Back to Integrations
Microsoft 365
Active IntegrationIdentity & Productivity

Microsoft 365

BitLyft AIR® connects directly to Microsoft 365 and Entra ID via the Microsoft Graph API, enabling automated detection and response across identity, email, SharePoint, Teams, and OneDrive — your entire Microsoft environment in a single automated loop.

15+

Detection Policies

8

Response Actions

< 1s

Avg. Response Time

What BitLyft AIR® Does with Microsoft 365

The Microsoft 365 integration is the core of the AIR® platform. Using the Microsoft Graph API, AIR® ingests audit logs from Entra ID, Exchange Online, SharePoint, OneDrive, and Teams — correlating events across all workloads to detect identity compromise, data loss, and administrative abuse in real time.

When a threat is detected, AIR® executes response actions directly against Microsoft 365 — revoking sessions, disabling accounts, removing forwarding rules, and enforcing MFA — without requiring analyst intervention. Detection triggers response. Response executes. Analysts are notified of the outcome.

Identity Protection

Entra ID sign-in risk, MFA fatigue, credential stuffing, impossible travel, admin role abuse.

Email Security

Phishing containment, forwarding rule removal, mailbox audit log monitoring.

Data Loss Prevention

SharePoint and OneDrive exfiltration detection, file sharing anomalies, Teams data leakage.

Conditional Access

Automated policy assignment and enforcement as part of containment workflows.

Automated Response Actions

Revoke User Sign-In Sessions

Immediately terminate all active sessions for a compromised user account.

Disable User Account

Set accountEnabled to false in Entra ID to prevent further access.

Reset User Password

Force a password reset, prompting the user on next login.

Enable MFA for User

Apply a Conditional Access MFA policy to a targeted user.

Assign User to Conditional Access Policy

Add a user to an existing policy scope automatically.

Remove Mailbox Forwarding Rule

Delete attacker-planted forwarding configurations that exfiltrate email.

List Entra ID Risky Users

Retrieve users flagged as risky by Microsoft Identity Protection.

Get User Sign-In Activity

Pull recent sign-in logs for a specific user for investigation.

Out-of-the-Box Detection Policies

Impossible Travel

Sign-ins from geographically impossible locations within a short timeframe.

MFA Fatigue Attack

Repeated MFA push requests targeting a user to approve fraudulent access.

Credential Stuffing

High-volume failed login attempts across multiple accounts.

Admin Role Change

Unexpected modifications to privileged roles or permissions.

Mailbox Forwarding Rule Created

Forwarding rules added to a mailbox — a common BEC indicator.

Suspicious OAuth App Consent

OAuth application granted excessive permissions by a user.

SharePoint Data Exfiltration

Abnormal volume of SharePoint or OneDrive file downloads.

Service Account Anomaly

Service account exhibiting unusual access patterns.

See the release notes

Microsoft 365 coverage was significantly expanded in v1.15 with 15 new detection policies, faster Graph API execution, and improved identity protection.

Read the v1.15 release post

Ready to automate your Microsoft 365 security?

See how AIR® detects and responds to threats across your entire Microsoft environment — automatically.

Schedule a Demo