<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/ct-p/microsoft-defender-threat-intelligence</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Sun, 03 May 2026 09:42:40 GMT</pubDate>
    <dc:creator>microsoft-defender-threat-intelligence</dc:creator>
    <dc:date>2026-05-03T09:42:40Z</dc:date>
    <item>
      <title>What’s New at Ignite: Powerful Enhancements in Unified Threat Intelligence</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-at-ignite-powerful-enhancements-in-unified-threat/ba-p/4470818</link>
      <description>&lt;P&gt;At Microsoft Ignite 2025, we’re unveiling transformative upgrades in threat intelligence designed to empower security teams. With the Threat Intelligence Briefing Agent now fully integrated into the Defender portal, defenders can shift from reactive to proactive security strategies, using Microsoft’s global intelligence combined with insights tailored to their organization. Additionally, the latest phase of the integration of Microsoft Defender Threat Intelligence (MDTI) with Defender XDR and Sentinel brings together unified, real-time threat intelligence and advanced analytics, streamlining the SecOps experience and equipping organizations with powerful tools to anticipate and address emerging threats more effectively.&lt;/P&gt;
&lt;H2&gt;Threat Intelligence Briefing Agent in Defender&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/introducing-the-threat-intelligence-briefing-agent/4390821" target="_blank" rel="noopener"&gt;Launched in March&lt;/A&gt;, the Threat Intelligence Briefing Agent has already enabled security teams to shift from reactive defense to proactive threat anticipation. At Ignite, we’re excited to announce that this agent is now fully integrated into the Microsoft Defender portal, currently available in Public Preview. It delivers daily, customized briefings, combining Microsoft’s global threat intelligence with insights specific to each organization, in just minutes. Instead of spending hours piecing together information from multiple sources, analysts now receive automated, up-to-date intelligence summaries. These briefings help analysts quickly prioritize actions by providing risk assessments, clear recommendations, and direct links to vulnerable assets, empowering organizations to address exposures proactively.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;MDTI Convergence into the Defender Portal&lt;/H2&gt;
&lt;P&gt;In July, we announced the integration of &lt;A href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Defender Threat Intelligence (MDTI)&lt;/A&gt; directly into &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/defender-threat-intelligence" target="_blank" rel="noopener"&gt;Defender XDR&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel" target="_blank" rel="noopener"&gt;Microsoft Sentinel&lt;/A&gt;. This integration delivers world-class, real-time threat intelligence within a unified SecOps experience, all at no additional cost. We are pleased to share that the first phase of this convergence is now available in Public Preview. It features Microsoft’s comprehensive threat intelligence library within Threat Analytics, and new enhancements making it easier than ever for users to access, understand, and act on this critical information.&lt;/P&gt;
&lt;H3&gt;Threat Intelligence Library in the Defender Portal&lt;/H3&gt;
&lt;P&gt;Defender XDR customers will have access to Microsoft’s comprehensive threat intelligence library via threat reports within &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/threat-analytics" target="_blank" rel="noopener"&gt;threat analytics (TA)&lt;/A&gt;. This includes exclusive analyses of threat activity and the detailed content focused on threat actors, threat tooling, and vulnerabilities found in &lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/whats-new-intel-profiles-deliver-crucial-information-context-about-threats/3780076" target="_blank" rel="noopener"&gt;i&lt;/A&gt;&lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/whats-new-intel-profiles-deliver-crucial-information-context-about-threats/3780076" target="_blank" rel="noopener"&gt;ntel profiles&lt;/A&gt;. Threat reports are automatically correlated with related incidents and affected assets, revealing endpoint vulnerabilities and recommended actions.&lt;/P&gt;
&lt;P&gt;Threat analytics in Defender enables and empowers customers to get threat insights around emerging threats on a global scale . Threat analytics provides contextual and operational information about the relevance of each threat for an organization, which allows security teams to organize and prioritize their operations and triage processes based on impact, available as in-product reports.&lt;/P&gt;
&lt;P&gt;Threat reports published in Threat analytics include threat activity such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Active threat actors and their campaigns&lt;/LI&gt;
&lt;LI&gt;Popular and new attack techniques&lt;/LI&gt;
&lt;LI&gt;Critical vulnerabilities&lt;/LI&gt;
&lt;LI&gt;Common attack surfaces&lt;/LI&gt;
&lt;LI&gt;Prevalent malware&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Threat reports provide analysts with insights into the methods and attack patterns employed by threat actors, along with details on vulnerabilities, zero-day exploits, and potentially harmful tools. These findings are correlated with relevant contextual information from the customer's environment to assess the specific impact each threat may have on their organization.&lt;/P&gt;
&lt;H3&gt;Threat Analytics library now also available to Sentinel-only customers&lt;/H3&gt;
&lt;P&gt;Sentinel-only customers now have access to Microsoft’s threat intelligence library through reports in &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/threat-analytics" target="_blank" rel="noopener"&gt;Threat Analytics (TA)&lt;/A&gt;, currently in Public Preview. This upgrade, now in Public Preview, brings Microsoft’s world-class threat intelligence and actionable indicators to Sentinel without a Defender XDR license. While incident correlation and automated response remain exclusive to Defender XDR, standalone Sentinel deployments gain improved threat visibility and integrated security options.&lt;/P&gt;
&lt;H3&gt;What’s new in Threat Analytics&lt;/H3&gt;
&lt;P&gt;Threat reports within Threat Analytics have been upgraded with enhanced insights—previously accessible exclusively through an MDTI license—to provide Defender customers with improved context regarding finished intelligence on prevalent threats. The following contextual insights for each report are now available within Threat Analytics:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Indicators of Compromise&lt;/U&gt;&lt;/STRONG&gt;: Each threat report now includes a comprehensive list of indicators attributed to the specific threat. This feature allows customers to review all relevant indicators and access detailed entity information within Defender directly from the report, streamlining navigation to support efficient investigation and triage.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;U&gt;MITRE ATT&amp;amp;CK Mapping&lt;/U&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;: By mapping threats’ tactics, techniques, and procedures (TTPs) to the MITRE ATT&amp;amp;CK framework, customers can proactively identify, detect, and mitigate persistent techniques, ultimately enhancing overall security posture.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;U&gt;Targeted Industries &amp;amp; Actor Origin&lt;/U&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;: Reports provide insight into targeted industries and threat actor origins, enabling analysts to prioritize intelligence and contextualize motivations and observed TTPs.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;U&gt;Related Intelligence &amp;amp; Aliases&lt;/U&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;: Threat Analytics offers links to related intelligence and presents actor or tool aliases, allowing customers to cross-reference reports and understand the alignment between Microsoft Threat Intelligence and broader industry developments.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;All these additional insights are available in the overview of a threat report&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Furthermore, finding threat reports is now easier. The reports are systematically organized and can be filtered by Actor, Tool, Technique, Vulnerability, Activity, or Core threat, making it quicker to locate specific reports.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Read more about threat analytics report and the information available&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-xdr/threat-analytics#view-a-threat-analytics-report" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;Access to Indicators of Compromise&lt;/H4&gt;
&lt;P&gt;Indicators of Compromise linked to specific threats provide SOC Analysts with valuable insight into the most common risks faced by their organization. For Defender customers, threat analytics now makes it easier to filter this data according to particular threats. Because information about indicators is vital, unauthorized access poses a risk of data theft or exploitation by malicious actors. Recognising its sensitivity, access to Indicators is restricted to verified customers only.&lt;/P&gt;
&lt;P&gt;Customers who do not have access to indicators will see the following when attempting to access it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In scenarios where access is restricted, customers will have the option to verify themselves by submitting business information to get access on successful verification. Read more about &lt;A href="https://learn.microsoft.com/defender-xdr/threat-analytics-indicators" target="_blank" rel="noopener"&gt;access to indicators&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Customers with access to indicators (with or without the need to submit additional verification) will be able to see the entire list.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The improvements to Threat analytics described above are designed to deliver a unified threat intelligence experience. By integrating MDTI features into Microsoft Defender and Sentinel, customers will progressively have access to more valuable insights that were previously available only with paid MDTI licenses. Read more about MDTI convergence&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/mdti-is-converging-into-microsoft-sentinel-and-defender-xdr/4427991" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Link Cases to IOCs for Complete Threat Context&lt;/H2&gt;
&lt;P&gt;You can now link a case directly to relevant Indicators of Compromise (IOCs), ensuring investigations and response workflows stay connected. This feature improves visibility and collaboration, enabling faster, more informed decisions during threat investigations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;The integration of the Threat Intelligence Briefing agent into the Defender Portal and the convergence of MDTI into Microsoft Defender and Sentinel represents a major leap forward for security teams, delivering unified threat intelligence and streamlined workflows. With enhanced access to threat reports, indicators of compromise, and contextual insights, organizations are better equipped to proactively defend against emerging threats and respond with greater speed and confidence. These advancements ensure that valuable intelligence is accessible to all, strengthening security operations and empowering defenders to stay ahead in an ever-evolving threat landscape.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 16:18:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-at-ignite-powerful-enhancements-in-unified-threat/ba-p/4470818</guid>
      <dc:creator>PrateekTaneja</dc:creator>
      <dc:date>2025-11-18T16:18:26Z</dc:date>
    </item>
    <item>
      <title>My companies app incorrectly detected as a trojan</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/my-companies-app-incorrectly-detected-as-a-trojan/m-p/4462429#M55</link>
