Search

55742 – Automated Incident Response for compromised user accounts (archived)

Microsoft Exchange Logo

check before: 2020-02-29

Product:

Advanced Threat Protection - Azure (ATP), Advanced Threat Protection - Office 365, Azure Active Directory, Cloud App Security, Defender ATP, Exchange

Platform:

Online, Web, World tenant

Status:

Launched

Change type:

Links:

Details:

We're adding a new playbook for automated investigation and remediation of compromised user accounts. With the new playbook for detecting compromised users, security teams can automatically identify, mitigate, and contain threats due to these user accounts, reducing potential damages significantly. The playbook will trigger automatic investigations for users with abnormal sending patterns or users restricted from sending email. The playbook will also provide valuable insights into how the user was compromised, if the user clicked on a bad link or it changed state, or if the user performed some malicious activity, such as sending phish or malware and other critical information including what actions the security team performed.

Change Category:
XXXXXXX ...

Scope:
XXXXXXX ...

Release Phase:
General Availability

Created:
2019-09-27

updated:
2020-09-01

the free basic plan is required to see all details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.


Last updated 2 years ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!