threat hunting
21 TopicsWhat’s New: MDTI Interoperability with Microsoft 365 Defender
Microsoft Defender Threat Intelligence (MDTI) helps streamline security analyst triage, incident response, threat hunting, and vulnerability management workflows, aggregating and enriching critical threat information in an easy-to-use interface. At Microsoft Secure, we announced new features, including that MDTI is now available to licensed customers within the Microsoft 365 Defender (M365 Defender) portal, placing its powerful threat intelligence side-by-side with the advanced XDR functionality of M365 Defender.What's New: APIs in Microsoft Graph
Unified APIs part of the Microsoft Graph with a single endpoint, permissions, auth model, and access token are now available. We’re happy to share that the new Microsoft Defender Threat Intelligence APIs in MS Graph: Incidents, Alerts, and Hunting are now in public preview!Welcome to the Microsoft Defender Threat Intelligence Tech Community
Since we launched Microsoft Defender Threat Intelligence (MDTI) in August, we've been thrilled with its positive reception across the cybersecurity community. We'll share the latest content on this page about how you and your team can get the most out of DTI's industry-leading investigation and discovery capabilities.Get to Know the Datasets and How to Use Them During Investigations
The internet can be confusing sometimes. Understanding its datasets doesn't have to be. Come learn how Microsoft Defender Threat Intelligence's datasets can help you uncover related indicators of compromise, which can help you react more readily to threats and build up stronger defenses.Performing a Successful Proof of Concept (PoC)
To effectively determine the benefits of adopting Defender Threat Intelligence, you should perform a Proof of Concept (PoC). Before enabling Defender Threat Intelligence, you and your team should go through a planning process to determine a series of tasks that must be accomplished in this PoC.