{"id":23057,"date":"2023-10-04T23:01:02","date_gmt":"2023-10-05T07:01:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/04\/news-16787\/"},"modified":"2023-10-04T23:01:02","modified_gmt":"2023-10-05T07:01:02","slug":"news-16787","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/04\/news-16787\/","title":{"rendered":"Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&#038;CK\u00ae Evaluations: Enterprise\u00a0"},"content":{"rendered":"<p><strong>Credit to Author: Tanmay Ganacharya| Date: Wed, 20 Sep 2023 13:00:00 +0000<\/strong><\/p>\n<p>For the fifth consecutive year, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-365-defender\">Microsoft 365 Defender<\/a> demonstrated industry-leading extended detection and response (XDR) capabilities in the independent <a href=\"https:\/\/attackevals.mitre-engenuity.org\/results\/enterprise?evaluation=turla\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE Engenuity ATT&amp;CK\u00ae Evaluations: Enterprise<\/a>. The attack used during the test highlights the importance of a unified XDR platform and showcases Microsoft 365 Defender as a leading solution, enabled by next-generation protection, industry-first capabilities like automatic attack disruption, and more.\u00a0\u00a0<\/p>\n<p>Microsoft 365 Defender demonstrated 100 percent visibility and complete coverage across all stages of the attack and achieved 100 percent protection across both Windows and Linux, showcasing the strong multiplatform capabilities of the solution. These results demonstrate that Microsoft\u2019s XDR provides organizations with industry-leading visibility and protection in a world of evolving threats.&nbsp;&nbsp;<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-12.webp\" alt=\"A diagram showing the level of coverage Microsoft provided across each step in the attack.\" class=\"wp-image-131663 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-12.webp\"><\/figure>\n<p><em>Figure 1. Microsoft 365 Defender providing full attack chain coverage.<\/em><\/p>\n<p>These results are only possible with continuous innovations built on the feedback of our customers. In just the last 12 months, Microsoft 365 Defender strengthened its endpoint protection with capabilities such as <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-defender-blog\/automatic-disruption-of-ransomware-and-bec-attacks-with\/ba-p\/3738294\" target=\"_blank\" rel=\"noreferrer noopener\">automatic attack disruption<\/a>, which uses AI to suspend in-progress ransomware attacks, the release of a <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/manage-security-settings-for-windows-macos-and-linux-natively-in\/ba-p\/3870617\" target=\"_blank\" rel=\"noreferrer noopener\">unified device settings management<\/a> experience, and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-defender-blog\/microsoft-defender-for-identity-expands-its-coverage-with-new-ad\/ba-p\/3894215\" target=\"_blank\" rel=\"noreferrer noopener\">expanded identity protection<\/a> to include Active Directory Certificate Services (AD CS).&nbsp;<\/p>\n<p>This year\u2019s ATT&amp;CK\u00ae Evaluations emulated the Turla threat group, tracked by Microsoft Threat Intelligence as <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1681695399084539908\" target=\"_blank\" rel=\"noreferrer noopener\">Secret Blizzard<\/a>. They are a Russian-based activity group that has been primarily targeting government organizations worldwide since the early 2000s. They employ extensive resources to remain on a target network in a clandestine manner, making detection more challenging for traditional security products.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<p>Let\u2019s take a closer look at how Microsoft 365 Defender once again achieved industry-leading results in this year\u2019s MITRE evaluation and how Microsoft\u2019s AI breakthroughs are shaping the future of security to respond to threats like Turla.&nbsp;&nbsp;<\/p>\n<div class=\"wp-block-msxcm-cta-block theme-dark\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters bg-gray-800 text-white\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft 365 Defender<\/h2>\n<div class=\"mb-3\">\n<p>Elevate your defenses with unified visibility, investigation, and response across the kill chain with Microsoft&#039;s extended detection and response (XDR) solution.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-365-defender\" class=\"btn btn-primary bg-body text-body\" > \t\t\t\t\t\t\t\t<span>Learn more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Migraine-featured-image-1024x683.jpg\" class=\"card-img img-object-cover\" alt=\"a man sitting in front of a laptop\" decoding=\"async\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Migraine-featured-image-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Migraine-featured-image-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Migraine-featured-image-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Migraine-featured-image.