      <description>&lt;P&gt;Hi Team.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am the developer of a gaming geo fence and your system had falsely detected my app as&amp;nbsp; Trojan:Script/Wacatac.C!ml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help to remove it as it seems like analysts are no longer checking false detections anymore? ( at least to me it seems automatic now )?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My app is a geo fence which creates firewall rules and use npcaap for packet capture to display server locations and the exe is encrypted to help fight against software pirates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an example submission of my exe for my application&amp;nbsp;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/wdsi/submission/5ab00c91-ea84-4fbb-a739-613316b32dfe" target="_blank"&gt;https://www.microsoft.com/en-us/wdsi/submission/5ab00c91-ea84-4fbb-a739-613316b32dfe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please get an analyst to manually inspect the file and whitelist it as its a pain telling my customers to turn off their anti virus and also its not advice i should have to give to be honest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My company is called sbmmoff ltd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A class="lia-external-url" href="https://papagal.bg/eik/207176266/58b9" target="_blank"&gt;https://papagal.bg/eik/207176266/58b9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Website is bflocker.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really would appreciate a speedy response to resolve the situation and thank you for your time.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Oct 2025 00:46:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/my-companies-app-incorrectly-detected-as-a-trojan/m-p/4462429#M55</guid>
      <dc:creator>bffan44</dc:creator>
      <dc:date>2025-10-18T00:46:56Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender doesn't, Spy hunter shows a Hijacker</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/microsoft-defender-doesn-t-spy-hunter-shows-a-hijacker/m-p/4455233#M53</link>
      <description>&lt;P&gt;Spy Hunter indicates a "Elex Hijacker" and three other problems were as Defender and McAfee do not show any problem.&lt;/P&gt;&lt;P&gt;Is Spy Hunter legitimate?&lt;/P&gt;&lt;P&gt;I did have a Search engine redirect problem that has a name "ext.ladispatcher.com" and "search-load.com" while using Chrome browser with Chrome search engine. But no problem with Microsoft Edge and Bing.&lt;/P&gt;&lt;P&gt;My monitor screen occasionally momentary collapses and reverts back to normal in a split second. Could there be a connection to malware.?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if i am posting on the wrong site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 19:46:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/microsoft-defender-doesn-t-spy-hunter-shows-a-hijacker/m-p/4455233#M53</guid>
      <dc:creator>JKFISH</dc:creator>
      <dc:date>2025-09-18T19:46:42Z</dc:date>
    </item>
    <item>
      <title>Need information on generating sample events for Threat Intelligence</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4450928#M48</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;I am working on exploring&amp;nbsp;&lt;STRONG&gt;MS Threat Intelligence&lt;/STRONG&gt;&amp;nbsp;and its features. But I am not able to generate sample data for this product, nor able to view the Threat Intelligence logs using Microsoft Management API following the schema -&amp;nbsp;https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#auditlogrecordtype&lt;/P&gt;&lt;P&gt;I tried sending some mails from external email account to my organisation's test user containing EICAR files, and also tried with some safe but malicious test URLs. But still unable to get data inside Threat Intelligence.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please help me here for generating events and viewing the content using Management APIs?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 13:35:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4450928#M48</guid>
      <dc:creator>aslin</dc:creator>
      <dc:date>2025-09-04T13:35:29Z</dc:date>
    </item>
    <item>
      <title>Need information on generating sample events for Threat Intelligence</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4448904#M46</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;I am working on exploring &lt;STRONG&gt;MS Threat Intelligence&lt;/STRONG&gt; and its features. But I am not able to generate sample data for this product, nor able to view the Threat Intelligence logs using Microsoft Management API following the schema -&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#auditlogrecordtype" target="_blank"&gt;https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#auditlogrecordtype&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I tried sending some mails from external email account to my organisation's test user containing EICAR files, and also tried with some safe but malicious test URLs. But still unable to get data inside Threat Intelligence.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please help me here for generating events and viewing the content using Management APIs?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 04:04:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4448904#M46</guid>
      <dc:creator>swaradajalukar</dc:creator>
      <dc:date>2025-08-28T04:04:42Z</dc:date>
    </item>
    <item>
      <title>MDTI is Converging into Microsoft Sentinel and Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-is-converging-into-microsoft-sentinel-and-defender-xdr/ba-p/4427991</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today’s rapidly evolving threat landscape, organizations need threat intelligence (TI) that is woven seamlessly into every step of their security operations, delivered exactly when and where it matters most. That’s why Microsoft is converging&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender Threat Intelligence (MDTI)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; directly into &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/defender-threat-intelligence" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Defender XDR&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; and &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel" target="_blank" rel="noopener"&gt;Microsoft Sentinel&lt;/A&gt;, which will provide world-class, real-time TI within a unified SecOps experience at no additional cost. This convergence will grant customers access to Microsoft’s extensive repository of both &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;raw&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; and finished threat intelligence, &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/03/24/microsoft-unveils-microsoft-security-copilot-agents-and-new-protections-for-ai/?msockid=2a719d258556689d07c98f0584c56974" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;developed from &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;84&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; trillion daily signals&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; and backed by over 10,000 security professionals, eliminating the need for additional licensing and costly third-party solutions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With comprehensive threat actor-focused TI at every layer of the SecOps workflow, teams gain enhanced visibility, faster detection, and accelerated incident response to outpace threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Key Features Arriving Soon&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The convergence of MDTI value into Microsoft Sentinel and Defender XDR will take place over the course of several months and be completed by the first half of next year. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Features in the first phase of this &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;convergence, which will be available by October, include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Finished Threat Intelligence: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Defender XDR customers will have access to Microsoft’s comprehensive threat intelligence library via threat reports within&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/threat-analytics" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;threat analytics (TA)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. This includes exclusive analyses of threat activity and the detailed content focused on threat actors, threat tooling, and vulnerabilities found in &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/whats-new-intel-profiles-deliver-crucial-information-context-about-threats/3780076" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;i&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/whats-new-intel-profiles-deliver-crucial-information-context-about-threats/3780076" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ntel profiles&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. Customers can connect this intelligence to related incidents and affected assets, revealing endpoint vulnerabilities and recommended actions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The convergence of MDTI’s finished intelligence into threat analytics also introduces threat actor-linked indicators of compromise (IOCs). Security operations and threat intelligence teams can use these IOCs—updated in real time as new evidence emerges from Microsoft researchers—to investigate specific attacker infrastructure and behavior, which supports more effective threat hunting and remediation. Even after their expiration, these IOCs will remain available for historical investigations, enabling analysis of past threats and their organizational impact. This helps security teams proactively uncover new, previously unseen attacker infrastructure beyond the known environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Additionally, the convergence brings &lt;/SPAN&gt;&lt;A href="https://attack.mitre.org/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;MITRE TTPs&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; (tactics, techniques, and procedures)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; into threat analytics. Understanding TTPs equips organizations to design detections that specifically target the more persistent methods attackers use. By proactively focusing on TTPs, organizations move beyond simply blocking or alerting on IOCs, which helps achieve stronger, more resilient defenses and a proactive security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Sentinel customers will also get access to threat analytics in the Defender portal, granting them the same finished TI with many of the same capabilities. This experience will be available for Sentinel customers soon after Defender XDR customers. Stay tuned to the MDTI Tech Community blog for updates on availability.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;IoCs in Case Management: &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Sentinel customers will be able to share threat actor IoCs via Sentinel case management to collaborate and share threat research across teams within their organization. This streamlined sharing not only enhances cross-team collaboration but also accelerates the identification and containment of threats as new intelligence is discovered. By leveraging this workflow within Sentinel, security teams can ensure that actionable threat indicators are promptly distributed and integrated into ongoing investigations, driving smarter and faster responses across the enterprise.&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;What to Expect from the Fully Unified Threat Intelligence Experience&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Once MDTI is fully converged into Defender XDR and Sentinel, customers' alerts, incidents, and investigations will be automatically enriched with relevant threat context, enabling faster, more precise detection and response to emerging threats. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Customers will benefit from the entirety of MDTI’s finished and raw intelligence through the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;threat analytics &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;blade in the Defender portal&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;—including open-source intelligence (OSINT), in-depth threat articles, and advanced &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender/threat-intelligence/data-sets" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;internet data sets.