BitLyft Air: Microsoft 365

Overview

The BitLyft AIR Microsoft integration provides comprehensive visibility, detection, and automated response capabilities across the Microsoft security ecosystem. By ingesting telemetry from Microsoft 365, Microsoft Defender, Azure Active Directory, Azure Audit Logs, and Microsoft Security & Compliance Center. BitLyft AIR enables organizations to detect identity threats, endpoint compromise, phishing activity, data exfiltration, and configuration risks.

This integration allows security teams to investigate and respond to threats across identity, email, cloud applications, endpoint security, and Azure infrastructure within a single automated response platform.

The Microsoft integration combines security detections, SOC-ready automations, and response playbooks to help organizations reduce **Mean Time To Detect (MTTD) **and Mean Time To Respond (MTTR) across Microsoft environments.


Core Capabilities

Identity and Authentication Threat Detection

BitLyft AIR monitors Microsoft authentication activity and identity protection signals to detect suspicious sign-in behavior, compromised accounts, and risky user activity.

Example detections include:

  • High number of failed authentication attempts

  • Login attempts to disabled accounts

  • Multifactor authentication interruptions

  • Authentication interruptions during login processes

  • Risky user detections (low, medium, and high risk levels)

  • Activity originating from infrequent countries

  • Logins from risky IP addresses

  • Impossible travel login activity

These detections help security teams identify credential compromise, brute-force attacks, and anomalous login activity that may indicate identity takeover attempts.


Endpoint Threat Detection

The integration leverages Microsoft Defender for Endpoint telemetry to detect malware activity, persistence mechanisms, and credential harvesting techniques on managed endpoints.

Example detections include:

  • Autostart Extension Point (ASEP) registry changes

  • Malware persistence observed on a host

  • Malware spread across multiple hosts

  • Suspicious access to the LSASS credential store

  • Process memory dumping activity

  • Suspicious service registry modifications

  • Kerberos SPN enumeration activity

These detections help identify advanced attacker techniques including credential dumping, persistence mechanisms, and lateral movement across systems.


Email Security and Phishing Detection

BitLyft AIR® monitors Microsoft Exchange and Message Trace activity to identify phishing campaigns, malicious email behavior, and mailbox manipulation.

Example detections include:

  • Rare or suspicious file extensions attached to email messages

  • Mailbox rule creation, modification, or deletion

  • Suspicious inbox forwarding rules

  • High volumes of email deletion from a mailbox

  • Mailsploit email spoofing techniques

These detections help security teams identify phishing campaigns, email compromise, and attacker attempts to manipulate inbox rules for persistence or data exfiltration.


Cloud Application and Data Security Monitoring

The integration includes monitoring for abnormal activity within OneDrive, SharePoint, and cloud application usage.

Example detections include:

  • High number of files downloaded from OneDrive

  • High number of files downloaded from SharePoint

  • Large file downloads from a single account

  • Creation of new OneDrive or SharePoint sites

  • Suspicious OAuth application file download activity

  • Data exfiltration to unsanctioned applications

These detections help identify potential data exfiltration, insider threats, and suspicious file access behavior.


Azure Identity and Infrastructure Monitoring

BitLyft AIR® monitors Azure administrative activity, identity configuration changes, and application permission changes that may indicate privilege escalation or configuration risk.

Example detections include:

  • Credentials added to existing applications

  • New application owners assigned

  • Application URI or AppID configuration changes

  • Domain federation settings modified

  • Azure subscription permission elevation

  • Changes to authentication methods

Monitoring these activities helps identify unauthorized configuration changes and privilege escalation within Azure environments.


Automated Response Capabilities

The Microsoft integration enables automated remediation actions directly against Microsoft 365 and Azure resources. These actions allow security teams to quickly contain identity threats, investigate incidents, and restore secure configurations.

Key Benefits

  • Rapid containment of compromised user accounts

  • Automated remediation of phishing attacks and mailbox manipulation

  • Faster investigation of suspicious user activity

  • Improved enforcement of security policies across the tenant

By combining detection policies with automated remediation actions, organizations can quickly move from detection to containment and investigation.


Automation and Remediation

SOC-Ready Automations

The Microsoft integration includes SOC-ready automations that connect Microsoft detections directly to remediation actions within BitLyft AIR®.

These automations enable security teams to rapidly respond to identity threats, phishing campaigns, and configuration risks while maintaining consistent incident response workflows.