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">100 percent visibility across all stages of the attack chain in real-time&nbsp;<\/h2>\n<p>In the face of a rapidly evolving threat carried out by adversaries like Turla, the speed of response makes a significant difference in a security team\u2019s effectiveness in mitigating an attack. A single delay can mean the difference of your organization\u2019s devices getting encrypted or not. Microsoft 365 Defender\u2019s XDR platform accelerates the security team\u2019s ability to respond by providing real-time, unparalleled breadth and depth of understanding an attack, starting with 100 percent visibility in real-time. This unique breadth of Microsoft\u2019s XDR extends across<strong> endpoints, network, hybrid identities, email, collaboration tools, software as a service (SaaS) apps, and data <\/strong>with centralized visibility, powerful analytics, and automatic attack disruption.&nbsp;&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-1024x576.webp\" alt=\"\" class=\"wp-image-131657 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-1024x576.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-300x169.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-768x432.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-1536x864.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-615x346.webp 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-336x189.webp 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-189x106.webp 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-630x354.webp 630w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2.webp 1950w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-2-1024x576.webp\"><\/figure>\n<p><em>Figure 2. Microsoft 365 Defender provides 100 percent visibility without delay in every attack stage.&nbsp;&nbsp;<\/em><\/p>\n<h2 class=\"wp-block-heading\">100 percent ATT&amp;CK technique-level detections at every attack stage without delay&nbsp;<\/h2>\n<p>As an attack unfolds, security teams need to know what they\u2019re up against the moment it\u2019s happening. Delayed and incomplete detections make it difficult for analysts to understand the attack in full, providing attackers an opportunity escalate their campaign by moving laterally, stealing credentials, or executing other malicious activities. With Microsoft 365 Defender\u2019s 100 percent real-time ATT&amp;CK technique-level coverage, analysts immediately receive relevant details within the alert that describe the attacker\u2019s approach, equipping them with the knowledge to effectively and rapidly respond.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-1024x576.webp\" alt=\"\" class=\"wp-image-131658 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-1024x576.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-300x169.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-768x432.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-1536x864.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-615x346.webp 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-336x189.webp 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-189x106.webp 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-630x354.webp 630w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3.webp 1950w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-3-1024x576.webp\"><\/figure>\n<p><em>Figure 3. Microsoft 365 Defender delivers ATT&amp;CK technique-level detections at every attack stage without delay.<\/em><\/p>\n<h2 class=\"wp-block-heading\">100% protection for every attack stage across Windows and Linux&nbsp;<\/h2>\n<p>This is the third year that MITRE has included a protection scenario as part of the evaluation, and for the third year running, Microsoft 365 Defender successfully blocked 100 percent of the attack stages across Windows and Linux platforms. Microsoft\u2019s AI-powered next-generation protection blocked each attack attempt across 13 steps, representing complete prevention of any malicious activity. This outcome showcases the strong multiplatform capabilities of the solution, independent of the device\u2019s operating system.&nbsp;&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-1024x576.webp\" alt=\"A bar chart showing the effectiveness of  MITRE evaluation participants in blocking the attack across major steps.\" class=\"wp-image-131659 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-1024x576.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-300x169.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-768x432.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-1536x864.