Tier 0 (Vault, Brokers, Session Hosts) must be secured at Tier 0 standards.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: Can we use a single "hardened"&amp;nbsp;session host&amp;nbsp;for all tiers to save costs?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;In DART's experience,&amp;nbsp;no. "Hardening" is often a configuration state that drifts or is bypassed by zero-days.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Architecture beats configuration.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;If you bridge the network tiers, a compromised Tier 1 admin account is all a&amp;nbsp;threat actor&amp;nbsp;needs to gain OS-level control of that host and from there, access to Tier 0 sessions is a matter of patience, not sophistication.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: If we have PAM, do we still need the Tiering Model?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Absolutely.&amp;nbsp;PAM&amp;nbsp;doesn’t&amp;nbsp;replace Tiering; when implemented correctly, it adds another layer of security and/or&amp;nbsp;governance.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tiering&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;keeps credentials and admin access separated,&amp;nbsp;so&amp;nbsp;threat actors&amp;nbsp;can’t&amp;nbsp;easily move sideways or reuse stolen hashes.&amp;nbsp;PAM provides&amp;nbsp;workflow, rotation, and audit trails.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: What is the most common mistake you see?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;We&amp;nbsp;frequently&amp;nbsp;see organizations approach PAM as a "magic stick", believing it secures everything about credential hygiene.&amp;nbsp;Yet, because they assume the tool secures itself, they treat this critical infrastructure as just another Tier-1 asset. It gets patched like a standard file server and&amp;nbsp;monitored&amp;nbsp;like a print server, rather than being hardened and isolated as a Tier-0&amp;nbsp;component. This mindset&amp;nbsp;doesn't&amp;nbsp;secure the environment; it creates a fragile bridge that&amp;nbsp;threat&amp;nbsp;actors can easily cross.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q: Our PAM vendor says their session host is hardened out of the box. Why is this still a risk?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PAM vendors are right that a well-configured session host with Credential&amp;nbsp;Guard&amp;nbsp;enabled, application control enforced, and remote management restricted&amp;nbsp;is&amp;nbsp;considerably harder&amp;nbsp;to exploit than a&amp;nbsp;stock&amp;nbsp;Windows Server. Some vendors use Kerberos constrained delegation with S4U2Proxy, meaning the machine account rather than the Domain Admin’s actual credentials&amp;nbsp;authenticates&amp;nbsp;to the target, which limits direct credential exposure. These are meaningful controls and we&amp;nbsp;don’t&amp;nbsp;dismiss them. However,&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;application-layer hardening is defeated by OS-layer control&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;. &lt;/STRONG&gt;If the PAM host is domain-joined and sits in a Tier 1 OU, a Tier 1 Domain Admin has Group Policy, software deployment rights, and&amp;nbsp;Active Directory&amp;nbsp;machine account control over that host. They can push a GPO to disable Credential Guard, deploy a driver via software distribution, or alter the&amp;nbsp;machine’s&amp;nbsp;configuration before the next reboot,&amp;nbsp;all using entirely legitimate AD administration tools.&amp;nbsp;The vendor’s hardening is irrelevant once the&amp;nbsp;threat actor&amp;nbsp;controls the tier the machine lives in. This is precisely why&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;tier placement is not a PAM configuration decision; it is an Active Directory architecture decision.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Q:&amp;nbsp;We’re&amp;nbsp;cloud-first and use Entra ID. Does AD Tiering still apply to us?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The specific tier labels change, but the principle does not. Microsoft’s&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model" target="_blank"&gt;Enterprise Access Model&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is the cloud-era evolution of AD Tiering, built around the same core concept: Control Plane (equivalent to Tier 0), Management Plane (Tier 1), and User Access / Data Plane (Tier 2). In an Entra ID environment, your Control Plane includes Global Administrators, Privileged Role Administrators, and the Conditional Access policies that govern them. A PAM or PIM&amp;nbsp;solution&amp;nbsp;managing those identities must be treated with the same isolation discipline. Hybrid environments,&amp;nbsp;where on-premises AD and Entra ID are synchronized,&amp;nbsp;carry the&amp;nbsp;additional&amp;nbsp;risk that a compromise of either plane can propagate to the other through synchronization. If anything, hybrid environments make strict intermediary placement&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;more&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; critical, not less.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN data-ccp-props="{}"&gt;Conclusion&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;PAM is a powerful tool in the defender’s arsenal;&amp;nbsp;but like any powerful tool, its effectiveness depends entirely on how it is positioned.&amp;nbsp;The&amp;nbsp;threat actors&amp;nbsp;we&amp;nbsp;encounter&amp;nbsp;in DART&amp;nbsp;engagements&amp;nbsp;don’t look for the most sophisticated path to Domain Admin. They look for the most&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;trusted&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;one.&amp;nbsp;A PAM server in the wrong tier&amp;nbsp;isn’t&amp;nbsp;a hardened barrier;&amp;nbsp;it’s&amp;nbsp;a trusted bridge with a gold-plated sign.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By aligning your PAM deployment with the principles of&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/overview" target="_blank"&gt;Privileged Access Administration&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;treating session hosts and service accounts as the tier of the assets they manage, not the zone they physically sit in,&amp;nbsp;you close the bridge before a&amp;nbsp;threat actor&amp;nbsp;finds it.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Build your architecture like a&amp;nbsp;threat actor&amp;nbsp;will find it. Because they will.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Stay secure, stay&amp;nbsp;tiered.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:200,&amp;quot;335572079&amp;quot;:6,&amp;quot;335572080&amp;quot;:1,&amp;quot;335572081&amp;quot;:11957550,&amp;quot;469789806&amp;quot;:&amp;quot;single&amp;quot;}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 18:34:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/when-the-shield-becomes-the-sword-how-misconfigured-pam-bridges/ba-p/4509392</guid>
      <dc:creator>UgurTGudekli</dc:creator>
      <dc:date>2026-04-15T18:34:46Z</dc:date>
    </item>
    <item>
      <title>Security Community Spotlight: Fabrício Assumpção</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/security-community-spotlight-fabr%C3%ADcio-assump%C3%A7%C3%A3o/ba-p/4511342</link>
      <description>&lt;img /&gt;
&lt;P&gt;Meet Fabrício Assumpção, a Technical Specialist Architect for a Microsoft Security and Compliance Certified Partner, based in Brazil. Fabrício considers his involvement with the Microsoft Security Community defined by a dual approach: architectural innovation and technical enablement. As a Microsoft Certified Trainer (MCT) since 2021, he has been dedicated to bridging the gap between theory and real-world implementation for security professionals globally.&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;What do you find most rewarding about being a member of the Microsoft Security Community?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;The most rewarding part of being a member of the Microsoft Security Community is the direct access to the pulse of cybersecurity innovation. As a Microsoft Certified Trainer (MCT) and a developer/engineer/architect focused on Cloud Security/M365 Security and SIEM, being in this ecosystem allows me to bridge the gap between complex architectural challenges and AI-driven solutions. Developing security agents for Microsoft Security Copilot is particularly fulfilling because I can see how the community’s collective knowledge shapes the future of automated defense. &lt;STRONG&gt;&lt;SPAN class="lia-text-color-15"&gt;For me, it’s not just about the tools, but about being part of a global movement that empowers defenders to stay ahead of sophisticated threats through intelligence and automation.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;How would you describe your Microsoft Community involvement?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;In my role as a Security Architect and Engineer at adaQuest, I advocate for Microsoft’s vision by designing and deploying complex security infrastructures. My work spans the entire Microsoft Security stack, from high-level XDR (Microsoft Defender) strategies and SIEM (Microsoft Sentinel) deployments to the cutting edge of AI-driven defense. Currently, alongside my other activities, I'm focused on developing custom security agents for Microsoft Security Copilot, a task that allows me to push the boundaries of how automation and AI can empower modern SOCs.&lt;/P&gt;
&lt;P&gt;While my primary involvement has been focused on technical architecture and developing security Copilot agents, my ideal community experience would be centered on deep-tier technical co-creation.&amp;nbsp; I envision a community space that facilitates direct architectural dialogues between Microsoft product teams and the engineers who are building on top of those platforms. For me, the most valuable community experience is one that prioritizes 'early-access' feedback loops and specialized hackathons where we can stress-test new features—like advanced XDR integrations or AI agent capabilities—before they hit the mainstream. My ideal is a community that functions as a high-octane R&amp;amp;D hub, where the collective expertise of architects and developers directly influences the roadmap of the security tools we use every day&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Editor’s note: The scenario Fabrício describes above is much like the&amp;nbsp;&lt;/EM&gt;&lt;A href="https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR5n91RGSMY5MoMjm9pNflCtUODMzMkFLR1JYT1dWRVM4NEZLU0tBRTRZRCQlQCN0PWcu&amp;amp;route=shorturl" target="_blank" rel="noopener"&gt;&lt;EM&gt;Security Advisors&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt; program, which gives you early access to products, features, and private previews. Your feedback to engineering has the power to directly influence Microsoft Security products. If this interests you, consider&lt;A class="lia-external-url" href="https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR5n91RGSMY5MoMjm9pNflCtUODMzMkFLR1JYT1dWRVM4NEZLU0tBRTRZRCQlQCN0PWcu&amp;amp;route=shorturl" target="_blank" rel="noopener"&gt; joining&lt;/A&gt;!&lt;/EM&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;How long have you been working with Microsoft Security products?