<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender Threat Intelligence topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/bd-p/MicrosoftDefenderThreatIntelligence</link>
    <description>Microsoft Defender Threat Intelligence topics</description>
    <pubDate>Wed, 13 May 2026 15:02:05 GMT</pubDate>
    <dc:creator>MicrosoftDefenderThreatIntelligence</dc:creator>
    <dc:date>2026-05-13T15:02:05Z</dc:date>
    <item>
      <title>My companies app incorrectly detected as a trojan</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/my-companies-app-incorrectly-detected-as-a-trojan/m-p/4462429#M55</link>
      <description>&lt;P&gt;Hi Team.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am the developer of a gaming geo fence and your system had falsely detected my app as&amp;nbsp; Trojan:Script/Wacatac.C!ml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help to remove it as it seems like analysts are no longer checking false detections anymore? ( at least to me it seems automatic now )?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My app is a geo fence which creates firewall rules and use npcaap for packet capture to display server locations and the exe is encrypted to help fight against software pirates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an example submission of my exe for my application&amp;nbsp;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/wdsi/submission/5ab00c91-ea84-4fbb-a739-613316b32dfe" target="_blank"&gt;https://www.microsoft.com/en-us/wdsi/submission/5ab00c91-ea84-4fbb-a739-613316b32dfe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please get an analyst to manually inspect the file and whitelist it as its a pain telling my customers to turn off their anti virus and also its not advice i should have to give to be honest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My company is called sbmmoff ltd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A class="lia-external-url" href="https://papagal.bg/eik/207176266/58b9" target="_blank"&gt;https://papagal.bg/eik/207176266/58b9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Website is bflocker.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really would appreciate a speedy response to resolve the situation and thank you for your time.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Oct 2025 00:46:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/my-companies-app-incorrectly-detected-as-a-trojan/m-p/4462429#M55</guid>
      <dc:creator>bffan44</dc:creator>
      <dc:date>2025-10-18T00:46:56Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender doesn't, Spy hunter shows a Hijacker</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/microsoft-defender-doesn-t-spy-hunter-shows-a-hijacker/m-p/4455233#M53</link>
      <description>&lt;P&gt;Spy Hunter indicates a "Elex Hijacker" and three other problems were as Defender and McAfee do not show any problem.&lt;/P&gt;&lt;P&gt;Is Spy Hunter legitimate?&lt;/P&gt;&lt;P&gt;I did have a Search engine redirect problem that has a name "ext.ladispatcher.com" and "search-load.com" while using Chrome browser with Chrome search engine. But no problem with Microsoft Edge and Bing.&lt;/P&gt;&lt;P&gt;My monitor screen occasionally momentary collapses and reverts back to normal in a split second. Could there be a connection to malware.?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if i am posting on the wrong site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 19:46:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/microsoft-defender-doesn-t-spy-hunter-shows-a-hijacker/m-p/4455233#M53</guid>
      <dc:creator>JKFISH</dc:creator>
      <dc:date>2025-09-18T19:46:42Z</dc:date>
    </item>
    <item>
      <title>Need information on generating sample events for Threat Intelligence</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4450928#M48</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;I am working on exploring&amp;nbsp;&lt;STRONG&gt;MS Threat Intelligence&lt;/STRONG&gt;&amp;nbsp;and its features. But I am not able to generate sample data for this product, nor able to view the Threat Intelligence logs using Microsoft Management API following the schema -&amp;nbsp;https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#auditlogrecordtype&lt;/P&gt;&lt;P&gt;I tried sending some mails from external email account to my organisation's test user containing EICAR files, and also tried with some safe but malicious test URLs. But still unable to get data inside Threat Intelligence.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please help me here for generating events and viewing the content using Management APIs?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 13:35:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4450928#M48</guid>
      <dc:creator>aslin</dc:creator>
      <dc:date>2025-09-04T13:35:29Z</dc:date>
    </item>
    <item>
      <title>Need information on generating sample events for Threat Intelligence</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4448904#M46</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;I am working on exploring &lt;STRONG&gt;MS Threat Intelligence&lt;/STRONG&gt; and its features. But I am not able to generate sample data for this product, nor able to view the Threat Intelligence logs using Microsoft Management API following the schema -&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#auditlogrecordtype" target="_blank"&gt;https://learn.microsoft.com/en-us/office/office-365-management-api/office-365-management-activity-api-schema#auditlogrecordtype&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I tried sending some mails from external email account to my organisation's test user containing EICAR files, and also tried with some safe but malicious test URLs. But still unable to get data inside Threat Intelligence.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please help me here for generating events and viewing the content using Management APIs?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 04:04:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/need-information-on-generating-sample-events-for-threat/m-p/4448904#M46</guid>
