Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Defender for O365 New Feature Allows Security Teams to Trigger Automated Investigations

Microsoft Defender for O365 New Feature Allows Security Teams to Trigger Automated Investigations

Posted on November 13, 2025November 13, 2025 By CWS

Microsoft has rolled out enhanced remediation capabilities in Defender for Workplace 365 (O365), enabling safety groups to provoke automated investigations and different actions straight from the Superior Searching interface.

This function, launched on November 10, 2025, empowers admins and analysts to answer e mail threats extra swiftly with out requiring coverage modifications.​

The brand new actions Undergo Microsoft, add entries to the Tenant Enable/Block Record, and Provoke Automated Investigation—have been beforehand restricted to the Risk Explorer software however at the moment are built-in into Superior Searching.

This permits for programmatic risk looking utilizing customized Kusto Question Language (KQL) queries, streamlining workflows for safety operations facilities (SOCs).

By bringing these instruments collectively, Microsoft addresses buyer suggestions, decreasing the time wanted to triage and remediate malicious emails.​

Microsoft Defender for O365

Superior Searching, a part of Microsoft Defender XDR, already gives deep visibility into cross-domain threats throughout e mail, endpoints, and identities. With this replace, customers can choose question outcomes and set off responses contextually primarily based on message supply standing, resembling purging from inboxes or quarantines.

For bulk choices exceeding 100 messages, choices like e mail purge and proposed remediations stay out there, making certain scalability for large-scale incidents. Risk Explorer continues to function independently, offering complementary views of real-time detections.​

Microsoft Defender for O365

This rollout impacts admins and safety analysts leveraging Microsoft Defender XDR, with actions enabled by default throughout worldwide tenants.

No consumer interface removing is feasible, however current administrative insurance policies, together with role-based entry management (RBAC), are absolutely revered to take care of compliance. Organizations can scope entry by way of the Microsoft 365 Defender portal underneath Settings > Permissions > Roles, stopping unauthorized use.​

To arrange, groups ought to audit present looking queries and combine the brand new actions into playbooks for automated responses. Speaking these adjustments to SOC stakeholders and offering focused coaching will reduce disruptions.

For example, updating documentation on initiating automated investigations can speed up adoption, particularly in environments dealing with excessive volumes of phishing or malware-laden emails.​

The enhancement aligns with broader traits in automated investigation and response (AIR) in Defender for O365 Plan 2, the place remediation clusters round malicious information or URLs for sooner risk neutralization.

By default, AIR actions require approval, however configurations for auto-remediation on message clusters can additional cut back handbook overhead, although clusters over 10,000 gadgets immediate opinions. In Superior Searching schemas like EmailPostDeliveryEvents, auto-remediated gadgets seem with ActionType “Automated Remediation” and ActionTrigger “Automation,” aiding forensic evaluation.​

This replace maintains proactive protection in an period of refined email-based assaults, resembling ransomware and enterprise e mail compromise.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Automated, Defender, Feature, Investigations, Microsoft, O365, Security, Teams, Trigger

Post navigation

Previous Post: Critical WatchGuard Firebox Vulnerability Exploited in Attacks
Next Post: NHS Investigating Oracle EBS Hack Claims as Hackers Name Over 40 Alleged Victims

Related Posts

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks Cyber Security News
Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Cyber Security News
Microsoft Warns Secure Boot May Be Bypassed as Windows UEFI Certificates Expire Microsoft Warns Secure Boot May Be Bypassed as Windows UEFI Certificates Expire Cyber Security News
New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver Cyber Security News
GitLab SSRF Vulnerability Exploited: CISA Issues Warning GitLab SSRF Vulnerability Exploited: CISA Issues Warning Cyber Security News
Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News