<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[SOCAutomators: SOCAutomators News Feed]]></title><description><![CDATA[Looking to automate your security operations?]]></description><link>https://socautomators.substack.com/s/socautomators-new-feed</link><image><url>https://substackcdn.com/image/fetch/$s_!M_s3!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ea5da9d-4b92-4bde-8be3-eb7492d7e866_58x58.png</url><title>SOCAutomators: SOCAutomators News Feed</title><link>https://socautomators.substack.com/s/socautomators-new-feed</link></image><generator>Substack</generator><lastBuildDate>Tue, 14 Apr 2026 02:17:48 GMT</lastBuildDate><atom:link href="https://socautomators.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[SocAutomators]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[socautomators@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[socautomators@substack.com]]></itunes:email><itunes:name><![CDATA[Mike Palitto]]></itunes:name></itunes:owner><itunes:author><![CDATA[Mike Palitto]]></itunes:author><googleplay:owner><![CDATA[socautomators@substack.com]]></googleplay:owner><googleplay:email><![CDATA[socautomators@substack.com]]></googleplay:email><googleplay:author><![CDATA[Mike Palitto]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Six amazing new changes to Group Policy]]></title><description><![CDATA[Troubleshooting Group Policy has always been about one thing: visibility.]]></description><link>https://socautomators.substack.com/p/six-amazing-new-changes-to-group</link><guid isPermaLink="false">https://socautomators.substack.com/p/six-amazing-new-changes-to-group</guid><dc:creator><![CDATA[Andrea Fisher]]></dc:creator><pubDate>Thu, 02 Apr 2026 15:10:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M_s3!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ea5da9d-4b92-4bde-8be3-eb7492d7e866_58x58.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Troubleshooting Group Policy has always been about one thing: visibility. Recent Windows releases introduce six meaningful improvements to Group Policy that make troubleshooting faster, clearer, and far less frustrating.</p><p>All six changes are enabled by default in Windows 11 24H2 and 25H2 (26.02D). For Windows Server 2022 and 2025, these changes are expected to be enabled by 26.06B.</p><p>Here is a closer look at the six updates and why they matter.</p><h3>1. Enhanced timestamps across Group Policy logs</h3><p>Group Policy logs now include full date and time stamps in the format <code>YYYY-MM-DD HH:MM:SS</code>. This replaces partially timestamped entries that made precise correlation difficult.</p><p>Accurate timestamps make it significantly easier to line up Group Policy activity with:</p><ul><li><p>Event Viewer entries</p></li><li><p>Network traces</p></li><li><p>Security and authentication logs</p></li><li><p>User reported timelines</p></li></ul><p>Logs that benefit from this change:</p><ul><li><p>GPSVC (<code>%windir%\debug\usermode\gpsvc.log</code>)</p></li><li><p>GPMC (<code>%temp%\gpmgmt.log</code>, <code>%systemroot%\debug\usermode\gpmc.log</code>)</p></li><li><p>GPEdit (<code>%windir%\debug\usermode\gpedit.log</code>)</p></li><li><p>ADMX and ADML processing (<code>%temp%\AdmTmpl.log</code>)</p></li></ul><p>This improvement removes a long&#8209;standing friction point when performing multi&#8209;log investigations.</p><div><hr></div><h3>2. Registry.pol corruption detection</h3><p>Group Policy now detects Registry.pol file corruption and surfaces clear indicators when it occurs. While remediation is still manual, detection is no longer silent. Registry.pol corruption can cause policies to fail without obvious explanation. With this update, administrators can quickly confirm whether corruption is the root cause instead of chasing environmental or permissions issues.</p><p>Simply knowing <em>which machines are affected</em> can save hours of troubleshooting time.</p><p>Enhancements include:</p><ul><li><p>Explicit corruption detection</p></li><li><p>Improved error messaging</p></li><li><p>Better alignment between <strong>Event ID 1096</strong> and entries in GPSVC.log</p></li></ul><div><hr></div><h3>3. More detailed error information for Group Policy Preferences</h3><p>Group Policy Preferences logging now provides richer diagnostic data when items fail to apply. In addition to existing events, a new Event ID 4117 is logged with expanded context. Previously vague errors such as &#8220;object not found&#8221; are now paired with actionable detail.</p><p>What you will now see:</p><ul><li><p>The exact network path involved</p></li><li><p>The preference item name</p></li><li><p>The associated error code, including HRESULT</p></li></ul><div><hr></div><h3>4. Improved attribution for Group Policy refresh triggers</h3><p>When Group Policy refreshes occur, logs now include who or what triggered them. Both the Group Policy Operational log and GPSVC.log provide expanded attribution.</p><p>New details include:</p><ul><li><p>Parent process</p></li><li><p>Triggering process</p></li><li><p>Process ID</p></li><li><p>Session ID</p></li><li><p>Account context</p></li></ul><div><hr></div><h3>5. Enable Group Policy Preferences logging locally</h3><p>Group Policy Preferences debug logging can now be enabled locally using <code>gpedit.msc</code>. There is no requirement to configure a domain&#8209;level GPO just to collect diagnostics.