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;My Microsoft security journey is a story of evolution—from a cloud support engineer resolving complex L3/L4 infrastructure issues to a Security Architect leading global SOC operations. I have spent the last decade mastering the transition to the cloud, starting with identity and endpoint management (Entra ID and Intune) and progressing to end-to-end administration of the Microsoft 365 and Azure security stack. A turning point was joining adaQuest, where I took the lead on SOCaaS and began bridging the gap between governance and hands-on engineering and Sentinel. Today, my journey has reached its most exciting phase: pioneering the use of Generative AI in security to build scalable, automated solutions that protect clients worldwide.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;What features or products have provided the most impact? Please describe how it has helped you or your customers.&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The most impactful solution has been the integration of Microsoft Sentinel with Security Copilot through custom-developed security agents. This combination has revolutionized how our customers manage their security posture, allowing them to orchestrate and query the entire Defender XDR, Entra ID, and Purview stack through natural language automation. The most direct benefit for our clients has been a drastic reduction in Mean Time to Respond (MTTR) and a significant increase in operational efficiency, transforming complex security data into proactive defense. This unified approach ensures that our customers maximize their investment in the Microsoft ecosystem while maintaining high-speed resilience against sophisticated threats.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;You’ve indeed been instrumental in building with Microsoft Security. What can you share with us, and can you tell us about your journey?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;I am incredibly proud of being a pioneer in the Microsoft Security Copilot ecosystem. In early 2025, before official documentation was fully available or the feature had reached General Availability (GA), I conceptualized and developed six custom security agents designed to enhance automated defense and incident response.&lt;/P&gt;
&lt;P&gt;These agents were the result of a deep dive into the underlying architecture of AI-driven security, where I had to materialize complex ideas into functional, real-world tools without a predefined roadmap. My work was officially showcased and published during the historic announcement of the Microsoft Security Store in 2025, marking the debut of third-party security agents.&lt;/P&gt;
&lt;P&gt;Seeing these agents evolve from initial concepts to essential tools for the SOC of the future—enabling faster, more intelligent decision-making—is my most rewarding professional achievement. It represents my commitment to pushing the boundaries.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Fabricio’s agents are available in the &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Security Store&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;. Here’s what he’s built (&lt;EM&gt;so far…&lt;/EM&gt;)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_admin_guard_insight" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Admin Guard Insight&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An agent focused on privileged identity and access analysis. It reviews administrative roles, sensitive changes, and risk signals to identify exposure, misuse of privileges, and opportunities to strengthen security posture.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_login_investigator" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Login Investigator&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An agent designed to investigate suspicious sign-in activity. It correlates authentication details, IPs, locations, devices, user risk, and related incidents to determine whether a login is legitimate or potentially malicious.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_entity_guard_investigator" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Entity Guard&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An entity-centric investigation agent for users, devices, applications, or service principals. It consolidates signals from multiple sources to enrich entity context and identify abnormal behavior, exposure, and associated risks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_sentinel_data_leak" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Data Leak Agent&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An agent specialized in investigating potential data leakage and sensitive information exposure. It validates and correlates incidents across Microsoft Defender XDR and Microsoft Sentinel to produce a more reliable and contextualized investigation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_l1_soc_triage_agent" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;L1 SOC Triage&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An agent built to support first-level SOC alert and incident triage. It helps classify events, enrich context, prioritize severity, and recommend next steps or escalation paths for analysts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_ransomware_kill_chain_investigator" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Ransomware Kill Chain Investigator&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An agent focused on ransomware investigations. It correlates evidence and maps observed activity to the ransomware kill chain to help teams understand the attack, impacted assets, and priority response actions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A href="https://securitystore.microsoft.com/solutions/adaquestinc1589508805668.scp_agent_ews_sunset_readiness_assessor" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;EWS Sunset Readiness Assessor&lt;/STRONG&gt;&lt;/A&gt;&lt;BR /&gt;An agent that assesses an organization’s readiness for Exchange Web Services (EWS) deprecation. It identifies application and service principal dependencies and supports planning for migration to more modern and secure alternatives.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;What impact has&amp;nbsp;integrating&amp;nbsp;with Microsoft Security&amp;nbsp;had on&amp;nbsp;your business&amp;nbsp;or&amp;nbsp;your customers?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Integrating with Microsoft Security has had a significant impact on both our business and our customers. For our business, it has enabled us to build higher-value security services and differentiated solutions, such as Security Copilot agents tailored to real operational challenges in identity protection, incident triage, data leakage investigations, ransomware analysis, and legacy dependency assessments.&lt;/P&gt;
&lt;P&gt;For our customers, the impact has been: improved speed, consistency, and depth in security operations. By leveraging Microsoft Security signals and platforms such as Microsoft Defender, Microsoft Sentinel, and Entra, we help teams investigate incidents faster, reduce manual effort, improve decision-making, and strengthen overall security posture. In practice, this means customers gain more actionable insights, better prioritization, and more efficient use of their security resources.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;What advice do you have for oth&lt;/STRONG&gt;&lt;STRONG&gt;ers who would like to get involved in the Microsoft Community?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;My advice is to bridge the gap between learning and building. Don’t just consume content; start creating solutions for real-world challenges, such as AI-driven automation in Security Copilot or Microsoft Sentinel. Use your practical experience to help others, and remember that teaching is one of the most powerful ways to contribute. In an era of rapid AI evolution, being a proactive 'early adopter' who shares insights is the best way to grow within the Microsoft Community and help protect the global digital landscape.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Fabrício beyond Microsoft Security&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Beyond my technical career, I am a lifelong learner with a deep passion for understanding how the world works, from the complexities of Quantum Computing—which I studied at the University of Coimbra—to the fundamental principles of Physics, Astronomy, and Philosophy. I am currently pursuing two Master’s degrees, as I believe that diverse knowledge fuels creativity.&amp;nbsp; I am also a polyglot at heart, teaching myself Italian, Spanish, Russian, and Chinese using open-source materials. My creative side is expressed through music, as I play both the violin and the piano. In my spare time, I enjoy the discipline of sports; I have a history as both a player and coach of Rugby, and I am a fan of Ice Hockey. My future plans include completing my Doctorate and embracing a nomadic lifestyle to experience different cultures and perspectives. For me, life is about the continuous pursuit of wisdom and the belief that we can always expand the boundaries of our own understanding. &lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Connect with&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/in/fabricio-assumpcao/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Fabrício&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; on LinkedIn&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;____________________________________________________________________________________________&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn and Engage with the Microsoft Security Community&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/bpblog" target="_blank" rel="noopener"&gt;Microsoft Security Community Blog&lt;/A&gt;.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;.&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/bpcommunity" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/bpadvisors" target="_blank" rel="noopener"&gt;Microsoft Security Advisors.&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/pbseclinkedin" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn Group&amp;nbsp;&lt;/A&gt;and follow the&amp;nbsp;&lt;A href="https://aka.ms/pbentralinkedin" target="_blank" rel="noopener"&gt;Microsoft Entra Community on LinkedIn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 17:13:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/security-community-spotlight-fabr%C3%ADcio-assump%C3%A7%C3%A3o/ba-p/4511342</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2026-04-15T17:13:44Z</dc:date>
    </item>
    <item>
      <title>Why UK Enterprise Cybersecurity Is Failing in 2026 (And What Leaders Must Change)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/why-uk-enterprise-cybersecurity-is-failing-in-2026-and-what/ba-p/4511187</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Enterprise cybersecurity in large organisations&lt;/STRONG&gt; has always been an asymmetric game. But with the rise of AI‑enabled cyber attacks, that imbalance has widened dramatically - particularly for &lt;STRONG&gt;UK and EMEA enterprises operating complex cloud, SaaS, and identity‑driven environments&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/?sort-by=newest-oldest&amp;amp;date=any" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence&lt;/A&gt; and &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/author/windows-defender-research/" target="_blank" rel="noopener"&gt;Microsoft Defender Security Research&lt;/A&gt; have &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/?msockid=0b14f701326860f033e0e01233a961ea" target="_blank" rel="noopener"&gt;publicly reported&lt;/A&gt; a clear shift in how attackers operate: &lt;STRONG&gt;AI is now embedded across the entire attack lifecycle&lt;/STRONG&gt;. Threat actors use AI to accelerate reconnaissance, generate highly targeted phishing at scale, automate infrastructure, and adapt tactics in real time - dramatically reducing the time required to move from initial access to business impact.&lt;/P&gt;
