{"id":126149,"date":"2023-03-27T15:00:00","date_gmt":"2023-03-27T22:00:00","guid":{"rendered":""},"modified":"2025-09-22T01:57:21","modified_gmt":"2025-09-22T08:57:21","slug":"microsoft-incident-response-retainer-is-generally-available","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/","title":{"rendered":"Microsoft Incident Response Retainer is generally available"},"content":{"rendered":"\n<div class=\"wp-block-bloginabox-theme-post-alert\" role=\"alert\" aria-live=\"polite\" data-bi-an=\"alert\">\n\t<div class=\"alert-content\">\n\t\tAs of January 1, 2024, the Microsoft Incident Response Retainer is now contracted as Cybersecurity Incident Response and available to all Unified customers. Customers can contact their account manager for details.\t<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">The task of securing organizations is constantly changing and getting more complex. Many organizations don\u2019t have the time, resources, or expertise to build an in-house incident response program. For customers that want help remediating an especially complex breach (or avoiding one altogether), <a href=\"http:\/\/aka.ms\/MicrosoftIR\">Microsoft Incident Response<\/a> offers an end-to-end portfolio of proactive and reactive incident response services. We operate in 190 countries and our incident responders are seasoned veterans with more than a combined 1,000 years of career experience resolving attacks from ransomware criminals to the most sophisticated nation-state threat actor groups.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"incident-response-retainers-are-increasingly-valuable-due-to-market-dynamics\">Incident response retainers are increasingly valuable due to market dynamics <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Customers face persistent attacks from a growing number of vectors that cost time and money and impact reputation. Companies that are unprepared to respond to an incident saw a global average breach cost USD4.3 million (USD9.44 million in the United States) in 2022. This compares to USD3.05 million (USD1.3 million or 30 percent less) for companies&nbsp;with incident response and AI&nbsp;automation.<sup>1<\/sup> Companies that put these proactive measures in place also detected breaches 74 days faster than those without support (249 days compared to 323 days). Compounding these challenges, only 41 percent of chief executive officers (CEOs) believe they are prepared for cybersecurity crises.<sup>2<\/sup> What this tells us is that customers need incident response help, and they need to engage this help proactively before a crisis happens\u2014and Microsoft has taken note.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cMy team lives and breathes incident response. I literally have to pull them away from work and make them take breaks\u2014they love what they do, and it shows in the quality of their work,\u201d said Dan Taylor, Head Coach of Microsoft Incident Response. \u201cWe are excited for the continued expansion of Microsoft Incident Response and the launch of our service via retainer, which improves the customer purchase experience and allows for deeper, more meaningful customer engagement.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"overview-of-the-microsoft-incident-response-retainer-service\">Overview of the Microsoft Incident Response Retainer service<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The Incident Response Retainer provides pre-paid hours for highly specialized incident response and recovery services before, during, and after a cybersecurity crisis. It\u2019s contracted on an annual basis and the retainer hours can be used in any combination of proactive and reactive services. If additional hours are needed, customers can easily uplift extra hours as requirements change.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This service provides our fastest response times and direct&nbsp;access to our global team of experts. It was designed to work with cyber insurance vendors and has flexible delivery options that meet the unique needs of each customer.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Capabilities<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Prioritized response from Incident Response experts<\/strong>\u2014Enhanced two-hour response in the event of a security incident (if purchasing proactively as a retainer).\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Assigned Incident Response Coordinator<\/strong>\u2014A Microsoft Incident Response expert to guide your engagement during an active security incident.\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Incident Response<\/strong>\u2014Threat investigation, digital forensics, log analysis, malware analysis, attacker containment, and recovery.\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Proactive compromise assessments<\/strong>\u2014Assessment of risks to your environment to increase security posture, including both on-premises and cloud.\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Threat briefings<\/strong>\u2014Threat intelligence briefings with guidance on emerging threats tailored to your industry and geographical location.\u00a0<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Assigned Customer Success Account Manager (CSAM)<\/strong>\u2014Your point of contact to schedule proactive services and to ensure you get the full value of your retainer contract.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"who-microsoft-incident-response-helps\">Who Microsoft Incident Response helps<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We hope you never have to experience a breach. But if you do, you can rest assured that we will do everything we can to help your organization get back to business as usual. In alignment with Microsoft\u2019s mission to empower every person and every organization on the planet to achieve more, we help every organization we can, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">New or existing Microsoft customers.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Customers that don\u2019t use Microsoft Security products (this is a vendor-agnostic service).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Enterprise, government, education, and non-profit customers on the Microsoft commercial cloud.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ecosystem-partnership\">Ecosystem partnership<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">One of our core principles at Microsoft Security is&nbsp;security for all. Meeting the needs of all kinds of organizations means offering choice\u2014not only in the types of services customers buy but in&nbsp;who&nbsp;they buy them from. At the end of the day, we know that a single provider can\u2019t meet the unique needs of every organization. That\u2019s why Microsoft is fully committed to working with an ecosystem of partners and technologies that provide customers the flexibility to choose what fits their needs.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has an extensive security services partner ecosystem for customers across the globe to choose from. Our incident response and Microsoft-verified MXDR solution partners have world-class capabilities and domain expertise, each offering a broad portfolio of specialized solutions across the Microsoft security product portfolio. If you are looking for partner services, please go to the <a href=\"https:\/\/www.microsoft.com\/misapartnercatalog?PartnerClassifications=MicrosoftVerifiedManagedXDRSolution&amp;PartnerTypes=MSSP\">Microsoft Intelligent Security Association<\/a> member directory to find a solution to meet your needs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In alignment with the expansion of our Incident Response portfolio, we are also announcing a new partnership with incident response provider, Kivu. Microsoft and Kivu will jointly work together to utilize existing relationships with cyber insurance providers in responding to customers\u2019 cyber incidents. Kivu will regard Microsoft as the premier option for post-breach remediation services when Kivu clients need them, and Microsoft will regard&nbsp;Kivu as a trusted partner to handle ransomware negotiations for customers seeking that service.