This article is contributed. See the original author and article here.

Microsoft Threat Protection continuously and seamlessly scours endpoints, email and docs, cloud app, and identity activities for suspicious signals and uses deep correlation logic to automatically find links between related signals across domains. It connects related existing alerts and generates additional alerts for suspicious events that could otherwise be missed.

 

Correlated signals, alerts, and relevant entities are collected and consolidated into a single comprehensive incident representing the whole attack.

 

We put Microsoft Threat Protection’s incident feature to the test by simulating an end-to-end attack chain that involves various attacker techniques across multiple domains, including spear-phishing, credential theft, overpass-the-hash attack, lateral movement, and other techniques observed in actual investigations.

 

fig1-attack-chain-overpass-the-hash-spear-phishing-lateral-movement.png

 

Learn how automatic correlations in Microsoft Threat Protection detected the initial access, lateral movement, and lateral phishing stages of the attack sprawl simulation. Read our latest blog: Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.