Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender for O365 New Feature Allows Security Teams to Trigger Automated Investigations

Posted on November 13, 2025November 13, 2025 By CWS

Microsoft has rolled out enhanced remediation capabilities in Defender for Workplace 365 (O365), enabling safety groups to provoke automated investigations and different actions straight from the Superior Searching interface.

This function, launched on November 10, 2025, empowers admins and analysts to answer e mail threats extra swiftly with out requiring coverage modifications.​

The brand new actions Undergo Microsoft, add entries to the Tenant Enable/Block Record, and Provoke Automated Investigation—have been beforehand restricted to the Risk Explorer software however at the moment are built-in into Superior Searching.

This permits for programmatic risk looking utilizing customized Kusto Question Language (KQL) queries, streamlining workflows for safety operations facilities (SOCs).

By bringing these instruments collectively, Microsoft addresses buyer suggestions, decreasing the time wanted to triage and remediate malicious emails.​

Microsoft Defender for O365

Superior Searching, a part of Microsoft Defender XDR, already gives deep visibility into cross-domain threats throughout e mail, endpoints, and identities. With this replace, customers can choose question outcomes and set off responses contextually primarily based on message supply standing, resembling purging from inboxes or quarantines.

For bulk choices exceeding 100 messages, choices like e mail purge and proposed remediations stay out there, making certain scalability for large-scale incidents. Risk Explorer continues to function independently, offering complementary views of real-time detections.​

Microsoft Defender for O365

This rollout impacts admins and safety analysts leveraging Microsoft Defender XDR, with actions enabled by default throughout worldwide tenants.

No consumer interface removing is feasible, however current administrative insurance policies, together with role-based entry management (RBAC), are absolutely revered to take care of compliance. Organizations can scope entry by way of the Microsoft 365 Defender portal underneath Settings > Permissions > Roles, stopping unauthorized use.​

To arrange, groups ought to audit present looking queries and combine the brand new actions into playbooks for automated responses. Speaking these adjustments to SOC stakeholders and offering focused coaching will reduce disruptions.

For example, updating documentation on initiating automated investigations can speed up adoption, particularly in environments dealing with excessive volumes of phishing or malware-laden emails.​

The enhancement aligns with broader traits in automated investigation and response (AIR) in Defender for O365 Plan 2, the place remediation clusters round malicious information or URLs for sooner risk neutralization.

By default, AIR actions require approval, however configurations for auto-remediation on message clusters can additional cut back handbook overhead, although clusters over 10,000 gadgets immediate opinions. In Superior Searching schemas like EmailPostDeliveryEvents, auto-remediated gadgets seem with ActionType “Automated Remediation” and ActionTrigger “Automation,” aiding forensic evaluation.​

This replace maintains proactive protection in an period of refined email-based assaults, resembling ransomware and enterprise e mail compromise.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Automated, Defender, Feature, Investigations, Microsoft, O365, Security, Teams, Trigger

Post navigation

Previous Post: Critical WatchGuard Firebox Vulnerability Exploited in Attacks
Next Post: NHS Investigating Oracle EBS Hack Claims as Hackers Name Over 40 Alleged Victims

Related Posts

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure Cyber Security News
Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User Cyber Security News
Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization Cyber Security News
Hackers Attempted to Misuse Claude AI to Launch Cyber Attacks Cyber Security News
Key Vulnerabilities, Threats, and Data Breaches Cyber Security News
Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News