<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Security Experts topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/bd-p/MicrosoftSecurityExpertsDiscussionSpace</link>
    <description>Microsoft Security Experts topics</description>
    <pubDate>Sun, 26 Apr 2026 18:05:47 GMT</pubDate>
    <dc:creator>MicrosoftSecurityExpertsDiscussionSpace</dc:creator>
    <dc:date>2026-04-26T18:05:47Z</dc:date>
    <item>
      <title>Issues blocking DeepSeek</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/issues-blocking-deepseek/m-p/4497200#M49</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am investigating DeepSeek usage in our Microsoft security environment and have found inconsistent behaviour between Defender for Cloud Apps, Defender for Endpoint, and IOC controls. I am hoping to understand if others have seen the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Environment&lt;/P&gt;&lt;P&gt;Full Microsoft security and management suite&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we are seeing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender for Cloud Apps&lt;/P&gt;&lt;P&gt;DeepSeek is classified as an Unsanctioned app&lt;/P&gt;&lt;P&gt;Cloud Discovery shows ongoing traffic and active usage&lt;/P&gt;&lt;P&gt;Multiple successful sessions and data activity visible&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender for Endpoint Indicators&lt;/P&gt;&lt;P&gt;DeepSeek domains and URIs have been added as Indicators with Block action&lt;/P&gt;&lt;P&gt;Indicators show as successfully applied&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Advanced Hunting and Device Timeline&lt;/P&gt;&lt;P&gt;Multiple executable processes are initiating connections to DeepSeek domains&lt;/P&gt;&lt;P&gt;Examples include Edge, Chrome, and other executables making outbound HTTPS connections&lt;/P&gt;&lt;P&gt;Connection status is a mix of Successful and Unsuccessful&lt;/P&gt;&lt;P&gt;No block events recorded&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Settings&lt;/P&gt;&lt;P&gt;Network Protection enabled in block mode&lt;/P&gt;&lt;P&gt;Web Content Filtering enabled&lt;/P&gt;&lt;P&gt;SmartScreen enabled&lt;/P&gt;&lt;P&gt;File Hash Computation enabled&lt;/P&gt;&lt;P&gt;Network Protection Reputation mode set to 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else had similar issues when trying to block DeepSeek or other apps via Microsoft security suite?&lt;/P&gt;&lt;P&gt;I am currently working with Microsoft support on this but wanted to ask here as well.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 00:01:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/issues-blocking-deepseek/m-p/4497200#M49</guid>
      <dc:creator>KevinJohnson1</dc:creator>
      <dc:date>2026-02-26T00:01:47Z</dc:date>
    </item>
    <item>
      <title>High CPU Usage by Microsoft Defender (MsMpEng.exe) on Azure Windows Server 2019</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/high-cpu-usage-by-microsoft-defender-msmpeng-exe-on-azure/m-p/4463199#M45</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I’ve been seeing consistent CPU spikes from MsMpEng.exe (Antimalware Service Executable) on several Windows Server 2019 Datacenter VMs hosted in Azure.&lt;/P&gt;&lt;P&gt;The usage reaches 100% for about 10–15 minutes daily, always around the same time.&lt;BR /&gt;No manual scans are scheduled, and limiting CPU usage with Set-MpPreference -ScanAvgCPULoadFactor didn’t help.&lt;/P&gt;&lt;P&gt;Could this be related to Defender’s cloud protection update cycle, or possibly a backend maintenance task from Defender for Cloud?&lt;/P&gt;&lt;P&gt;Is there a recommended way to throttle or schedule these background Defender tasks in production environments?&lt;/P&gt;&lt;P&gt;Appreciate any insights,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:07:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/high-cpu-usage-by-microsoft-defender-msmpeng-exe-on-azure/m-p/4463199#M45</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2025-10-21T17:07:24Z</dc:date>
    </item>
    <item>
      <title>Defender for Endpoint Conflicting with Internal Firewall Authentication</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-for-endpoint-conflicting-with-internal-firewall/m-p/4463198#M44</link>
      <description>&lt;P&gt;Hi Security Experts,&lt;/P&gt;&lt;P&gt;After onboarding a few devices into Defender for Endpoint, I noticed that those machines started having connection drops to the company’s internal firewall.&lt;BR /&gt;They constantly re-authenticate before regaining web access.&lt;/P&gt;&lt;P&gt;Devices not onboarded into Defender don’t experience this issue.&lt;/P&gt;&lt;P&gt;Could Defender’s network protection or proxy policies be interfering with the internal firewall authentication flow?&lt;BR /&gt;Any recommendations on how to keep Defender active while keeping the internal firewall as the primary control point?&lt;/P&gt;&lt;P&gt;Thanks for any suggestions,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:06:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-for-endpoint-conflicting-with-internal-firewall/m-p/4463198#M44</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2025-10-21T17:06:06Z</dc:date>
    </item>
    <item>
