Site icon WinCert

Microsoft Defender’s New Tool Stops Account Threats

<p>A significant challenge faced by IT administrators lately is figuring out when a real user&&num;8217&semi;s account is under threat of being misused for deploying harmful software or stealing data&period; For this purpose&comma; Microsoft has recently updated its Defender for Endpoint to deal with this issue&comma; with an addition of the &&num;8220&semi;contain user&&num;8221&semi; tool&comma; that is currently in public preview&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-3203" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2019&sol;07&sol;hacker&period;jpg" alt&equals;"" width&equals;"640" height&equals;"426" &sol;><&sol;p>&NewLine;<p>Basically&comma; if this tool detects a user account that&&num;8217&semi;s behaving suspiciously&comma; Defender for Endpoint will isolate that user&period; It will cut off its access to other endpoints and resources&comma; thus stopping any potential damage&comma; such as the deployment of ransomware&period;<&sol;p>&NewLine;<p>Referred to as &&num;8220&semi;attack disruption&comma;&&num;8221&semi; this feature will prevent compromised users from carrying out malicious activities like moving through systems&comma; stealing credentials&comma; extracting data&comma; or encrypting files remotely&period; Rob Lefferts&comma; Corporate Vice President for Microsoft 365 Security&comma; explained in a blog post that this default capability identifies and isolates compromised users by shutting down their communication with other endpoints&period;<&sol;p>&NewLine;<p>When the suspicious account is held&comma; all other endpoints are safeguarded&period; They will pass the process named &&num;8220&semi;inoculation&comma;&&num;8221&semi; where incoming malicious traffic is blocked&period; This strategic move leaves the hacker isolated&comma; with no communication&period; Microsoft said that this default action significantly reduces the impact of an attack&comma; giving security analysts more time to find&comma; identify&comma; and deal with the threat linked to the compromised identity&period;<&sol;p>&NewLine;

Exit mobile version