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Defender XDR customers will be able to directly link this compendium of intelligence to Defender alerts, endpoints, and vulnerabilities. Sentinel customers will gain unique enhancements of their own, such as automated detection triggers based on the latest IoCs, real-time incident enrichment with current threat actor TTPs, advanced automation features like incident triage, and the ability to enhance third-party intelligence through the Sentinel Threat Intelligence Platform (TIP). For some capabilities, such as alerting on IoCs against log data, Sentinel customers will have to pay a small cost for ingestion of TI (there is no minimum ingestion cost).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The first phase of the convergence will be complete by October 2025, with the rest of the features rolling out over time. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Reference the table below to see the features and capabilities that will be available after MDTI is fully converged with Defender XDR and Sentinel.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;This chart shows how MDTI features will converge into Defender XDR and Sentinel&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For ongoing updates about new MDTI features coming online in Sentinel and Defender XDR, customers should check back-in on the MDTI Tech Community blog.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Actions for Existing MDTI Customers&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Existing MDTI customers will continue to have full access to their current MDTI experience until the product is retired on August 1, 2026. They will be contacted by their account team or partner with guidance on next steps and how to reduce their current license and transition to this new unified threat intelligence experience in Defender XDR or Sentinel at no additional cost. Please do not hesitate to reach out to your account team with any questions.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Additional Information&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Discover how this unified experience simplifies operations, eliminates silos, and helps you see and stop threats faster. Explore the following resources:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2025/07/22/microsoft-sentinel-data-lake-unify-signals-cut-costs-and-power-agentic-ai/" target="_blank" rel="noopener"&gt;Read our blog&lt;/A&gt; announcing the expanded Sentinel data lake offering&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;A class="lia-external-url" href="https://info.microsoft.com/FY26-Microsoft-Security-Sentinel-Innovation_Interest-Form.html" target="_blank" rel="noopener"&gt;Register to join us in September&lt;/A&gt; for our next wave of innovation around threat intelligence and Microsoft Sentinel&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 30 Jul 2025 14:58:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-is-converging-into-microsoft-sentinel-and-defender-xdr/ba-p/4427991</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2025-07-30T14:58:58Z</dc:date>
    </item>
    <item>
      <title>Disable Defender TI access to end user</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/disable-defender-ti-access-to-end-user/m-p/4417993#M41</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;When our users access Defender quarantine (or access Defender Admin Center directly), they also get access to Microsoft Defender Threat Intelligence.&lt;BR /&gt;&lt;BR /&gt;Is it possible to disable it and allow access only to the Quarantine?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dario Woitasen&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 16:44:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/disable-defender-ti-access-to-end-user/m-p/4417993#M41</guid>
      <dc:creator>DarioMWS</dc:creator>
      <dc:date>2025-05-27T16:44:08Z</dc:date>
    </item>
    <item>
      <title>Can the Microsoft Defender portal show the server details as per security group?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/can-the-microsoft-defender-portal-show-the-server-details-as-per/m-p/4412713#M40</link>
      <description>&lt;P&gt;I'm using Microsoft Defender to monitor the servers.&lt;/P&gt;&lt;P&gt;I have multiple groups of people working from various other vendors. I would like create multiple security groups and add people based on their company and configure the defender such a manner that only people from Company "A" can see their own servers and people working from Campany "B" can see their respective servers. Also, I as admin can see both "A's" and "B's" servers.&lt;/P&gt;&lt;P&gt;Can this be achieved using Microsoft Defender? If yes, how to achieve this? Any step-by-step approach would help. Or if there are any other ways, please suggest. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 04:38:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/can-the-microsoft-defender-portal-show-the-server-details-as-per/m-p/4412713#M40</guid>
      <dc:creator>jr-rout</dc:creator>
      <dc:date>2025-05-12T04:38:25Z</dc:date>
    </item>
    <item>
      <title>Introducing the Threat Intelligence Briefing Agent</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-threat-intelligence-briefing-agent/ba-p/4390821</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;As cyber threats rapidly evolve, security teams are overwhelmed by the sheer volume of threat intelligence, making it challenging to deliver timely, targeted briefings. That’s why we’re introducing the Security Copilot Threat Intelligence Briefing Agent—a powerful new tool that slashes the time to produce actionable threat reports from hours or days to just minutes. Now in Public Preview, the agent delivers prioritized insights, mapping the latest adversary activity to your unique attack surface so you know exactly which vulnerabilities demand attention now. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Looking ahead, we’re planning even deeper integrations, such as automated remediation, exposure trend analysis, and more, to empower security teams to stay one step ahead of attackers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;Analysis at Machine Speed&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This next evolution in Security Copilot threat intelligence capabilities builds on its powerful ability to correlate Microsoft threat data, real-time signals, and customer telemetry to add critical context to threats. The agent dynamically builds briefings based on the latest threat actor activity from&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; Microsoft security research&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; and both internal and external vulnerability data sourced from &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management" target="_blank" rel="noopener"&gt;Microsoft Defender Vulnerability Management (MDVM)&lt;/A&gt; and &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/cloud-security/microsoft-defender-external-attack-surface-management" target="_blank" rel="noopener"&gt;Microsoft Defender External Attack Surface Management (EASM)&lt;/A&gt;. It automates the collection, analysis, and summarization of this powerful threat information, delivering continuous, tailored briefings based on factors such your organization’s evolving attack surface, your industry, and geographic location.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These briefings, which can be scheduled or run ad-hoc, offer regular executive summaries and technical analysis accessible via the UI or directly to a CISO's inbox. They determine whether a vulnerability is being actively exploited and its potential organizational impact. Instead of sifting through threat feeds and vulnerability reports, security teams receive clear insights aligned with the organization's needs, allowing for effective resource allocation. As a result, cyberthreat intelligence (CTI) analysts gain important data for further research, while CISOs and security leaders get the situational awareness needed to fine-tune their defense strategies.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;How the Agent Works&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Setting up the Agent&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;The Threat Intelligence Briefing agent is in the Security Copilot standalone experience. A new area of the product is devoted to agents, where both Microsoft and third parties offer a variety of agents that perform critical tasks to make cybersecurity teams more effective and efficient. CTI analysts can quickly set up the Threat Intelligence Briefing agent to run once for a one-time report or set it to run automatically at an interval of their choosing. Setting up the agent is simple. Customers can choose an identity for the agent using Microsoft’s robust role-based access controls (RBAC):&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Customers can choose an existing identity or create an agent-specific identity.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;They can then ensure the required plugins are enabled for the agent to run. At the core of this agent is its integration with Microsoft’s extensive threat intelligence ecosystem. It leverages &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence" target="_blank" rel="noopener"&gt;Microsoft Defender Threat Intelligence (MDTI) &lt;/A&gt;profiles, articles, and intelligence on threat actors, tools, and techniques, automatically prioritizing content based on the organization's unique profile. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Currently, the Threat Intelligence Briefing Agent is best suited for MDEASM and &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;Microsoft Defender for Endpoint (MDE)&lt;/A&gt;, as it relies on telemetry and insights from these first-party integrations to deliver accurate and context-rich reports.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For organizations with E5 licenses, the agent can also incorporate insights from MDVM to highlight potential weaknesses in your internal IT infrastructure. If the organization utilizes MDEASM, the agent further tailors its briefings using external data such as vulnerabilities associated with unmanaged assets (e.g., CVE information):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Customers can choose up to three plugins to provide the agent with threat intelligence to build briefings.&lt;/img&gt;
&lt;P&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-contrast="auto"&gt;Once set up, the agent is ready to run in the background to generate the briefing: &lt;/SPAN&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Once the agent is set up, it's ready to run!&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Agent in Action&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-contrast="auto"&gt;A key benefit of the agent for CISOs and security managers is simplification. The agent runs at regularly scheduled intervals or on-demand:&lt;/SPAN&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Customers can look into any run the agent has made to read past briefings.&lt;/img&gt;
&lt;P&gt;&lt;SPAN style="background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-family: var(--lia-blog-font-family); font-size: var(--lia-bs-font-size-base); font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight);"&gt;Here, we can see the briefing highlighted potentially significant threats facing the organization, focusing on recent campaigns by the riskiest threat actors. These campaigns involve tactics such as exploiting vulnerabilities in network devices, phishing, and ransomware attacks:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Briefings show the latest threats that are most relevant to an organization with a summary of recent campaigns and recommended actions.&lt;/img&gt;