      <title>Can’t Remove Defender Tag After Asset Rule Was Deleted</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/can-t-remove-defender-tag-after-asset-rule-was-deleted/m-p/4463197#M43</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I’m facing an issue where a rule-based tag in Microsoft Defender for Endpoint remains visible on devices even after I deleted the original asset rule.&lt;/P&gt;&lt;P&gt;The rule was disabled and deleted months ago, but the tag still appears under &lt;EM&gt;Rule-based tags&lt;/EM&gt; in the device details.&lt;BR /&gt;Even using the API or PowerShell doesn’t show or remove it.&lt;/P&gt;&lt;P&gt;Is there any supported way to force a tag refresh or clear orphaned rule-based tags from the Defender portal?&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:05:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/can-t-remove-defender-tag-after-asset-rule-was-deleted/m-p/4463197#M43</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2025-10-21T17:05:05Z</dc:date>
    </item>
    <item>
      <title>Defender for Endpoint Firewall Rules Not Applying to Devices</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-for-endpoint-firewall-rules-not-applying-to-devices/m-p/4463196#M42</link>
      <description>&lt;P&gt;Hello Security Experts,&lt;/P&gt;&lt;P&gt;I’m currently deploying Microsoft Defender for Business and trying to enforce firewall configurations directly from the Defender portal.&lt;/P&gt;&lt;P&gt;However, I’ve noticed that the settings are not applying to any of the onboarded devices — nothing changes on the endpoints.&lt;/P&gt;&lt;P&gt;Do firewall rules in Defender for Endpoint require Intune to be enforced, or should they work standalone?&lt;BR /&gt;And if Intune isn’t used, what’s the best approach to apply consistent Defender firewall rules across devices?&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:03:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-for-endpoint-firewall-rules-not-applying-to-devices/m-p/4463196#M42</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2025-10-21T17:03:36Z</dc:date>
    </item>
    <item>
      <title>Automating Defender Alerts with CISA KEV and n8n – Has anyone tried similar workflows?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/automating-defender-alerts-with-cisa-kev-and-n8n-has-anyone/m-p/4463195#M41</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I’ve been experimenting with n8n automation to improve vulnerability management. I created a workflow that cross-references Microsoft Defender for Endpoint vulnerabilities with the CISA Known Exploited Vulnerabilities (KEV) catalog, and then automatically creates Jira tickets for remediation.&lt;/P&gt;&lt;P&gt;The flow takes about 16 seconds to run and prioritizes only the CVEs that are both present in the environment &lt;EM&gt;and&lt;/EM&gt; listed in KEV.&lt;/P&gt;&lt;P&gt;Has anyone here built similar automation (maybe with Logic Apps, Power Automate, or Sentinel playbooks)?&lt;BR /&gt;Would love to hear how others handle vulnerability prioritization or ticket creation!&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:02:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/automating-defender-alerts-with-cisa-kev-and-n8n-has-anyone/m-p/4463195#M41</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2025-10-21T17:02:29Z</dc:date>
    </item>
    <item>
      <title>Automação de Alertas do Defender com o Catálogo KEV da CISA usando n8n</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/automa%C3%A7%C3%A3o-de-alertas-do-defender-com-o-cat%C3%A1logo-kev-da-cisa/m-p/4463193#M40</link>
      <description>&lt;OL&gt;&lt;LI&gt;Overview&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Recently, I decided to explore how automation could help simplify daily security operations, especially in vulnerability management. While studying n8n, an open-source automation platform, I saw the opportunity to connect it with Microsoft Defender for Endpoint and the CISA Known Exploited Vulnerabilities (KEV) Catalog.&lt;/P&gt;&lt;P&gt;The goal was simple: build an automated workflow that identifies which vulnerabilities detected in Defender are actively exploited in the wild, and then create actionable tickets in Jira for remediation teams — automatically and with full context.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Why I Built This&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Most security teams deal with thousands of vulnerabilities every week, but only a small portion are actually being exploited.&lt;BR /&gt;I wanted to find a way to prioritize what truly matters without adding more manual work.&lt;/P&gt;&lt;P&gt;Defender for Endpoint already provides strong vulnerability data, but by combining it with the CISA KEV catalog, we can instantly highlight high-risk CVEs that need urgent attention.&lt;/P&gt;&lt;P&gt;This project was also a great opportunity to test n8n’s flexibility and API-handling capabilities in a real-world cybersecurity scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 16:43:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/automa%C3%A7%C3%A3o-de-alertas-do-defender-com-o-cat%C3%A1logo-kev-da-cisa/m-p/4463193#M40</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2025-10-21T16:43:26Z</dc:date>
