{"id":8879,"date":"2025-05-15T16:08:04","date_gmt":"2025-05-15T16:08:04","guid":{"rendered":"https:\/\/partnernews.sophos.com\/es-es\/?p=8879"},"modified":"2025-05-15T16:08:04","modified_gmt":"2025-05-15T16:08:04","slug":"sophos-mdr-new-analyst-response-actions-for-microsoft-365","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/es-es\/2025\/05\/products\/sophos-mdr-new-analyst-response-actions-for-microsoft-365\/","title":{"rendered":"Sophos MDR: New Analyst Response Actions for Microsoft 365"},"content":{"rendered":"<p>Businesses of all sizes are increasingly reliant on productivity tools like Microsoft 365 \u2014 and attackers are using this to their advantage. Organizations need 24\/7 visibility and a fully staffed SOC team to effectively defend against attacks \u2014 which is a major challenge for many resource-constrained businesses.<\/p>\n<p>Sophos MDR provides the people, processes, and technology to detect, investigate, and effectively respond to threats targeting Microsoft 365. Our turnkey integrations and proprietary detection rules identified and thwarted almost 5,000 attacks on Microsoft 365 environments last quarter alone.<\/p>\n<p><strong>We continually innovate and enhance Sophos MDR, and today, we\u2019re excited to announce that the service is getting even stronger with the introduction of new response capabilities.<\/strong><\/p>\n<h2><strong>New analyst response actions for Microsoft 365<\/strong><\/h2>\n<p>The ability to respond quickly to a cyber incident is crucial \u2014\u00a0the faster the attack can be detected, contained, and neutralized, the less damage the attacker can inflict. Now, when an attack is detected in a customer\u2019s Microsoft 365 environment, Sophos MDR analysts can execute a range of additional response actions, rapidly containing the threat and freeing up time for you and the customer.<\/p>\n<p><strong>Microsoft 365 response actions now available<\/strong><\/p>\n<table style=\"border-style: none; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9178\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/gear.png\" \/><\/td>\n<td style=\"background-color: #ffffff; width: 86.5741%; vertical-align: middle;\"><strong>Block \/ enable user sign-in<\/strong><br \/>\nSophos MDR analysts can lock down a user\u2019s account to prevent an adversary from accessing Microsoft 365 services and Azure resources using stolen credentials. Following clean-up, access to the user\u2019s account can be restored in seconds.<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9178\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/gear.png\" \/><\/td>\n<td style=\"background-color: #ffffff; width: 86.5741%; vertical-align: middle;\"><strong>Terminate current user sessions<\/strong><br \/>\nBy immediately revoking all currently active sessions for a specific user, Sophos MDR analysts can quickly eject an attacker who has already gained access to an account and remove their ability to reuse any stolen session tokens.<strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9178\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/gear.png\" \/><\/td>\n<td style=\"background-color: #ffffff; width: 86.5741%; vertical-align: middle;\"><strong>Disable suspicious inbox rules<\/strong><br \/>\nAttackers routinely set up inbox rules in Microsoft 365 for business email compromise attacks in order to move, obfuscate, or delete emails that could otherwise alert the user. Sophos MDR analysts can disable specific inbox rules to regain control.<strong>\u00a0<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><strong>Easy setup in Sophos Central<\/strong><\/h2>\n<p>The new response capabilities for Microsoft 365 are included with all Sophos MDR service tiers at no additional cost and can be enabled in minutes by activating a new integration in Sophos Central.<\/p>\n<p><strong>Threat response modes<\/strong><\/p>\n<p>Sophos provide the flexibility for your customers, and Sophos MSPs, to choose how our MDR team will interact with them when a cyber incident requires a response, by selecting their preferred threat response mode:<\/p>\n<ul>\n<li><strong>\u201cAuthorize\u201d mode:<\/strong>\u00a0Our experts perform threat response without prior consent or active involvement from the customer or MSP. Once the new Microsoft 365 response actions integration is enabled, Sophos MDR analysts will immediately execute those actions when needed, to provide the most efficient response.<\/li>\n<li><strong>\u201cCollaborate\u201d mode:<\/strong>\u00a0Our experts conduct investigations, but do not take response actions without prior consent or active involvement from the customer or MSP. Once the new Microsoft 365 response actions integration is enabled, Sophos MDR analysts will execute those actions only once consent has been obtained. Customers and MSPs can also choose to allow Sophos MDR to operate in \u201cAuthorize\u201d mode if we are unable to reach them for consent.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><strong>The most robust MDR service for Microsoft environments<\/strong><\/h2>\n<p>Sophos MDR services protect over 30,000 organizations \u2013 more than any other MDR service provider in the world. In Gartner\u2019s 2024 Voice of the Customer Report for Managed Detection and Response Services, Sophos once again had the highest number of reviews among all vendors and scored a 4.9\/5.0 rating based on customer reviews.<\/p>\n<p>Many of these businesses have also invested in Microsoft tools, leveraging Sophos MDR to defend against sophisticated attacks that technology alone can\u2019t stop.