</p><p>Key points:</p><ul><li><p>GPP logging ADMX and ADML files are now available on client SKUs</p></li><li><p>Logging is configurable directly on the local machine</p></li><li><p>Ideal for isolated systems or early investigations</p></li></ul><div><hr></div><h3>6. Critical section lock detection</h3><p>Tracing around critical policy section locks has been significantly improved. Third&#8209;party applications can sometimes lock Group Policy processing and fail to release it, resulting in long delays or apparent hangs. Previously, diagnosing this required heavy debugging. Now, the responsible process is visible directly in the logs. </p><p>GPSVC.log now shows when:</p><ul><li><p>A critical policy section is entered</p></li><li><p>An external process holds the lock</p></li><li><p>Timeouts are adjusted</p></li><li><p>The lock is released</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/p/six-amazing-new-changes-to-group?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/p/six-amazing-new-changes-to-group?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/subscribe?"><span>Subscribe now</span></a></p><h3></h3>]]></content:encoded></item><item><title><![CDATA[Azure Key Vault will default to RBAC]]></title><description><![CDATA[There&#8217;s a small but important shift happening in Azure Key Vault that security teams need to be aware of.]]></description><link>https://socautomators.substack.com/p/azure-key-vault-will-default-to-rbac</link><guid isPermaLink="false">https://socautomators.substack.com/p/azure-key-vault-will-default-to-rbac</guid><dc:creator><![CDATA[Andrea Fisher]]></dc:creator><pubDate>Tue, 27 Jan 2026 16:43:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M_s3!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ea5da9d-4b92-4bde-8be3-eb7492d7e866_58x58.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There&#8217;s a small but important shift happening in Azure Key Vault that security teams need to be aware of.</p><p>Starting with the upcoming Key Vault API version 2026&#8209;02&#8209;01, Azure Key Vault defaults to Azure RBAC for access control, not access policies. This is a default behavior change at the API level, and it could cause you some issues.</p><p>For years, access policies gave teams a fast way to wire up permissions. They also created a messy security boundary where anyone with sufficient write permissions on the vault could quietly grant themselves data access.</p><p>RBAC closes that gap.</p><p>With RBAC as the default:</p><ul><li><p>Data plane access is governed through Entra AD roles</p></li><li><p>Permission assignment is centralized</p></li><li><p>Privileged Identity Management finally applies cleanly to Key Vault</p></li><li><p>The &#8220;vault writer gives themselves secret access&#8221; gun goes away</p></li></ul><h3>What actually changes</h3><p>Here&#8217;s what you need to know</p><ul><li><p>New vaults created with API version 2026&#8209;02&#8209;01 automatically enable RBAC</p></li><li><p>Existing vaults stay exactly as they are until you change them</p></li><li><p>You can still opt into access policies, but you have to do so explicitly</p></li></ul><p>Cloud Shell users are especially impacted because Cloud Shell always uses the latest API version. If you haven&#8217;t validated your permissions model ahead of time, you may notice things breaking in surprising ways.</p><h3>The deadline</h3><p>Older Key Vault API versions retire February 27, 2027. If you manage Key Vaults at scale, or rely on them for automation, secrets delivery, or identity&#8209;driven workflows, this is your signal to inventory, test, and migrate.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/p/azure-key-vault-will-default-to-rbac?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/p/azure-key-vault-will-default-to-rbac?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Fighting alert fatigue with built-in incident prioritization]]></title><description><![CDATA[It&#8217;s Monday morning and there are 50 alerts in the incident queue.]]></description><link>https://socautomators.substack.com/p/fighting-alert-fatigue-with-built</link><guid isPermaLink="false">https://socautomators.substack.com/p/fighting-alert-fatigue-with-built</guid><dc:creator><![CDATA[Andrea Fisher]]></dc:creator><pubDate>Thu, 08 Jan 2026 17:57:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!n1VL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s Monday morning and there are 50 alerts in the incident queue. How do you decide where to start? High alerts? Most recent?</p><p>Everything is urgent. Everything is loud. The noise is overwhelming. </p><p>The basic limitations of the traditional use of low, medium and high to gauge alert severity makes it hard to determine the most urgent issues. We&#8217;ve talked about alert fatigue in how <a href="https://socautomators.substack.com/p/automate-your-soc-noise-is-the-enemy">Noise is the enemy of speed</a>. In fact, we did a whole series about improving incident prioritization called <a href="https://socautomators.substack.com/p/lets-automate-your-soc">Let&#8217;s automate your SOC</a>. </p><p>And all of that information is still valuable if you want to control incident prioritization using your own criteria. But there is a new feature in the Defender portal that helps prioritize your incident queue automatically. The Defender incident queue now applies a machine learning&#8211;driven prioritization algorithm across <em>all</em> incidents, including Microsoft native detections, custom detections, and third-party signals when they surface in Defender or Sentinel. <a href="https://learn.microsoft.com/en-us/defender-xdr/incident-queue">Prioritize...soft Learn </a></p><p>Every incident receives a priority score from 0 to 100, recalculated daily:</p><ul><li><p>Red (&gt;85): top priority</p></li><li><p>Orange (15&#8211;85): medium priority</p></li><li><p>Gray (&lt;15): low priority</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n1VL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n1VL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 424w, https://substackcdn.com/image/fetch/$s_!n1VL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 848w, https://substackcdn.com/image/fetch/$s_!n1VL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 1272w, https://substackcdn.com/image/fetch/$s_!n1VL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n1VL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png" width="1456" height="370" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:370,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:71362,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://socautomators.substack.com/i/183926985?