{"id":66539,"date":"2017-01-09T09:00:23","date_gmt":"2017-01-09T17:00:23","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=66539"},"modified":"2023-06-23T09:53:35","modified_gmt":"2023-06-23T16:53:35","slug":"microsoft-enterprise-threat-detection","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/01\/09\/microsoft-enterprise-threat-detection\/","title":{"rendered":"Microsoft Enterprise Threat Detection"},"content":{"rendered":"
This post is authored by Joe Faulhaber, Senior Consultant ECG<\/em><\/p>\n The Microsoft Enterprise Cybersecurity Group (ECG) consists of three pillars: Protect, Detect, and Respond. Protection in depth is always the best defense, and being able to respond to incidents and recover is key to business continuity. Solid protection and rapid response capability are tied together by detection and intelligence, and the Enterprise Threat Detection (ETD) service enables detection in depth with global intelligence.<\/p>\n The detection technologies and intelligence data of ETD are\u00a0brought together by a dedicated global team of cybersecurity analysts compounded by machine analytics. The analyst team merges deep knowledge of Windows and cyber threats with specific understanding of customer environments, becoming a virtual cybersecurity team for the enterprise. They provide in-depth technical knowledge along with reach-back into the vast resources of Microsoft. The ETD analyst team is tightly integrated with all cybersecurity teams in Microsoft, including ECG Global Incident Response and Recovery, the Microsoft Malware Protection Center, Azure Security Center, and the Microsoft Cyber Defense Operations Center. This brings the enterprise unparalleled access to Microsoft\u2019s entire cyber security organization, enabling best-in-class detection, analysis, and actionable intelligence to detect the latest APT and other attacks.<\/p>\n In addition to the analyst team, the ETD service leverages\u00a0machine analytics which uses built-in Windows features to enable powerful detection that adversaries find very difficult to avoid. These unique detection capabilities are just part of the ETD story, however, customers also benefit from global ecosystem visibility from the largest malware telemetry system in the world, as well as recommended actions specific to each customer environment from Microsoft threat analysts.<\/p>\n The service includes immediate alerts in the case of detection of threats. If a determined human adversary is suspected, an ETD analyst contacts the customer to further discuss the identified threat details and response steps, including the Microsoft Global Incident Response and Recovery team if required. Regular summary reports are delivered in discussion meetings with ETD analysts that cover actionable intelligence and insights. Additional analysis support is also provided as needed.<\/p>\n Together, these capabilities, alerts and reports provide benefits to enterprises at all levels of cybersecurity sophistication, from those with no dedicated cyber security personnel to enterprises with world-class cybersecurity capabilities.<\/p>\n ETD leverages Windows Error Reporting to analyze system error reports to determine if malicious code has been run on the system. This powerful technology has been a core Windows operating system component since Windows XP. It has been used extensively by Microsoft and select customers to detect novel, known, and targeted attacks across the threat lifecycle.<\/p>\n ETD also extends error reporting with additional capabilities and attack detection fidelity, even for processes that never generate a Windows error event. And since the feature is built natively into Windows and runs by default, configuring endpoints for ETD is achieved through policy configuration alone.<\/p>\n When employed alongside the Enhanced Mitigation Experience Toolkit, ETD can detect attempted exploits at 3 times the normal detection rate.<\/strong><\/p>\n Cyber Threat Intelligence is a key component of Microsoft\u2019s commitment to defending Windows and Azure customers. \u00a0With an ETD subscription, the CTI data is used to provide a view into an enterprise\u2019s security posture and enables discovery and understanding of emerging threat events in the global ecosystem.<\/p>\n Microsoft\u2019s threat intelligence includes information from all Microsoft antimalware products, resulting in a vast global data set from over a billion computers and 86 billion files.<\/strong> It also includes URL intelligence from SmartScreen and Bing, as well as network intelligence and indicators of compromise from the Microsoft Advanced Persistent Threat hunter teams.<\/p>\n Personalized information for enterprises from Microsoft\u2019s Digital Crimes Unit\u2019s (DCU) Cyber Threat Intelligence Program is also included in the ETD data set, which includes sinkhole data from DCU botnet takedown operations.<\/p>\n ATA enables detection across identities in the enterprise, which ETD advises over and enriches with endpoint information to inform even more powerful and actionable detections.<\/p>\n Microsoft has taken the approach used by ETD in previous versions of Windows and perfected it for Windows 10. \u00a0WD-ATP enables full behavioral monitoring in an enterprise with built-in sensors. ETD analysts have deep understanding of the WD-ATP data stream, and can help manage the comprehensive data to separate commodity malware events from targeted events.<\/p>\n ETD provides world-class threat detection capabilities leveraging proprietary technologies and cyber threat data sources that complement any enterprise\u2019s cyber security strategy and deployment. \u00a0Along with custom analysis, the service, benefits enterprises at any stage of cybersecurity maturity.<\/p>\n","protected":false},"excerpt":{"rendered":" This post is authored by Joe Faulhaber, Senior Consultant ECG Overview The Microsoft Enterprise Cybersecurity Group (ECG) consists of three pillars: Protect, Detect, and Respond. Protection in depth is always the best defense, and being able to respond to incidents and recover is key to business continuity. Solid protection and rapid response capability are tied […]<\/p>\n","protected":false},"author":49,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3674,3675],"products":[3854,3720],"threat-intelligence":[],"tags":[3822],"coauthors":[1957],"class_list":["post-66539","post","type-post","status-publish","format-standard","hentry","content-type-news","topic-incident-response","topic-information-protection-and-governance","products-microsoft-incident-response","products-microsoft-security-experts","tag-microsoft-security-insights"],"yoast_head":"\nOverview<\/h2>\n
Components of Enterprise Threat Detection Service<\/h2>\n
Corporate Error Reporting<\/h4>\n
Cyber Threat Intelligence (CTI)<\/h4>\n
Coordinating Microsoft Products and Services<\/h2>\n
Advanced Threat Analytics (ATA)<\/h4>\n
Windows Defender Advanced Threat Protection (WD-ATP)<\/h4>\n
Conclusion<\/h2>\n