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-615x346.webp 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-336x189.webp 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-189x106.webp 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-630x354.webp 630w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4.webp 1950w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Figure-4-1024x576.webp\"><\/figure>\n<p><em>Figure 4. Microsoft 365 Defender blocks&nbsp;every attack stage across Windows and Linux.&nbsp;&nbsp;<\/em><\/p>\n<h2 class=\"wp-block-heading\">Deep visibility into Linux devices&nbsp;<\/h2>\n<p>With the prevalence of increasingly complex attacks, visibility into low-level protocols is critical for security teams to protect against sophisticated network sniffing and drive-by compromise attacks. Microsoft 365 Defender provides that visibility through ingestion of raw socket operations as well as into script content on Linux devices. It also takes action on script content that is obfuscated or encrypted, as well as suspicious network and other protocol behaviors.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2-1024x608.webp\" alt=\"A screenshot of the Microsoft 365 Defender portal showing detection of traffic signaling and network sniffing.  \" class=\"wp-image-131652 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2-1024x608.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2-300x178.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2-768x456.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2-1536x912.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2.webp 1574w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture1-2-1024x608.webp\"><\/figure>\n<p><em>Figure 5. 9.A.12: Traffic Signaling (T1205) and 9.A.13: Network Sniffing (T1040)<\/em>.<\/p>\n<h2 class=\"wp-block-heading\">Eliminated blind spots with network detection and response&nbsp;<\/h2>\n<p>Several stages of the Turla emulation involved network-based techniques. They are an increasingly popular way of infiltrating and moving across systems laterally as they leave minimal traces on source and target devices. Security teams gain full visibility into network traffic with Microsoft 365 Defender\u2019s network detection and response capabilities. As a result, analysts receive high-confidence, context-rich alerts to hunt down and block these sophisticated attacks early in the kill chain. In addition, analysts can discover both managed and unmanaged devices, identify blind spots, and reduce their attack surface to increase their security posture.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture6-1024x622.webp\" alt=\"A screenshot of the Microsoft 365 Defender portal showing the product identifying beaconing behavior.\" class=\"wp-image-131627 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture6-1024x622.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture6-300x182.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture6-768x466.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture6.webp 1430w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture6-1024x622.webp\"><\/figure>\n<p><em>Figure 6. Sub-step 11.A.5 identifies beaconing behavior determining it to be a command-and-control type activity based on process and network frequency analysis.&nbsp;&nbsp;<\/em><\/p>\n<h2 class=\"wp-block-heading\">Deep visibility into each stage of lateral movement&nbsp;<\/h2>\n<p>Adversaries wage increasingly sophisticated campaigns by moving across hosts in a domain. The test involved significant lateral movement with a total of 6 steps, which is more than 30 percent of the total steps.<strong> <\/strong>Microsoft\u2019s XDR solution provides visibility into each stage of lateral movement, whether access is gained through brute force (5.A.3), valid accounts (14.A.3), pass the hash (17.A.1) or any other technique. When tools are being transferred laterally (sub-steps 5.A.6, 18.A.3), Microsoft\u2019s XDR shows the full context of what was transferred, from which host to which destination. Whether the execution on the target host happens through masqueraded PsExec (17.A.1), plink.exe (9.A.5), or WMI (18.A.5), we provide detection and visibility.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture7-1024x597.webp\" alt=\"A screenshot of the Microsoft 365 Defender portal showing tools being transferred across hosts.\" class=\"wp-image-131628 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture7-1024x597.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture7-300x175.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture7-768x448.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture7.webp 1430w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture7-1024x597.webp\"><\/figure>\n<p><em>Figure 7. Sub-step 5.A.6 Microsoft 365 Defender portal showing tools being transferred across hosts<\/em>.