Welcome to the new community home for Microsoft Threat Protection (MTP)
Published Jul 01 2020 01:57 PM 7,592 Views
Microsoft

Welcome!

 

We all understand that attackers know no boundaries—they will cross multiple domains like email, identity, endpoints, and applications to go after your most valuable assets. Current solutions that have been designed as point solutions don’t talk to each other and don’t connect the dots. While you might block an attacker from stealing your password, they might have found another way in via email or a vulnerable SaaS application.

 

With Microsoft Threat protection (MTP) we are fundamentally changing the approach to detection, investigation and response across domains to better help security teams gain end-to-end visibility into attacker activities and automatically correlate signals across domains, so we can fully understand the breadth of an attack and stop it.

 

MTP is an integrated, cross-domain threat detection and response solution. It provides organizations with the ability to prevent, detect, investigate, and remediate sophisticated cross-domain attacks within their Microsoft 365 environments. MTP leverages raw signal data from individual domains -- user identity, endpoints, applications, email, and collaboration tools -- normalizing the data at the point of creation. The data is analyzed and low-level signals that may otherwise be missed as well as individual alerts are fused into incidents, giving a complete view of an attack that can be responded to in its entirety. Powerful workflows and AI auto-heal affected assets, and advanced hunting capabilities mean organizations can use their proprietary knowledge to uncover sophisticated breaches and customize their responses.

 

This community will be a forum for open discussions, questions, and interaction with the Microsoft product teams working on MTP. Check back for exciting product announcements and feature updates, as well as security best practices and instructional webcasts. Be part of MTP’s innovation journey: provide feedback and inputs that will help inform our decisions and investments in building products and features that work for you.

 

To learn more about Microsoft Threat Protection, visit our webpage and our corporate security blog. Visit our Documentation page for deep how-to information and technical guidance. We look forward to talking with you soon.

 

@Raviv Tamir  – Partner Group Program Manager (Microsoft Threat Protection).

 

 

 

3 Comments
Bronze Contributor

Community involvement is very important, there are many ethical hackers who want to engage with Microsoft to makes platform stronger and make it harder for cybercriminals to break into systems. Rapid investigating and response plays important role, when we have a stronger defense, our job become easier.

Iron Contributor

Just sharing an interesting snippet where we were surprised to find that from the cloud based console we were able to identify onPrem logon details via Active Directory - great work on a really useful tool:

// Logons
IdentityLogonEvents
| where Application == "Active Directory"
| where ActionType == "LogonSuccess"
//| where AccountDisplayName contains "David Caddick"
//| limit 100
| join IdentityInfo on AccountObjectId 
Microsoft

@David Caddick Indeed, in IdentityLogonEvents you will find on-premise logons against Active Directory, which are monitored by Azure ATP, and logons to Microsoft online services, which are monitored by MCAS. 

Version history
Last update:
‎Jul 01 2020 02:09 PM
Updated by: