{"id":15943,"date":"2026-02-07T15:46:28","date_gmt":"2026-02-07T02:46:28","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=15943"},"modified":"2026-02-07T15:46:28","modified_gmt":"2026-02-07T02:46:28","slug":"beyond-endpoint-protection-what-is-itdr","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=15943","title":{"rendered":"Beyond Endpoint Protection &#8211; What is ITDR?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Your Microsoft 365 environment is where your business happens. It&#8217;s also where attackers want to be.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Most New Zealand businesses have invested in endpoint protection such as antivirus, EDR, or even MDR, but are they leaving a critical attack surface completely exposed: their identities?<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Identity Threat Detection and Response (ITDR) for Microsoft 36<\/strong>5 represents the next frontier in business security, protecting the credentials, sessions, and access patterns that traditional endpoint security tools simply cannot see.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Identity Attack Surface<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/intelligence-reports\/microsoft-digital-defense-report-2024\">Microsoft&#8217;s Digital Defense Report 2024<\/a> reveals a staggering 600 million identity attacks every single day. These aren&#8217;t attacks against devices\u2014they&#8217;re attacks against the people and service accounts that access your Microsoft 365 environment.\u00a0 That will only have inreased in the year since that report was published.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Business Email Compromise (BEC) alone represents a $50 billion problem according to the FBI&#8217;s Internet Crime Complaint Center. Yet most businesses remain focused exclusively on protecting devices while their identities remain vulnerable.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Here&#8217;s why identity attacks are so effective: they don&#8217;t need to break through firewalls or bypass antivirus. They simply use legitimate credentials to walk right through the front door.<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; border_width_all=&#8221;1px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">What ITDR for Microsoft 365 Actually Does<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">ITDR solutions monitor your Microsoft 365 environment for identity-based threats that endpoint security tools cannot detect. These include session hijacking, credential theft, malicious inbox and forwarding rules, and account takeover attempts.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Leading ITDR platforms provide several critical capabilities:<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>24\/7 Identity Monitoring<\/strong>: Continuous surveillance of all authentication attempts, login patterns, and user behavior across your Microsoft 365 environment. This includes monitoring for impossible travel scenarios (when accounts appear to log in from geographically distant locations within impossible timeframes), unusual access patterns, and legacy authentication attempts that bypass modern security controls.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Rogue Application Detection<\/strong>: Proactive detection and remediation of potentially malicious OAuth applications installed in Microsoft 365 environments. Attackers frequently use legitimate-looking &#8220;OAuth apps&#8221; to maintain persistent access to your environment without needing passwords.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Shadow Workflow Protection<\/strong>: Detection of malicious inbox rules and email forwarding configurations that attackers create to intercept sensitive communications. These attacks use Microsoft&#8217;s built-in email processing capabilities to automatically move emails containing payment information or credentials to hidden folders or external mailboxes, with users remaining completely unaware.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Session Hijacking Prevention<\/strong>: Identification of stolen session tokens that allow attackers to bypass multi-factor authentication entirely. Even with MFA enabled, session hijacking lets attackers impersonate legitimate users.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Human-Validated Alerts<\/strong>: Unlike automated systems that generate overwhelming volumes of false positives, mature ITDR platforms provide human-verified threat intelligence. Every alert is actionable, human-validated, and designed to address real threats while minimizing noise.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Rapid Incident Response<\/strong>: When threats are confirmed, ITDR platforms provide clear remediation guidance and can automatically disable compromised accounts to prevent further damage.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; border_width_all=&#8221;1px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">How ITDR Complements MDR<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">If you&#8217;re already running Managed Detection and Response (MDR) for your endpoints, ITDR isn&#8217;t a replacement.\u00a0 It is a critical complement. Here&#8217;s why both are essential:<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>MDR protects devices. ITDR protects identities.<\/strong> An attacker who compromises a user&#8217;s Microsoft 365 account doesn&#8217;t need to touch any endpoint device. They can access email, SharePoint, Teams, and OneDrive from anywhere in the world using stolen credentials or hijacked sessions.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>MDR sees endpoint activity. ITDR sees cloud authentication and access patterns.<\/strong> When someone logs into Microsoft 365 from an unusual location or sets up a malicious forwarding rule, there&#8217;s no endpoint event to detect\u2014the activity happens entirely in the cloud.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>MDR stops malware. ITDR stops Business Email Compromise.<\/strong> BEC attacks don&#8217;t use malware. They use social engineering, credential theft, and legitimate Microsoft features weaponized for malicious purposes.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Think of it this way: MDR is your security guard watching your physical office. ITDR is your security guard watching who&#8217;s accessing your cloud workspace. You need both.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; border_width_all=&#8221;1px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The Security Evolution: Antivirus \u2192 EDR \u2192 MDR<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">To understand where ITDR fits, it helps to understand the evolution of endpoint security:<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Antivirus<\/strong> was the foundation\u2014signature-based detection that identifies known malware by comparing files against a database of malware signatures. It effectively identifies well-known threats but struggles with more advanced, rapidly evolving attacks.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Endpoint Detection and Response (EDR)<\/strong> represented a significant advancement. Instead of focusing on preventing threats using known malware definitions, EDR uses technology to analyze behaviors of workstations through Artificial Intelligence. EDR can identify suspicious behavior patterns even when the specific threat is unknown.