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cCybercrime will never stop. We have to partner, pool talent, combine intelligence and work together with our public sector colleagues to protect organizations from cyber threats. Our alliance with Microsoft Security combines our strengths to have more impact on almost any imaginable cybersecurity issue,\u201d said Shane Sims, CEO, Kivu Consulting, Inc.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cOur mission is to secure the world so our customers can thrive.&nbsp; Security is a team sport, and incident response is one of the most important areas for industry leaders to come together in collaboration,\u201d said Kelly Bissell, Corporate Vice President of Security Services, Microsoft. \u201cWe look forward to working with Kivu and other partners to help customers be safe and secure against all cyberattacks. Customers can be confident that their incident response needs will be addressed so their business can thrive.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more, please\u202f<a href=\"http:\/\/aka.ms\/MicrosoftIR\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>\u202for read our blogs in the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/microsoft-security-experts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Experts series<\/a>. For more information on purchasing the service on Unified, contact your account manager.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n\n\n\n<div style=\"height:63px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">Cost of a Data Breach Report 2022<\/a>, IBM. 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>2<\/sup><a href=\"https:\/\/www.conference-board.org\/pdfdownload.cfm?masterProductID=44769\" target=\"_blank\" rel=\"noreferrer noopener\">C-Suite Outlook 2023<\/a>, The Conference Board. 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Security is expanding its incident response presence and we\u2019re excited to announce the Microsoft Incident Response Retainer is now generally available.<\/p>\n","protected":false},"author":162,"featured_media":126787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3854,3720],"topic":[3674,3683],"coauthors":[2064],"class_list":["post-126149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","product-microsoft-incident-response","product-microsoft-security-experts","topic-incident-response","topic-security-management","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-never-1694638263-791","review-flag-new-1694638263-340","review-flag-partn-1694638263-177","review-flag-partn-1694638263-597","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Incident Response Retainer is generally available | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Microsoft Security is expanding its incident response presence and the Microsoft Incident Response Retainer is now generally available.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Incident Response Retainer is generally available | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft Security is expanding its incident response presence and the Microsoft Incident Response Retainer is now generally available.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T08:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Incident Response\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Incident Response\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/detection-and-response-team-dart\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Incident Response\"}],\"headline\":\"Microsoft Incident Response Retainer is generally available\",\"datePublished\":\"2023-03-27T22:00:00+00:00\",\"dateModified\":\"2025-09-22T08:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\"},\"wordCount\":1095,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg\",\"articleSection\":[\"Cybersecurity\",\"Microsoft Security Experts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\",\"name\":\"Microsoft Incident Response Retainer is generally available | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg\",\"datePublished\":\"2023-03-27T22:00:00+00:00\",\"dateModified\":\"2025-09-22T08:57:21+00:00\",\"description\":\"Microsoft Security is expanding its incident response presence and the Microsoft Incident Response Retainer is now generally available.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg\",\"width\":800,\"height\":600,\"caption\":\"A person wearing a headset.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Incident Response Retainer is generally available\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b\",\"name\":\"Christine Barrett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"caption\":\"Christine Barrett\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Incident Response Retainer is generally available | Microsoft Security Blog","description":"Microsoft Security is expanding its incident response presence and the Microsoft Incident Response Retainer is now generally available.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Incident Response Retainer is generally available | Microsoft Security Blog","og_description":"Microsoft Security is expanding its incident response presence and the Microsoft Incident Response Retainer is now generally available.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-03-27T22:00:00+00:00","article_modified_time":"2025-09-22T08:57:21+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg","type":"image\/jpeg"}],"author":"Microsoft Incident Response","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Incident Response","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/detection-and-response-team-dart\/","@type":"Person","@name":"Microsoft Incident Response"}],"headline":"Microsoft Incident Response Retainer is generally available","datePublished":"2023-03-27T22:00:00+00:00","dateModified":"2025-09-22T08:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/"},"wordCount":1095,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg","articleSection":["Cybersecurity","Microsoft Security Experts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/","name":"Microsoft Incident Response Retainer is generally available | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg","datePublished":"2023-03-27T22:00:00+00:00","dateModified":"2025-09-22T08:57:21+00:00","description":"Microsoft Security is expanding its incident response presence and the Microsoft Incident Response Retainer is now generally available.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture4.jpg","width":800,"height":600,"caption":"A person wearing a headset."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/27\/microsoft-incident-response-retainer-is-generally-available\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Incident Response Retainer is generally available"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b","name":"Christine Barrett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db","url":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","caption":"Christine Barrett"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/126149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=126149"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/126149\/revisions"}],"predecessor-version":[{"id":142485,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/126149\/revisions\/142485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/126787"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=126149"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=126149"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=126149"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=126149"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=126149"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=126149"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=126149"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=126149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}