      <dc:creator>swaradajalukar</dc:creator>
      <dc:date>2025-08-28T04:04:42Z</dc:date>
    </item>
    <item>
      <title>Disable Defender TI access to end user</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/disable-defender-ti-access-to-end-user/m-p/4417993#M41</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;When our users access Defender quarantine (or access Defender Admin Center directly), they also get access to Microsoft Defender Threat Intelligence.&lt;BR /&gt;&lt;BR /&gt;Is it possible to disable it and allow access only to the Quarantine?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dario Woitasen&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 16:44:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/disable-defender-ti-access-to-end-user/m-p/4417993#M41</guid>
      <dc:creator>DarioMWS</dc:creator>
      <dc:date>2025-05-27T16:44:08Z</dc:date>
    </item>
    <item>
      <title>Can the Microsoft Defender portal show the server details as per security group?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/can-the-microsoft-defender-portal-show-the-server-details-as-per/m-p/4412713#M40</link>
      <description>&lt;P&gt;I'm using Microsoft Defender to monitor the servers.&lt;/P&gt;&lt;P&gt;I have multiple groups of people working from various other vendors. I would like create multiple security groups and add people based on their company and configure the defender such a manner that only people from Company "A" can see their own servers and people working from Campany "B" can see their respective servers. Also, I as admin can see both "A's" and "B's" servers.&lt;/P&gt;&lt;P&gt;Can this be achieved using Microsoft Defender? If yes, how to achieve this? Any step-by-step approach would help. Or if there are any other ways, please suggest. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 04:38:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/can-the-microsoft-defender-portal-show-the-server-details-as-per/m-p/4412713#M40</guid>
      <dc:creator>jr-rout</dc:creator>
      <dc:date>2025-05-12T04:38:25Z</dc:date>
    </item>
    <item>
      <title>New Blog | New Copilot for Security Plugin Name Reflects Broader Capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-new-copilot-for-security-plugin-name-reflects-broader/m-p/4261114#M36</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank"&gt;Michael Browning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Copilot for Security team is continuously enhancing threat intelligence (TI) capabilities in Copilot for Security to provide a more comprehensive and integrated TI experience for customers. We're excited to share that the Copilot for Security threat Intelligence plugin has broadened beyond just MDTI to now encapsulate data from other TI sources, including Microsoft Threat Analytics (TA) and SONAR, with even more sources becoming available soon.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To reflect this evolution of the plugin, customers may notice a change in its name from "Microsoft Defender Threat Intelligence (MDTI) to "Microsoft Threat Intelligence," reflecting its broader scope and enhanced capabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Since launch in April, Copilot for Security customers have been able to access, operate on, and integrate the raw and finished threat intelligence from MDTI developed from trillions of daily security signals and the expertise of over 10 thousand multidisciplinary analysts through simple natural language prompts. Now, with the ability for Copilot for Security's powerful generative AI to reason over more threat intelligence, customers have a more holistic, contextualized view of the threat landscape and its impact on their organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-copilot-for-security-plugin-name-reflects-broader/ba-p/4258810" target="_blank" rel="noopener"&gt;New Copilot for Security Plugin Name Reflects Broader Capabilities&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 16:48:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-new-copilot-for-security-plugin-name-reflects-broader/m-p/4261114#M36</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-10-02T16:48:40Z</dc:date>
    </item>
    <item>
      <title>New Blog | Introducing the MDTI Premium Data Connector for Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-introducing-the-mdti-premium-data-connector-for/m-p/4222671#M35</link>
      <description>&lt;P&gt;&lt;SPAN&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank" rel="noopener"&gt;Michael Browning&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The MDTI and Unified Security Operations Platform teams are excited to introduce an MDTI data connector available in the Unified Security Operations Platform and standalone Sentinel experiences. The connector enables customers to apply the powerful raw and finished threat intelligence in MDTI, including high-fidelity indicators of compromise (IoCs), across their security operations to detect and respond to the latest threats.