Manage SIEM, XDR, and threat intelligence from one place with new updates in the Microsoft Defender portal. Interact with all of your security data using generative AI with Security Copilot. View incidents across your digital estate — whether they’re related to endpoints, SaaS services, your network in the cloud or on prem. This unified approach eliminates the inefficiency of SOC teams having to switch between multiple systems and manually piece together incident details, while maintaining all the current functionalities of each connected service.
Rob Lefferts joins Jeremy Chapman to discuss how the Defender experience has evolved into a unified security operations platform that combines threat detection, prevention, investigation, and response.
Manage your entire multicloud security operation from one place.
Use natural language to author KQL queries.
See how Security Copilot is embedded within Microsoft Defender. Click to watch.
Protect against advanced attacks.
Combined forces of SIEM+XDR automatically take actions to lock and disable accounts with attack disruption. See it here.
Watch our video here:
00:00 — How Microsoft Defender has evolved
01:47 — Increase your SOC’s efficiency and speed
02:30 — GPT-based Security Copilot
03:54 — See an active incident
05:45 — Attack disruption
06:48 — High-level recap with Security Copilot
07:39 — Unified advanced hunting
08:51 — Set it up
09:32 — Wrap up
For more information, and to join our private preview go to https://aka.ms/SOCPlatform
Unfamiliar with Microsoft Mechanics?
As Microsoft’s official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
- Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
- Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
- Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
Keep getting this insider knowledge, join us on social:
- Follow us on Twitter: https://twitter.com/MSFTMechanics
- Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
- Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
- Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
– What if I told you that with just one portal, you can manage your entire multicloud security operation from one place, so you don’t need to jump between a SIEM, Extended Detection Response and Threat Intel systems and it lets you interact with all of your security data using generative AI with Security Copilot. That’s what we’re delivering and that’s what you just saw with the new unified SIEM and XDR experience in the Microsoft Defender portal. And Rob Lefferts is back to tell us all about it.
– Always great to be back as we keep evolving and improving.
– I’m really looking forward to this so tell us how Microsoft Defender then has changed and how it’s evolving.
– So to build on what we’ve covered here on the show through various seasons, we’ve been working towards a unified security operations platform for a while and now it’s here. First, we are extending Microsoft 365 Defender with signals from Defender for Cloud and renaming it to Microsoft Defender XDR. Additionally, we’re bringing in all of Microsoft Sentinel with its vast insights to deliver a truly unified security operations platform. So now, instead of multiple interfaces and data streams that you’d need to learn, navigate, and use to work through your security incidents, we’ve made things much easier. The Microsoft Defender portal provides a single experience to help you coordinate threat detection, prevention, investigation and response. And you get a comprehensive overview of incidents across your digital estate, whether they are related to endpoints, SaaS services, your network in the cloud, or on-prem infrastructure. Additionally, as security events happen, you can disrupt them at machine speed to protect users identities and endpoints, and now even business applications. Which of course takes things a step further in the prevention of data exfiltration.
– Right, in terms of the pain that goes away, these are incidents and activities that might have spanned a few different services like different islands kind of in the past.
– Absolutely. And as a result, SOC teams would need to jump between those islands carrying the context and piecing together the full scope and details of an incident in their heads. Not the most efficient way to carry out an investigation where seconds count. And just to be clear, with Microsoft Defender portal’s unified approach, you won’t be losing any of the functionality you rely on today in each service. You can still jump back into those connected services. It just means that you can now operate within one island when that 360 degree context matters.
– Right, and this really helps when time is of the essence. And plus you’ve got a lot of different time savers, which then leads us to the big news that we announced last March, GPT-based Security Copilot. So, how does that play into Microsoft Defender?
– It gives you a powerful natural language interface over your security data so that you can easily query it and sometimes can catch details that you may have missed. Security Copilot, in fact, has been specifically trained and fine-tuned on cybersecurity. So we’ve evolved the large language model itself and we’ve built an orchestration layer underneath that to find and parse through massive amounts of security data and signals across Microsoft Defender XDR, Microsoft Sentinel, and all of your non-Microsoft connected services completely tailored to your environment and SOC scenarios. Then as you work in Microsoft Defender, Security Copilot is embedded within each Microsoft Defender experience. With all of this training and connected knowledge in the Security Copilot sidebar, each incident automatically gets a generated summary and will even create reports for you. And as you investigate alerts, it can analyze scripts and commands in context as you work. And in Advanced Hunting, you can use natural language to author KQL queries with Security Copilot. Building an AI system like this is something we’re uniquely able to do with our expertise in cybersecurity and in operating large language models.
– Right Rob, I bet you know where this is going. I’d love to see all this working so do you have an example you can show us?