&lt;P&gt;The briefings also include the most critical CVEs contextualized with threat intelligence. It also includes links to vulnerable assets for further action:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;The briefing also shows the most critical vulnerabilities identified by the agent, mitigation steps, and the affected assets across the organization's IT setup and external attack surface.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The briefing provides concrete recommendations to enhance defenses, including patching vulnerabilities, strengthening endpoint protection, and implementing attack surface reduction rules. Customers can then review the path the agent took to see how it gathered this real-time intelligence:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here, we can see the path the agent has taken to generate the briefing. At each step of the way, it is making dynamic decisions about the best threat intelligence to include based on its inherent threat intelligence expertise. This path can change each day based on changes in the threat landscape and on the organization’s attack surface. For example, if a CVE gets remediated, threat intelligence associated with that vulnerability will become less of a priority:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;The agent shows the path it took to build each briefing. It makes dynamic decision based on its threat intelligence expertise every step of the way.&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;What’s Next&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="normaltextrun" data-ccp-charstyle-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;51c629e7-8701-403e-9e5d-db74b7fcd85a|45&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[201342446,&amp;quot;1&amp;quot;,201342447,&amp;quot;5&amp;quot;,201342448,&amp;quot;3&amp;quot;,201342449,&amp;quot;1&amp;quot;,469777841,&amp;quot;Aptos&amp;quot;,469777842,&amp;quot;Arial&amp;quot;,469777843,&amp;quot;ＭＳ 明朝&amp;quot;,469777844,&amp;quot;Aptos&amp;quot;,201341986,&amp;quot;1&amp;quot;,469769226,&amp;quot;Aptos,Arial,ＭＳ 明朝&amp;quot;,268442635,&amp;quot;24&amp;quot;,469775450,&amp;quot;normaltextrun&amp;quot;,201340122,&amp;quot;1&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;normaltextrun&amp;quot;,335572020,&amp;quot;1&amp;quot;,469778324,&amp;quot;Default Paragraph Font&amp;quot;]}"&gt;The Threat Intelligence Briefing Agent marks a major step toward AI-driven automation for improving security outcomes, but this is just the beginning. &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;We are&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt; continuously listening to our customers and rolling out &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;new updates&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt; regularly&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This powerful agent will soon be available alongside the&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; rich, continuously updated threat intelligence&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; in the Threat Analytics blade of Defender XDR to enable Defender customers to create these briefings with the click of a button.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Learn More&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Threat Intelligence Briefing Agent offers a strategic way to reduce complexity, optimize security decision-making, and expedite the identification of the most relevant vulnerabilities and threats impacting your organization. By automating and prioritizing threat intelligence—the same intelligence that previously took hours or days to assemble—this agent provides clear, actionable insights that enhance overall security readiness.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="normaltextrun" data-ccp-charstyle-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;51c629e7-8701-403e-9e5d-db74b7fcd85a|45&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[201342446,&amp;quot;1&amp;quot;,201342447,&amp;quot;5&amp;quot;,201342448,&amp;quot;3&amp;quot;,201342449,&amp;quot;1&amp;quot;,469777841,&amp;quot;Aptos&amp;quot;,469777842,&amp;quot;Arial&amp;quot;,469777843,&amp;quot;ＭＳ 明朝&amp;quot;,469777844,&amp;quot;Aptos&amp;quot;,201341986,&amp;quot;1&amp;quot;,469769226,&amp;quot;Aptos,Arial,ＭＳ 明朝&amp;quot;,268442635,&amp;quot;24&amp;quot;,469775450,&amp;quot;normaltextrun&amp;quot;,201340122,&amp;quot;1&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;normaltextrun&amp;quot;,335572020,&amp;quot;1&amp;quot;,469778324,&amp;quot;Default Paragraph Font&amp;quot;]}"&gt;To learn more about this agent&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt; and the rest of the first and third-party agents now available&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;watch our&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://register.secure.microsoft.com/?ocid=cmm54b6jcm9" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;Microsoft Secure digital &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;event&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;. F&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;or &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;a closer look at this agent, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://medius.microsoft.com/Embed/video-nc/a93aedba-f614-4ee6-9517-bbea7974322d?r=18531212020" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;watch our deep dive in the Microsoft Security &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Copilot Content Hub&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt; &lt;A class="lia-external-url" href="https://aka.ms/SecurityCopilot-RSAC25" target="_blank" rel="noopener"&gt;Read this blog&lt;/A&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="normaltextrun"&gt;o learn more about Security Copilot agents at RSA.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 17:58:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-threat-intelligence-briefing-agent/ba-p/4390821</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2025-08-07T17:58:46Z</dc:date>
    </item>
    <item>
      <title>New at Ignite: TI Guided Experience in Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-at-ignite-ti-guided-experience-in-security-copilot/ba-p/4287492</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The Security Copilot team is consistently improving the&amp;nbsp;threat intelligence (TI) experience for customers. At Microsoft Ignite 2024, we're thrilled to unveil&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; two out-of-the-box promptbooks that create guided experiences for cyberthreat intelligence and SOC analysts for investigating and responding to threats affecting their organization, simplifying complex workflows and making difficult, repetitive tasks easier to do for all experience levels.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Below, we’ll cover each of these promptbooks in more detail:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Threat 'Intelligence 360' report on MDTI article&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With Security Copilot able to tap into&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/ignite-unified-ti-experience" target="_blank" rel="noopener"&gt;powerful threat intelligence from more sources&lt;/A&gt;, customers get a much more holistic view of threats, better understand how they impact the organization, have more recommendations and guidance to respond faster and more effectively.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This promptbook shows customers the full impact a threat covered in a Microsoft Defender Threat Intelligence article has on their organization to streamline and accelerate response.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These prompts help map content from the article back to CVE and vulnerability data related to their organization’s attacks surface, surface related incidents, and provide recommendations for remediation.&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Below, we’ll examine what an analyst sees when they run the 'Threat Intelligence 360 Report' promptbook for the MDTI article “Attack Abuses Victim Resources to Reap Rewards from Titan Network.”&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The first step of the promptbook pulls up all indicators of compromise (IoCs) added to the article by Microsoft researchers. Below, you can see the prompt return a list of IoCs that includes two IP addresses and several URLs:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Copilot extracts the IoCs from the MDTI article.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The next step of the promptbook asks Security Copilot to create a KQL query to hunt across the organization’s network for activity related to the indicators from the article. In the example below, Security Copilot created a query for&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;IPV4 indicators in the article returned by Security Copilot. The promptbook will create KQL queries for every indicator type and return all relevant intelligence.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;KQL query to hunt for malicious domains referenced in the article on the network.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The promptbook will then search for Defender incidents related to the article. In this example, it returns four incidents that contain indicators or tactics, techniques, and procedures (TTPs) that are covered in the article. Grouping the incidents by activity make them easy to reference for incident responders and provide important context and a clear path forward for cyberthreat intel analysts' investigation.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Related incidents involving the IoCs and TTPs covered in the MDTI article&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Finally, the promptbook shows the analyst details of the CVEs listed in the articles and its impact to the organization by listing their organization's vulnerable assets and resources to help them understand how their attack surface is exposed and the steps they need to take to address and remediate the vulnerabilities:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;List of impacted assets from Threat Analytics.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Overall, this information rapidly summarizes a threat analyzed in a threat intelligence article so analysts can quickly and efficiently understand the nuances of the threat and its impact to the organization.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Impact of external article&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This promptbook shows analysts the impact of an external threat intelligence article from a third-party source (not found in Microsoft products) on their organization. This promptbook extracts indicators from the article to check against all Microsoft’s intelligence to show all relevant information and the impact on the organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Below, the analyst deploys this promptbook to better understand a threat intelligence article from a third-party source about the latest campaigns leveraging the 'Silent Skimmer':&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;IoCs extracted from third-party article&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Next, the promptbook takes the indicators extracted from the article and queries Microsoft's compendium of threat intelligence to show all related content and data to give analysts a broader understanding of the threat activity. Below, the promptbook checks each IoC's reputation against Microsoft Threat Intelligence. The analyst can see that several of the indicators from the article are known to be malicious to Microsoft and are associated with several Microsoft threat intelligence articles in MDTI:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Microsoft reputation scoring for each third-party IoC&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;After uncovering related intelligence&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, the promptbook asks Security Copilot to create KQL queries to automatically hunt across the network for the malicious indicators from the article, as well as the ones newly surfaced in Microsoft threat intelligence. In the example below, it’s searching for the file hashes listed in the article:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;KQL query automatically generated by the promptbook to hunt across the network for threat activity covered in the article&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Finally, the promptbook asks Security Copilot to create a table showing any reference in Microsoft threat intelligence to the indicators mentioned in the article, as well as any devices in the customer organization that are affected by CVEs listed in the article based on Threat Analytics data:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Query automatically generated to show the impact of this third-party article to the organization from data in Threat Analytics and MDVM.