Skip to content

Commit ab2738d

Browse files
authored
Update automatic-attack-disruption.md
edited added text
1 parent 7fc2818 commit ab2738d

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-xdr/automatic-attack-disruption.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 05/29/2024
21+
ms.date: 09/11/2024
2222
---
2323

2424
# Automatic attack disruption in Microsoft Defender XDR
@@ -65,10 +65,10 @@ Automatic attack disruption uses Microsoft-based XDR response actions. Examples
6565

6666
- [Device contain](/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.
6767

68-
- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The Disable user action behaves differently depending on how the user is hosted in your environment.
69-
- User hosted in Active Directory : Microsoft Defender for Identity will trigger the Disable user action on DCs running the Defender for Identity agent
70-
- User hosted in Active Directory and synced on Entra ID : Microsoft Defender for Identity will trigger the Disable user action via onboarded domain controllers. Attack Disruption will also disable the user on the Entra ID synced account as well.
71-
- User hosted on Entra ID only (cloud native account) : Attack Disruption will disable the user on the Entra ID synced account.
68+
- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The disable user action behaves differently depending on how the user is hosted in your environment.
69+
- When the user account is hosted in Active Directory: Defender for Identity triggers the disable user action on domain controllers running the Defender for Identity agent.
70+
- When the user account is hosted in Active Directory and is synced on Entra ID: Defender for Identity triggers the disable user action via onboarded domain controllers. Attack disruption also disables the user account on the Entra ID synced account.
71+
- When the user account is hosted on Entra ID only (cloud native account): attack disruption disable the user account on the Entra ID synced account.
7272

7373
[!NOTE] Disabling the user on Entra ID is not dependent on Microsoft Defender for Identity being deployed.
7474

0 commit comments

Comments
 (0)