Huntress logo
Huntress
Create
Roadmap
Feedback
Managed ITDR
302
Changelog

    Boards

  • Managed EDR

  • Managed ITDR

  • Managed SAT

  • Managed SIEM

  • Endpoint Security Posture Management

  • Integrations, Webhooks, APIs

  • Account, Org, and User Management

  • Reporting & Dashboards

Powered by Canny

Managed ITDR

MDR for Microsoft 365
Shadow Workflows
The Shadow Workflows capability will provide detection and response of the most common post-compromise malicious activities. These activities include: Malicious inbox rule creation (we are completely revamping how we detect malicious inbox rules as part of this effort) Malicious phishing campaigns: At a minimum, we will detect and generate an incident report when a mailbox is responsible for a malicious phishing campaign. Data exfiltration timeline: Provide a timeline and attack summary within the ITDR incident report to enable users to quickly determine scope of an attack.
7
·
in progress
Powered by Canny