    </item>
    <item>
      <title>EDR logs explanation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/edr-logs-explanation/m-p/4403657#M39</link>
      <description>&lt;P&gt;Hello, would it be possible for an expert from this forum to analyze the EDR logs? Could you also explain to me in detail what happened? Furthermore, can you tell me if it is clearly established that the deleted files were deleted by someone physically present on the machine, or if there are other possible explanations? Thanks in advance.&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Apr 2025 06:36:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/edr-logs-explanation/m-p/4403657#M39</guid>
      <dc:creator>FredSLN</dc:creator>
      <dc:date>2025-04-12T06:36:47Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Cloud App and Managed identities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/microsoft-defender-for-cloud-app-and-managed-identities/m-p/4363499#M30</link>
      <description>&lt;P&gt;I would like to check if we can use Microsoft Managed Identities to enable App connectors connection in Microsoft Defender for Cloud App? If No, looking forward for the best practices for the service/integration accounts to be used in these integrations.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 15:38:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/microsoft-defender-for-cloud-app-and-managed-identities/m-p/4363499#M30</guid>
      <dc:creator>KV_MDCA</dc:creator>
      <dc:date>2025-01-07T15:38:33Z</dc:date>
    </item>
    <item>
      <title>Unwanted Linked device</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/unwanted-linked-device/m-p/4285134#M23</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;2 devices have access to my Microsoft account, sometimes when I log into my device it welcomes me as the other person vice versa. When we try creating a new alias on the other device it does not allow us (I don't even know what an alias is, all I know is it's in my name on another person's device)&lt;BR /&gt;Sometimes I find the other device linked to mine, I keep removing the device however it keeps linking itself.&lt;BR /&gt;Please help me because it turns out the other device has access to my cloud documents, regardless of whether I've logged in or not. I have to get this fixed within next 2 weeks otherwise I'm done for.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 10:15:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/unwanted-linked-device/m-p/4285134#M23</guid>
      <dc:creator>mahlanguthandeka966</dc:creator>
      <dc:date>2024-11-02T10:15:42Z</dc:date>
    </item>
    <item>
      <title>My laptop has been blocked by BitLocker.</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/my-laptop-has-been-blocked-by-bitlocker/m-p/4284679#M22</link>
      <description>&lt;P&gt;However, there is no BitLocker recovery keys on my Microsoft account. &amp;nbsp;I have tried to call Microsoft support, but I only get bot messages that take me to sites that asks me to go and check my Microsoft account. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way I can chat with a human that can actually help me how to get around this BitLocker? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 16:09:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/my-laptop-has-been-blocked-by-bitlocker/m-p/4284679#M22</guid>
      <dc:creator>rocio_yanez</dc:creator>
      <dc:date>2024-11-01T16:09:42Z</dc:date>
    </item>
    <item>
      <title>Where shall I start if i would like to learn IT and move onto cybersecurity?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/where-shall-i-start-if-i-would-like-to-learn-it-and-move-onto/m-p/4260193#M21</link>
      <description>&lt;P&gt;Which learning paths and certifications will be recommended for someone trying to learn cloud security for the SOC, IR ?&lt;/P&gt;&lt;P&gt;By the way hi my name is Enyel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 18:46:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/where-shall-i-start-if-i-would-like-to-learn-it-and-move-onto/m-p/4260193#M21</guid>
      <dc:creator>enyels</dc:creator>
      <dc:date>2024-10-01T18:46:34Z</dc:date>
    </item>
    <item>
      <title>Defender Experts in-depth - running a modern SOC in the age of LLMs</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-experts-in-depth-running-a-modern-soc-in-the-age-of/m-p/4002684#M12</link>
      <description>&lt;P&gt;Did you miss the Defender Experts session held today (December 6, 2023) during the Microsoft Security Tech Accelerator event? &lt;SPAN&gt;See how our Defender Experts team runs a modern SOC and leverages LLMs and Copilots.&amp;nbsp;&lt;/SPAN&gt;You can catch the session on-demand here:&amp;nbsp;&lt;A href="https://aka.ms/Accelerate/ModernSOC" target="_blank" rel="noopener"&gt;https://aka.ms/Accelerate/ModernSOC&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 20:23:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-experts-in-depth-running-a-modern-soc-in-the-age-of/m-p/4002684#M12</guid>
      <dc:creator>Elisa_Lippincott</dc:creator>
      <dc:date>2023-12-06T20:23:07Z</dc:date>
    </item>
    <item>