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n1VL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 424w, https://substackcdn.com/image/fetch/$s_!n1VL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 848w, https://substackcdn.com/image/fetch/$s_!n1VL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 1272w, https://substackcdn.com/image/fetch/$s_!n1VL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb7b230d-06a7-4023-a874-4e4b37de67ab_1486x378.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This immediately does two things:</p><ol><li><p>It creates an ordered queue letting you know what to focus on first</p></li><li><p>It forces the platform to explain its reasoning </p></li></ol><h3>Where the score comes from</h3><p>The algorithm considers a combination of signals that you probably already use mentally when you&#8217;re making a decision of what to triage. </p><ul><li><p>Threat analytics and disruption indicators</p></li><li><p>MITRE techniques tied to the activity</p></li><li><p>Asset criticality for the impacted users, devices, or apps</p></li><li><p>Alert type rarity and signal-to-noise patterns</p></li><li><p>Indicators associated with high-profile threats like ransomware or nation-state activity</p></li></ul><h3>See the reasoning behind the score</h3><p>Now, when you select an incident in the queue you can see the contributing factors behind the score in the summary pane, alongside the incident details, recommended actions, and related threats. For the incident below, you can see that it received a score of 100 because there were three notable alert types, high risk threat of Credential Phish, a critical asset was involved and there were two related threat analytics reports.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v6UZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v6UZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 424w, https://substackcdn.com/image/fetch/$s_!v6UZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 848w, https://substackcdn.com/image/fetch/$s_!v6UZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 1272w, https://substackcdn.com/image/fetch/$s_!v6UZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v6UZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png" width="648" height="799" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:799,&quot;width&quot;:648,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74212,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://socautomators.substack.com/i/183926985?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v6UZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 424w, https://substackcdn.com/image/fetch/$s_!v6UZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 848w, https://substackcdn.com/image/fetch/$s_!v6UZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 1272w, https://substackcdn.com/image/fetch/$s_!v6UZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec8ece0-bcef-4d88-86a6-f4468dca67b6_648x799.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Each of the priority factors can be expanded to gain even more information. For example, if you click the drop-down arrow next to the related threat analytics reports, you&#8217;ll be able to move directly to the two articles about the related threats.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u4JJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u4JJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 424w, https://substackcdn.com/image/fetch/$s_!u4JJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 848w, https://substackcdn.com/image/fetch/$s_!u4JJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 1272w, https://substackcdn.com/image/fetch/$s_!u4JJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u4JJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png" width="604" height="375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:375,&quot;width&quot;:604,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:29645,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://socautomators.substack.com/i/183926985?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u4JJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 424w, https://substackcdn.com/image/fetch/$s_!u4JJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 848w, https://substackcdn.com/image/fetch/$s_!u4JJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 1272w, https://substackcdn.com/image/fetch/$s_!u4JJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82375d29-f5d4-4aeb-885f-4df84b922fdc_604x375.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let us know what you think about the new prioritization feature.  Is it saving you time? Evaluating incidents the way you would? Look forward to hearing from you.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/p/fighting-alert-fatigue-with-built?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/p/fighting-alert-fatigue-with-built?