Recent Blog ArticlesNewest TopicsMost LikesTagged:TagUnified MDTI APIs in Microsoft Graph Now GA We’re thrilled to share that the unified APIs that are part of the Microsoft Graph are now generally available! These APIs come with a single endpoint, permissions, auth model, and access toke...Using MDTI with the Diamond Model for Threat Intelligence Microsoft Defender Threat Intelligence (MDTI) provides robust tools and features that enable security analysts to quickly investigate incidents and respond to cyber threats by applying the Dia...What's New: Hash and URL Search Intelligence Microsoft Defender Threat Intelligence (Defender TI) now includes File Hash and URL Search capabilities, enabling researchers, analysts, hunters, and security responders to search for high-qua...What's New: Intel Profiles Deliver Crucial Information, Context About Threats Microsoft is thrilled to introduce Intel Profiles within Microsoft Defender Threat Intelligence. This feature offers a single, reliable source of information for security operations teams, pro...Infrastructure Chaining with Microsoft Defender Threat Intelligence Infrastructure Chaining is used to investigate the relationships between connected datasets which allows an analyst to develop an investigation into events or incidents on their network. How Microsoft Defender Threat Intelligence Enables Threat Hunting Success Microsoft Defender Threat Intelligence enables threat hunters to quickly investigate events and incidents on their network.