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These powerful new promptbooks will create guided experiences for a variety of personas, simplifying complex workflows and making difficult, repetitive tasks easier to do. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;Conclusion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft delivers leading threat intelligence built on visibility across the global threat landscape made possible protecting Azure and other large cloud environments, managing billions of endpoints and emails, and maintaining a continuously updated graph of the internet. By processing an astonishing 78 trillion security signals daily, Microsoft can deliver threat intelligence in Copilot for Security&amp;nbsp;providing an all-encompassing view of attack vectors across various platforms, ensuring customers have comprehensive threat detection and remediation.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;To learn more about Security Copilot, visit the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/bg-p/SecurityCopilotBlog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Tech Community page here.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn more about&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security Copilot in Microsoft Defender Threat Intelligence here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn more about &lt;A class="lia-external-url" href="https://aka.ms/ignite-unified-ti-experience" target="_blank" rel="noopener"&gt;other Microsoft threat intelligence innovations launching at Ignite here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Also, be sure to contact our &lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;sales&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;team to request a demo or a quote. Learn how you can begin using MDTI with the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti-copilot-guide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;purchase of just one Security Copilot SCU here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 17:27:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-at-ignite-ti-guided-experience-in-security-copilot/ba-p/4287492</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2024-11-22T17:27:22Z</dc:date>
    </item>
    <item>
      <title>New at Ignite: Unified Threat Intelligence Experience in Security Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-at-ignite-unified-threat-intelligence-experience-in-security/ba-p/4287484</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The Security Copilot team is continuously enhancing threat intelligence (TI) capabilities in Copilot. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;At Microsoft Ignite 2024, we’re excited to announce several powerful innovations that &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;provide a more comprehensive and integrated TI experience for customers. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Now generally available, Security Copilot customers can build a '360-degree' view of threats by tapping into a wider range of TI sources for more insight into attacker tooling and methodology and how they may impact the organization.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Below, we’ll cover these innovations in more detail. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;Now Public Preview: MDTI Indicator Data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Ten new indicators skills can now leverage the full corpus of raw and finished threat intelligence in MDTI to link any indicator of compromise (IoC) to all related data and content, providing critical context to attacks and enabling advanced research and preemptive hunting capabilities that give defenders a head start on adversaries. This automated &lt;/SPAN&gt;&lt;A href="https://aka.ms/infrastructure_chaining" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;infrastructure chaining&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; is a &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;crucial function for a security analyst or threat hunter to investigate the relationships between connected &lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIDatasets" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;data&lt;/SPAN&gt; &lt;SPAN data-ccp-charstyle="Hyperlink"&gt;sets&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, which allows them to kick off and expand their investigations into events or incidents on their network.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;These skills call upon two main categories of threat intelligence:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;In-depth Indicators data:&lt;/STRONG&gt;&amp;nbsp;Security&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Copilot can now automatically link any IoC with all threat intelligence linked to it in MDTI, including &lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIIntelProfiles" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;intel profiles&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, articles, and summary data, which includes detonation and reputation information from Microsoft’s &lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIDetonationIntelligenceVideo" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;file and URL analysis&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;. This context is critical when responding to an incident, providing instant information on the attacker and nature of the attack. This data can also level-up analysts by providing the necessary next steps outlined in MDTI to help them deal with the incident quickly and efficiently.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Indicators metadata: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;Security&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;Copilot can link any IoC to associated infrastructure across the internet via MDTI’s advanced internet data sets. These data sets are developed by collecting and analyzing internet data at a global scale and are comprised of core and derived data sets. Core data sets include Resolutions, WHOIS information, SSL Certificates, Subdomains, DNS, Reverse DNS, and Services. Derived data sets including Trackers, Components, Host Pairs, and Cookies. When linked to related infrastructure, analysts can make connections between related threat activity and preemptively uncover new threat tooling before it can be used against the organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="none"&gt;I&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;n this example, you can see an indicator has been linked to several IP addresses, two articles, and three intel profiles. Copilot has also pulled up its reputation, WHOIS, and passive DNS data.&lt;/SPAN&gt;&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;Now GA: Expanded Unified Vulnerability Intelligence&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Recently, &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/defenderthreatintelligence/new-copilot-for-security-plugin-name-reflects-broader-capabilities/4258810" target="_blank" rel="noopener" data-lia-auto-title="we announced the expansion of the Threat Intelligence plugin in Copilot" data-lia-auto-title-active="0"&gt;we announced the expansion of the Threat Intelligence plugin in Security Copilot&lt;/A&gt;. Now generally available, Security Copilot can also reason over vulnerability and asset intelligence &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;from Microsoft Defender External Attack Surface Management (MDEASM), Defender Vulnerability Mangement (MDVM), and Threat Analytics for a more complete view of vulnerabilities and a better understanding of how known threats covered in Microsoft threat intelligence impact the organization. Through this holistic experience, customers get a deeper view of threats, better understand how they impact the organization, and have more recommendations and guidance to respond faster and more effectively.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="none"&gt;Above, we can see the threat intelligence sidecar in Defender XDR showing the key details around CVE – 2023-6119, including its severity, impact on the organization in number of exposed devices, and other important information, such as affected versions.&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In a single view, customers can understand the impact of a vulnerability or exposure, including exposed and unmanaged assets,&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; risk-based prioritization, and steps for remediation. Customers can also see all threat intelligence related to the vulnerability to better understand the threat actors leveraging it so they can take preemptive steps to secure their organization.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;With the integration of threat intelligence sources in Security Copilot that are otherwise separate, customers get a much more holistic view of threats, sharper clarity on how they impact the organization, and have more recommendations and guidance to respond faster and more effectively.&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;Conclusion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft delivers leading threat intelligence built on visibility across the global threat landscape made possible protecting Azure and other large cloud environments, managing billions of endpoints and emails, and maintaining a continuously updated graph of the internet. By processing an astonishing 78 trillion security signals daily, Microsoft can deliver threat intelligence in Security Copilot providing an all-encompassing view of attack vectors across various platforms, ensuring customers have comprehensive threat detection and remediation.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;To learn more about Security Copilot, visit the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/bg-p/SecurityCopilotBlog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Tech Community page here.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn more about &lt;A class="lia-external-url" href="https://aka.ms/ignite-ti-guided-experiences" target="_blank" rel="noopener"&gt;other threat intelligence innovations being announced at Ignite here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn more about&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security Copilot in Microsoft Defender Threat Intelligence here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Also, be sure to contact our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;sales&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;team to request a demo or a quote. Learn how you can begin using MDTI with the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti-copilot-guide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;purchase of just one Security Copilot SCU here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 17:26:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-at-ignite-unified-threat-intelligence-experience-in-security/ba-p/4287484</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2024-11-22T17:26:48Z</dc:date>
    </item>
    <item>