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Managed Detection and Response (MDR)<\/strong> adds the critical human element. While EDR relies on sophisticated technology to monitor, detect, and respond to threats, it can only operate within its programmed parameters. MDR combines the technology of EDR with human expertise and instinct.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">MDR isn&#8217;t just one tool but a combination of systems including EDR, Security Operations Center (SOC), Security Information and Event Monitoring (SIEM), and Threat Intelligence Discovery.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The progression is clear: each level adds more sophisticated detection capabilities and, critically, more expert human oversight.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Why This Matters for New Zealand Businesses<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Most New Zealand businesses run their operations through Microsoft 365. Email, document collaboration, customer communications, financial data all flow through this environment. Yet many businesses protect their endpoints comprehensively while leaving their Microsoft 365 identities exposed.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The strategic question isn&#8217;t whether identity attacks will target your business. It is is whether you&#8217;ll detect them when they do.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Kinetics&#8217; 2026 Strategic Security Enhancement<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Understanding this evolving threat landscape, Kinetics is currently implementing a comprehensive security upgrade across our <strong>KARE Foundation service:<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>All PCs upgraded to MDR (Managed Detection and Response)<\/strong>, providing:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>Advanced behavioral detection<\/strong> beyond traditional antivirus capabilities<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>24\/7 expert monitoring<\/strong> from our Security Operations Center<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Rapid threat response<\/strong> with human verification reducing false positives<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Comprehensive endpoint visibility<\/strong> across all protected devices<\/li>\n<\/ul>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>All users upgraded to ITDR (Identity Threat Detection and Response)<\/strong>, delivering:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>Continuous Microsoft 365 identity monitoring<\/strong> for credential theft and session hijacking<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Rogue application detection<\/strong> catching malicious OAuth apps<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Business Email Compromise protection<\/strong> through inbox rule monitoring<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Human-validated threat alerts<\/strong> minimizing false positives while maximizing protection<\/li>\n<\/ul>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This dual enhancement exemplifies the strategic approach we advocate: protecting both the devices your team uses and the identities they use to access business-critical systems. Neither layer alone provides complete protection\u2014together, they create comprehensive coverage against modern threats.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Strategic Security Framework<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Effective modern security requires multiple layers working together:<\/p>\n<ol class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-decimal flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>MDR for Endpoints<\/strong>: Protecting devices from malware, ransomware, and endpoint-based attacks<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>ITDR for Identities<\/strong>: Protecting Microsoft 365 accounts from credential theft, BEC, and session hijacking<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Security Awareness Training<\/strong>: Reducing the human element that enables both types of attacks<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Strategic Oversight<\/strong>: Ensuring all security investments align with business objectives and compliance requirements<\/li>\n<\/ol>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">None of these layers alone provides complete protection. Together, they create a comprehensive defense against modern threats.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Strategic Question<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">As identity-based attacks continue to grow in sophistication and frequency, the question for business leaders becomes: Are you protecting what attackers are actually targeting?<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">If your security strategy focuses exclusively on endpoints while your entire business operates through Microsoft 365, you&#8217;re securing the wrong attack surface.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">ITDR for Microsoft 365 isn&#8217;t about adding another security tool\u2014it&#8217;s about extending protection to cover the identity-based threats that endpoint security cannot see. It&#8217;s the difference between securing the devices your team uses and securing the accounts they use to access your business-critical systems.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Making Security Strategic<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">At Kinetics, we believe effective security requires both technical capability and strategic thinking. That&#8217;s why our security approach includes:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>Systematic assessment<\/strong> of where your actual vulnerabilities exist<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Layered protection<\/strong> addressing both endpoints and identities<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>24\/7 monitoring<\/strong> with expert human verification<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Regular strategic reviews<\/strong> ensuring security investments align with business evolution<\/li>\n<\/ul>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The MDR upgrade we&#8217;re implementing across <a href=\"https:\/\/new.kinetics.co.nz\/proactive-it-service-and-support\/\"><strong>KARE Foundation<\/strong><\/a> devices represents our commitment to systematic security enhancement\u2014not dramatic overhauls driven by crisis, but planned improvements based on evolving threat landscapes.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><em>Ready to assess your complete security posture\u2014endpoints and identities? Contact Kinetics for a complimentary IT Partnership Health Check: <strong>0800 546 384<\/strong> or visit <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/new.kinetics.co.nz\/\">new.kinetics.co.nz\/<\/a><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your Microsoft 365 environment is where your business happens. It&#8217;s also where attackers want to be. Most New Zealand businesses have invested in endpoint protection such as antivirus, EDR, or even MDR, but are they leaving a critical attack surface completely exposed: their identities? Identity Threat Detection and Response (ITDR) for Microsoft 365 represents the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":15948,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-15943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15943"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}