      <title>Defender Experts | Sentinel Automation based on Defender Experts Notifications (DENs)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-experts-sentinel-automation-based-on-defender-experts/m-p/4000657#M11</link>
      <description>&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Based on invaluable customer feedback, we're rolling out the first installment of our Defender Experts “cookbook”—a guide to enhance your experience with Sentinel automation based on Defender Experts Notifications (DENs). This customer-driven initiative reflects the importance our customers place on efficient SIEM automation to manage their operations effectively. This guide is a direct response to your insights. Think of it as a recipe book tailored to maximize the power of Defender Experts services. From optimizing DENs for automation to sharing pro tips, the guide is a collaborative effort to fortify our collective defense against evolving cyber threats.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This collaborative effort reflects our commitment to transforming customer input into actionable solutions, with each new “recipe” empowering customers to navigate the complexities of the cybersecurity terrain with the confidence that Microsoft Defender Experts have their back. We encourage users to experiment with these insights and share their experiences, contributing to an ongoing dialogue that strengthens collective defenses against evolving cyber threats. Your success and protection against advanced threats is at the heart of our mission, and we look forward to continuing this collaborative journey together.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="width: 550px;" width="550"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="701px" style="background-color: #0078d4;"&gt;
&lt;P&gt;&lt;FONT color="#ffffff"&gt;Defender Experts | Sentinel Automation – &lt;STRONG&gt;NEW&lt;/STRONG&gt; Defender Experts Notifications&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="701px"&gt;
&lt;TABLE style="width: 590px;" width="590"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="689px" style="background-color: #f2f2f2;"&gt;
&lt;P&gt;In order to configure automation rules based on NEW Defender Experts Notifications (DENs), follow the conditions below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Select Trigger &lt;STRONG&gt;When Incident is Created&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Select &lt;STRONG&gt;If Incident provider Equals&lt;/STRONG&gt; &lt;STRONG&gt;&lt;EM&gt;Microsoft Defender XDR&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Select &lt;STRONG&gt;Title Contains &lt;EM&gt;Defender Experts&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configure the relevant Actions you would like to enable based on the conditions selected above. For example, you can select a specific playbook to run or assign a particular owner to the Incident.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Screenshot of Sentinel Automation Rule Trigger and Conditions based on &lt;STRONG&gt;NEW&lt;/STRONG&gt; Incidents issued as DENs&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="height: 735px; width: 535px;" width="535"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="800px" height="30px" style="background-color: #107c10; width: 849px; height: 30px;"&gt;
&lt;P&gt;&lt;FONT color="#ffffff"&gt;Defender Experts | Sentinel Automation – &lt;STRONG&gt;EXISTING &lt;/STRONG&gt;Incidents that are upgraded to DENs&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="800px" height="705px"&gt;
&lt;TABLE style="width: 588px;" width="588"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="387px" style="background-color: #f2f2f2; width: 588px;"&gt;
&lt;P&gt;In order to configure automation rules based on EXISTING Incidents that are upgraded to Defender Experts Notifications (DENs), follow the conditions below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Select Trigger &lt;STRONG&gt;When Incident is Updated&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Select &lt;STRONG&gt;If Incident provider Equals&lt;/STRONG&gt; &lt;STRONG&gt;&lt;EM&gt;Microsoft Defender XDR&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Select &lt;STRONG&gt;Alerts Added&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Select&lt;STRONG&gt; Title Contains&lt;EM&gt; Defender Experts&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configure the relevant Actions you would like to enable based on the conditions selected above. For example, you can select a specific playbook to run or assign a particular owner to the Incident.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;Screenshot of Sentinel Automation Rule Trigger and Conditions based on &lt;STRONG&gt;EXISTING&lt;/STRONG&gt; Incidents Upgraded to DENs&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2023 04:14:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/defender-experts-sentinel-automation-based-on-defender-experts/m-p/4000657#M11</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2023-12-05T04:14:57Z</dc:date>
    </item>
    <item>
      <title>How are folks limiting what employees share with unauthorized LLMs?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/how-are-folks-limiting-what-employees-share-with-unauthorized/m-p/3996267#M8</link>