Automation Benefits

  • Faster response to compromised accounts and phishing attacks

  • Reduced manual investigation and remediation effort

  • Standardized incident response procedures

  • Improved operational efficiency for security teams

SOC-ready automations help operationalize security response workflows across Microsoft environments.


Microsoft Response Actions

The integration includes a large set of response and investigation actions that allow security teams to interact with Microsoft 365 and Azure resources directly through BitLyft AIR®.

These actions support both security operations and IT administration workflows.

Identity and Account Security

These actions help security teams respond to compromised accounts and enforce identity security policies.

Examples include:

  • Log out users and revoke active sessions

  • Reset user passwords

  • Enable or disable user accounts

  • Assign users to conditional access policies

  • Ensure MFA enforcement policies exist

These capabilities help contain compromised identities and enforce stronger authentication controls.


Email Security and Investigation

Security teams can investigate and contain phishing threats using automated email response actions.

Examples include:

  • Search user mailboxes for suspicious content

  • Quarantine emails by sender or subject

  • Retrieve mailbox rules

  • Delete malicious mailbox rules

These actions allow analysts to quickly contain phishing campaigns and remove attacker persistence mechanisms.


Investigation and Audit Visibility

The integration provides access to detailed audit and activity logs that help analysts investigate incidents and understand user behavior.

Examples include:

  • Retrieve user activity logs

  • Retrieve user sign-in logs

  • Retrieve conditional access policy configurations

  • Retrieve Microsoft audit subscription status

These capabilities support forensic analysis and incident investigations.


Tenant Administration and Governance

BitLyft AIR® also includes administrative actions that help organizations manage Microsoft tenants and maintain operational security controls.

Examples include:

  • Create or manage users

  • Assign or remove licenses

  • Add users to groups

  • Retrieve user capabilities and permissions

  • List domains, groups, and SharePoint sites

These capabilities support operational workflows while enabling security teams to maintain visibility across tenant resources.


Automated Security Playbooks

The Microsoft integration includes predefined playbooks designed to automate common security response scenarios.

Compromised User Account Response

The M365 Compromised User Account playbook automates containment and investigation steps when a user account is suspected to be compromised.

Key actions include:

  • Revoking active user sessions

  • Resetting the user’s password

  • Retrieving user activity logs

  • Gathering user permissions and capabilities

This playbook helps contain unauthorized access while providing analysts with information needed for investigation.


Conditional Access and Compliance Enforcement

The M365 Conditional Access and Compliance playbook helps ensure that strong authentication controls are enforced across the tenant.

Key actions include:

  • Creating or validating conditional access policies requiring MFA

  • Adding users to enforced conditional access policies

This playbook helps organizations strengthen identity security posture and ensure MFA protections remain enforced.


Phishing Email Containment and Remediation

The M365 Phishing Email Containment playbook automates investigation and containment of phishing attacks.

Key actions include:

  • Quarantining malicious emails

  • Reviewing mailbox forwarding rules

  • Removing malicious inbox rules

  • Logging out affected users

  • Resetting compromised user passwords

This playbook helps security teams rapidly contain phishing campaigns and restore compromised accounts to a secure state.


Security Value

The BitLyft AIR® Microsoft integration provides broad coverage across the Microsoft ecosystem by addressing several major security risk areas:

  • Identity compromise and authentication attacks

  • Endpoint malware and credential theft

  • Phishing and email compromise

  • Data exfiltration and insider threats

  • Azure privilege escalation and configuration risk

By combining multi-source telemetry, automated detections, investigation workflows, and remediation actions, BitLyft AIR® enables organizations to detect and respond to threats across their Microsoft environment with greater speed and consistency.


Microsoft Remediation Actions

Account Security & Compromise Response

ActionDescriptionUse Case
Logs Out UserRevokes all active sign-in sessions for a user.Used when a user’s credentials are suspected to be compromised to immediately terminate active sessions and prevent attackers from maintaining access.
Reset User PasswordChanges the user’s password to a specified or randomly generated value and forces a reset at next login.Essential when responding to account compromise or enforcing immediate password hygiene following a breach.
Disable User AccountDisables a user account within the tenant, preventing authentication and access to services.Used to immediately suspend access for users under investigation, during offboarding, or when responding to suspected account compromise.
Enable User AccountRe-enables a previously disabled user account.Used after verifying account security or restoring access for returning employees.