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft researchers, with the backing of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;interdisciplinary teams of thousands of experts spread across 77 countries,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;continually add new analysis of threat activity observed across more than 78 trillion threat signals to MDTI, including powerful indicators drawn directly from threat infrastructure. In Sentinel, this intelligence enables enhanced threat detection, enrichment of incidents for rapid triage, and the ability to launch investigations that proactively surface external threat infrastructure before it can be used in campaigns.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;This blog will highlight the exciting use cases for the MDTI premium data connector, including enhanced enrichment, threat detection, and hunting to ensure customer organizations are protected against the most critical threats. It will also cover how you can easily get started with this out-of-the-box connector.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-the-mdti-premium-data-connector-for-sentinel/ba-p/4220346" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Introducing the MDTI Premium Data Connector for Sentinel&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 19 Aug 2024 16:25:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-introducing-the-mdti-premium-data-connector-for/m-p/4222671#M35</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-08-19T16:25:37Z</dc:date>
    </item>
    <item>
      <title>Incorrect Detected as Malware</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/incorrect-detected-as-malware/m-p/4203635#M34</link>
      <description>&lt;P&gt;Dear team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our apps have been detected incorrectly as malware and we've submitted for screening somehow still flagged as malware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We tried to appeal and looking for someone to help us how can we remove this flag from defender.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 07:36:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/incorrect-detected-as-malware/m-p/4203635#M34</guid>
      <dc:creator>anguslii</dc:creator>
      <dc:date>2024-07-29T07:36:09Z</dc:date>
    </item>
    <item>
      <title>New Blog | More Threat Intelligence Content in MDTI, TA Enables Better Security Outcomes</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-more-threat-intelligence-content-in-mdti-ta-enables/m-p/4178851#M33</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank" rel="noopener"&gt;Michael Browning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft threat intelligence empowers our customers to keep up with the global threat landscape and understand the threats and vulnerabilities most relevant to their organization. We are excited to announce that we have recently accelerated the speed and scale at which we publish threat intelligence, giving our customers more critical security insights, data, and guidance than ever before.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog will show how our 10,000 interdisciplinary experts and applied scientists reason over more than 78 trillion daily threat signals to continuously add to our understanding of threat actors and activity. It will also show how this increased publishing cadence in Microsoft Defender Threat Intelligence (MDTI), Threat Analytics, and Copilot for Security helps enrich and contextualize hundreds of thousands of security alerts while enhancing customers' overall cybersecurity programs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 id="toc-hId--544228585"&gt;Increased Intel Profiles&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has published 270 new&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIIntelProfiles" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;Intel profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;over the past year to help customers maintain situational awareness&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;around the threat activity, techniques, vulnerabilities, and the more than 300 named actors Microsoft tracks. These digital compendiums of intelligence help organizations stay informed about potential threats, including Indicators of Compromise (IOCs), historical data, mitigation strategies, and advanced hunting queries&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Intel profiles are continuously maintained and updated by Microsoft's threat intelligence team, which&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;added 24 new Intel profiles in May alone, including 10 Activity Profiles, 4 Actor Profiles, 5 Technique Profiles, and 5&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/enhanced-vuln-profiles" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;Vulnerability Profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Intel profiles are published to both MDTI and Threat Analytics, which can be found&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;under the "Threat Intelligence" blade in the left-hand navigation menu in the Defender XDR Portal. In Threat Analytics, customers can understand how the content in Intel profiles relates to devices and vulnerabilities in their environment. In MDTI, Intel Profiles enhance security analyst triage, incident response, threat hunting, and vulnerability management workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In Copilot for Security,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;customers can quickly retrieve information from intel profiles to contextualize artifacts and correlate MDTI and Threat Analytics content and data with other security information from Defender XDR, such as incidents and hunting activities, to help customers assess their vulnerabilities and quickly understand the broader scope of an attack. For example, Copilot can reason over vulnerability intelligence in MDTI and Threat Analytics to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;deliver a customized, prioritized list based on a customer organization’s unique security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/more-threat-intelligence-content-in-mdti-ta-enables-better/ba-p/4177542" target="_blank" rel="noopener"&gt;More Threat Intelligence Content in MDTI, TA Enables Better Security Outcomes&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 21:26:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-more-threat-intelligence-content-in-mdti-ta-enables/m-p/4178851#M33</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-06-28T21:26:32Z</dc:date>