      <title>New Blog | New Copilot for Security Plugin Name Reflects Broader Capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-new-copilot-for-security-plugin-name-reflects-broader/m-p/4261114#M36</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank"&gt;Michael Browning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Copilot for Security team is continuously enhancing threat intelligence (TI) capabilities in Copilot for Security to provide a more comprehensive and integrated TI experience for customers. We're excited to share that the Copilot for Security threat Intelligence plugin has broadened beyond just MDTI to now encapsulate data from other TI sources, including Microsoft Threat Analytics (TA) and SONAR, with even more sources becoming available soon.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To reflect this evolution of the plugin, customers may notice a change in its name from "Microsoft Defender Threat Intelligence (MDTI) to "Microsoft Threat Intelligence," reflecting its broader scope and enhanced capabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Since launch in April, Copilot for Security customers have been able to access, operate on, and integrate the raw and finished threat intelligence from MDTI developed from trillions of daily security signals and the expertise of over 10 thousand multidisciplinary analysts through simple natural language prompts. Now, with the ability for Copilot for Security's powerful generative AI to reason over more threat intelligence, customers have a more holistic, contextualized view of the threat landscape and its impact on their organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-copilot-for-security-plugin-name-reflects-broader/ba-p/4258810" target="_blank" rel="noopener"&gt;New Copilot for Security Plugin Name Reflects Broader Capabilities&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 16:48:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-new-copilot-for-security-plugin-name-reflects-broader/m-p/4261114#M36</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-10-02T16:48:40Z</dc:date>
    </item>
    <item>
      <title>New Security Copilot Plugin Name Reflects Broader Capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-security-copilot-plugin-name-reflects-broader-capabilities/ba-p/4258810</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Security Copilot team is continuously enhancing threat intelligence (TI) capabilities in Security Copilot to provide a more comprehensive and integrated TI experience for customers. We're excited to share that the Security Copilot threat Intelligence plugin has broadened beyond just MDTI to now encapsulate data from other TI sources, including Microsoft Threat Analytics (TA) and &lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Microsoft file and URL intelligence,&lt;/SPAN&gt;&amp;nbsp;with even more sources becoming available soon.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To reflect this evolution of the plugin, customers may notice a change in its name from "Microsoft Defender Threat Intelligence (MDTI) to "Microsoft Threat Intelligence," reflecting its broader scope and enhanced capabilities.&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Since launch in April, Security Copilot customers have been able to access, operate on, and integrate the raw and finished threat intelligence from MDTI developed from trillions of daily security signals and the expertise of over 10 thousand multidisciplinary analysts through simple natural language prompts. Now, with the ability for Security Copilot's powerful generative AI to reason over more threat intelligence, customers have a more holistic, contextualized view of the threat landscape and its impact on their organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;New plugin name in Security Copilot reflects broader range of capabilities&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This broader range of information, delivered instantly and in-context, adds to the ability to enable different security personas to defend at machine speed and scale. For example, a customer may ask "Tell me more about the Threat actor Silk Typhoon" for the latest threat intelligence information from MDTI, including IoCs, data from mass collection and analysis, intelligence articles, Intel Profiles (vulnerabilities, threat actors, threat tooling], and guidance. Security Copilot now also shows customers the impact of threat to their organization and which assets may be vulnerable though threat analytics and reputation information from&amp;nbsp;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Microsoft file and URL (detonation) intelligence.&lt;/SPAN&gt; for indicators associated with incidents and other threat activity.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;In this example, impacted asset data from Threat Analytics is available alongside MDTI intelligence for complete context about a threat and its impact on the organization.&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;It's important to note that customers will only see threat intelligence associated with the products they are provisioned for. For example, a Security Copilot customer that isn't provisioned for Defender XDR will not see any threat intelligence from Threat Analytics.&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;Conclusion&amp;nbsp;&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft delivers leading threat intelligence built on visibility across the global threat landscape made possible protecting Azure and other large cloud environments, managing billions of endpoints and emails, and maintaining a continuously updated graph of the internet. By processing an astonishing 78 trillion security signals daily, Microsoft can deliver threat intelligence in Security Copilot providing an all-encompassing view of attack vectors across various platforms, ensuring customers have comprehensive threat detection and remediation. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;. To learn more about Security Copilot, visit the &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/bg-p/SecurityCopilotBlog" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Tech Community page here.&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn more about&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence" target="_self"&gt;Microsoft Security Copilot in Microsoft Defender Threat Intelligence here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Also, be sure to contact our &lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;sales&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; team to request a demo or a quote. Learn how you can begin using MDTI with the &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti-copilot-guide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;purchase of just one Security Copilot SCU here&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2025 19:42:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-security-copilot-plugin-name-reflects-broader-capabilities/ba-p/4258810</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2025-04-14T19:42:41Z</dc:date>
    </item>
    <item>
      <title>MDTI for Government Now Available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-for-government-now-available/ba-p/4258823</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;We are thrilled to introduce Microsoft Defender Threat Intelligence (MDTI) with FedRAMP High &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-dod-il2" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;(DOD IL2)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; attestation are now available for government sectors. Customers across U.S. state, local, and tribal governments utilizing GCC services can now purchase MDTI and the MDTI API SKUs to unmask adversaries and understand their organization’s security posture against threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;MDTI serves as the ultimate resource for Microsoft Threat Intelligence, empowering security teams to access, ingest, and act upon a comprehensive repository of operational, strategic, and tactical threat intelligence. With MDTI, organizations can swiftly assess their exposure to threats, including over 300 threat actors monitored by Microsoft, and determine the best course of action. Licensed per seat, MDTI grants access to a premium 'analyst workbench' in the Threat Intelligence tab of the Defender XDR portal. This workbench features extensive finished threat intelligence on actors, tools, and techniques, complemented by advanced internet data sets to help analysts delve deeper and identify threat infrastructures.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;For API access, customers must purchase an MDTI seat license. The API facilitates integration with other security tools, providing critical context around threat actors, vulnerabilities, and attack tools. When combined with Microsoft Sentinel, the API provides powerful context and enhances alert enrichment and triage capabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;img /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn more about MDTI by taking the MDTI Ninja Training here.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Conclusion&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft delivers leading threat intelligence built on visibility across the global threat landscape made possible protecting Azure and other large cloud environments, managing billions of endpoints and emails, and maintaining a continuously updated graph of the internet. By processing an astonishing 78 trillion security signals daily, Microsoft can deliver threat intelligence in MDTI providing an all-encompassing view of attack vectors across various platforms, ensuring Sentinel customers have comprehensive threat detection and remediation.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI&lt;/SPAN&gt; &lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2024 17:08:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-for-government-now-available/ba-p/4258823</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2024-09-30T17:08:06Z</dc:date>
    </item>
    <item>
      <title>Introducing the MDTI Home Page Widget and Article Digest</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-mdti-home-page-widget-and-article-digest/ba-p/4223917</link>
      <description>&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;
&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;&lt;SPAN&gt;The MDTI team is excited to announce the Threat Intelligence Widget in the Microsoft Defender home page and &lt;/SPAN&gt;the MDTI Article Digest,&lt;SPAN&gt; two handy new features that make Microsoft threat intelligence more accessible, digestible, and relevant. When customers login to the Unified SecOps platform, they will now see a&amp;nbsp;widget that&amp;nbsp;displays featured threat intelligence articles containing the most impactful content on the threat landscape. Via the digest, they can stay up to speed with a summary of the latest threat intelligence published since their last login. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;&lt;STRONG&gt;MDTI Article Digest&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-pm-slice="1 1 []" data-en-clipboard="true"&gt;The MDTI article digest is a brand new way for customers to stay up to speed with the latest analysis of threat activity observed across more than 78 trillion daily threat signals from Microsoft's interdisciplinary teams of experts worldwide. The digest, seamlessly integrated into the MDTI user interface in the threat intelligence blade of Defender XDR, shows users everything published since their last login:&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;will see that not only does the digest notify users of the latest content but also encourages exploration through a user-friendly sidebar that lists the articles:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;With the added convenience of pagination, users can now easily navigate through a wealth of information, ensuring they never miss valuable insights. The digest is also flexible, allowing users to clear notifications, thus tailoring the experience to their preferences.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The digest is a significant step forward in our commitment to delivering exceptional user experiences, and we're excited to see how it will positively impact the MDTI community. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;If you're a licensed MDTI user, login to Defender XDR today to see the digest located on the right-hand side of the UI, to the left of the TI Copilot embedded experience sidebar.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;MDTI Home Page Widget&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The MDTI Home Page Widget provides features the most impactful and relevant content recently publishes to MDTI surfaced alongside a summary of the most crucial information across your cybersecurity program. The articles surfaced serves as a 'front page' for the latest threat intelligence and news about the threat landscape, and serves as a great entry point for additional research.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Conclusion&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft delivers leading threat intelligence built on visibility across the global threat landscape made possible protecting Azure and other large cloud environments, managing billions of endpoints and emails, and maintaining a continuously updated graph of the internet. By processing an astonishing 78 trillion security signals daily, Microsoft can deliver threat intelligence in MDTI providing an all-encompassing view of attack vectors across various platforms, ensuring Sentinel customers have comprehensive threat detection and remediation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Also, be sure to contact our &lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;sales&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; team to request a demo or a quote. Learn how you can begin using MDTI with the &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti-copilot-guide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;purchase of just one Copilot for Security SCU here&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 20:49:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-mdti-home-page-widget-and-article-digest/ba-p/4223917</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2024-09-06T20:49:54Z</dc:date>