<\/p>\n<h2 class=\"wp-block-heading\">Identity threat detection and response spanning the cloud to on-premises&nbsp;<\/h2>\n<p>Part of the MITRE evaluation emulated one of the fastest-growing threat vectors\u2014identity-based attacks where malicious actors seek to exploit identities in the cloud and on-premises, or the underlying infrastructure and policies governing them. Microsoft XDR has native endpoint and identity protection to counter these types of attacks by providing security teams with high-fidelity, contextual signals that other vendors either lack entirely or require a separate integration for. Throughout the attack, Microsoft 365 Defender provided visibility on all identity-related attack steps like sensitive group enumeration, password spraying, and creation of accounts and unusual additions to sensitive groups.&nbsp;&nbsp;<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture8.webp\" alt=\"Screenshot of the Microsoft 365 Defender portal showing details on a suspected brute-force attack.\" class=\"wp-image-131629 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture8.webp\"><\/figure>\n<p><em>Figure 8. Sub-step 5.A.3: Our identity sensors on Active Directory revealed the utilization of the Password Spraying technique, providing information about the users whose login attempts failed and number of such attempts.&nbsp;<\/em><\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture2-2.webp\" alt=\"Screenshot of Microsoft 365 Defender portal showing signals from Active Directory indicating the creation of suspicious accounts, aimed at establishing persistence.\" class=\"wp-image-131653 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture2-2.webp\"><\/figure>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture3-2.webp\" alt=\"Screenshot of the Microsoft 365 Defender portal showing a signal of unusual additions to a sensitive group, aimed at establishing persistence.\" class=\"wp-image-131654 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Picture3-2.webp\"><\/figure>\n<p><em>Figures 9 and 10. Sub-step 17.A.5: Active Directory signals revealed the creation of accounts and unusual additions to sensitive group, all aimed at establishing persistence.&nbsp; &nbsp;<\/em><\/p>\n<h2 class=\"wp-block-heading\">Security in the era of AI&nbsp;<\/h2>\n<p>The MITRE ATT&amp;CK evaluation focused on detection and prevention in the case of one type of attack, for which Microsoft effectively blocked at the earliest step at every attack stage. In real world scenarios where millions of attacks are waged every day, sometimes adversaries can breach the security perimeter. With AI breakthroughs introduced by Microsoft, security teams have already seen first-hand how they can scale their defenses against breaches and respond in novel ways that challenge the assumption of an asymmetric battlefield.&nbsp;&nbsp;<\/p>\n<p>Announced in November 2022, Microsoft 365 Defender\u2019s unique, industry-first <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-defender-blog\/what-s-new-in-xdr-at-microsoft-ignite\/ba-p\/3648872\" target=\"_blank\" rel=\"noreferrer noopener\">automatic attack disruption<\/a> stops the most sophisticated attack campaigns at machine speed like this Turla attack, spanning ransomware, business email compromise, and adversary-in-the-middle. This capability combines our industry-leading detection with AI-powered enforcement mechanisms to block threats early in the kill chain and contain their advancement. Analysts have a powerful tool against human-operated attacks while leaving them in complete control of investigating, remediating, and bringing assets back online.&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.microsoft.com\/blog\/2023\/03\/28\/introducing-microsoft-security-copilot-empowering-defenders-at-the-speed-of-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Copilot<\/a>, first announced at Microsoft Secure in March 2023, is the industry\u2019s first generative AI security product that allows security teams to move at machine speed. It combines OpenAI\u2019s GPT-4 generative AI model with Microsoft\u2019s security-specific model informed by our unique global threat intelligence and more than 65 trillion daily signals. Security teams benefit from Security Copilot by simplifying complex tasks with capabilities like guided response actions, and gaining intuitive, actionable insight across the threat landscape such as summarized incidents in natural language. As a result, organizations can detect threats earlier and outpace adversaries. Security Copilot is currently in private preview and in the nomination period for an early access program. The single best way to prepare to realize the benefits of Microsoft Security Copilot is by adopting and deploying Microsoft 365 Defender today.