<\/p>\n<table style=\"border-style: none; width: 100%;\">\n<tbody>\n<tr style=\"height: 90px;\">\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9182 aligncenter\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/microsoft-certified-expert-badge.png\" alt=\"\" width=\"79\" height=\"79\" \/><\/td>\n<td style=\"background-color: #ffffff; height: 90px; width: 86.5741%; vertical-align: middle;\" width=\"86.5741%\"><strong>Microsoft<\/strong> <strong>Certified experts<\/strong><strong><br \/>\n<\/strong>Organizations can extend their in-house teams with Microsoft Certified Security Operations Analysts specializing in detecting and responding to cyberattacks using custom Microsoft response playbooks.<\/td>\n<\/tr>\n<tr style=\"height: 105px;\">\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9183 aligncenter\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/shield.png\" alt=\"\" width=\"79\" height=\"94\" \/><\/td>\n<td style=\"background-color: #ffffff; height: 105px; width: 86.5741%; vertical-align: middle;\" width=\"86.5741%\"><strong>Microsoft-specific threat detections<\/strong>Sophos uses proprietary threat detection rules and world-class intelligence to identify and stop threats that could bypass Microsoft security solutions. We can accurately identify suspicious inbox rules, unauthorized user access patterns, and more.<\/td>\n<\/tr>\n<tr style=\"height: 97px;\">\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img decoding=\"async\" class=\"size-full wp-image-9178 aligncenter\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/gear.png\" \/><\/td>\n<td style=\"background-color: #ffffff; height: 97px; width: 86.5741%; vertical-align: middle;\" width=\"86.5741%\"><strong>NEW <\/strong><strong>A<\/strong><strong>nalyst<\/strong><strong> response actions <\/strong><strong>for Microsoft 365<\/strong>Sophos MDR analysts can execute a range of additional response actions, enabling rapid containment of threats with no action required by the customer or MSP. Disable user sign-in, terminate active user sessions, and more.<strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 100px;\">\n<td style=\"background-color: #ffffff; width: 13.4259%; vertical-align: top;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9184 aligncenter\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/05\/microsoft.png\" alt=\"\" width=\"75\" height=\"73\" \/><\/td>\n<td style=\"background-color: #ffffff; height: 100px; width: 86.5741%; vertical-align: middle;\" width=\"86.5741%\"><strong>Comprehensive support for<\/strong><strong> Microsoft solutions<\/strong>Included with Sophos MDR at no additional cost, our turnkey integrations support a broad range of Microsoft solutions. Data from Microsoft 365, Defender for Endpoint, Defender for Identity, Defender for Cloud Apps, and more, is collected, analyzed, correlated, and prioritized.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>To learn more about Sophos MDR and how it can strengthen your customers\u2019 defenses for Microsoft 365, visit\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-detection-and-response\/microsoft-defender\">www.sophos.com\/mdr-microsoft<\/a>\u00a0and access the Sophos Partner portal for valuable\u00a0<a href=\"https:\/\/partners.sophos.com\/prm\/English\/c\/selling-sophos-mdr\">product and sales resources<\/a>.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>Coming soon: Microsoft 365 response actions for Sophos XDR<\/strong><\/h2>\n<p>The new analyst response actions for Microsoft 365 are now generally available for Sophos MDR. And, coming soon, organizations with their own in-house security operations teams will have access to these same powerful capabilities in the Sophos XDR platform. Customers and MSPs will be able to enable\/disable M365 user logins, terminate user sessions, and disable suspicious inbox rules directly from the Threat Analysis Center in Sophos Central. We expect the new capabilities to be generally available for Sophos XDR at the end of May.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><small><em>Gartner, Voice of the Customer for Managed Detection and Response, Peer Contributors, 28 November 2024.<\/em><\/small><\/p>\n<p><small><em>GARTNER is a registered trademark and service mark, and the GARTNER PEER INSIGHTS CUSTOMERS\u2019 CHOICE badge and PEER INSIGHTS are trademarks and service marks, of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.<\/em><\/small><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Powerful new response capabilities reduce risk \u2014 and work \u2014 for you and your customers. <\/p>\n","protected":false},"author":8,"featured_media":8880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[72],"tags":[184],"coauthors":[204],"class_list":["post-8879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-managed-detection-and-response-mdr"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/es-es\/wp-content\/uploads\/sites\/7\/2025\/05\/featured-image-microsoft-365.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/8879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/comments?post=8879"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/8879\/revisions"}],"predecessor-version":[{"id":8881,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/8879\/revisions\/8881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/media\/8880"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/media?parent=8879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/categories?post=8879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/tags?post=8879"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/coauthors?post=8879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}