82077 – Microsoft Defender for Identity: Native “response” actions

cloudscout.one Icon

check before: 2021-08-31

Product:

Azure Active Directory, Defender, Microsoft Defender for Identity

Platform:

World tenant, Online

Status:

In development

Change type:

Feature update

Links:

Details:

From this release SecOps will have the ability to directly lock the Active Directory account, or to prompt for the password to be reset, meaning more direct action can be taken when a user is compromised. Up until now, when a user is confirmed as compromised in Microsoft Defender for Identity, it's the Azure Active Directory account that is effected via a conditional access rule.

Change Category:
XXXXXXX ...

Scope:
XXXXXXX ...

Ring:
General Availability

Created:
2021-06-30

updated:
2021-07-08

task type:

the free basic plan is required to see all details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.


Login to your account

Welcome Back, We Missed You!