      <description>&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt;A common question I encounter is how companies are preventing their employees from sharing sensitive information with unauthorized LLMs. Some of the initial solutions include DLP (Data Loss Prevention) and modifying the network filter. I wonder what Windows offers in this regard, but more importantly - what are the best practices in the industry?&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt; &lt;A href="https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview" target="_self"&gt;Microsoft Defender Application Guard&amp;nbsp;&lt;/A&gt;can be configured to open specific LLM/chat-sites in a lock down browser and control how users interact with the content. With application guard you can block specific sites or limit clipboard, etc.&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-family: Calibri; font-size: 11pt;"&gt;&lt;FONT size="4"&gt;GPO: &lt;A href="https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/microsoft-defender-application-guard/configure-md-app-guard" target="_blank"&gt;Configure the Group Policy settings for Microsoft Defender Application Guard &lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="font-family: Calibri; font-size: 11pt;"&gt;&lt;FONT size="4"&gt;GPO &amp;amp; Intune: &lt;A href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/windows-10-all-things-about-application-guard/ba-p/2455596#:~:text=D%20eploy%20Application%20Guard%20Profile%20by%20using%20%28Intune%29,settings%20for%20the%20profile%3A%20Name%20and%20Description%20" target="_blank"&gt;Windows 10 - All Things About Application Guard - Microsoft Community Hub&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;How do you prevent, control, or track your employees' access to unapproved LLM/chat-sites?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 20:40:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/how-are-folks-limiting-what-employees-share-with-unauthorized/m-p/3996267#M8</guid>
      <dc:creator>JoeCicero</dc:creator>
      <dc:date>2023-11-29T20:40:16Z</dc:date>
    </item>
    <item>
      <title>Are Any Defender Experts customers using Enhanced Phishing Protection in Microsoft Defender?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/are-any-defender-experts-customers-using-enhanced-phishing/m-p/3996255#M7</link>
      <description>&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;If you are running Windows 11(version 22H2) in your environment, a newly introduced feature enhances phishing protection by prompting users to exercise caution before entering their passwords in potentially insecure spaces, such as on malicious websites.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If a user signs into Windows using a password, Enhanced Phishing Protection works alongside Windows security protections, and helps protect typed work or school password used to sign into Windows 11 in these ways:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If users type or paste their work or school password on any browser, into a site deemed malicious by Microsoft Defender SmartScreen, Enhanced Phishing Protection alerts them. It also alerts them to change their password so attackers can't gain access to their account.&lt;/LI&gt;
&lt;LI&gt;Reusing work or school passwords makes it easy for attackers who compromise a user's password to gain access to their other accounts. Enhanced Phishing Protection can warn users if they reuse their work or school Microsoft account password on sites and apps and alert them to change their password.&lt;/LI&gt;
&lt;LI&gt;Since it's unsafe to store plaintext passwords in text editors, Enhanced Phishing Protection can warn users if they store their work or school password in Notepad, Word, or any Microsoft 365 Office app, and recommends they delete their password from the file.&lt;/LI&gt;
&lt;LI&gt;If users type their work or school password into a website or app that SmartScreen finds suspicious, Enhanced Phishing Protection can automatically collect information from that website or app to help identify security threats. For example, the content displayed, sounds played, and application memory.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read more about Enhanced Phishing Protection in Microsoft Defender SmartScreen and how to deploy via Intune and/or GPO here:&amp;nbsp; &lt;A href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection?tabs=intune" target="_blank" rel="noopener"&gt;Enhanced Phishing Protection in Microsoft Defender SmartScreen - Windows Security | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 29 Nov 2023 20:25:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/are-any-defender-experts-customers-using-enhanced-phishing/m-p/3996255#M7</guid>
      <dc:creator>JoeCicero</dc:creator>
      <dc:date>2023-11-29T20:25:38Z</dc:date>
    </item>
    <item>
      <title>Security Experts... Please advise the necessary people</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/security-experts-please-advise-the-necessary-people/m-p/3991646#M3</link>