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Turning off incident correlation for Sentinel alerts in the Defender portal]]></title><description><![CDATA[Every so often, Microsoft slips a feature into preview that looks small on paper but solves a very loud problem for SOCs in the middle of a migration.]]></description><link>https://socautomators.substack.com/p/turning-off-incident-correlation</link><guid isPermaLink="false">https://socautomators.substack.com/p/turning-off-incident-correlation</guid><dc:creator><![CDATA[Andrea Fisher]]></dc:creator><pubDate>Mon, 05 Jan 2026 20:30:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HUvr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every so often, Microsoft slips a feature into preview that looks small on paper but solves a <em>very</em> loud problem for SOCs in the middle of a migration. The new <strong>&#8220;Exclude analytics rules from correlation&#8221;</strong> capability in Microsoft Defender XDR is exactly that kind of gift. <a href="https://learn.microsoft.com/en-us/defender-xdr/exclude-analytics-rules-correlation">[Exclude an...soft Learn | Learn.Microsoft.com]</a></p><p>If you&#8217;ve ever worked through a Sentinel&#8209;to&#8209;Defender transition, you already know the pain point. Sentinel&#8217;s incident model is beautifully straightforward: one analytics rule, one grouping configuration, one predictable incident. Defender XDR, on the other hand, takes all your alerts, stirs in correlation logic, attacker activity sequences, multi&#8209;product signals and sometimes hands you back incidents shaped slightly differently than what your automation playbooks expect.</p><p>That change can cause more than a few problems with runbooks, SOAR logic, backlog projections&#8230; basically anything that relies on consistent incident formation.</p><p>Microsoft Defender XDR&#8217;s correlation engine is powerful. It&#8217;s also opinionated. It tells a cohesive &#8220;attack story&#8221; by merging alerts and incidents across products and analytics engines. That&#8217;s fantastic when you want clarity during an active attack. But for teams migrating from Sentinel, it can be disruptive.</p><p>This new preview lets you <strong>selectively exclude specific analytics rules from the correlation engine</strong> so that:</p><ul><li><p>Alerts from those rules bypass correlation entirely</p></li><li><p>They form incidents in Defender the same way they did in Sentinel</p></li><li><p>Your existing automations continue to behave predictably</p></li><li><p>Your runbooks stop throwing surprise exceptions</p></li><li><p>Your analysts stop asking why incidents look &#8220;wrong&#8221;</p></li></ul><h3>How do I actually disable correlation</h3><p>There are two ways to disable correlation in the Defender portal. </p><ol><li><p>Browse to Investigation &amp; response &#8594; Hunting &#8594; Custom detection rules.</p></li><li><p>Select the check box next to the rule that you want to disable correlation.</p></li><li><p>Then at the top select Disable correlation.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HUvr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HUvr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 424w, https://substackcdn.com/image/fetch/$s_!HUvr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 848w, https://substackcdn.com/image/fetch/$s_!HUvr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 1272w, https://substackcdn.com/image/fetch/$s_!HUvr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HUvr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png" width="1456" height="437" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:437,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:85895,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://socautomators.substack.com/i/183593583?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HUvr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 424w, https://substackcdn.com/image/fetch/$s_!HUvr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 848w, https://substackcdn.com/image/fetch/$s_!HUvr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 1272w, https://substackcdn.com/image/fetch/$s_!HUvr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4f683ef-8c38-456f-a833-2ef491e760fc_1783x535.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Another method is to exclude a rule from correlation by adding a #DONT_CORR# tag.</p><ol><li><p>Browse to Investigation &amp; response &#8594; Hunting &#8594; Custom detection rules.</p></li><li><p>Open the analytics rule in edit mode.</p></li><li><p>In the rule&#8217;s <strong>Description</strong> field, add <code>#DONT_CORR#</code> at the very beginning of the text.</p></li><li><p>Save the rule.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5n6P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5n6P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 424w, https://substackcdn.com/image/fetch/$s_!5n6P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 848w, https://substackcdn.com/image/fetch/$s_!5n6P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 1272w, https://substackcdn.com/image/fetch/$s_!5n6P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5n6P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png" width="1267" height="426" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:426,&quot;width&quot;:1267,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:46944,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://socautomators.substack.com/i/183593583?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5n6P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 424w, https://substackcdn.com/image/fetch/$s_!5n6P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 848w, https://substackcdn.com/image/fetch/$s_!5n6P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 1272w, https://substackcdn.com/image/fetch/$s_!5n6P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6bdf18c-eced-4069-bfbc-7bc8c2ae24cf_1267x426.