&lt;P&gt;In recent months, &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/" target="_blank" rel="noopener"&gt;Microsoft has documented&lt;/A&gt; &lt;STRONG&gt;AI‑enabled phishing campaigns abusing legitimate authentication mechanisms&lt;/STRONG&gt;, including OAuth and device‑code flows, to compromise &lt;STRONG&gt;enterprise accounts at scale&lt;/STRONG&gt;. These attacks rely on automation, dynamic code generation, and highly personalised lures - not on exploiting traditional vulnerabilities or stealing passwords.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Reality Gap: Adaptive Attackers vs. Static Enterprise Defences&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Meanwhile, many UK enterprises still rely on &lt;STRONG&gt;legacy cybersecurity controls&lt;/STRONG&gt; designed for a very different threat model - one rooted in a far more predictable world.&lt;/P&gt;
&lt;P&gt;This creates a dangerous "Resilience Gap."&lt;/P&gt;
&lt;P&gt;Here is why your current stack is failing- and the &lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;C-Suite strategy&lt;/STRONG&gt; required to fix it.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;1. &lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;The Failure of Traditional Antivirus in the AI Era&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIAxAA" data-complete="true" data-processed="true"&gt;Traditional antivirus (AV) relies on static signatures and hashes. It assumes malicious code remains identical across different targets.&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;AI has rendered this assumption obsolete. &lt;/STRONG&gt;Modern malware now uses&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;automated mutation&lt;/STRONG&gt; to generate unique code variants at execution time, and adapts behaviour based on its environment.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIAxAA" data-complete="true" data-processed="true"&gt;Microsoft Threat Intelligence has observed threat actors using AI‑assisted tooling to rapidly rewrite payload components, ensuring that every deployment looks subtly different. In this model, there is no reliable signature to detect. By the time a pattern exists, the attacker has already moved on. Signature‑based detection is not just slow - it is structurally misaligned with AI‑driven attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The Risk:&lt;/STRONG&gt; If your security relies on "recognising" a threat, you are already breached. By the time a signature exists, the attacker has evolved.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The C-Suite Pivot:&lt;/STRONG&gt;&amp;nbsp;Shift investment from artifact detection to&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;EDR/XDR (Extended Detection and Response)&lt;/STRONG&gt;. We must prioritise&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;behavioural analytics&lt;/STRONG&gt;&amp;nbsp;and machine learning models that identify&amp;nbsp;&lt;EM data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;intent&lt;/EM&gt;&amp;nbsp;rather than file names.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;2. Why Perimeter Firewalls Fail in a Cloud-First World&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIBxAA" data-complete="true" data-processed="true"&gt;Many UK enterprise still rely on firewalls enforcing static allow/deny rules based on IP addresses and ports. This model worked when applications were predictable and networks clearly segmented.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIBxAA" data-complete="true" data-processed="true"&gt;Today, enterprise traffic is encrypted, cloud‑hosted, API‑driven, and deeply integrated with SaaS and identity services. &lt;STRONG&gt;AI‑assisted phishing&lt;/STRONG&gt; campaigns abusing OAuth and device‑code flows demonstrate this clearly. From a network perspective, everything looks legitimate: HTTPS traffic to trusted identity providers. No suspicious port. No malicious domain. Yet the attacker successfully compromises identity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The Risk:&lt;/STRONG&gt; Traditional firewalls are "blind" to identity-based breaches in cloud environments.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The C-Suite Pivot:&lt;/STRONG&gt;&amp;nbsp;Move to&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;Identity-First Security&lt;/STRONG&gt;. Treat&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;Identity as the new Control Plane&lt;/STRONG&gt;, integrating signals like user risk, device health, and geolocation into every access decision.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;3. The Critical Weakness of Single-Factor Authentication&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Despite clear&amp;nbsp;&lt;A class="lia-external-url" href="https://www.ncsc.gov.uk/news/government-adopt-passkey-technology-digital-services" target="_blank" rel="noopener"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;NCSC guidance&lt;/STRONG&gt;&lt;/A&gt;, single-factor passwords remain a common vulnerability in legacy applications and VPNs.&lt;/P&gt;
&lt;P&gt;AI-driven credential abuse has changed the economics of these attacks. Threat actors now deploy&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;adaptive phishing campaigns&lt;/STRONG&gt; that evolve in real-time. Microsoft has observed attackers using AI to hyper-target high-value UK identities- specifically&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true" aria-owns="action-menu-parent-container"&gt;CEOs, Finance Directors, and Procurement leads.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDBAA" data-complete="true" data-processed="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDRAA" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The Risk:&lt;/STRONG&gt; Static passwords are now the primary weak link in&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;UK supply chain security&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDRAB" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The C-Suite Pivot:&lt;/STRONG&gt; Mandate &lt;A href="https://learn.microsoft.com/en-us/security/zero-trust/sfi/phishing-resistant-mfa" target="_blank" rel="noopener"&gt;Phishing‑resistant MFA&lt;/A&gt; (Passkeys or hardware security keys). &amp;nbsp;Implement&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;Conditional Access&lt;/STRONG&gt; policies that evaluate risk dynamically at the moment of access, not just at login.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;
&lt;P class="lia-align-center"&gt;Legacy Security vs. AI‑Era Reality&lt;/P&gt;
&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;4.&amp;nbsp;The Inherent Risk of VPN-Centric Security&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIAxAA" data-complete="true" data-processed="true"&gt;VPNs were built on a flawed assumption: that anyone "inside" the network is trustworthy. In 2026, this logic is a liability.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIBBAA" data-complete="true" data-processed="true"&gt;AI-assisted attackers now use automation to map internal networks and identify escalation paths the moment they gain VPN access. Furthermore,&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;Microsoft&lt;/STRONG&gt;&amp;nbsp;has tracked nation-state actors using AI to create&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;synthetic employee identities- &lt;/STRONG&gt;complete with fake resumes and deepfake communication. In these scenarios,&lt;STRONG&gt; VPN access isn't "hacked"; it is legally granted to a fraudster.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDxAA" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The Risk:&lt;/STRONG&gt;&amp;nbsp;A compromised VPN gives an attacker the "keys to the kingdom."&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDxAB" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The C-Suite Pivot:&lt;/STRONG&gt;&amp;nbsp;Transition to&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;Zero Trust Architecture (ZTA)&lt;/STRONG&gt;. Access must be explicit, scoped to the specific application, and&amp;nbsp;&lt;/SPAN&gt;
&lt;P&gt;continuously re‑evaluated using behavioural signals.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;5. Data: The High-Velocity Target&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIBxAA" data-complete="true" data-processed="true"&gt;Sensitive data sitting unencrypted in legacy databases or backups is a ticking time bomb. In the AI era, data discovery is no longer a slow, manual process for a hacker.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEICBAA" data-complete="true" data-processed="true"&gt;Attackers now use AI to instantly analyse your directory structures, classify your files, and prioritise high-value data for theft.&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;Unencrypted data&lt;/STRONG&gt; significantly increases your "blast radius," turning a containable incident into a catastrophic board-level crisis.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEICBAA" data-complete="true" data-processed="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIERAA" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The Risk:&lt;/STRONG&gt; Beyond the technical breach, unencrypted data leads to massive&amp;nbsp;&lt;A class="lia-external-url" href="https://www.gov.uk/government/publications/data-protection-fining" target="_blank" rel="noopener"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;UK GDPR fines&lt;/STRONG&gt;&lt;/A&gt; and irreparable brand damage.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIERAB" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The C-Suite Pivot:&lt;/STRONG&gt;&amp;nbsp;Adopt&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;Data-Centric Security&lt;/STRONG&gt;. Implement encryption by default,&amp;nbsp;&lt;/SPAN&gt;classify data while adding&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/purview/create-sensitivity-labels?tabs=classic-label-scheme" target="_blank" rel="noopener"&gt;sensitivity labels &lt;/A&gt;and start board-level discussions regarding &lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;A href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank" rel="noopener"&gt;post‑quantum cryptography (PQC&lt;/A&gt;)&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;to future-proof your most sensitive assets.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;6. The Failure of Static IDS&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P class=""&gt;Traditional&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;Intrusion Detection Systems (IDS)&lt;/STRONG&gt;&amp;nbsp;rely on known indicators of compromise - assuming attackers reuse the same tools and techniques. AI‑driven attacks deliberately avoid that assumption.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDBAA" data-complete="true" data-processed="true"&gt;Threat actors are now using&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;Large Language Models (LLMs)&lt;/STRONG&gt; to weaponize newly disclosed vulnerabilities within hours. While your team waits for a "known pattern" to be updated in your system, the attacker is already using a custom, AI-generated exploit.&lt;/P&gt;
