<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Defender — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/microsoft-defender/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/microsoft-defender/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)</title><link>https://feed.craftedsignal.io/briefs/2026-04-defender-privesc/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-defender-privesc/</guid><description>CVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.</description><content:encoded><![CDATA[<p>CVE-2026-33825 describes a privilege escalation vulnerability affecting Microsoft Defender. The vulnerability stems from insufficient granularity of access control, allowing an attacker with local access and some level of authorization to elevate their privileges on the system. The vulnerability was published on April 14, 2026. Successful exploitation of this vulnerability would allow an attacker to perform actions with higher privileges than intended, potentially leading to system compromise. Microsoft has released a patch, and defenders should apply it as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to a system with Microsoft Defender installed. This may be achieved through existing credentials or exploitation of another vulnerability.</li>
<li>The attacker identifies a specific area within Microsoft Defender where access control is insufficiently granular.</li>
<li>The attacker crafts a malicious request or input that exploits the identified access control weakness.</li>
<li>Microsoft Defender processes the malicious request, failing to properly validate the attacker&rsquo;s authorization level.</li>
<li>The attacker gains elevated privileges within the context of Microsoft Defender.</li>
<li>The attacker leverages the elevated privileges to modify Defender settings, policies, or configurations.</li>
<li>The attacker uses the modified Defender configuration to execute arbitrary code with elevated privileges on the system.</li>
<li>The attacker achieves full system compromise, potentially leading to data theft, malware installation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33825 allows an attacker to escalate privileges on a system running Microsoft Defender. This could allow the attacker to disable security features, install malware, steal sensitive data, or gain complete control of the affected system. Given the widespread deployment of Microsoft Defender, this vulnerability poses a significant risk to a large number of organizations and individuals.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Microsoft patch for CVE-2026-33825 immediately to remediate the vulnerability (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825)</a>.</li>
<li>Monitor process creation events for unusual processes spawned by Microsoft Defender processes (see Sigma rule below).</li>
<li>Review and harden Microsoft Defender&rsquo;s configuration to ensure least privilege and prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>microsoft-defender</category><category>cve-2026-33825</category></item><item><title>CrowdStrike Falcon SIEM Integration with Microsoft Defender</title><link>https://feed.craftedsignal.io/briefs/2026-04-falcon-siem-microsoft-defender/</link><pubDate>Sat, 28 Mar 2026 22:14:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-falcon-siem-microsoft-defender/</guid><description>CrowdStrike's Falcon Next-Gen SIEM expands to support third-party EDR solutions, beginning with Microsoft Defender, to unify detection, investigation, and response without requiring the Falcon sensor and modernize security operations.</description><content:encoded><![CDATA[<p>CrowdStrike is expanding its Falcon Next-Gen SIEM to incorporate third-party EDR solutions, starting with Microsoft Defender. This integration aims to allow organizations to modernize their SOC without replacing existing endpoint agents, addressing the issue of fragmented security systems. Modern attacks exploit gaps across endpoint, identity, network, and cloud environments, forcing security teams to investigate across disparate systems. Falcon Next-Gen SIEM combines index-free search, AI-driven threat detection, and automation across diverse environments to provide a data-agnostic approach to SOC transformation, improving detection and response times. By integrating Microsoft Defender telemetry, Falcon Next-Gen SIEM unifies detection, investigation, and response within a single console.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This threat brief focuses on the integration of security tools rather than a specific attack chain.  However, the value of the integration is to defend against a variety of attack chains, a generalized example follows:</p>
<ol>
<li>Initial Access: An attacker gains initial access through methods such as phishing or exploiting a vulnerability. (T1566, T1190)</li>
<li>Execution: The attacker executes malicious code on the endpoint. (T1059)</li>
<li>Persistence: The attacker establishes persistence to maintain access to the compromised system. (T1547)</li>
<li>Lateral Movement: The attacker moves laterally within the network to access additional systems. (T1021)</li>
<li>Credential Access: The attacker attempts to steal credentials to escalate privileges and access sensitive data. (T1003)</li>
<li>Data Exfiltration: The attacker exfiltrates sensitive data from the compromised systems. (T1041)</li>
<li>Impact: The attacker achieves their objective, such as data theft, system disruption, or ransomware deployment. (T1486)</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The integration of Microsoft Defender with CrowdStrike Falcon Next-Gen SIEM aims to reduce the impact of successful attacks.  Without unified detection, organizations may experience delayed detection, slower response times, increased operational costs, and potential data breaches. The number of potential victims and sectors targeted is broad, as this integration applies to any organization using both Microsoft Defender and CrowdStrike. Success of an attack despite these tools leads to data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect suspicious processes indicative of post-exploitation activity.</li>