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/p/turning-off-incident-correlation?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/p/turning-off-incident-correlation?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/subscribe?"><span>Subscribe now</span></a></p><p></p></li></ol><p></p>]]></content:encoded></item><item><title><![CDATA[Random cool things from Ignite]]></title><description><![CDATA[There were so many announcements at Ignite, it&#8217;s honestly hard to keep up with them.]]></description><link>https://socautomators.substack.com/p/random-cool-things-from-ignite</link><guid isPermaLink="false">https://socautomators.substack.com/p/random-cool-things-from-ignite</guid><dc:creator><![CDATA[Andrea Fisher]]></dc:creator><pubDate>Tue, 25 Nov 2025 20:22:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M_s3!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ea5da9d-4b92-4bde-8be3-eb7492d7e866_58x58.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There were so many announcements at Ignite, it&#8217;s honestly hard to keep up with them. I grabbed a few that I thought could help with security, but they didn&#8217;t get much attention.</p><h4>Sysmon functionality in Windows: </h4><p>Sysinternals Sysmon is now included in updates to Windows 11 and Windows Server 2025. Prior to this release, you had to deploy, update and configure Sysmon all on your own. This functionality provides better visibility for proactive threat hunting with reduced operational overhead.</p><p><strong>Additional resources:</strong> <a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112">Native Sysmon functionality coming to Windows | Microsoft Community Hub</a></p><h4>Custom data collection in Microsoft Defender for Endpoint (Preview)</h4><p>Custom data collection (Preview) enables you to customize telemetry collection beyond the default MDE configurations to support your specialized threat hunting and security monitoring needs. This feature allows you to define specific collection rules with tailored filters for event properties such as folder paths, process names, and network connections.</p><p><strong>Additional resources: </strong><a href="https://learn.microsoft.com/en-us/defender-endpoint/custom-data-collection">Custom data collection in Microsoft Defender for Endpoint - Microsoft Defender for Endpoint | Microsoft Learn</a></p><h4>Autopatch update readiness </h4><p>This feature, now in preview, is designed to help you gain real-time visibility into which devices are ready for updates or need attention and why. It surfaces actionable insights, provides clear guidance on remediation and helps prevent issues before they disrupt work. Hopefully, it will help you spend less time chasing and patching problems.</p><p>You can quickly find devices that are out of compliance or missing critical signals. Policy conflicts that could block updates will be identified and explained and detailed telemetry will help ensure that every device provides the data needed for update readiness and compliance tracking.</p><p><strong>Additional resources:</strong> <a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-autopatch-%E2%80%94-elevate-your-update-experience-for-modern-work/4468111">Windows Autopatch &#8212; Elevate Your Update Experience for Modern Work</a></p><h4>New enterprise features for Microsoft Edge for Business</h4><p><strong>Watermarking</strong>: Employees often struggle to recognize which files are safe to share and which are not. Edge for Business is making it easier to distinguish sensitive data with a watermarking overlay &#8212; a persistent, visual reminder that will prompt users to pause and think before sharing confidential content. Admins will be able to enable watermarking with a simple toggle in the Edge management service. Once turned on, the overlay will appear on sensitive files and sites based on sensitivity labels or data loss prevention (DLP) policies.</p><p><strong>Protected clipboard:</strong> Another new feature addresses the &#8220;all or nothing&#8221; dilemma common in data protection: Admins can either block all copy/paste actions or allow users to copy/paste freely and risk data leaks. Protected clipboard in Edge for Business will enable admins to define trusted boundaries across managed web apps. Data from inside the boundary can&#8217;t be pasted outside, while data from outside can enter the boundary if needed. Users will get a clear warning if they try to paste outside the trusted zone, keeping data safe without breaking workflows.</p><p><strong>Manage cross-platform security policies all in one place:</strong> You&#8217;ll be able to use the Edge management service in the Microsoft 365 admin center to easily set and enforce Edge browser policies across macOS, iOS and Android. You simply select checkboxes for the additional platforms you want to manage. </p><p>These features are available in preview beginning later this month.</p><p><strong>Additional resources: </strong><a href="https://blogs.windows.com/msedgedev/2025/11/18/edge-for-business-presents-the-worlds-first-secure-enterprise-ai-browser/">Edge for Business presents: the world&#8217;s first secure enterprise AI browser</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/p/random-cool-things-from-ignite?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/p/random-cool-things-from-ignite?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://socautomators.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://socautomators.substack.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item></channel></rss>