    </item>
    <item>
      <title>New Blog | Copilot for Security TI Embedded Experience in Defender XDR is now GA</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-copilot-for-security-ti-embedded-experience-in-defender/m-p/4176046#M32</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank"&gt;Michael Browning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;he Microsoft Defender Threat Intelligence (MDTI) and Defender XDR teams are pleased to announce that the Copilot for Security threat intelligence embedded experience in the Defender XDR portal is now generally available. As of today, Defender XDR customers will see a handy AI-powered sidecar in the Threat Analytics, intel profiles, intel explorer, and intel projects tabs in the threat intelligence blade (in brackets below), which returns, contextualizes, and summarizes intelligence from across MDTI and Threat Analytics about threat actors, threat tooling, and indicators of compromise (IoCs) related to their vulnerabilities and security incidents.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;SPAN class="lia-inline-image-caption"&gt;The embedded experience on the right hand side of the Defender XDR portal has an open prompt bar as well as a guided experience with three pre-populated prompts.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/copilot-for-security-ti-embedded-experience-in-defender-xdr-is/ba-p/4114858" target="_blank" rel="noopener"&gt;Copilot for Security TI Embedded Experience in Defender XDR is now GA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 23:50:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-copilot-for-security-ti-embedded-experience-in-defender/m-p/4176046#M32</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-06-25T23:50:55Z</dc:date>
    </item>
    <item>
      <title>Massive reduction in Threat Intelligence IP data since Monday 10th June</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/massive-reduction-in-threat-intelligence-ip-data-since-monday/m-p/4166033#M31</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone else see a massive reduction in Threat Intelligence IP data since Monday 10th June into Sentinel platforms? I operate two Sentinel environments and they both seen the same change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The screenshot below is the past 30 days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;The past 48 hours still reports some IP information being sent but at a very reduced rate.&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;What's changed with the feed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 09:51:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/massive-reduction-in-threat-intelligence-ip-data-since-monday/m-p/4166033#M31</guid>
      <dc:creator>MikeP751860</dc:creator>
      <dc:date>2024-06-12T09:51:36Z</dc:date>
    </item>
    <item>
      <title>New Blog | MDTI Achieves PCI DSS Certification: Elevating Security Standards</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-mdti-achieves-pci-dss-certification-elevating-security/m-p/4127830#M30</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1248534" target="_blank"&gt;Ash Luitel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are excited to announce that MDTI has successfully obtained the Payment Card Industry Data Security Standard (&lt;/SPAN&gt;&lt;A href="https://www.pcisecuritystandards.org/" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;PCI DSS&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;) certification, representing a significant milestone in our continuous pursuit of security excellence. This accomplishment follows closely after our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/iso-certification" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;ISO certification&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, highlighting our unwavering commitment to upholding the highest standards of data protection and our dedication to safeguarding information and proactively combating fraud.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This certification not only strengthens our security measures but also reaffirms the trust our customers have in us to handle their most sensitive data with the utmost care and diligence.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 id="toc-hId--548875858"&gt;Why the PCI DSS certification matters&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;PCI DSS is a renowned global standard for securing credit card data and preventing fraud. For organizations that handle sensitive payment information, compliance with PCI DSS is not just a requirement - it's a cornerstone of our promise to safeguard customer data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-achieves-pci-dss-certification-elevating-security-standards/ba-p/4126581" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;MDTI Achieves PCI DSS Certification: Elevating Security Standards&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 30 Apr 2024 21:57:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-mdti-achieves-pci-dss-certification-elevating-security/m-p/4127830#M30</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-04-30T21:57:35Z</dc:date>