&lt;P data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIDBAA" data-complete="true" data-processed="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL data-sfc-root="c" data-sfc-cb="" data-complete="true" data-processed="true"&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIExAA" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The Risk:&lt;/STRONG&gt;&amp;nbsp;Your team is defending against yesterday's news while the attacker is moving at machine speed.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-sfc-root="c" data-sfc-cb="" data-hveid="CAEIExAB" data-complete="true" data-sae=""&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;The C-Suite Pivot:&lt;/STRONG&gt;&amp;nbsp;Invest in&amp;nbsp;&lt;STRONG data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;Adaptive Threat Detection&lt;/STRONG&gt;. Move toward &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-graph-overview?tabs=defender" target="_blank" rel="noopener"&gt;Graph‑based XDR platforms&lt;/A&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true" aria-owns="action-menu-parent-container"&gt; that correlate signals across email, endpoint, and cloud to &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/air-about" target="_blank" rel="noopener"&gt;automate investigation&amp;nbsp;&lt;/A&gt;and response &lt;/SPAN&gt;&lt;SPAN data-sfc-cp="" data-sfc-root="c" data-sfc-cb="" data-complete="true"&gt;before the damage spreads.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;BR /&gt;
&lt;P class="lia-align-center"&gt;From Static Security to Continuous Security&lt;/P&gt;
&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Closing Thought: Security Is a Journey, Not a D&lt;/STRONG&gt;&lt;STRONG&gt;estination&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;For UK enterprises, the shift toward adaptive cybersecurity is&amp;nbsp;&lt;STRONG&gt;no longer optional&lt;/STRONG&gt; - it is increasingly driven by&amp;nbsp;&lt;STRONG&gt;regulatory expectation, board oversight, and accountability for operational resilience&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Recent UK cyber resilience reforms and evolving regulatory frameworks signal a clear direction of travel: &lt;STRONG&gt;cybersecurity is now a board‑level responsibility&lt;/STRONG&gt;, not a back‑office technical concern. Directors and executive leaders are expected to demonstrate effective governance, risk ownership, and preparedness for cyber disruption - particularly as AI reshapes the threat landscape.&lt;/P&gt;
&lt;P&gt;AI is not a future cybersecurity problem.&lt;BR /&gt;It is a &lt;STRONG&gt;current force multiplier for attackers&lt;/STRONG&gt;, exposing the limits of legacy enterprise security architectures faster than many organisations are willing to admit.&lt;/P&gt;
&lt;P&gt;The uncomfortable truth for boards in 2026 is that &lt;STRONG&gt;no enterprise is 100% secure&lt;/STRONG&gt;. Intrusions are inevitable. Credentials will be compromised. Controls will be tested.&lt;/P&gt;
&lt;P&gt;The difference between a resilient enterprise and a vulnerable one is not the absence of incidents, but &lt;STRONG&gt;how risk is managed when they occur&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;In mature organisations, this means assuming breach and designing for containment:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Access controls&lt;/STRONG&gt; that limit blast radius&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Least privilege and conditional access &lt;/STRONG&gt;restricting attackers to the smallest possible scope if an identity is compromised&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data‑centric security&lt;/STRONG&gt; using automated classification and encryption, ensuring that even when access is misused, sensitive data cannot be freely exfiltrated&amp;nbsp;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As a &lt;STRONG&gt;Senior Enterprise Cybersecurity Architect&lt;/STRONG&gt;, I see this moment as a unique opportunity. AI adoption does not have to repeat the mistakes of earlier technology waves, where innovation moved fast and security followed years later.&lt;/P&gt;
&lt;P&gt;We now have a rare chance to &lt;STRONG&gt;embed security from day one&lt;/STRONG&gt; - designing identity controls, data boundaries, automated monitoring, and governance &lt;STRONG&gt;before&lt;/STRONG&gt; AI systems become business‑critical.&lt;/P&gt;
&lt;P&gt;When security is built in upfront, enterprises don’t just reduce risk - they gain the confidence to move faster and unlock AI’s value safely.&lt;/P&gt;
&lt;P&gt;Security is no longer a “department”.&lt;BR /&gt;In the age of AI, it is a &lt;STRONG&gt;continuous business function&lt;/STRONG&gt; - essential to preserving trust and maintaining operational continuity as attackers move at machine speed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;References:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/" target="_blank" rel="noopener"&gt;Inside an AI‑enabled device code phishing campaign | Microsoft Security Blog&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/?msockid=0b14f701326860f033e0e01233a961ea" target="_blank" rel="noopener"&gt;AI as tradecraft: How threat actors operationalize AI | Microsoft Security Blog&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2026/03/12/detecting-analyzing-prompt-abuse-in-ai-tools/" target="_blank" rel="noopener"&gt;Detecting and analyzing prompt abuse in AI tools | Microsoft Security Blog&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank" rel="noopener"&gt;Post-Quantum Cryptography | CSRC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/" target="_blank" rel="noopener"&gt;Microsoft Digital Defense Report 2025 | Microsoft&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;https://www.ncsc.gov.uk/news/government-adopt-passkey-technology-digital-services&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 16:31:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/why-uk-enterprise-cybersecurity-is-failing-in-2026-and-what/ba-p/4511187</guid>
      <dc:creator>Alex_Zold</dc:creator>
      <dc:date>2026-04-20T16:31:29Z</dc:date>
    </item>
    <item>
      <title>Hunting Infostealers - Trusted Platform Abuse</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-trusted-platform-abuse/ba-p/4505343</link>
      <description>&lt;P&gt;In this part of the “Hunting Infostealers” series, we explore the growing abuse of trusted communication services and software ecosystems—including messaging platforms like WhatsApp and seemingly benign PDF converter tools—to propagate malware and deploy credential stealers such as Eternidade Stealer, lowering user suspicion and complicating detection. Throughout the blog, we map observed activity to Microsoft Defender XDR coverage and provide actionable guidance to help organizations detect, mitigate, and respond to infostealers.&lt;/P&gt;
&lt;P&gt;Platform Abuse (WhatsApp, PDF Converters)&lt;BR /&gt;Since late 2025, Platform abuse has become an increasingly prevalent tactic in the modern threat landscape, wherein adversaries deliberately exploit the legitimacy, scale, and user trust associated with widely used applications and services. By weaponizing platforms such as WhatsApp and seemingly benign PDF conversion tools, threat actors are able to disguise malicious activity within normal user behavior, enabling efficient malware delivery, lateral propagation, and evasion of traditional security controls.&lt;/P&gt;
&lt;H3&gt;WhatsApp Abused to Deliver Eternidade Stealer&lt;/H3&gt;
&lt;P&gt;During the third week of November 2025, Microsoft Defender Experts (DEX) identified a WhatsApp platform abuse campaign that leverages a multi-stage infection chain and worm-like propagation techniques to distribute malware. The activity begins with the execution of an obfuscated Visual Basic script, which drops a malicious batch file that launches multiple PowerShell instances to download additional payloads from adversary-controlled command-and-control domains. These payloads include a Python script responsible for WhatsApp Web–based dissemination of the malware in a worm-like manner, as well as a malicious MSI installer that ultimately delivers the Eternidade Stealer. To ensure successful execution, the batch script also installs the required Python dependencies on the compromised system.&lt;/P&gt;
&lt;P&gt;The Python script establishes communication with a remote server and leverages the open-source project WPPConnect to automate message sending from hijacked WhatsApp accounts. As part of this process, it harvests the victim’s entire contact list while filtering out groups, business contacts, and broadcast lists. The malware then collects, for each contact, the associated WhatsApp phone number, name, and an indicator showing whether the contact is saved. This information is exfiltrated to an attacker-controlled server via an HTTP POST request. In the final stage of this propagation mechanism, the malware sends a malicious attachment to all harvested contacts, using a predefined messaging template populated with time-based greetings and contact names to increase the likelihood of interaction.&lt;/P&gt;
&lt;P&gt;The malicious MSI installer drops several components, including encrypted payload files with .dmp and .tda extensions, an &lt;STRONG&gt;AutoIt executable&lt;/STRONG&gt;, and a script loader disguised as a &lt;STRONG&gt;.log&lt;/STRONG&gt; file. Despite its benign appearance, the .log file functions as an AutoIt-based malicious script that conducts environment reconnaissance, performs anti-detection checks, and loads payloads in memory using large hex-encoded binary blobs to initialize native components. The encrypted .tda file acts as an injector and employs a process hollowing technique to execute the final payload. Specifically, the injector reads the .dmp file, decrypts the embedded payload, and injects the Eternidade Stealer into svchost.exe, allowing the malware to run stealthily under the guise of a trusted system process.&lt;/P&gt;
&lt;P&gt;Eternidade Stealer, a Delphi-based credential stealer, continuously monitors active windows and running processes for strings associated with banking portals, payment services, and cryptocurrency exchanges and wallets. These include, but are not limited to, Bradesco, BTG Pactual, MercadoPago, Stripe, Binance, Coinbase, MetaMask, and Trust Wallet, highlighting its focus on harvesting sensitive financial and cryptocurrency-related information&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;WhatsApp Abuse to Deliver Eternidade Stealer Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H3&gt;Malicious Crystal PDF installer campaign&lt;/H3&gt;
&lt;P&gt;In late September 2025, Microsoft Defender Experts (DEX) discovered a malicious campaign conducted by an unknown threat actor centered on an application masquerading as a PDF editor named Crystal PDF. The campaign leveraged malvertising and search engine optimization (SEO) poisoning techniques, using misleading advertisements to lure users into downloading a malicious payload.&lt;/P&gt;
&lt;P&gt;The attack chain begins when a user clicks the download button for the PDF editor on &lt;STRONG&gt;crystalpdf[.]com&lt;/STRONG&gt;. The request is redirected to one of two actor-controlled domains, from which the CrystalPDF.exe payload is downloaded. Users most likely arrived at this website through deceptive advertisements distributed via Google Ads, which served as the primary lure for the campaign. Microsoft suspects that Google Ads were used based on the URL format observed in telemetry: &lt;STRONG&gt;hxxps://smartdwn[.]com/download?v=&amp;lt;GUID&amp;gt;&amp;amp;campaign_id=&amp;lt;ID#&amp;gt;&amp;amp;utm_source=google_b2b&amp;amp;subid=&amp;lt;domainSource&amp;gt;&amp;amp;kw=true&amp;amp;gad_source=5&amp;amp;gad_campaignid=&amp;lt;ID#&amp;gt;&amp;amp;gclid=&amp;lt;&amp;gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When CrystalPDF.exe is downloaded and executed on the device, it performs several actions to establish persistence and enable further activity. A copy of the CrystalPDF.exe payload is created in the &lt;STRONG&gt;AppData\Local\Temp\crys &lt;/STRONG&gt;directory, and a malicious scheduled task is created to ensure continued execution on the compromised device. In addition, a second binary named Crystal PDF.exe (note the space in the filename) is dropped in the user’s Desktop folder.&lt;/P&gt;