&nbsp;&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Customer reality is core to Microsoft\u2019s testing approach&nbsp;<\/h2>\n<p>As the threat landscape rapidly evolves, Microsoft is committed to empowering defenders with industry-leading, cross-platform XDR. Our evaluation philosophy is to reflect the real world by configuring the product as customers would in line with industry best practices. For instance, our configuration used the most updated OS versions to test the latest protection available to customers. In the MITRE Evaluations, as with all simulations, Microsoft 365 Defender achieved industry-leading visibility without manual processing or fine-tuning&nbsp;and can be run in customer environments without generating an untenable number of false positives. Microsoft&#8217;s commitment to protection while minimizing false positives is reflected in regularly occurring public evaluations.\u202f&nbsp;<\/p>\n<p>We thank MITRE Engenuity for the opportunity to contribute to and participate in this year\u2019s evaluation.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n<p>Learn more about <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-365-defender\">Microsoft 365 Defender<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.\u00a0Bookmark the\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u00a0for the latest news and updates on cybersecurity.<\/p>\n<h3 class=\"wp-block-heading\">About MITRE Engenuity ATT&amp;CK\u00ae Evaluations&nbsp;&nbsp;<\/h3>\n<p>ATT&amp;CK\u00ae Evaluations is built on the backbone of MITRE\u2019s objective insight and conflict-free perspective. Cybersecurity providers turn to the Evaluations program to improve their offerings and to provide defenders with insights into their product\u2019s capabilities and performance. Evaluations enable defenders to make better informed decisions on how to leverage the products that secure their networks. The program follows a rigorous, transparent methodology using a collaborative, threat-informed, purple-teaming approach that brings together providers and MITRE experts to evaluate solutions within the context of ATT&amp;CK. In line with MITRE Engenuity\u2019s commitment to serve the public good, Evaluations results and threat emulation plans are freely accessible. <a href=\"https:\/\/mitre-engenuity.org\/cybersecurity\/attack-evaluations\/\" target=\"_blank\" rel=\"noreferrer noopener\">ATT&amp;CK Evaluations | MITRE Engenuity (mitre-engenuity.org)<\/a>&nbsp;<\/p>\n<h3 class=\"wp-block-heading\">About MITRE Engenuity&nbsp;<\/h3>\n<p>MITRE Engenuity, a subsidiary of MITRE, is a tech foundation for public good. MITRE\u2019s mission-driven teams are dedicated to solving problems for a safer world. Through our public-private partnerships and federally funded R&amp;D centers, we work across government and in partnership with industry to tackle challenges to the safety, stability, and well-being of our nation. MITRE Engenuity brings MITRE\u2019s deep technical know-how and systems thinking to the private sector to solve complex challenges that government alone cannot solve. MITRE Engenuity catalyzes the collective R&amp;D strength of the broader U.S. federal government, academia, and private sector to tackle \u00a9 2023 MITRE Engenuity, LLC. Approved for Limited Release to MITRE Engenuity ATT&amp;CK\u00ae Evaluations: Enterprise 2023: Turla Participants. national and global challenges, such as protecting critical infrastructure, creating a resilient semiconductor ecosystem, investing in pandemic preparedness, accelerating use case innovation in 5G, and democratizing threat-informed cyber defense.&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/09\/20\/microsoft-365-defender-demonstrates-100-percent-protection-coverage-in-the-2023-mitre-engenuity-attck-evaluations-enterprise\/\">Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&#038;CK\u00ae Evaluations: Enterprise\u00a0<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/09\/20\/microsoft-365-defender-demonstrates-100-percent-protection-coverage-in-the-2023-mitre-engenuity-attck-evaluations-enterprise\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Tanmay Ganacharya| Date: Wed, 20 Sep 2023 13:00:00 +0000<\/strong><\/p>\n<p>\u200bFor the fifth consecutive year, Microsoft 365 Defender demonstrated leading extended detection and response (XDR) capabilities in the independent MITRE Engenuity ATT&#038;CK\u00ae Evaluations: Enterprise. The attack used during the test highlights the importance of a unified XDR platform and showcases Microsoft 365 Defender as a leading solution, enabled by next-gen protection, industry-first capabilities like automatic attack disruption, and more. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/09\/20\/microsoft-365-defender-demonstrates-100-percent-protection-coverage-in-the-2023-mitre-engenuity-attck-evaluations-enterprise\/\">Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&#038;CK\u00ae Evaluations: Enterprise\u00a0<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-23057","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23057"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23057\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23057"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}