Here’s how Defender XDR can help you find attackers sooner in your environment | Deception Rules MDE

Andre Camillo, CISSP
3 min readJan 3, 2024

Microsoft announced Deception rules as part of Defender for Endpoint Plan 2 at ignite 23.

Here’s why Deceptive technologies are important for your cyber security program according to NIST and how it currently works in preview for Defender XDR.

Deception Technologies

In the cyber security domain the ability to detect attackers is fundamental for threat analysis and of course for protection one of…

--

--

Andre Camillo, CISSP

Cloud and Security technologies, Career, Growth Mindset. Follow: https://linktr.ee/acamillo . Technical Specialist @Microsoft. Opinions are my own.