Huntress logo
Huntress
Create
Roadmap
Feedback
ITDR (MDR for Microsoft 365)
151
Changelog

    Boards

  • Managed EDR

  • Integrations

  • Security Awareness Training

  • ITDR (MDR for Microsoft 365)

  • Reporting

  • macOS

  • UI/UX

  • MAV (Managed AV - Microsoft Defender)

  • Ransomware Canaries

  • Managed SIEM

  • API

  • SOC/Incident/Investigations/Escalations

  • Account/Organization/User Management

Powered by Canny

ITDR (MDR for Microsoft 365)

Category

      • Bug
      • Major
      • Minor
      • New Escalations
      • Unwanted Access Improvements
      • Shadow Workflows Improvements
      • Rogue Apps Improvements
      • Evasive Behaviors Improvements
      • New Functionality
      • Uncategorized
Shadow Workflows
The Shadow Workflows capability will provide detection and response of the most common post-compromise malicious activities. These activities include: Malicious inbox rule creation (we are completely revamping how we detect malicious inbox rules as part of this effort) Malicious phishing campaigns: At a minimum, we will detect and generate an incident report when a mailbox is responsible for a malicious phishing campaign. Data exfiltration: At a minimum, we will detect malicious file downloads from the Microsoft ecosystem.
7
·

in progress

Powered by Canny