<li>Investigate systems generating process creation events flagged by the rules in this brief (process_creation logging).</li>
<li>Review Falcon Onum settings to ensure proper filtering and routing of Microsoft Defender telemetry to optimize data fidelity and reduce storage costs (Falcon Onum documentation).</li>
<li>Utilize federated search capabilities to investigate across live, network, and archived data sources, including Falcon LogScale, ExtraHop, and Amazon S3 (Falcon Next-Gen SIEM documentation).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>siem</category><category>edr</category><category>integration</category><category>microsoft-defender</category></item><item><title>CrowdStrike Falcon SIEM Integrates with Microsoft Defender EDR</title><link>https://feed.craftedsignal.io/briefs/2026-03-falcon-siem-integration/</link><pubDate>Sat, 28 Mar 2026 21:52:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-falcon-siem-integration/</guid><description>CrowdStrike Falcon Next-Gen SIEM is expanding its capabilities to integrate with third-party EDR solutions, starting with Microsoft Defender, to enable organizations to extend their AI-native SOC across heterogeneous environments without replacing existing endpoint agents.</description><content:encoded><![CDATA[<p>CrowdStrike Falcon Next-Gen SIEM is evolving to support third-party endpoint detection and response (EDR) solutions, beginning with Microsoft Defender. This integration allows organizations to modernize their Security Operations Center (SOC) without necessitating the replacement of existing endpoint agents. The Falcon platform combines index-free, petabyte-scale search performance with AI-native threat detection, frontline adversary intelligence, and agentic automation. This expansion includes Falcon Onum, a feature embedded within the Falcon platform that facilitates real-time data pipeline management. Falcon Onum ingests, filters, enriches, and routes data in motion to reduce noise, improve data fidelity, and lower infrastructure costs. The goal is to provide a data-agnostic path to an agentic SOC, streamlining data onboarding and reducing storage costs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This brief focuses on SIEM integration rather than a specific attack chain, but here&rsquo;s a generalized scenario where this integration could improve detection:</p>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to an endpoint via phishing or exploitation of a vulnerability.</li>
<li><strong>Execution:</strong> The attacker executes malicious code on the endpoint using a tool like PowerShell or a custom script.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li><strong>Lateral Movement:</strong> The attacker attempts to move laterally to other systems on the network using techniques like pass-the-hash or exploiting SMB vulnerabilities.</li>
<li><strong>Command and Control:</strong> The attacker establishes a command and control (C2) channel to communicate with the compromised system.</li>
<li><strong>Data Exfiltration:</strong> The attacker identifies and exfiltrates sensitive data from the compromised network.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data theft or ransomware deployment.</li>
</ol>
<p>In this scenario, Microsoft Defender would detect initial malicious activity. Falcon Next-Gen SIEM would ingest and analyze Defender telemetry, correlating it with other data sources to provide a more complete picture of the attack and accelerate response.</p>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to data breaches, financial losses, and reputational damage. Organizations can experience slower detection and delayed response due to fragmented security systems. The integration of Microsoft Defender telemetry into Falcon Next-Gen SIEM aims to address these challenges by unifying detection, investigation, and response, without altering existing endpoint deployments. By leveraging Falcon Onum, organizations can improve data fidelity, lower infrastructure costs, and strengthen the foundation for AI-driven security operations across the entire ecosystem.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Utilize Falcon Next-Gen SIEM to ingest and analyze Microsoft Defender telemetry for enhanced threat detection and response.</li>
<li>Implement Falcon Onum for real-time data pipeline management to reduce noise, enrich data, and optimize data routing, as described in the overview.</li>
<li>Leverage the federated search capabilities of Falcon Next-Gen SIEM to investigate across live, network, and archived data sources without costly re-ingestion.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>siem</category><category>edr</category><category>microsoft-defender</category><category>crowdstrike-falcon</category></item><item><title>CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools</title><link>https://feed.craftedsignal.io/briefs/2026-03-falcon-siem-third-party-edr/</link><pubDate>Sat, 28 Mar 2026 09:13:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-falcon-siem-third-party-edr/</guid><description>CrowdStrike Falcon Next-Gen SIEM is expanding to support third-party EDR solutions, starting with Microsoft Defender, enabling organizations to extend their AI-native SOC across their ecosystem by unifying detection, investigation, and response.</description><content:encoded><![CDATA[<p>On March 23, 2026, CrowdStrike announced that its Falcon Next-Gen SIEM will support third-party EDR solutions, starting with Microsoft Defender. This enhancement allows organizations to modernize their SOC without replacing existing endpoint agents. The integration aims to address the challenges posed by adversaries exploiting cross-domain gaps across endpoint, identity, network, and cloud environments. Legacy SIEMs often impose a &ldquo;data tax&rdquo; for full ingestion, while siloed tools create blind spots. Falcon Next-Gen SIEM combines petabyte-scale search performance, AI-native threat detection, and frontline adversary intelligence to deliver a data-agnostic approach to agentic SOC transformation, eliminating the data tax and accelerating security outcomes. The platform includes Falcon Onum for real-time data pipeline management and federated search capabilities for diverse data sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This threat brief outlines the integration of third-party EDR solutions into the CrowdStrike Falcon Next-Gen SIEM. There is not an actual attack chain to describe, but rather a product enhancement. The purpose of the integration is to increase SOC visibility. This enhancement does not represent a specific attack campaign, but rather the mitigation of potential attacks by unifying telemetry.</p>