Identity & User Management

ActionDescriptionUse Case
Create UserCreates a new user within the Microsoft tenant.Used during employee onboarding, automated provisioning workflows, or restoring accounts that were previously removed.
List UsersRetrieves a list of all users within the tenant.Helps identify unauthorized accounts, recently created identities, or validate user inventories during audits.
Total User CountRetrieves the total number of users in the tenant.Useful for compliance checks, auditing, or identifying abnormal spikes in user creation.
Get User CapabilitiesRetrieves the service capabilities and permissions assigned to a specific user.Helps verify what services or privileges a user has access to during security reviews or troubleshooting access issues.

License & Resource Management

ActionDescriptionUse Case
Add License to UserAssigns a Microsoft 365 license to a user account.Ensures users have access to required services during onboarding or role changes.
Remove License from UserRemoves a Microsoft 365 license from a user account.Reclaims licenses when users leave the organization or no longer require access to certain services.
List User LicensesRetrieves all licenses currently assigned to a user.Useful for license audits and ensuring users have appropriate service entitlements.

Email Security & Phishing Response

ActionDescriptionUse Case
List User Mail RulesRetrieves all mailbox rules configured for a user.Helps identify malicious forwarding or deletion rules often created during phishing or account compromise incidents.
Delete Mail RulesDeletes specific mailbox rules for a user.Removes suspicious or malicious email forwarding rules without impacting legitimate rules.
Delete All Mail RulesDeletes all mailbox rules configured for a user.Used when widespread malicious rules are detected and a full reset of mailbox rules is required.
Search MailboxSearches a user’s mailbox for specific content, returning up to 50 results.Useful for identifying phishing emails, sensitive data exposure, or malicious messages during investigations.
Quarantine Email - Subject LineMoves all emails matching a specified subject to the deleted items folder.Mitigates the spread of phishing campaigns with consistent subject lines.
Quarantine Email - Sender AddressMoves all emails from a specific sender to the deleted items folder.Neutralizes malicious emails from known malicious senders or threat actors.

Security Investigation & Audit Visibility

ActionDescriptionUse Case
Azure Retrieve User Activity LogsRetrieves detailed activity logs for a specific user within Azure.Provides forensic insight into user actions during security investigations.
Azure Retrieve User Sign-in Activity LogsRetrieves detailed sign-in activity logs for a specific user.Helps identify suspicious authentication events or anomalous login activity.
List Microsoft 365 Audit SubscriptionsLists configured Microsoft 365 audit logging subscriptions.Helps verify that audit logging is enabled and identify missing or misconfigured subscriptions.
Enable Microsoft 365 Audit SubscriptionsEnables audit logging for General, Exchange, SharePoint, and Azure AD APIs.Ensures comprehensive logging coverage required for compliance, monitoring, and incident investigations.

Access Control & Policy Enforcement

ActionDescriptionUse Case
Assign User to Conditional Access PolicyAdds a user to an existing Conditional Access policy.Enforces additional security requirements such as MFA or location restrictions for high-risk users.
List Conditional Access PoliciesRetrieves a list of Conditional Access policies configured in the tenant.Used to audit tenant security controls and validate enforcement policies.
Get Conditional Access Policy DetailsRetrieves detailed configuration information for a specific Conditional Access policy.Helps security teams review policy logic, scope, and enforcement conditions.
Ensure BitLyft MFA Conditional Access PolicyEnsures an MFA enforcement policy exists and creates it if missing.Helps guarantee consistent MFA enforcement across the tenant to strengthen identity security.

Group & Access Management

ActionDescriptionUse Case
Add User to GroupAdds a user to a specified Azure or Microsoft 365 group.Used to apply group-based permissions or enforce security controls during onboarding or incident response.
Get Users in GroupRetrieves a list of users belonging to a specific group.Helps validate group membership for compliance audits or access reviews.
Get Group ID by NameRetrieves the unique ID of a group based on its name.Supports automated workflows that require group identifiers for policy enforcement or access management.

Tenant & Infrastructure Visibility

ActionDescriptionUse Case
List Azure DomainsRetrieves all domains associated with the Azure tenant.Useful for domain inventory audits or identifying unauthorized domain additions.
List SharePoint SitesRetrieves information about SharePoint sites in the tenant.Helps identify potentially exposed data repositories or unauthorized site creation.