IIJ America has officially launched the IIJA Microsoft 365 Detection & Response Service for North American Customers.
Background
Microsoft 365, a cloud-based collaborative software, offers a diverse set of features beyond email functionality, such as Office Applications and other cloud services.
Having essential business functions and storing critical data on Microsoft platforms provides people with efficiency and convenience, but it can also increase the risk of becoming a target for cyberattacks.
Moreover, Microsoft 365 frequently updates its functionalities, and it is crucial to reassess your current security measures regularly. Attackers are always looking for configuration flaws and attempt to steal your account identity by cyberattacking.
In response to these challenges, IIJ America has launched the IIJA Microsoft 365 Detection & Response Service. This service is focused on detecting and responding to threats and identity authentication anomalies. SOC analysts will monitor and respond any anomalies, rather than automated alerts, allowing customers to get appropriate countermeasures alongside the findings.
These are key threats this service can detect:
- Session hijacking and Credential theft
Detects any suspicious activities, including unauthorized VPN usage or access from unusual geolocations.
- Business Email Compromise
Detects any suspicious activities targeting mailboxes, such as external email forward settings.
- Anomaly Detection for Microsoft 365 Apps
It detects malicious use of the official app and also detects OAuth apps that request more than necessary.
Upgrade your security measures on Microsoft 365 by utilizing this service!
Service Highlights
This service continuously collects Microsoft 365 event data; when anomalies are detected, analysts will analyze the data. If malicious activity is detected, we will guide customers on incident response procedures and confirm the alert status with customers (escalation). Additionally, accounts are automatically locked based on the situation.
Service includes the following:
1, Monitoring Microsoft 365 Activity 24/7
Microsoft 365 usage is continuously monitored, and SOC analysts will analyze any suspicious activity. IIJA engineers will report to customers, including recommended action plans.
*Customer reporting is handled during IIJA business hours.
2, Detection and Response
In the event of a high-priority incident, IIJA will not only send alert notifications but also implement responses such as disabling accounts.
3, Can be customized to fit Customer Usage Patterns
Through an initial learning period, we look to fully understand the customers' usage patterns, enabling security monitoring tailored to the customers’ specific situation.
Service Image

For more information
Visit the following website for more details on the service.