<h2 id="impact">Impact</h2>
<p>The successful implementation of CrowdStrike&rsquo;s Falcon Next-Gen SIEM with third-party EDR support aims to reduce the time to detect and respond to threats across diverse environments. The integration seeks to break down data silos and provide a unified view of security events, potentially impacting organizations of all sizes and sectors. Without such integration, organizations may face slower detection times, increased operational costs due to data duplication, and a fragmented security posture. The specific number of organizations potentially impacted is currently not available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Leverage Falcon Onum’s real-time data pipeline capabilities to reduce noise and optimize telemetry before it reaches downstream systems, as mentioned in the overview.</li>
<li>Utilize the federated search capabilities to investigate across live, network, and archived data sources, including Falcon LogScale, ExtraHop, and Amazon S3 via Athena, without costly re-ingestion or duplication.</li>
<li>Explore the integration of Microsoft Defender telemetry into Falcon Next-Gen SIEM to unify detection, investigation, and response without changing endpoint deployments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>SIEM</category><category>EDR</category><category>Microsoft Defender</category></item><item><title>CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender</title><link>https://feed.craftedsignal.io/briefs/2026-03-falcon-siem-defender/</link><pubDate>Sat, 28 Mar 2026 08:12:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-falcon-siem-defender/</guid><description>CrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions, beginning with Microsoft Defender, enabling organizations to extend their AI-native SOC and unify detection across heterogeneous environments.</description><content:encoded><![CDATA[<p>CrowdStrike&rsquo;s Falcon Next-Gen SIEM is evolving to support third-party EDR solutions, starting with Microsoft Defender, without requiring the Falcon sensor. This integration aims to modernize security operations centers (SOCs) by enabling them to unify detection, investigation, and response across diverse environments without replacing existing endpoint agents. The integration focuses on addressing the challenges of fragmented security systems, growing architectural complexity, and data visibility tradeoffs. Falcon Next-Gen SIEM combines index-free, petabyte-scale search performance, AI-native threat detection, and agentic automation to provide a data-agnostic approach to SOC transformation, eliminating the &ldquo;data tax&rdquo; associated with legacy SIEMs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given that the document describes a product integration and not a specific attack, the attack chain below represents a theoretical scenario where the integration of Falcon Next-Gen SIEM with Microsoft Defender helps to detect and respond to an attack:</p>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a system via a phishing email (T1566.001) containing a malicious attachment.</li>
<li><strong>Execution:</strong> The user opens the attachment, executing a malicious payload that bypasses initial security measures.</li>
<li><strong>Persistence:</strong> The malware establishes persistence by creating a scheduled task or modifying registry keys to ensure it runs after a system reboot.</li>
<li><strong>Lateral Movement:</strong> The attacker uses compromised credentials to move laterally to other systems on the network, escalating privileges as needed.</li>
<li><strong>Command and Control:</strong> The attacker establishes a command and control (C2) channel to remotely control the compromised systems and exfiltrate sensitive data.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from the compromised systems to an external server.</li>
<li><strong>Detection &amp; Response:</strong> Falcon Next-Gen SIEM, integrated with Microsoft Defender, detects anomalous behavior and alerts security analysts.</li>
<li><strong>Remediation:</strong> Security analysts use Falcon Next-Gen SIEM to investigate the incident, contain the affected systems, and remediate the threat.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If the integration between Falcon Next-Gen SIEM and Microsoft Defender is not in place or is misconfigured, organizations face slower detection, delayed response, and a SOC struggling to keep pace with modern threats. This can lead to successful data breaches, financial losses, reputational damage, and regulatory fines. The integration aims to mitigate these risks by providing a unified platform for detecting, investigating, and responding to threats across heterogeneous environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Evaluate the integration of Falcon Next-Gen SIEM with Microsoft Defender to unify detection, investigation, and response across your environment, as described in the overview.</li>
<li>Leverage Falcon Onum&rsquo;s real-time data pipeline capabilities to filter, enrich, and route data, reducing noise and improving the fidelity of telemetry for AI models and detection workflows, as described in the overview.</li>
<li>Utilize Falcon Next-Gen SIEM&rsquo;s federated search capabilities to investigate across live, network, and archived data sources without costly re-ingestion or duplication, as described in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>siem</category><category>edr</category><category>microsoft defender</category><category>crowdstrike falcon</category></item></channel></rss>