Here’s how Defender XDR can help you find attackers sooner in your environment | Deception Rules MDE
3 min readJan 3, 2024
Microsoft announced Deception rules as part of Defender for Endpoint Plan 2 at ignite 23.
Here’s why Deceptive technologies are important for your cyber security program according to NIST and how it currently works in preview for Defender XDR.
Deception Technologies
In the cyber security domain the ability to detect attackers is fundamental for threat analysis and of course for protection one of…