    </item>
    <item>
      <title>New Blog | A Copilot for Security Customer’s Guide to MDTI</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-a-copilot-for-security-customer-s-guide-to-mdti/m-p/4104612#M29</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1322330" target="_blank" rel="noopener"&gt;Michael Browning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With just one Security Compute Unit (SCU), Copilot for Security customers have unlimited access to the powerful operational, tactical, and strategic threat intelligence in Microsoft Defender Threat Intelligence (MDTI), a $50k per seat value, at no extra cost. This compendium of high-fidelity intelligence developed by Microsoft's team of more than 10,000 multidisciplinary security experts and informed by over 78 trillion security signals enables teams to unmask and neutralize adversaries quickly and efficiently.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this blog, we will review what MDTI is, what you get as a Copilot for Security customer, and how you can immediately tap into this powerful intelligence.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId--550815304"&gt;What is MDTI?&amp;nbsp;&amp;nbsp;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;MDTI is a threat intelligence product that enables security professionals to directly access, ingest, and act upon trillions of daily security signals in Microsoft's telemetry. MDTI's finished intelligence, including threat articles and&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/MDTIIntelProfiles" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN data-contrast="none"&gt;intel profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, provides the latest on cyber threat actors and their tools, tactics, and procedures. Its unique security data sets enable advanced investigations that uncover malicious&amp;nbsp;&lt;A href="https://aka.ms/MDTIWhatsInAWebCrawl" target="_self" rel="noopener noreferrer"&gt;infrastructure connections&lt;/A&gt;&amp;nbsp;across the global cyberthreat landscape to highlight where an organization is vulnerable and address the tools and systems used in cyberattacks.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;MDTI is a powerful complement to Microsoft's SIEM, XDR, and AI solutions. Copilot for Security customers can use the incredible depth and breadth of Microsoft threat intelligence in MDTI with Generative AI to quickly understand the full scope of attacks, anticipate the next steps of an ongoing campaign, and drive an optimal security plan for their organizations. They can immediately begin using MDTI in the Copilot for Security standalone experience or embedded experience in Defender XDR. They can also use MDTI directly via the MDTI' analyst workbench' experience in the Threat Intelligence blade in Defender XDR.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;SPAN class="lia-inline-image-caption"&gt;Copilot for Security customers can tap into MDTI’s powerful threat intelligence in a variety of ways&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/a-copilot-for-security-customer-s-guide-to-mdti/ba-p/4103238" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;A Copilot for Security Customer’s Guide to MDTI&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 03 Apr 2024 16:13:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-a-copilot-for-security-customer-s-guide-to-mdti/m-p/4104612#M29</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-04-03T16:13:39Z</dc:date>
    </item>
    <item>
      <title>New Blog | New at Secure: Enhanced Vulnerability Profiles and CVE Search within MDTI</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-new-at-secure-enhanced-vulnerability-profiles-and-cve/m-p/4086853#M27</link>
      <description>&lt;P&gt;The Microsoft Defender Threat Intelligence (MDTI) team revamped vulnerability profiles to improve customers’ ability to access world-class intelligence on vulnerabilities and exposures within the Defender XDR portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These exciting updates include:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A new layout that mirrors the design of our Threat Actor and Tool intel profiles for a more consistent experience&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Vulnerability profiles sorted by published date by default in list view to display a steady feed of new, high importance CVEs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;The decoupling of Vulnerability Profiles from open-source Common Vulnerabilities and Exposures (CVEs) so customers can access all available information on vulnerabilities&lt;/LI&gt;
&lt;LI&gt;An enhanced CVE search experience: searches will return all content related to a vulnerability instead of directing a user to a CVE information page.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These enhancements will provide a more intuitive experience for surfacing content related to CVEs, offering critical context on threats and information within alerts and incidents.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId--572057185"&gt;What are Vulnerability Profiles?