check before: 2021-08-31
Azure Active Directory, Defender, Microsoft Defender for Identity
World tenant, Online
From this release SecOps will have the ability to directly lock the Active Directory account, or to prompt for the password to be reset, meaning more direct action can be taken when a user is compromised. Up until now, when a user is confirmed as compromised in Microsoft Defender for Identity, it's the Azure Active Directory account that is effected via a conditional access rule.
the free basic plan is required to see all details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.