    </item>
    <item>
      <title>New Blog | Introducing the MDTI Premium Data Connector for Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-introducing-the-mdti-premium-data-connector-for/m-p/4222671#M35</link>
      <description>&lt;P&gt;&lt;SPAN&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank" rel="noopener"&gt;Michael Browning&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The MDTI and Unified Security Operations Platform teams are excited to introduce an MDTI data connector available in the Unified Security Operations Platform and standalone Sentinel experiences. The connector enables customers to apply the powerful raw and finished threat intelligence in MDTI, including high-fidelity indicators of compromise (IoCs), across their security operations to detect and respond to the latest threats.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft researchers, with the backing of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;interdisciplinary teams of thousands of experts spread across 77 countries,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;continually add new analysis of threat activity observed across more than 78 trillion threat signals to MDTI, including powerful indicators drawn directly from threat infrastructure. In Sentinel, this intelligence enables enhanced threat detection, enrichment of incidents for rapid triage, and the ability to launch investigations that proactively surface external threat infrastructure before it can be used in campaigns.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This blog will highlight the exciting use cases for the MDTI premium data connector, including enhanced enrichment, threat detection, and hunting to ensure customer organizations are protected against the most critical threats. It will also cover how you can easily get started with this out-of-the-box connector.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-mdti-premium-data-connector-for-sentinel/ba-p/4220346" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Introducing the MDTI Premium Data Connector for Sentinel&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 19 Aug 2024 16:25:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-introducing-the-mdti-premium-data-connector-for/m-p/4222671#M35</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-08-19T16:25:37Z</dc:date>
    </item>
    <item>
      <title>Introducing the MDTI Premium Data Connector for Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-mdti-premium-data-connector-for-sentinel/ba-p/4220346</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The MDTI and Unified Security Operations Platform teams are excited to introduce an MDTI data connector available in the Unified Security Operations Platform and standalone Sentinel experiences. The connector enables customers to apply the powerful raw and finished threat intelligence in MDTI, including high-fidelity indicators of compromise (IoCs), across their security operations to detect and respond to the latest threats.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft researchers, with the backing of &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;interdisciplinary teams of thousands of experts spread across 77 countries, &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;continually add new analysis of threat activity observed across more than 78 trillion threat signals to MDTI, including powerful indicators drawn directly from threat infrastructure. In Sentinel, this intelligence enables enhanced threat detection, enrichment of incidents for rapid triage, and the ability to launch investigations that proactively surface external threat infrastructure before it can be used in campaigns.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This blog will highlight the exciting use cases for the MDTI premium data connector, including enhanced enrichment, threat detection, and hunting to ensure customer organizations are protected against the most critical threats. It will also cover how you can easily get started with this out-of-the-box connector.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 data-pm-slice="1 1 []" data-en-clipboard="true"&gt;Getting started&lt;/H3&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The MDTI premium data connector provides more IoCs than the standard (free) MDTI data connector, including high-fidelity IoCs added by the Microsoft Threat Intelligence Center (MSTIC) and those tied to the over 300 threat actor groups Microsoft tracks. Combined, the free and premium data connectors give you full coverage of available threat intelligence. Please note that an MDTI premium license and API license are required to begin using the MDTI premium data connector.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;To get started with the free and premium data connectors, &lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/connect-mdti-data-connector" target="_blank" rel="noopener" rev="en_rl_none"&gt;follow the instructions here.&lt;/A&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H3&gt;Use Cases&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Dynamic Incident Enrichment &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The MDTI premium data connector can help analysts respond to threats at scale by automatically enriching incidents with MDTI premium threat intelligence, evaluating indicators in an incident with dynamic reputation data (everything Microsoft knows about a piece of online infrastructure) to mark its severity and automatically triage it accordingly. Comments are added to the incident outlining the reputation details with links to further information about associated threat actors, tools, and vulnerabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Threat Detection&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With a flip of the switch, the MDTI premium data connector immediately enables detections for threats, including activity from the more than 300 named threat actor groups tracked by Microsoft. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;When enabled in Microsoft Sentinel, this connector takes URLs, domains, and IPs from a customer environment via log data and checks them against a dynamic list of known bad IOCs from MDTI. When a match occurs, an incident is automatically created, and the data is written to the Microsoft Sentinel TI tab. By enabling this rule, Microsoft Sentinel users know they have detections in place for threats known to Microsoft.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;External Threat Hunting&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Customers can pivot off the IoCs to investigate further and boost their understanding of the threat with MDTI's repository of raw and finished intelligence. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Finished intelligence, or written intelligence and analysis, includes articles, activity snapshots, and &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-intel-profiles-deliver-crucial-information-context/ba-p/3780076?search-action-id=786597998604&amp;amp;search-result-uid=3780076" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Intel Profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; about actors tooling and vulnerabilities. It provides crucial context and vital information such as targeting information, TTPs (tactics, techniques, and procedures), and additional IoCs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Customers can also explore a&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;dvanced internet data sets created by amass collection network that &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/infrastructure-chaining-with-microsoft-defender-threat/ba-p/3687956" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;maps threat infrastructure&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; across the internet every day to locate relationships between entities on the web to malicious infrastructure, tooling, and backdoors outside the network at incredible scale.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Below is an example of how to effectively detect and hunt for Indicators of Compromise (IoCs) associated with threat actors using Sentinel with MDTI connector enabled.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Begin by following these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI data-leveltext="%1." data-font="Aptos" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Filter IoCs by MDTI Source - Set the source filter to "Premium Microsoft Defender Threat Intelligence" within Sentinel TI tab&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="%1." data-font="Aptos" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;By using tags, you can filter IoCs by specific threat actors, for example, `ActivityGroup:AQUA BLIZZARD`&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Leverage the enriched data from the MDTI feed in your Log Analytics workspace using KQL queries to hunt and create custom analytic rules.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To create an analytics rule, fill out the fields under the 'general tab' as shown below:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For the sake of this demo, our detection rule is very simple. However, you can enhance it with your own detection logic:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers can extend their investigation even further and gather more intelligence on the threat actor by using the Unified Security Operations platform premium MDTI experience. Simply take an indicator value and perform a search in the global search feature:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Clicking into an Intel Profile for Aqua Blizzard provides the full corpus of intelligence, data, and analysis related to the threat actor, including TTPs and IoCS, continuously updated by Microsoft threat researchers:&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Conclusion&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft delivers leading threat intelligence built on visibility across the global threat landscape made possible protecting Azure and other large cloud environments, managing billions of endpoints and emails, and maintaining a continuously updated graph of the internet. By processing an astonishing 78 trillion security signals daily, Microsoft can deliver threat intelligence in MDTI providing an all-encompassing view of attack vectors across various platforms, ensuring Sentinel customers have comprehensive threat detection and remediation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Also, be sure to contact our &lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;sales&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; team to request a demo or a quote. Learn how you can begin using MDTI with the &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti-copilot-guide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;purchase of just one Copilot for Security SCU here&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 22:04:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-mdti-premium-data-connector-for-sentinel/ba-p/4220346</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2024-09-24T22:04:50Z</dc:date>
    </item>
    <item>