&lt;P&gt;The attacker configures the payload to run daily at 7:15 AM local system time using a scheduled task named Crystal_updater. When triggered, this scheduled task launches the malicious &lt;STRONG&gt;CrystalPDF.exe&lt;/STRONG&gt;, which initiates network connections to three command-and-control domains: &lt;STRONG&gt;negmari[.]com&lt;/STRONG&gt;,&lt;STRONG&gt; ramiort[.]com&lt;/STRONG&gt;, and &lt;STRONG&gt;strongdwn[.]com&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The secondary executable, Crystal PDF.exe, stored in the Desktop directory, establishes network connections to multiple cloudconvert[.]com-related domains. CloudConvert is a legitimate service used to convert files into different formats, including converting various document types into PDF files. Analysis of this file indicates that it is a clean file and is designed to appear as a legitimate application that leverages CloudConvert to provide document-to-PDF conversion functionality.&lt;/P&gt;
&lt;P&gt;Despite presenting itself as a legitimate PDF conversion and merging tool, CrystalPDF.exe ultimately functions as an information stealer. It covertly hijacks Firefox and Chrome browsers and attempts to access sensitive files located in the AppData\Roaming directory, which stores user-specific configuration and profile data that must persist across sessions. This includes cookies and session data, sign-in and credential caches, and profile settings. By harvesting credentials, tokens, and session cookies stored in the browser, the attacker can bypass standard authentication mechanisms and impersonate the user to gain unauthorized access to accounts and services that the user is authorized to use.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Crystal PDF Installer Attack Chain&lt;/EM&gt;&lt;/img&gt;
&lt;H2&gt;Mitigation and protection guidance&lt;/H2&gt;
&lt;P&gt;Microsoft recommends the following mitigations to reduce the impact of trusted platform abuse used to deliver infostealers as discussed in this report. These recommendations draw from established Defender blog guidance patterns and align with protections offered across Microsoft Defender XDR.&lt;/P&gt;
&lt;P&gt;Organizations can follow these recommendations to mitigate threats associated with this threat: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Strengthen user awareness &amp;amp; execution safeguards&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Educate users on social‑engineering lures&lt;/STRONG&gt;, including malvertising redirect chains, fake installers, and ClickFix‑style copy‑paste prompts.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Control outbound traffic &amp;amp; staging behavior&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Block direct access to known C2 infrastructure&lt;/STRONG&gt; where possible, informed by your organization’s threat‑intelligence sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Protect against cross‑platform payloads&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Harden endpoint defenses around LOLBIN abuse&lt;/STRONG&gt;, such as wscript.exe executing Visual Basic scripts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Evaluate activity involving AutoIt and process hollowing&lt;/STRONG&gt;, common in platform‑abuse campaigns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft also recommends the following mitigations to reduce the impact of this threat.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus" target="_blank" rel="noopener"&gt;cloud-delivered protection&lt;/A&gt; in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a majority of new and unknown threats.&lt;/LI&gt;
&lt;LI&gt;Run&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/edr-in-block-mode" target="_blank" rel="noopener"&gt;EDR in block mode&lt;/A&gt; so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.&lt;/LI&gt;
&lt;LI&gt;Enable network protection and web protection in Microsoft Defender for Endpoint to safeguard against malicious sites and internet-based threats.&lt;/LI&gt;
&lt;LI&gt;Encourage users to use Microsoft Edge and other web browsers that support Microsoft Defender SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.&lt;/LI&gt;
&lt;LI&gt;Allow&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-endpoint/automated-investigations" target="_blank" rel="noopener"&gt;investigation and remediation&lt;/A&gt; in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.&lt;/LI&gt;
&lt;LI&gt;Turn on&amp;nbsp;&lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection" target="_blank" rel="noopener"&gt;tamper protection features&lt;/A&gt; to prevent attackers from stopping security services. Combine tamper protection with the &lt;A href="https://learn.microsoft.com/windows/client-management/mdm/defender-csp" target="_blank" rel="noopener"&gt;DisableLocalAdminMerge&lt;/A&gt;&amp;nbsp;setting to prevent attackers from using local administrator privileges to set antivirus exclusions.&lt;/LI&gt;
&lt;LI&gt;Microsoft Defender XDR customers can also implement the following attack surface reduction rules to harden an environment against LOLBAS techniques used by threat actors:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference#block-execution-of-potentially-obfuscated-scripts" target="_blank" rel="noopener"&gt;Block execution of potentially obfuscated scripts&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion" target="_blank" rel="noopener"&gt;Block executable files from running unless they meet a prevalence, age, or trusted list criterion&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://learn.microsoft.com/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content" target="_blank" rel="noopener"&gt;Block JavaScript or VBScript from launching downloaded executable content&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Microsoft Defender XDR detections&amp;nbsp; &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, and apps to provide integrated protection against attacks like the threat discussed in this blog.&lt;/P&gt;
&lt;P&gt;Customers with provisioned access can also use &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/security-copilot-in-microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Security Copilot in Microsoft Defender&lt;/A&gt; to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Tactic&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Observed activity&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender coverage&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Execution&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Payloads downloaded using PowerShell&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious Powershell download or encoded command execution&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Persistence&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Registry Run key created&lt;/P&gt;
&lt;P&gt;- Scheduled task created for recurring execution&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Anomaly detected in ASEP registry&lt;/P&gt;
&lt;P&gt;- Suspicious Scheduled Task Launched&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defense Evasion&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- Unauthorized code execution facilitated by DLL sideloading and process injection&lt;/P&gt;
&lt;P&gt;- Python script execution&lt;/P&gt;
&lt;P&gt;- Renamed AutoIT interpreter binary and AutoIT script&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- An executable file loaded an unexpected DLL file&lt;/P&gt;
&lt;P&gt;- A process was injected with potentially malicious code&lt;/P&gt;
&lt;P&gt;- Suspicious Python binary execution&lt;/P&gt;
&lt;P&gt;- Rename AutoIT tool&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Discovery&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;- System information queried using WMI and Python&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Suspicious System Hardware Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Process Discovery&lt;/P&gt;
&lt;P&gt;- Suspicious Security Software Discovery&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Threat intelligence reports&lt;/H3&gt;
&lt;P&gt;Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender XDR Threat analytics&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/intel-explorer/articles/398d9691" target="_blank" rel="noopener"&gt;Malicious Crystal PDF installer campaign&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Hunting queries&amp;nbsp;&lt;/H1&gt;
&lt;H2&gt;Microsoft Defender XDR&lt;/H2&gt;
&lt;P&gt;Microsoft Defender XDR customers can run the following queries to find related activity in their networks:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to WhatsApp Abused to Deliver Eternidade Stealer&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify the files dropped from the malicious VBS execution
DeviceFileEvents
| where InitiatingProcessCommandLine has_all ("Downloads",".vbs")
| where FileName has_any (".zip",".lnk",".bat") and FolderPath has_all ("\\Temp\\")&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify batch script launching powershell instances to drop payloads
DeviceProcessEvents
| where InitiatingProcessParentFileName == "wscript.exe" and InitiatingProcessCommandLine  has_any ("instalar.bat","python_install.bat")
| where ProcessCommandLine !has "conhost.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify AutoIT executable invoking malicious AutoIT script
DeviceProcessEvents
| where InitiatingProcessCommandLine   has ".log" and InitiatingProcessVersionInfoOriginalFileName == "Autoit3.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use the following queries to identify activity related to Malicious &lt;/STRONG&gt;&lt;STRONG&gt;CrystalPDF Installer Campaign&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify network connections to C2 domains
DeviceNetworkEvents
| where InitiatingProcessVersionInfoOriginalFileName == "CrystalPDF.exe"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang=""&gt;// Identify scheduled task persistence
DeviceEvents
| where InitiatingProcessVersionInfoProductName == "CrystalPDF"
| where ActionType == "ScheduledTaskCreated&lt;/LI-CODE&gt;
&lt;H1&gt;Indicators of compromise&lt;/H1&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Indicator&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Type&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Description&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;2c885d1709e2ebfcaa81e998d199b29e982a7559b9d72e5db0e70bf31b183a5f  &lt;/P&gt;
&lt;P&gt;6168d63fad22a4e5e45547ca6116ef68bb5173e17e25fd1714f7cc1e4f7b41e1&lt;/P&gt;
&lt;P&gt;3bd6a6b24b41ba7f58938e6eb48345119bbaf38cd89123906869fab179f27433&amp;nbsp;&lt;/P&gt;
&lt;P&gt;5d929876190a0bab69aea3f87988b9d73713960969b193386ff50c1b5ffeadd6&amp;nbsp;&lt;/P&gt;
&lt;P&gt;bdd2b7236a110b04c288380ad56e8d7909411da93eed2921301206de0cb0dda1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;495697717be4a80c9db9fe2dbb40c57d4811ffe5ebceb9375666066b3dda73c3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;de07516f39845fb91d9b4f78abeb32933f39282540f8920fe6508057eedcbbea&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;SHA-256&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Payloads related to WhatsApp malware campaign&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;598da788600747cf3fa1f25cb4fa1e029eca1442316709c137690e645a0872bb&lt;/P&gt;