&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Vulnerability Profiles are MDTI’s newest intel profile type,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-at-microsoft-ignite-2023/ba-p/3980487" target="_self"&gt;launched at Microsoft Ignite in November&lt;/A&gt;. Building off our work to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-intel-profiles-deliver-crucial-information-context/ba-p/3780076" target="_blank" rel="noopener"&gt;introduce intel profiles to MDTI&lt;/A&gt;, which has become the definitive source of Microsoft’s shareable knowledge on over 200 threat actors and 70 tools, MDTI now also contains over 75 extensive profiles of the CVEs deemed most critical and relevant by our dedicated security researchers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Amid the many vulnerabilities teams must keep track of — old and new, with varying degrees of prominence and impact as threat actors adjust their techniques, tactics, and procedures (TTPs) — Vulnerability Profiles tilt the advantage back in favor of defenders by delivering focused, actionable insights and recommendations on how to protect against the most critical CVEs, based on information garnered from Microsoft’s 65 trillion threat signals per day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By routinely visiting the “Vulnerabilities” tab on the Intel Profiles page in Defender XDR, customers will see a steady stream of new profiles, sorted by published date, indicating CVEs that are considered pressing by Microsoft’s security researchers. This enables CISOs, Vulnerability Managers, SOC Analysts and Cyber Threat Intelligence Analysts alike to remain informed on these CVEs to prioritize detections and implement patching on endpoints and other recommendations in their environment for the vulnerabilities which are most relevant to their organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Vulnerability Profiles are accessible from the “Intel profiles” page within the “Threat intelligence” blade in the left navigation. See these profiles by clicking on the “Vulnerabilities” tab:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;SPAN class="lia-inline-image-caption"&gt;Vulnerability Profiles are accessible from the “Vulnerabilities” tab on the Intel Profiles page, which is contained under the threat intelligence blade in the left navigation.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the Vulnerability Profiles list view, the “Profile” column displays the CVE number, title, and summary of the profile, whereas the right-most column displays the published date, indicating how recently Microsoft wrote about the vulnerability. Under the “Intelligence” column in the Vulnerability Profiles list view, customers will see priority and CVSS scores as well as indications of active exploitation (“Active exploitation observed”), dark web chatter (“Chatter Observed”), and available public proof of concept exploits (“POC Available”, "1 Published POC") for these vulnerabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Vulnerability Profiles are decorated with proprietary information from Microsoft’s own research and telemetry that can only be found in our intel profiles. This includes original research such as observations of active exploitation in the wild; detailed analysis of the methods used to exploit these CVEs by malicious actors; detections and Advanced Hunting queries that will indicate or alert on related activity in an organization’s network; and recommendations to protect against the threat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-at-secure-enhanced-vulnerability-profiles-and-cve-search/ba-p/4083159" target="_self"&gt;New at Secure: Enhanced Vulnerability Profiles and CVE Search within MDTI - Microsoft Tech Community&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 18:09:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-new-at-secure-enhanced-vulnerability-profiles-and-cve/m-p/4086853#M27</guid>
      <dc:creator>TonyOPS</dc:creator>
      <dc:date>2024-03-15T18:09:03Z</dc:date>
    </item>
    <item>
      <title>New Blog Post | New at Secure: MDTI in Defender XDR Global Search</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-post-new-at-secure-mdti-in-defender-xdr-global-search/m-p/4086845#M26</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;On the heels of introducing Microsoft Defender Threat Intelligence (MDTI)&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-at-microsoft-secure/ba-p/3773576" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;premium&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/introducing-mdti-free-experience-for-microsoft-defender-xdr/ba-p/3976635" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;standard&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;editions into the Microsoft Defender XDR portal, we are thrilled to introduce an even greater integrated threat intelligence experience by making results for MDTI content available within Defender XDR’s global search bar.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users will notice that they can now use the top-level Defender XDR search to discover results from MDTI on indicators of compromise (IOCs), common vulnerabilities and exposures (CVEs), articles, threat actors and more. From anywhere in the portal, customers now can readily find MDTI raw intelligence including IPs, domains, hashes, and URLs as well as finished intelligence in the form of articles, intel profiles, and CVEs alongside their other content from Defender XDR when conducting searches, helping to accelerate investigations with critical threat intelligence context.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Results from MDTI and Threat Analytics will appear within the “Intel Explorer” list in the results page:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;SPAN class="lia-inline-image-caption"&gt;MDTI results are now available under the “Intel Explorer” tab when searching via Defender XDR’s global search bar. You may search and see results for indicators such as IP addresses or file hashes, intel profiles, CVEs, threat articles and more.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-at-secure-mdti-in-defender-xdr-global-search/ba-p/4083158" target="_self"&gt;New at Secure: MDTI in Defender XDR Global Search - Microsoft Tech Community&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 18:03:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-post-new-at-secure-mdti-in-defender-xdr-global-search/m-p/4086845#M26</guid>
