{"id":133734,"date":"2024-03-21T09:00:00","date_gmt":"2024-03-21T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=133734"},"modified":"2024-03-21T09:05:03","modified_gmt":"2024-03-21T16:05:03","slug":"how-microsoft-incident-response-and-microsoft-defender-for-identity-work-together-to-detect-and-respond-to-cyberthreats","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/21\/how-microsoft-incident-response-and-microsoft-defender-for-identity-work-together-to-detect-and-respond-to-cyberthreats\/","title":{"rendered":"How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats"},"content":{"rendered":"\n

Identity-based cyberthreats are on the rise. 2023 saw a tenfold increase in threats including phishing, ransomware, and more.1<\/sup> And bad actors continue to evolve their techniques\u2014making them more sophisticated, more overwhelming, and more believable. From an employee\u2019s viewpoint, every ping, click, swipe, buzz, ding, text, and tap takes time and attention\u2014which can add up to a loss of focus, alert fatigue, and increased risk. In this post, we\u2019ll look at a human-operated ransomware attack that began with one malicious link in one user\u2019s email. Then we\u2019ll share how Microsoft Incident Response<\/a> helped facilitate collaboration among security, identity, and incident response teams to help a customer evict the bad actor from their environment and build resilience for future threats.<\/p>\n\n\n

\n\t
\n\t\t
\n\n\t\t\t\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Microsoft Incident Response <\/h2>\n\n\t\t\t\t\t
\n\t\t\t\t\t\t

Strengthen your security with an end-to-end portfolio of proactive and reactive cybersecurity incident response services.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t