In March, we announced the release of Blumira’s Microsoft 365 Threat Response, enabling customers to respond to M365, Azure, and Entra threats through Blumira. We also added new global reports to our platform, including those for Cloud Connectors and Tenant IDs, along with various improvements and bug fixes.
Microsoft 365 Threat Response: Customers can now respond to M365, Azure, and Entra threats directly within Blumira’s platform to improve your average time to respond. With built-in response actions, you can quickly lock out compromised user accounts and contain threats while you investigate further. These capabilities support identity management, isolation, and remediation, helping protect your environment from further compromise.
Note: Microsoft 365 Threat Response is available through Blumira’s SIEM+ and XDR editions.
Microsoft 365 - Cloud Connectors and Tenant IDs: This new global report helps customers correlate their Blumira Cloud Connector names with Microsoft tenant IDs, which is most useful when setting up a M365 Threat Response connector in accounts with more than one Microsoft tenant.
Meraki Reports: We added these four new global reports for Meraki data to the app:
Log Type | Detection Rule | Details |
---|---|---|
M365 & Azure |
Microsoft 365 Threat Response | We updated 39 Microsoft 365 detections and 7 Azure detections with the ability to disable a user and revoke sessions whenever the updated detection rules generates a finding. |
Rules Change Status - We resolved an issue that was delaying updates when users changed a detection rule’s activation status between enabled and disabled.
In case you missed the February updates, you can find and review those notes here.
We’ve updated our SIEM Starter Edition to better support lean IT teams:
1 year of data retention to meet compliance
Full environment coverage, including endpoint detections
New pricing: just $12/employee - a 20% savings