Managed ITDR

MDR for Microsoft 365
Escalation response options UI could be more clear
When responding to an ITDR escalation the options to add "Account" and "Organization" Unexpected\Unauthorized rules within the UI are much more prominent than the option to add the same rule to an "Identity". My recommendation would be to make the Identity option equally as prominent. "Account" has a very similar meaning to "Identity" when discussing O365 administration so at a glance this looks like the two options users expect to have. Yes, this is explained in the Huntress documentation. Yes , this we informed our techs during our onboarding. Yes, it says the name of our Account right there next to the "Create Rule for Account" button. No, this was not enough to stop users from consistently making inappropriate Account level rules. I understand the intent with the "resolve actions" big buttons to allow multiple escalations to be resolved with the same rule at once, but ideally we are so quick to close the typical one off escalation that there is only ever one open escalation at time. Ideally the typical user experience is to view the respond section with only one identify in the list. In this situation, I do not believe the three vertical dots at the end of the solitary offending-identity-information-row were we must first consider "Login Count" "First Seen At" and "IPs (last 14 days)" before we can get to the our true goal, the 3 vertical dots button, are as obvious to the average person as the sweet siren call of the big red and green buttons immediately after the bold text "Resolve Actions". As a third\bonus option it would be great to have the option to deny account level access rules\settings by security role for users created in the top level account. To my mind it undermines having privileged organizations if they can be effected by rules created by users whose non-admin role forbids them access to the privileged organization. We want these users to have admin access to any organization, but we dont want them to have admin access to every organization in a single action. If this was once or twice I would just blame the user and move on, but this has happened by several different users and they all offer variations of the same feedback provided above.
0
Load More