Microsoft Defender for Identity now detects Zerologon attacks

Microsoft Defender for Identity now detects Zerologon attacks


Microsoft has added support for Zerologon exploitation detection to Microsoft Defender for Identity to allow Security Operations teams to detect on-premises attacks attempting to abuse this critical vulnerability.


Microsoft Defender for Identity (previously known as Azure Advanced Threat Protection or Azure ATP) is a cloud-based security solution designed to leverage on-premises Active Directory signals to detect and analyze compromised identities, advanced threats, and malicious insider activity targeting an enrolled organization.


"Microsoft Defender for Identity can detect this vulnerability early on," Microsoft program manager Daniel Naim said. "It covers both the aspects of exploitation and traffic inspection of the Netlogon channel."


Alerts displayed whenever Zerologon exploitation or related activity is detected will allow SecOps teams to quickly get info on the device or the domain controller behind attack attempts.


The alerts will also provide information that can help identify targeted asserts and if the attacks were successful.


"Finally, customers using Microsoft 365 Defender can take full advantage of the power of the signals and alerts from Microsoft Defender for Identity, combined with behavioral events and detections from Microsoft Defender for Endpoint," Naim added.


"This coordinated protection enables you not just to observe Netlogon exploitation attempts over network protocols, but also to see device process and file activity associated with the exploitation."



Zerologon detection alert (Microsoft)

Multi-stage patch rollout


Zerologon is a critical flaw that ca ..

Support the originator by clicking the read the rest link below.