      <description>&lt;P&gt;I'm exploring this forum as a last resort, having exhausted all other options. My story involves a serious flaw in Microsoft's security framework, which has devastatingly impacted my once-thriving business. As a small yet vital enterprise of 15 employees, functioning as an MSP and Microsoft Silver Partner, I faced an unforeseen betrayal. During my absence for spinal surgery, a rogue Microsoft CSP Direct Partner, who was only supposed to manage my business temporarily, exploited their Microsoft affiliation. Utilizing social engineering and their insider status, they illegitimately transferred my company's goodwill and assets to themselves. This included the theft of two decades' worth of private data.&lt;/P&gt;&lt;P&gt;The gravity of their deception extends beyond my business; they now control my client base, mainly consisting of solicitors and accountants. Despite clear evidence of their phishing and scamming activities, Microsoft has remained passive, allowing the situation to deteriorate. The suppliers, duped by fraudulent documents, are now realizing their mistake but continue to deny my rights to my own business. This inaction, shared by both Microsoft and the suppliers, leaves me entangled in debt and potential litigation.&lt;/P&gt;&lt;P&gt;Interestingly, I am still aware of the physical whereabouts of these scammers. Moreover, I possess pages and pages of IOCs that further substantiate their illicit activities. If Microsoft genuinely engaged with this issue and worked collaboratively towards a resolution, perhaps we could transform this into a tale of rectification and justice. But, having pursued every possible channel without success, I am compelled to raise awareness on public forums. With nothing left to lose, I am calling for attention to this matter. Should you be able to assist, or know someone who can, please reach out. My contact details are linked to my forum ID, and Microsoft can easily access my tenant and phone information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="1450993" data-lia-user-login="bozzaman" class="lia-mention lia-mention-user"&gt;bozzaman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 15:31:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/security-experts-please-advise-the-necessary-people/m-p/3991646#M3</guid>
      <dc:creator>bozzaman</dc:creator>
      <dc:date>2023-11-24T15:31:25Z</dc:date>
    </item>
    <item>
      <title>Check out what's new with Microsoft Defender Experts for XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/check-out-what-s-new-with-microsoft-defender-experts-for-xdr/m-p/3983979#M2</link>
      <description>&lt;P&gt;The Defender Experts team has been busy helping customers and adding great features to the Defender Experts for XDR service. Read about the latest enhancements in our latest blog&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/what-s-new-in-microsoft-defender-experts-for-xdr/ba-p/3982765" target="_blank"&gt;What’s new in Microsoft Defender Experts for XDR.&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 18:53:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/check-out-what-s-new-with-microsoft-defender-experts-for-xdr/m-p/3983979#M2</guid>
      <dc:creator>Elisa_Lippincott</dc:creator>
      <dc:date>2023-11-15T18:53:00Z</dc:date>
    </item>
    <item>
      <title>Welcome to the Microsoft Security Experts community!</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-experts/welcome-to-the-microsoft-security-experts-community/m-p/3968977#M1</link>
      <description>&lt;P&gt;We are thrilled to announce the launch of the Microsoft Security Experts community!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Whether you’re familiar with our services or just starting to explore what we offer, you’ll find this community a collaborative space where you can freely ask questions and share insights with our team. We hope to engage in constructive dialogue that fosters growth and innovation and build a resourceful hub that benefits everyone.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In addition to this community, we invite you to learn more about our services below and follow our &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/bg-p/MicrosoftSecurityExperts" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;blog&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for the latest news and insights:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/dex-xdr-overview?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender Experts for XDR&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/defender-experts-for-hunting?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender Experts for Hunting&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/microsoft-incident-response" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Incident Response&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Thank you for being a part of our community!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 16:06:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-experts/welcome-to-the-microsoft-security-experts-community/m-p/3968977#M1</guid>
      <dc:creator>Raae_</dc:creator>
      <dc:date>2023-10-31T16:06:13Z</dc:date>
    </item>
  </channel>
</rss>