&lt;P&gt;3bc62aca7b4f778dabb9ff7a90fdb43a4fdd4e0deec7917df58a18eb036fac6e&lt;/P&gt;
&lt;P&gt;c72f8207ce7aebf78c5b672b65aebc6e1b09d00a85100738aabb03d95d0e6a95&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;SHA-256&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Payloads related to Malicious Crystal PDF installer campaign&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;hxxps://empautlipa[.]com/altor/installer.msi&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;URL&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Used to deliver VBS initial access payload (WhatsApp Abused to Deliver Eternidade Stealer)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Negmari[.]com&lt;/P&gt;
&lt;P&gt;Ramiort[.]com&lt;/P&gt;
&lt;P&gt;Strongdwn[.]com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Domain&lt;/P&gt;
&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;C2 servers (Malicious Crystal PDF installer campaign)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H1&gt;Microsoft Sentinel&lt;/H1&gt;
&lt;P&gt;Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the &lt;A href="https://learn.microsoft.com/azure/sentinel/sentinel-solutions-deploy" target="_blank" rel="noopener"&gt;Microsoft Sentinel Content Hub&lt;/A&gt; to have the analytics rule deployed in their Sentinel workspace.&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;References&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://www.cyberproof.com/blog/infostealers-stike-again-malicious-installers-impersonate-legitimate-productivity-tools/" target="_blank" rel="noopener"&gt;Infostealers Strike Again: Malicious Installers Pass Through EDRs Undetected&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://levelblue.com/blogs/spiderlabs-blog/spiderlabs-ids-new-banking-trojan-distributed-through-whatsapp/" target="_blank" rel="noopener"&gt;SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Learn more &amp;nbsp;&lt;/H1&gt;
&lt;P&gt;For the latest security research from the Microsoft Threat Intelligence community, check out the &lt;A href="https://aka.ms/threatintelblog" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence Blog&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To get notified about new publications and to join discussions on social media, follow us on &lt;A href="https://www.linkedin.com/showcase/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;, &lt;A href="https://x.com/MsftSecIntel" target="_blank" rel="noopener"&gt;X (formerly Twitter)&lt;/A&gt;, and &lt;A href="https://bsky.app/profile/threatintel.microsoft.com" target="_blank" rel="noopener"&gt;Bluesky&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the &lt;A href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence podcast&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/hunting-infostealers-trusted-platform-abuse/ba-p/4505343</guid>
      <dc:creator>FeliciaCarter</dc:creator>
      <dc:date>2026-04-15T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Credential Exposure Risk &amp; Response Workbook</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/credential-exposure-risk-response-workbook/ba-p/4511172</link>
      <description>&lt;H3&gt;&lt;STRONG&gt;How to set up the Workbook&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-text-type="withSpacing"&gt;Use the steps outlined in the&amp;nbsp;&lt;A class="lia-external-url" href="https://github.com/microsoft/purview/blob/main/purview-blueprints/Identify%20and%20Remediate%20Credentials%20with%20Purview-Blueprint.pdf" target="_blank" rel="noopener"&gt;Identify and Remediate Credentials&lt;/A&gt; article to get the right rules in place to start capturing credential data. You may choose to use custom regex patterns or more specific SITs that align with your scenario. This workbook will help you once that is done.&amp;nbsp;&lt;/P&gt;
&lt;P data-text-type="withSpacing"&gt;This workbook transforms credential leakage detection into a measurable, executive-ready capability.&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="e1b78deaa634cf701826765f4c692ecda"&gt;End‑to‑end situational awareness: Correlates alerts across workloads, departments, credential types, and users to surface material exposure quickly.&lt;/LI&gt;
&lt;LI data-list-item-id="e1834c1776c6791745f769643ce8a4628"&gt;Actionable triage &amp;amp; forensics: Drill from trends to the artifact (message/file/URL), accelerating containment and root‑cause analysis.&lt;/LI&gt;
&lt;LI data-list-item-id="ef544833d34c21134df6fef390e9c6f17"&gt;Risk‑aligned decisions: Quantifies exposure and response performance (creation vs. resolution trends) to guide investment and policy changes.&lt;/LI&gt;
&lt;LI data-list-item-id="eb9dbb46d479f92e9a63b60d15a026648"&gt;Audit‑ready governance: Captures decisions, timelines, and outcomes for PCI/PII controls, identity hygiene, and secrets management.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="ede9f3e3f1ae5b48347e7730e87f805cd"&gt;License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the&amp;nbsp;&lt;STRONG&gt;Information Protection&lt;/STRONG&gt;&amp;nbsp;sections from&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance" target="_blank" rel="noopener"&gt;Microsoft 365 guidance for security &amp;amp; compliance&lt;/A&gt;&amp;nbsp;and the related&amp;nbsp;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2139145" target="_blank" rel="noopener"&gt;PDF download&lt;/A&gt;&amp;nbsp;for feature-level licensing requirements.&lt;/LI&gt;
&lt;LI data-list-item-id="ee07fd5d73e98730d1189491aa21fa98e"&gt;Before you start, all endpoint interaction with Sensitive content is already being included in the audit logging with Endpoint DLP enabled (Endpoint DLP must be enabled). For Microsoft 365 SharePoint, OneDrive Exchange, and Teams you can enable policies that generate events but not incidents for important sensitive information types.&lt;/LI&gt;
&lt;LI data-list-item-id="efe6f3db15d72781d0004ee0ab22c86c5"&gt;Install Power BI Desktop to make use of the templates&amp;nbsp;&lt;A class="lia-external-url" href="https://powerbi.microsoft.com/en-us/downloads/" target="_blank" rel="noopener"&gt;Downloads - Microsoft Power BI&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Step-by-step guided walkthrough&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-text-type="withSpacing"&gt;In this guide, we will provide high-level steps to get started using the new tooling.&lt;/P&gt;
&lt;OL&gt;
&lt;LI data-list-item-id="ebf28d343833dea7677ec481b685b709a"&gt;Get the latest version of the report that you are interested in. In this case, we will show the Board report.&lt;/LI&gt;
&lt;LI data-list-item-id="e7a85d8bde7ad7b9e41f85707c6adbbbe"&gt;Open the report. If Power BI Desktop is installed, it should look like this:&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 3. You must authenticate with the &lt;A href="https://api.security.microsoft.com/" target="_blank" rel="noopener"&gt;https://api.security.microsoft.com&lt;/A&gt;,&amp;nbsp;&lt;STRONG&gt;select Organizational account&lt;/STRONG&gt;, and&amp;nbsp;&lt;STRONG&gt;sign in&lt;/STRONG&gt;. Then click&amp;nbsp;&lt;STRONG&gt;Connect&lt;/STRONG&gt;.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;4. You will also have to authenticate with httpps://api.security.microsoft.com/api/advancedhunting, &lt;STRONG&gt;select Organizational account&lt;/STRONG&gt;, and&amp;nbsp;&lt;STRONG&gt;sign in&lt;/STRONG&gt;. Then&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;click &lt;STRONG&gt;Connect&lt;/STRONG&gt;.&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;&lt;STRONG&gt;What the Workbook Delivers&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-text-type="withSpacing"&gt;The workbook moves programs to something that is measurable. Combined with customers' outcome‑based metrics (operational risk, control risk, end‑user impact), it enables an executive‑level, data‑driven narrative for investment and policy decisions.&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="e4e613df511f0a2cb2155834017b5f017"&gt;End‑to‑end situational awareness: Correlates alerts across workloads, departments, credential types, and users to surface material exposure quickly.&lt;/LI&gt;
&lt;LI data-list-item-id="ee01183e9c40acb39516fbabfcde88ceb"&gt;Actionable triage &amp;amp; forensics: Drill from trends to the artifact (message/file/URL), accelerating containment and root‑cause analysis.&lt;/LI&gt;
&lt;LI data-list-item-id="e867a34c1f62d963a67e84020c6c6c4a4"&gt;Risk‑aligned decisions: Quantifies exposure and response performance (creation vs. resolution trends) to guide investment and policy changes.&lt;/LI&gt;
&lt;LI data-list-item-id="e204860afc0234831a7564ccdc110964e"&gt;Audit‑ready governance: Captures decisions, timelines, and outcomes for PCI/PII controls, identity hygiene, and secrets management.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-text-type="withSpacing"&gt;Troubleshooting tips:&lt;/P&gt;
&lt;P data-text-type="withSpacing"&gt;If you are receiving a (400): Bad request error, it is likely that you do not have the necessary tables from the endpoint in Advanced Hunting. Those errors may also show if there are empty values passed from the left-hand side of the KQL queries.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Detection trend&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Apply filtering to this view based on the DLP policies that monitor credentials.&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="e17405c0b6fa3dc37ba4f4ea72ce66e00"&gt;&lt;STRONG&gt;Trend Analysis Over Time&lt;/STRONG&gt;&lt;BR /&gt;Displays daily detection counts, helping identify spikes in credential leakage activity and enabling proactive investigation.&lt;/LI&gt;
&lt;LI data-list-item-id="e0fdb4690965a458c951a712aef4afe11"&gt;&lt;STRONG&gt;Workload and Credential Type Breakdown&lt;/STRONG&gt;&lt;BR /&gt;Shows which workloads (e.g., Endpoint, Exchange, OneDrive) and credential types are most affected, guiding targeted security measures.&lt;/LI&gt;
&lt;LI data-list-item-id="e9b8f2550da4d1f33f5eb3c7a78882a6e"&gt;&lt;STRONG&gt;Detection Source Visibility&lt;/STRONG&gt;&lt;BR /&gt;Highlight which security tools (Sentinel, Cloud App Security, Defender) are catching leaks, ensuring monitoring coverage, and identifying gaps.&lt;/LI&gt;
&lt;LI data-list-item-id="eb5cb231dc6a4a5ee884c3a92e8c92fa4"&gt;&lt;STRONG&gt;Detailed Credential Exposure&lt;/STRONG&gt;&lt;BR /&gt;Lists exposed credentials for quick validation and remediation, reducing the risk of misuse or compromise. (This part is dependent on the AI component)&lt;/LI&gt;
&lt;LI data-list-item-id="e9d0b4d28d961c72a2c8c137527499645"&gt;&lt;STRONG&gt;Supports Incident Response&lt;/STRONG&gt;&lt;BR /&gt;Enables rapid triage by correlating detection trends with specific credentials and sources, improving response times.&lt;/LI&gt;
&lt;LI data-list-item-id="e8eae0cbe68c1d7930f3f9bea962cb04f"&gt;&lt;STRONG&gt;Compliance and Audit Readiness&lt;/STRONG&gt;&lt;BR /&gt;Provides clear evidence of credential monitoring and leakage detection for regulatory and governance reporting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Credential incident trends&lt;/STRONG&gt;&lt;/H4&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="ecb9f6514c445a38ebbaeb8fdbee188be"&gt;&lt;STRONG&gt;Lifecycle Tracking of Credential Alerts&lt;/STRONG&gt;&lt;BR /&gt;Visualizes creation and resolution trends over time, helping teams measure response efficiency and identify periods of heightened risk.&lt;/LI&gt;
