check before: 2024-08-15
Product:
Defender, Entra, Microsoft 365 Apps, Microsoft 365 Defender
Platform:
World tenant, Online
Status:
Change type:
New feature, Admin impact
Links:
Details:
Summary:
The Attacker in the Middle detection feature will be generally available in Microsoft Entra ID Protection by late August 2024, enhancing security by identifying compromised user accounts. No admin action is required before the rollout.
Details:
The Attacker in the Middle detection will be Generally Available for users in Microsoft Entra ID Protection.
[When this will happen:]
General Availability (Worldwide): We will begin rolling out mid-August 2024 and expect to complete by late August 2024.
Change Category:
XXXXXXX ...
Scope:
XXXXXXX ...
Release Phase:
Created:
2024-08-09
updated:
2024-08-09
Task Type
XXXXXXX ...
Docu to Check
XXXXXXX ...
MS How does it affect me
XXXXXXX ...
MS Preperations
XXXXXXX ...
MS Urgency
XXXXXXX ...
MS workload name
XXXXXXX ...
Direct effects for Operations**
- Direct Impact on IT Operations
- Increased Security Monitoring
- The introduction of the Attacker in the Middle detection feature will require IT operations to monitor alerts more closely, as compromised accounts will be flagged as high risk.
- Roles Impacted: Security Operations Team, IT Administrators
- Dependencies: Integration with Microsoft 365 Defender for alert generation and response actions.
- Potential Increase in User Support Requests
- As users may experience elevated risk alerts, there could be a surge in support requests from users who are confused or concerned about their account status.
- Roles Impacted: Help Desk Support, IT Support Staff
- Dependencies: User training and documentation updates to help users understand the new feature.
- Direct Impact on IT Services
- Conditional Access Policy Adjustments
- The feature will trigger existing Conditional Access policies, which may lead to changes in user access levels and service availability.
- Roles Impacted: IT Security Team, Compliance Officers
- Dependencies: Existing Conditional Access configurations and any related services that rely on user authentication.
- Documentation and Training Needs
- The rollout necessitates updates to internal documentation and training materials to ensure that all stakeholders understand the new detection capabilities and response protocols.
- Roles Impacted: IT Training Coordinators, Documentation Specialists
- Dependencies: Collaboration with Microsoft resources for accurate information dissemination.
For more information on the risks and features of Microsoft Entra ID Protection, refer to the official Microsoft documentation: [Microsoft Entra ID Protection](https://learn.microsoft.com/entra/id-protection/concept-identity-protection-risks).
** AI generated content. This information is not reliable.
the free basic plan is required to see all details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.