Skip to content

Commit 7fc2818

Browse files
authored
Update automatic-attack-disruption.md
Added clarifications on how the user is disabled per scenario.
1 parent cbbbd74 commit 7fc2818

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

defender-xdr/automatic-attack-disruption.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,12 @@ Automatic attack disruption uses Microsoft-based XDR response actions. Examples
6565

6666
- [Device contain](/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.
6767

68-
- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution.
68+
- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The Disable user action behaves differently depending on how the user is hosted in your environment.
69+
- User hosted in Active Directory : Microsoft Defender for Identity will trigger the Disable user action on DCs running the Defender for Identity agent
70+
- User hosted in Active Directory and synced on Entra ID : Microsoft Defender for Identity will trigger the Disable user action via onboarded domain controllers. Attack Disruption will also disable the user on the Entra ID synced account as well.
71+
- User hosted on Entra ID only (cloud native account) : Attack Disruption will disable the user on the Entra ID synced account.
72+
73+
[!NOTE] Disabling the user on Entra ID is not dependent on Microsoft Defender for Identity being deployed.
6974

7075
- [Contain user](/defender-endpoint/respond-machine-alerts#contain-user-from-the-network) - based on Microsoft Defender for Endpoint's capability, this response action automatically contains suspicious identities temporarily to help block any lateral movement and remote encryption related to incoming communication with Defender for Endpoint's onboarded devices.
7176

0 commit comments

Comments
 (0)