Announcing quarantine release integration in Microsoft Defender for Office 365 hunting experience!!

  • Thread starter Thread starter soumyamishra
  • Start date Start date
S

soumyamishra

We are excited to introduce the new quarantine release integration within Microsoft Defender for Office 365 as part of the hunting experience. This enhancement allows Security Operators (SecOps) to address false positives more efficiently and with greater flexibility in Microsoft Defender for Office 365.



With this new capability, SecOps can now move quarantined messages to Inbox across hunting experiences - Threat Explorer, Advanced Hunting, Email summary panel, Email Entity Page, and custom detection.

SecOps team members can act on both single and quarantine messages in bulk. To act on a single message, use the Email Entity page, to act on multiple messages use Threat Explorer, Advanced hunting, custom detection rules in Defender XDR.



The previous workflow for false positive triage was cumbersome and required SecOps to go through approximately 5 different steps and switch tabs from hunting surfaces like Threat explorer and Advanced hunting. With this new functionality, these extra steps are no longer needed and SecOps can quickly release messages from where they are without losing context. This also allows SecOps teams to define and better filter on messages with custom queries and take release action directly from Threat explorer and Advanced hunting.



Additionally, SecOps can carry out a bulk quarantine release operation on more than 100 messages asynchronously. For best result, release remediation should be done in batches of 50,000 or fewer.



Some examples of how Threat explorer, email entity page/ email summary panel, Advanced hunting and API can deal with false positives effectively are given below.



  • SecOps can search for a False positive URL in threat explorer find related Quarantined messages and directly Move to inbox/release from Quarantine – while in Threat explorerlarge?v=v2&px=999.gif
  • SecOps can search for a False positive URL in Advanced hunting that have been blocked/ Quarantined, find all messages quarantined based on the URL and threat type and directly trigger Move to inbox/release from Quarantine – while using Advance hunting in Microsoft Defender XDR.

EmailEvents

| where ThreatTypes contains "Phish" and LatestDeliveryLocation contains "Quarantine"​

| join EmailUrlInfo on NetworkMessageId


| project Timestamp,NetworkMessageId,RecipientEmailAddress,Subject,DeliveryAction,LatestDeliveryLocation,Url,UrlCount, ReportId



large?v=v2&px=999.gif

  • SecOps can act on the quarantine release from Email entity page and Email Summary Panel –
  • Quarantine release through custom detection rules-
    • Email action with Microsoft Defender for Office 365 is natively integrated with custom detections in Microsoft Defender XDR. This means SecOps can easily write sophisticated kql queries to find any messages which got quarantined incorrectly and respond to these events and take release / move to inbox action even automatically. Please learn more about custom detection here.large?v=v2&px=999.gif



Learn more:


Do you have questions or feedback about Microsoft Defender for Office 365? Engage with the community and Microsoft experts in the Defender for Office 365 forum

Continue reading...
 
Back
Top