Microsoft Defender is getting AI-powered anti-ransomware protection

A profile of a human brain against a digital background.
(Image credit: Pixabay)

Microsoft has added a new layer of adaptive protection to Microsoft Defender for Endpoint that uses Artificial Intelligence (AI) to thwart human-operated ransomware attacks.

Ruofan Wang and Kelly Kang from the Microsoft 365 Defender Research Team argue that human-operated ransomware attacks can be characterized by a specific set of methods and behaviors.

Microsoft researchers have capitalized on this to develop a cloud-based machine learning (ML) system that, when queried by a device, intelligently predicts if it is at risk, and then blocks the attacker’s next steps.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“By considering indicators that would otherwise be considered low priority for remediation, adaptive protection stopped the attack chain at an early stage such that the overall impact of the attack was significantly reduced,” note the researchers, while explaining how the AI-driven adaptive protection feature helped stop an attack on one of their customers.

Data driven approach

Microsoft explains that the system’s data-driven decisions are based on extensive research and experimentation, and can effectively block attacks without negatively impacting customer experience. 

Furthermore, since the adaptive protection is AI-driven, the risk score it assigns to a device isn’t solely based on individual indicators, but on a broad set of patterns and features that helps the system gauge whether it is about to be attacked

“This capability is suited in fighting against human-operated ransomware because even if attackers use an unknown or benign file or even a legitimate file or process, the system can help prevent the file or process from launching,” explains the duo.

The AI-driven protection is automatically available to all Microsoft Defender for Endpoint customers who have enabled cloud protection.

You can also protect your network using these best firewall apps and services, and guard individual computers against all kinds of attacks with these best endpoint protection tools

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
A hand reaching out to touch a futuristic rendering of an AI processor.
Google Cloud unveils new AI Protection security tools, no matter which model you use
Microsoft Team Red
Microsoft's own baddie team 'attacked' more than 100 generative AI products: Here's what they learnt
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)