&lt;LI data-list-item-id="efcbfd404251e4f25d413c642dc7b84cf"&gt;&lt;STRONG&gt;Workload and Credential Type Breakdown&lt;/STRONG&gt;&lt;BR /&gt;Shows which workloads (Endpoint, Exchange, OneDrive) and credential types are most impacted, enabling targeted mitigation strategies.&lt;/LI&gt;
&lt;LI data-list-item-id="ef4bb6c897b4c5f59b35c0dbdbe8104ab"&gt;&lt;STRONG&gt;Incident Type Analysis&lt;/STRONG&gt;&lt;BR /&gt;Highlights the distribution of alerts by category (e.g., CredRisk, Agent), supporting prioritization of critical incidents.&lt;/LI&gt;
&lt;LI data-list-item-id="ee345ffc58d80672b97cb8765a4adf2ff"&gt;&lt;STRONG&gt;Detailed Alert Context&lt;/STRONG&gt;&lt;BR /&gt;Provides message IDs and associated credentials for precise investigation and remediation, reducing time to contain threats.&lt;/LI&gt;
&lt;LI data-list-item-id="e1dd380b9e8ee0e758c3857d965e7e9c8"&gt;&lt;STRONG&gt;Performance and SLA Monitoring&lt;/STRONG&gt;&lt;BR /&gt;Tracks resolution timelines to ensure compliance with internal security SLAs and regulatory requirements.&lt;/LI&gt;
&lt;LI data-list-item-id="ea20a7c71d6a6c99b3e82c0670329945e"&gt;&lt;STRONG&gt;Audit and Governance Support&lt;/STRONG&gt;&lt;BR /&gt;Offers clear evidence of alert handling and closure, strengthening accountability and reporting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Content view&lt;/STRONG&gt;&lt;/H4&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="ec829fa3b04d12d3aa0289f4946c90833"&gt;&lt;STRONG&gt;Workload-Level Risk Visibility&lt;/STRONG&gt;&lt;BR /&gt;Highlights which workloads (e.g., SharePoint, Endpoint) have the highest credential exposure, enabling targeted security hardening.&lt;/LI&gt;
&lt;LI data-list-item-id="ea8ddba9f075f35685dd054384508ebf0"&gt;&lt;STRONG&gt;Departmental Risk Breakdown&lt;/STRONG&gt;&lt;BR /&gt;Shows which departments (Security, Logistics, Sales) are most impacted, helping prioritise remediation for critical business areas.&lt;/LI&gt;
&lt;LI data-list-item-id="e890bf8fb352204175fad92bf3286b7a7"&gt;&lt;STRONG&gt;Credential Type Analysis&lt;/STRONG&gt;&lt;BR /&gt;Identifies exposed credential types such as API keys, shared access keys, and tokens, guiding policy enforcement and rotation strategies.&lt;/LI&gt;
&lt;LI data-list-item-id="ee6910479df682bb47e65a9115d23a5bc"&gt;&lt;STRONG&gt;User and Document Correlation&lt;/STRONG&gt;&lt;BR /&gt;Links exposed credentials to specific users and documents, supporting rapid investigation and containment of leaks.&lt;/LI&gt;
&lt;LI data-list-item-id="e17c482d1c4668bfad5148132bfa6bc48"&gt;&lt;STRONG&gt;Comprehensive Drill-Down&lt;/STRONG&gt;&lt;BR /&gt;Enables navigation from department → credential type → user → document for precise root cause analysis.&lt;/LI&gt;
&lt;LI data-list-item-id="e520700f682a4336e97493c06d7f8d22f"&gt;&lt;STRONG&gt;Governance and Compliance Support&lt;/STRONG&gt;&lt;BR /&gt;Provides auditable evidence of credential exposure across workloads and departments, strengthening regulatory reporting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For endpoint, this view is an excellent way to catch applications that are not treating secrets in a safe way and expose them in temporary files.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Force-directed graph&lt;/STRONG&gt;&lt;/H4&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="e126a5aaa1a0d46f59569b2eda0ecbb8f"&gt;&lt;STRONG&gt;Visual Alert Correlation&lt;/STRONG&gt;&lt;BR /&gt;Displays a force-directed graph linking users to alert categories, making it easy to identify patterns and clusters of credential-related risks.&lt;/LI&gt;
&lt;LI data-list-item-id="ef8eaf31e6edc0a954d4f52ca36ebcd22"&gt;&lt;STRONG&gt;High-Risk User Identification&lt;/STRONG&gt;&lt;BR /&gt;Highlights users with multiple or severe alerts, enabling prioritisation for investigation and remediation.&lt;/LI&gt;
&lt;LI data-list-item-id="e7972e41644797b967b95d24ad22c4f77"&gt;&lt;STRONG&gt;Credential Type and Department Context&lt;/STRONG&gt;&lt;BR /&gt;Shows which credential types and departments are most associated with alerts, supporting targeted security measures.&lt;/LI&gt;
&lt;LI data-list-item-id="e825765cac701519cb9d7e20a9c11f194"&gt;&lt;STRONG&gt;Alert Severity and Details&lt;/STRONG&gt;&lt;BR /&gt;Provides a detailed table of alerts with severity and category, helping analysts quickly assess impact and urgency.&lt;/LI&gt;
&lt;LI data-list-item-id="e6777f7d265f22b0df8bbae9a1cc1d1d3"&gt;&lt;STRONG&gt;Improved Threat Hunting&lt;/STRONG&gt;&lt;BR /&gt;Enables analysts to trace relationships between users, alert types, and credential exposure for deeper root cause analysis.&lt;/LI&gt;
&lt;LI data-list-item-id="e7c3ca3ae007fd5585a52a0e1dd946d2b"&gt;&lt;STRONG&gt;Compliance and Reporting&lt;/STRONG&gt;&lt;BR /&gt;Offers clear evidence of monitoring and categorisation of credential-related alerts for governance and audit purposes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Security incidents correlated to credential leakage&lt;/STRONG&gt;&lt;/H4&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI data-list-item-id="e7193ae2313cf0c861ddca8d9049f6727"&gt;&lt;STRONG&gt;Focused on Credential Leakage&lt;/STRONG&gt;&lt;BR /&gt;Provides a dedicated view of alerts related to exposed credentials, enabling quick detection and response.&lt;/LI&gt;
&lt;LI data-list-item-id="e29e2731278edaa343241b99621d2fa43"&gt;&lt;STRONG&gt;Role-Based Risk Analysis&lt;/STRONG&gt;&lt;BR /&gt;Breaks down incidents by department and role, helping prioritise remediation for high-risk groups such as developers and security teams.&lt;/LI&gt;
&lt;LI data-list-item-id="e5ab7d04ce4da0dce4dd33b609853572d"&gt;&lt;STRONG&gt;User-Level Investigation&lt;/STRONG&gt;&lt;BR /&gt;Allows drill-down to individual users involved in credential-related alerts for rapid containment and corrective action.&lt;/LI&gt;
&lt;LI data-list-item-id="edef95f3fbf6e23cdbfb4fd9b7ac8140c"&gt;&lt;STRONG&gt;Credential Type Insights&lt;/STRONG&gt;&lt;BR /&gt;Highlight which types of credentials (e.g., API keys, passwords) are most vulnerable, guiding policy improvements and rotation strategies.&lt;/LI&gt;
&lt;LI data-list-item-id="ea065166f89b61d0d7afc9a1935f11006"&gt;&lt;STRONG&gt;Alert Source Correlation&lt;/STRONG&gt;&lt;BR /&gt;Displays which security tools (Sentinel, MCAS, Defender) are detecting leaks, ensuring coverage and identifying monitoring gaps.&lt;/LI&gt;
&lt;LI data-list-item-id="ebfb3cc59a54f5ad39c02a0bcf5e42cf6"&gt;&lt;STRONG&gt;Compliance and Governance Support&lt;/STRONG&gt;&lt;BR /&gt;Offers auditable evidence of credential monitoring, supporting regulatory and internal security requirements.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;App and Network correlated to credential leakage&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;For network detection, adjust the query in production to remove standard applications if they are too noisy. We have seen cases where Word and other commonly used applications make calls using FTP services as an example. While other applications may add too much noise.&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Token Detection Event Traceability&lt;/STRONG&gt;&lt;BR /&gt;Shows detected Token credentials events linked directly to individual User IDs and Device IDs for investigation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application Usage Context&lt;/STRONG&gt;&lt;BR /&gt;Identifies that the detected activity is associated with the application &lt;EM&gt;ms‑teams.exe as an example&lt;/EM&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;External URL Association&lt;/STRONG&gt;&lt;BR /&gt;Displays the Remote URL connected to the token detection event.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Remote IP Visibility&lt;/STRONG&gt;&lt;BR /&gt;Lists the Remote IP addresses associated with the activity.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Entity-Level Correlation&lt;/STRONG&gt;&lt;BR /&gt;Links UserId, DeviceId, Application, Remote URL, and Remote IP within a single event flow. You can select port used or how Apps are linked as well.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detection Count Aggregation&lt;/STRONG&gt;&lt;BR /&gt;Summarises the number of credential events tied to each correlated entity path.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P aria-hidden="true" data-text-type="withSpacing"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-text-type="withSpacing"&gt;Turn detection into decisions. Deploy the workbook today to get measurable insights, accelerate triage, and deliver audit-ready governance. Start driving risk-aligned investment and policy changes with confidence.&lt;/P&gt;
&lt;P data-text-type="withSpacing"&gt;The PBI report is&lt;A class="lia-external-url" href="https://github.com/OfficeDev/O365-ActivityFeed-AzureFunction/blob/master/PBI_Report/Credential%20III.pbit" target="_blank" rel="noopener"&gt; located here&lt;/A&gt;.&lt;/P&gt;
&lt;P data-text-type="withSpacing"&gt;Based on what you identify, you may be using tools such as &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/purview/data-security-investigations-credentials" target="_blank" rel="noopener"&gt;Data Security Investigations&lt;/A&gt; to go deeper. We are also working on surfacing the AI triaging in a context that will enrich the DLP analyst experience.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 10:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/credential-exposure-risk-response-workbook/ba-p/4511172</guid>
      <dc:creator>Jon_Nordstrom</dc:creator>
      <dc:date>2026-04-15T10:00:00Z</dc:date>
    </item>
    <item>
      <title>Why External Users Can’t Open Encrypted Attachments in Certain Conditions &amp; How to Fix It Securely</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/why-external-users-can-t-open-encrypted-attachments-in-certain/ba-p/4510644</link>
      <description>&lt;P&gt;When Conditional Access policies enforce MFA across all cloud apps and include external users, encrypted attachments may require additional considerations. This post explains why.&lt;/P&gt;
&lt;P&gt;This behavior applies &lt;STRONG&gt;only&lt;/STRONG&gt; in environments where &lt;STRONG&gt;all of the following are true&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Purview encryption is used for emails and attachments&lt;/LI&gt;
&lt;LI&gt;A Conditional Access (CA) policy is configured to:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Require MFA&lt;/LI&gt;
&lt;LI&gt;Apply to &lt;STRONG&gt;all cloud applications&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Include &lt;STRONG&gt;guest or external users&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;The Situation: Email Opens, Attachment Doesn’t&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;When an email is encrypted using:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Purview Sensitivity Labels, or&lt;/LI&gt;
&lt;LI&gt;Information Rights Management (IRM)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Any attached Office document automatically &lt;STRONG&gt;inherits encryption&lt;/STRONG&gt;. This inheritance i&lt;SPAN style="color: rgb(30, 30, 30);"&gt;s intentional and enforced by the service, &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;Ensures consistent protection of sensitive content. &lt;/SPAN&gt;That inheritance is &lt;STRONG&gt;mandatory&lt;/STRONG&gt; and cannot be disabled.&lt;/P&gt;
&lt;P&gt;So far, so good.&amp;nbsp; But here’s where things break for external recipients.&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;The Hidden Dependency: Identity &amp;amp; Conditional Access&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Reading an encrypted email and opening an encrypted attachment are &lt;STRONG&gt;two different flows&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;External users can usually read encrypted emails by authenticating through:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;One-Time Passcode (OTP)&lt;/LI&gt;