      <dc:creator>TonyOPS</dc:creator>
      <dc:date>2024-03-15T18:03:02Z</dc:date>
    </item>
    <item>
      <title>New Blog Post | What's New at Microsoft Secure 2024</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-post-what-s-new-at-microsoft-secure-2024/m-p/4086839#M25</link>
      <description>&lt;P&gt;&lt;SPAN&gt;At Microsoft Secure, we are excited to announce several new innovations from the Microsoft Defender Threat Intelligence (MDTI) team. These updates enable our customers to access valuable, high-fidelity threat intelligence where, when, and how they need it:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;To optimize MDTI content for customers, we have enhanced the look and feel of vulnerability profiles and are releasing the full corpus of Microsoft’s intel profiles to the MDTI standard version.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;We are keeping pace with Copilot for Security as it evolves, launching a new side card experience in the threat intelligence blade of Defender XDR. We have also introduced new MDTI skills and promptbooks for Copilot that deliver more of Microsoft's world-class threat intelligence to the SOC at machine speed.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Finally, as we continue to build a more comprehensive threat intelligence experience across Microsoft Defender XDR, we’re proud to announce that MDTI content is now available via the global search function.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Read more about what's rolling out at Microsoft Secure 2024 below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;New MDTI skills and workbooks for Copilot for Security&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;MDTI is making more threat intelligence available via new Copilot for Security skills and workbooks&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;to help customers understand the full scope of attacks, anticipate the next steps of an ongoing campaign, and drive an optimal security plan for their organizations at machine speed and scale.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;These include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;Correlate MDTI data with Defender XDR information:&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-contrast="none"&gt;These out-of-the-box prompt&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;books correlate MDTI data with other critical security information from Defender XDR such as incidents and hunting activities to help a user understand the broader scope of an attack.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;Correlate MDTI Content with Threat Analytics (TA) content:&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;When prompted, this skill reasons over threat intelligence content from MDTI and Threat Analytics, and provides a summary of the two, e.g., "Tell me everything Microsoft knows about [this threat actor]."&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;Obtain current reputation TI for file hashes, URLs, Domains, and IPs:&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;This skill s&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;hows the full information for hashes and URLs, including MDTI and SONAR data.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN class="TextRun SCXW171793715 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW171793715 BCX0"&gt;&lt;A href="https://aka.ms/SecurityCommunity" target="_self" rel="noopener noreferrer"&gt;Register for our Tech Community Webinar in April 11&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to learn more about how MDTI enables Copilot to deliver threat intelligence at machine speed.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN class="TextRun SCXW171793715 BCX0" data-contrast="none"&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/what-s-new-at-microsoft-secure-2024/ba-p/4083184" target="_self"&gt;What's New at Microsoft Secure 2024- Tech Community&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 17:59:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-post-what-s-new-at-microsoft-secure-2024/m-p/4086839#M25</guid>
      <dc:creator>TonyOPS</dc:creator>
      <dc:date>2024-03-15T17:59:47Z</dc:date>
    </item>
    <item>
      <title>New Blog Post | MDTI Standalone Portal Retirement and Transition to Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-post-mdti-standalone-portal-retirement-and-transition/m-p/4080245#M24</link>
      <description>&lt;P&gt;On June 30th, 2024, the Microsoft Defender Threat Intelligence (MDTI) standalone portal will reach end-of-life and the Microsoft Defender XDR portal will become MDTI’s exclusive home for both standard and premium users. In this blog, we’ll guide customers using the standalone portal that wish to continue using MDTI in Defender XDR through the simple migration process. We’ll also help customers, and their teams, prepare to take advantage of the benefits MDTI brings to Microsoft’s XDR,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/microsoft-defender-xdr-security-copilot-amp-microsoft-sentinel/ba-p/3989312" target="_blank" rel="noopener"&gt;SIEM, and AI solutions.&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId--572854973"&gt;What is happening to the MDTI standalone portal?&amp;nbsp;&lt;/H3&gt;