– Sure, I have a great one lined up for you. In this case, we have an active incident with our SAP environment, so it’s business critical and we need to contain it fast. Here, I’m in the new Microsoft Defender portal, which as I mentioned has everything you need from its cloud-based SIEM capabilities, full breakdown of active incidents, complete set of investigation tools with threat intelligence built in, attack story visualizations and more. We see total unique incidents, a unified list across Microsoft Sentinel and Defender XDR insights into data connectors, top risky entities and more. While Defenders used to have two different homepages to go into to get started and determine what to do that day, now they have just one. I can quickly see all of the active attacks in my environment and on my network. And from the data connectors and automation tiles, you can see the extent of our data integration from our SIEM. Let’s dig into the active attacks on my network. This is our new unified incident queue. You can easily see alerts correlated into incidents, and these are prioritized based on machine learning. Now let’s look at this incident on the top. A financial process manipulation on SAP. SAP is a critical ERP and CRM product used by many companies containing both company and employee data, making it a popular target for cyber attacks. But, we see this incident is already tagged with attack disruption, and if you’re new to attack disruption, it automatically intervenes and stops the progression of advanced attacks within Microsoft Defender XDR. And we’ve already had this for Microsoft 365 workloads, but this is new. It’s taking action to disrupt an attack directly on SAP, including protecting the SAP user account.
– Right, and you’ve got all the sentinel information right there in context inside of Defender, but I also see that you’ve also got Jonathan Wolcott and he’s back. So, is he in trouble again?
– Well, he’s had his moments in previous shows, I hope he is okay. Let’s open up this incident and in fact, he’s not okay. As we can see, he has been attacked and attack disruption has already kicked in and things have happened on two fronts. First, Jonathan Wolcott’s AD account has been disabled to get the attacker out of his productivity applications, but his SAP account has also been locked. So the attacker can’t, for example, redirect payment from a business to their own accounts. So being able to disable additional IDs is increasingly important with multi identity stores and many different applications that organizations leverage. By bringing first and third party insights together here, we are getting better coverage and higher confidence that the combined forces of SIEM+XDR automatically take the right actions like this one to defend against advanced attacks. I’m going to need to let our manager and potentially the board know what has happened here. And the good news is that we now have Microsoft Security Copilot reasoning over both Microsoft Sentinel and Defender XDR data right here in the portal to create a summary. Just by clicking this generate an incident report, Copilot gives us a detailed summary of what has happened and why. You see that Jonathan Walcott got a phishing email with a link, which turned out to be a malicious URL, resulting in his credentials being stolen. We even see the IP that was used by the attacker. Now you can easily ship this summary off to a manager, the board, whoever needs to get a heads up about what happened and how it was addressed automatically with your security tools.
– Nice and this really provides a high level recap in terms of what happened. But what else might you do then to find out more or contain that threat?
– One thing you might want to do is find out where any other files accessed from this malicious IP. And the good news is Copilot will guide you to Advanced Hunting to do some research. In this new unified hunting experience, you can look through both Microsoft Sentinel and Defender XDR data. No matter where it’s from, this also means your SAP data, your device events, all your information will be there. Before this as a tier one analyst, hunting using KQL was quite a challenge to me, but now I can use Microsoft Security Copilot to query and return results. And in this case it even figured out what I should be looking for and wrote the prompt for me. And I can continue using natural language prompts or suggested prompts. And in this case it says, “Hey, you should check out were there any successful connections.” And when I do that, you’ll see that they were able to access a few more files but nothing confidential. We were able to stop them before they reached the important stuff. With this, unified advanced hunting, it’s working across Microsoft Sentinel and Defender XDR. So I was able to query everything in one place without having to keep track in my head of where to find what relevant information.
– Right and everything you did there just saved a ton of time in terms of investigation and response. So this is Mechanics again and a lot of implementers are watching. How would I get all this stuff set up?
– So if you’re already on Microsoft Defender E5 and using Microsoft Sentinel, you’ll see this banner displayed in Defender’s Homepage at the top with a button to connect your Microsoft Sentinel Workspace. And when I click on it, it takes me through a simple Wizard process to onboard my workspace. The entire process takes only a few minutes so there’s no complicated onboarding required. And Microsoft Sentinel continues to work in the Azure portal just like usual. It’s pretty easy and brings everything together in one place.
– Which as you showed, makes it a lot easier than to work through your incidents with all the tools and intelligence you need. And it’s right there for you. So for anyone who’s watching right now, looking to get started, what do you recommend?
– Well that’s easy. If you’re already using Microsoft Sentinel and Microsoft Defender XDR as we just showed, it’s super simple to get everything up and running. And you can find out more at aka.ms/SOCPlatform and join our private preview, we’d love to hear from you.
– Thanks again, Rob, for joining us today.
– Thank you.
– And it’s great to see the unified experience there with Defender and all things you’re doing and also Security Copilot. And by the way, for deeper dives like this in the latest tech, be sure to subscribe to Microsoft Mechanics. Thanks for watching, we’ll see you next time.