      <title>Incorrect Detected as Malware</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/incorrect-detected-as-malware/m-p/4203635#M34</link>
      <description>&lt;P&gt;Dear team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our apps have been detected incorrectly as malware and we've submitted for screening somehow still flagged as malware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We tried to appeal and looking for someone to help us how can we remove this flag from defender.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 07:36:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/incorrect-detected-as-malware/m-p/4203635#M34</guid>
      <dc:creator>anguslii</dc:creator>
      <dc:date>2024-07-29T07:36:09Z</dc:date>
    </item>
    <item>
      <title>New Blog | More Threat Intelligence Content in MDTI, TA Enables Better Security Outcomes</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-more-threat-intelligence-content-in-mdti-ta-enables/m-p/4178851#M33</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank" rel="noopener"&gt;Michael Browning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft threat intelligence empowers our customers to keep up with the global threat landscape and understand the threats and vulnerabilities most relevant to their organization. We are excited to announce that we have recently accelerated the speed and scale at which we publish threat intelligence, giving our customers more critical security insights, data, and guidance than ever before.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog will show how our 10,000 interdisciplinary experts and applied scientists reason over more than 78 trillion daily threat signals to continuously add to our understanding of threat actors and activity. It will also show how this increased publishing cadence in Microsoft Defender Threat Intelligence (MDTI), Threat Analytics, and Copilot for Security helps enrich and contextualize hundreds of thousands of security alerts while enhancing customers' overall cybersecurity programs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 id="toc-hId--544228585"&gt;Increased Intel Profiles&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has published 270 new&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIIntelProfiles" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;Intel profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;over the past year to help customers maintain situational awareness&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;around the threat activity, techniques, vulnerabilities, and the more than 300 named actors Microsoft tracks. These digital compendiums of intelligence help organizations stay informed about potential threats, including Indicators of Compromise (IOCs), historical data, mitigation strategies, and advanced hunting queries&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Intel profiles are continuously maintained and updated by Microsoft's threat intelligence team, which&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;added 24 new Intel profiles in May alone, including 10 Activity Profiles, 4 Actor Profiles, 5 Technique Profiles, and 5&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/enhanced-vuln-profiles" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;Vulnerability Profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Intel profiles are published to both MDTI and Threat Analytics, which can be found&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;under the "Threat Intelligence" blade in the left-hand navigation menu in the Defender XDR Portal. In Threat Analytics, customers can understand how the content in Intel profiles relates to devices and vulnerabilities in their environment. In MDTI, Intel Profiles enhance security analyst triage, incident response, threat hunting, and vulnerability management workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In Copilot for Security,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;customers can quickly retrieve information from intel profiles to contextualize artifacts and correlate MDTI and Threat Analytics content and data with other security information from Defender XDR, such as incidents and hunting activities, to help customers assess their vulnerabilities and quickly understand the broader scope of an attack. For example, Copilot can reason over vulnerability intelligence in MDTI and Threat Analytics to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;deliver a customized, prioritized list based on a customer organization’s unique security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/more-threat-intelligence-content-in-mdti-ta-enables-better/ba-p/4177542" target="_blank" rel="noopener"&gt;More Threat Intelligence Content in MDTI, TA Enables Better Security Outcomes&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 21:26:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-more-threat-intelligence-content-in-mdti-ta-enables/m-p/4178851#M33</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-06-28T21:26:32Z</dc:date>
    </item>
    <item>
      <title>More Threat Intelligence Content In MDTI, TA Enables Better Security Outcomes</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/more-threat-intelligence-content-in-mdti-ta-enables-better/ba-p/4177542</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft threat intelligence empowers our customers to keep up with the global threat landscape and understand the threats and vulnerabilities most relevant to their organization. We are excited to announce that we have recently accelerated the speed and scale at which we publish threat intelligence, giving our customers more critical security insights, data, and guidance than ever before.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog will show how our 10,000 interdisciplinary experts and applied scientists reason over more than 78 trillion daily threat signals to continuously add to our understanding of threat actors and activity. It will also show how this increased publishing cadence in Microsoft Defender Threat Intelligence (MDTI), Threat Analytics, and Copilot for Security helps enrich and contextualize hundreds of thousands of security alerts while enhancing customers' overall cybersecurity programs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Increased Intel Profiles&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has published 270 new &lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIIntelProfiles" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Intel profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; over the past year to help customers maintain situational awareness &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;around the threat activity, techniques, vulnerabilities, and the more than 300 named actors Microsoft tracks. These digital compendiums of intelligence help organizations stay informed about potential threats, including Indicators of Compromise (IOCs), historical data, mitigation strategies, and advanced hunting queries&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; Intel profiles are continuously maintained and updated by Microsoft's threat intelligence team, which &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;added 24 new Intel profiles in May alone, including 10 Activity Profiles, 4 Actor Profiles, 5 Technique Profiles, and 5 &lt;/SPAN&gt;&lt;A href="https://aka.ms/enhanced-vuln-profiles" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Vulnerability Profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Intel profiles are published to both MDTI and Threat Analytics, which can be found &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;under the "Threat Intelligence" blade in the left-hand navigation menu in the Defender XDR Portal. In Threat Analytics, customers can understand how the content in Intel profiles relates to devices and vulnerabilities in their environment. In MDTI, Intel Profiles enhance security analyst triage, incident response, threat hunting, and vulnerability management workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In Copilot for Security, &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;customers can quickly retrieve information from intel profiles to contextualize artifacts and correlate MDTI and Threat Analytics content and data with other security information from Defender XDR, such as incidents and hunting activities, to help customers assess their vulnerabilities and quickly understand the broader scope of an attack. For example, Copilot can reason over vulnerability intelligence in MDTI and Threat Analytics to &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;deliver a customized, prioritized list based on a customer organization’s unique security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Enhanced OSINT&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has also added to the breadth of intelligence we make available to customers, improving the quantity and depth of open-source intelligence (OSINT). Microsoft's threat intelligence teams have begun adding 500% more OSINT to MDTI since mid-March to capture more insights for our customers to apply to their security programs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Because OSINT involves collecting and analyzing information from publicly available sources, such as the internet, public records, and media, Microsoft's teams have begun enriching OSINT profiles with proprietary IOCs, recommendations, detections, and analysis to give customers even more situational awareness and actionable insights around threat activity analyzed across the industry. In May alone, our threat intelligence teams published and enriched more than 50 OSINT articles in MDTI.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These OSINT articles are cross-linked to other threat intelligence in MDTI to enable analysts to understand how threat activity is connected. In Copilot, customers can &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;quickly retrieve information on indicators related to this OSINT, including IP addresses and domains, and contextualize artifacts with content such as threat articles and intel profiles.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Microsoft Defender XDR Threat Analytics&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft's teams build detections based on content from MDTI and Threat Analytics to help customers detect, understand, and address related activities. In the Threat Analytics portal, Microsoft's threat intelligence teams provide security recommendations, which can be tracked by customers within the product. The portal also shows affected endpoints using Microsoft Defender for Vulnerability Management data and lists any impacted devices associated with the alerts. In May, Threat Analytics generated 235,000 alerts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Threat Intelligence published in Threat Analytics is crucial for giving customers context on daily alerts. For instance, a recent Technique Profile for PowerShell led to over 1.3 million alerts across Microsoft security products.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;New to MDTI? Here’s where to start&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you are interested in learning more about MDTI and how it can help you unmask and neutralize modern adversaries and cyberthreats such as ransomware, and to explore the features and benefits of MDTI &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;please visit the MDTI product web page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Also, be sure to contact our &lt;/SPAN&gt;&lt;A href="https://info.microsoft.com/ww-landing-security-generic-contact-me.html?culture=en-us&amp;amp;country=us" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;sales&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; team to request a demo or a quote. Learn how you can begin using MDTI with the &lt;/SPAN&gt;&lt;A href="https://aka.ms/mdti-copilot-guide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;purchase of just one Copilot for Security SCU here&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 21:58:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/more-threat-intelligence-content-in-mdti-ta-enables-better/ba-p/4177542</guid>
      <dc:creator>Mike_Browning</dc:creator>
      <dc:date>2024-07-01T21:58:01Z</dc:date>
    </item>
  </channel>
</rss>