&lt;P aria-level="1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="1"&gt;On June 30th, 2024, the MDTI standalone portal at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://ti.defender.microsoft.com/" target="_blank" rel="noopener noreferrer"&gt;ti.defender.microsoft.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;will be decommissioned. However, customers can seamlessly use the same features and content from MDTI's permanent home in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-xdr" target="_blank" rel="noopener noreferrer"&gt;Microsoft Defender XDR&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;portal in both free and premium capacities. All existing MDTI licenses will carry over to the new portal. Customers can also access this information via natural language prompts by purchasing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" target="_blank" rel="noopener noreferrer"&gt;Copilot for Security&lt;/A&gt;.&lt;/P&gt;
&lt;P aria-level="1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId-1914657860" aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;How do I use MDTI within the Defender XDR portal?&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P aria-level="1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Within Microsoft Defender XDR, users will see the familiar MDTI pages under the “Threat Intelligence” blade in the left navigation menu:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;SPAN class="lia-inline-image-caption"&gt;Microsoft Defender Threat Intelligence resources are accessible under the Threat Intelligence blade within the left navigation menu, on the “Intel profiles”, “Intel explorer”, and “Intel projects” tabs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;On the “Intel explorer” tab within Defender XDR (pictured above), you will find the same features and content from the standalone portal Home page. This includes Threat Intelligence Search, Featured Articles, and Recent Threat Article streams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;The content from the Profiles page on the standalone portal is available on the “Intel profiles” tab in Defender XDR.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You can create or access your team and individual projects from the “Intel projects” tab. You can continue working on the same projects you created on the standalone portal by logging into Defender XDR with the same account.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-standalone-portal-retirement-and-transition-to-defender-xdr/ba-p/4077806" target="_blank"&gt;MDTI Standalone Portal Retirement and Transition to Defender XDR - Microsoft Community Hub&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2024 00:02:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-post-mdti-standalone-portal-retirement-and-transition/m-p/4080245#M24</guid>
      <dc:creator>TonyOPS</dc:creator>
      <dc:date>2024-03-09T00:02:15Z</dc:date>
    </item>
    <item>
      <title>Python Update Recommendation Not Desapearing from Microsoft Vulnerability Management list</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/python-update-recommendation-not-desapearing-from-microsoft/m-p/4073482#M23</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft Defender Vulnerability Management is recommending to update Python in my Azure VM Machines since version 3.9 has some critical vulnerabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did the update to version 3.12 but only the Windows 2019 Datacenter machine is not appearing as Exposed Device anymore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The procedure to update Python in all machines was the same but the Windows 2016 Datacenter VM´s remains in the Exposed Device list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because Python relies on Anaconda, it is not possible to remove the older version completely. The strange thing is why the same proceduro to update the software is seen as diferent by Microsoft Defender Vulnerability Management apparently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice is highly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mirella&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 19:22:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/python-update-recommendation-not-desapearing-from-microsoft/m-p/4073482#M23</guid>
      <dc:creator>mpellizzon</dc:creator>
      <dc:date>2024-03-01T19:22:23Z</dc:date>
    </item>
    <item>
      <title>New Blog | MDTI Earns Impactful Trio of ISO Certificates</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-mdti-earns-impactful-trio-of-iso-certificates/m-p/4067961#M22</link>
      <description>&lt;P&gt;Microsoft Defender Threat Intelligence (MDTI) has achieved ISO 27001, ISO 27017 and ISO 27018 certifications. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.iso.org/home.html" target="_blank" rel="noopener nofollow noreferrer"&gt;ISO&lt;/A&gt;, the International Organization for Standardization, develops market relevant international standards that support innovation and provide solutions to global challenges, including information security requirements around establishing, implementing, and improving an Information Security Management System (ISM).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These certificates emphasize the MDTI team’s continuous commitment to protecting customer information and following the strictest standards of security and privacy standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read the full blog here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-threat/mdti-earns-impactful-trio-of-iso-certificates/ba-p/4067591" target="_blank"&gt;MDTI Earns Impactful Trio of ISO Certificates - Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 23:57:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-threat/new-blog-mdti-earns-impactful-trio-of-iso-certificates/m-p/4067961#M22</guid>
      <dc:creator>BrittanyCCP</dc:creator>
      <dc:date>2024-02-26T23:57:32Z</dc:date>
    </item>
  </channel>
</rss>