&lt;LI&gt;Microsoft personal accounts&lt;/LI&gt;
&lt;LI&gt;Their own organization’s identity&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;However, &lt;STRONG&gt;encrypted attachments use Microsoft Rights Management Services (RMS)&lt;/STRONG&gt; — and RMS expects an identity the sender’s tenant can evaluate.&lt;/P&gt;
&lt;P&gt;If your organization has:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A &lt;STRONG&gt;global Conditional Access policy&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Enforcing &lt;STRONG&gt;MFA for all users&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Applied to &lt;STRONG&gt;all cloud apps&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;external users can get blocked&amp;nbsp;&lt;STRONG&gt;even after successful email decryption&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;This commonly results in errors like:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“This account does not exist in the sender’s tenant…”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;AADSTS90072: The external user account does not exist in our tenant and cannot access the Microsoft Office application. The account needs to be added as an external user in the tenant or use an alternative authentication method.&lt;/EM&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;When It Works (and Why It Often Doesn’t)&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;External access to encrypted attachments works only when &lt;STRONG&gt;one of these conditions is met&lt;/STRONG&gt;:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The sender trusts the recipient’s tenant MFA via &lt;STRONG&gt;Cross‑Tenant Access (MFA trust)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;The recipient already exists as a &lt;STRONG&gt;guest account&lt;/STRONG&gt; in the sender’s tenant&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;In real-world scenarios, these conditions often fail:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;External recipients use consumer or non‑Entra identities&lt;/LI&gt;
&lt;LI&gt;Recipient domains are not predictable&lt;/LI&gt;
&lt;LI&gt;Guest onboarding does not scale&lt;/LI&gt;
&lt;LI&gt;Cross‑tenant trust is intentionally restricted&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In such cases, &lt;STRONG&gt;Conditional Access policies designed for internal users can affect RMS evaluation for external users&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;So what’s the alternative?&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;The Practical, Secure Alternative&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;When the two standard access conditions (cross‑tenant trust or guest presence) cannot be met , you can&amp;nbsp;&lt;STRONG&gt;refine Conditional Access evaluation&lt;/STRONG&gt; without weakening encryption. The goal is &lt;STRONG&gt;not to remove MFA&lt;/STRONG&gt;, but to ensure it is &lt;STRONG&gt;applied appropriately based on identity type and access path&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;In this scenario:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MFA remains enforced for all internal users&lt;/STRONG&gt;, including access to Microsoft Rights Management Services (RMS)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MFA remains enforced for external users&lt;/STRONG&gt; across cloud applications &lt;STRONG&gt;other than RMS&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;The Key Idea&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Let encryption stay strong, but stop blocking external RMS authentication.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is achieved by:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Keeping the existing Conditional Access policy that enforces MFA for &lt;STRONG&gt;all internal users across all cloud applications&lt;/STRONG&gt;, including RMS&lt;/LI&gt;
&lt;LI&gt;Excluding &lt;STRONG&gt;guest and external users&lt;/STRONG&gt; from that internal‑only policy&lt;/LI&gt;
&lt;LI&gt;Deploying a &lt;STRONG&gt;separate Conditional Access policy&lt;/STRONG&gt; scoped to guest and external users to:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Continue enforcing MFA for external users where supported&lt;/LI&gt;
&lt;LI&gt;Explicitly exclude &lt;STRONG&gt;Microsoft Rights Management Services (RMS)&lt;/STRONG&gt; from evaluation&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;RMS can be excluded from the external‑user policy by specifying the following application (client) ID:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;RMS App ID: 00000012-0000-0000-c000-000000000000&lt;/STRONG&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Why This Is Still Secure&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;This approach:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;✅ Keeps email and attachment encryption fully intact&lt;/LI&gt;
&lt;LI&gt;✅ Internal security posture is unchanged&lt;/LI&gt;
&lt;LI&gt;✅ External users remain protected by MFA where applicable&lt;/LI&gt;
&lt;LI&gt;✅ Allows external users to authenticate using supported methods&lt;/LI&gt;
&lt;LI&gt;✅ Avoids over-trusting external tenants&lt;/LI&gt;
&lt;LI&gt;✅ Scales for large, unpredictable recipient sets&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Final Takeaway&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Encrypted attachment access is governed by &lt;STRONG&gt;identity recognition and policy design&lt;/STRONG&gt;, not by email encryption alone.&lt;/P&gt;
&lt;P&gt;By aligning Conditional Access with how encrypted content is evaluated, organizations can enable secure external collaboration while maintaining strong protection standards&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 16:57:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/why-external-users-can-t-open-encrypted-attachments-in-certain/ba-p/4510644</guid>
      <dc:creator>samsul_ahamed</dc:creator>
      <dc:date>2026-04-13T16:57:02Z</dc:date>
    </item>
    <item>
      <title>Azure Key Vault HSM Platform One Retirement: What Purview BYOK Customers Need to Know</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-community/azure-key-vault-hsm-platform-one-retirement-what-purview-byok/ba-p/4510371</link>
      <description>&lt;H4&gt;&lt;STRONG&gt;What is changing?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In early 2024, Azure Key Vault introduced a modernized hardware security module (HSM) platform based on FIPS 140-2 Level 3 certified HSMs. As part of this evolution, the legacy HSM Platform One will be retired on September 15, 2028. Many Information Protection customers who use BYOK today rely on this legacy platform.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Why this matters for BYOK customers&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;BYOK configurations for Information Protection require that the tenant root key is stored in Azure Key Vault. Azure Key Vault does not support exporting keys once imported. &amp;nbsp;In short, affected customers will need to migrate their BYOK key to a new Key Vault on the modern HSM platform and update their Purview configuration to reference it.&lt;/P&gt;
&lt;P&gt;If no action is taken before the retirement date, encryption and decryption operations for Information Protection will become unavailable until the key is successfully migrated.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Why act now (even though retirement is in 2028)?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Although the retirement date is several years away, Microsoft strongly recommends that customers begin planning now. Migrating sooner allows customers to move to the most secure configuration available today. More critically, some customers may no longer have access to the original on-premises key material that was used during initial BYOK setup. Recovering, regenerating, or replacing this key material can take significant time and coordination across security, compliance, and HSM teams.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;What should customers do next?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;For customers using BYOK with Information Protection:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Review the MS Learn page - &lt;A href="https://learn.microsoft.com/en-us/purview/rights-management-byok#determine-if-your-key-is-on-hsmplatform-1" target="_blank"&gt;Configure BYOK (bring your own key) for the Azure Rights Management service root key | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Confirm whether your tenant key is using legacy HSM Platform&lt;/LI&gt;
&lt;LI&gt;If so, follow the steps in the section - &lt;STRONG&gt;Migrating from Azure Key Vault hsmPlatform 1 to hsmPlatform 2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;If your organization no longer has access to the original key material, begin planning immediately and engage with Microsoft support to explore your options&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In February, we also published a Message Center post (MC1234660) to notify those customers affected (i.e. using BYOK currently) about the Azure Key Vault HSM Platform One retirement and its impact on Information Protection tenants using Bring Your Own Key (BYOK).&lt;/P&gt;
&lt;P&gt;Updated guidance for configuring and managing BYOK with Information Protection is available on Microsoft Learn.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/purview/rights-management-tenant-key?tabs=microsoft-managed" target="_blank" rel="noopener"&gt;Manage the root key for your tenant's Azure Rights Management service | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We recommend reviewing this documentation in detail to understand prerequisites, supported configurations, and migration considerations.&lt;/P&gt;
&lt;P&gt;Microsoft will continue to communicate updates through the Microsoft 365 Message Center and Tech Community as the retirement date approaches.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 22:12:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-community/azure-key-vault-hsm-platform-one-retirement-what-purview-byok/ba-p/4510371</guid>
      <dc:creator>AdamBell</dc:creator>
      <dc:date>2026-04-21T22:12:44Z</dc:date>
    </item>
    <item>
      <title>VPN Integration not persistent</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/vpn-integration-not-persistent/m-p/4509994#M4315</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We tried to configure &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-for-identity/vpn-integration" target="_blank"&gt;VPN Integration for MDI&lt;/A&gt; from supported Cisco VPN GW. We established the RADIUS Accounting logs to be sent to DC with MDI sensors installed. Yet when we enabled this in Defender Portal (Settings &amp;gt; Identities &amp;gt; VPN) by checking the box and inserting the shared secret, the configuration is not persistent. We hit save, and we are presented with the success green message, but once we refresh the page or go elsewhere in the portal, the checkbox is not checked. Has anyone encountered the same issue?&lt;/P&gt;&lt;P&gt;Thanks, Simon&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 13:31:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/vpn-integration-not-persistent/m-p/4509994#M4315</guid>
      <dc:creator>schimpanze</dc:creator>
      <dc:date>2026-04-09T13:31:08Z</dc:date>
    </item>
  </channel>
</rss>

