You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/detect-threats-overview.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,34 +24,33 @@ Microsoft's unified SecOps platform in the Microsoft Defender portal pulls detec
24
24
25
25
## Threat detection in the Microsoft Defender portal
26
26
27
-
Security teams need focus and clarity to eliminate false positives. Microsoft Defender portal correlates and merges alerts and incidents from all Microsoft security and compliance solutions as well as unifying threat detection from external solutions through Microsoft Sentinel and Microsoft Defender for Cloud. The correlation and merging of these signals brings rich context and prioritization. For example, an Adversary-in-The-Middle (AiTM) phishing attack might have pieces of the threat puzzle scattered across multiple sources. Defender XDR puts those pieces together into an attack story while providing attack disrupt and guided response to remediate the threat.
27
+
Security teams need focus and clarity to eliminate false positives. The Microsoft Defender portal correlates and merges alerts and incidents from all supported Microsoft security and compliance solutions, and unifies threat detection from external solutions through Microsoft Sentinel and Microsoft Defender for Cloud. The correlation and merging of these signals brings rich context and prioritization. For example, an Adversary-in-The-Middle (AiTM) phishing attack might have pieces of the threat puzzle scattered across multiple sources. The Defender portal puts those pieces together into an attack story while providing attack disrupt and guided response to remediate the threat.
28
28
29
29
The following image shows the incidents dashboard correlating signals from multiple services, including the individual detection sources for a complete AiTM attack story.
30
30
31
31
:::image type="content" source="media/detect-threats-overview/defender-xdr-multiple-source-example.png" alt-text="Screenshot showing an incident stitched together from multiple detection streams." lightbox="media/detect-threats-overview/defender-xdr-multiple-source-example.png":::
32
32
33
-
Each Microsoft security product enabled unlocks more signals to stream into the Defender portal. For more information on how these signals are stitched together and prioritized, see [Incidents and alerts in the Microsoft Defender portal](/defender-xdr/incidents-overview).
33
+
Each supported Microsoft security product enabled unlocks more signals to stream into the Defender portal. For more information on how these signals are stitched together and prioritized, see [Incidents and alerts in the Microsoft Defender portal](/defender-xdr/incidents-overview).
34
34
35
35
## Microsoft Defender XDR threat detection
36
36
37
-
Defender XDR has a unique correlation capability that provides another layer of data analysis and threat detection. The following table gives examples of how each Defender XDR security service is tuned to detect threats matching the character of its solution.
37
+
Defender XDR has a unique correlation capability that provides an extra layer of data analysis and threat detection. The following table gives examples of how suported security services are tuned to detect threats matching the character of its solution.
38
38
39
39
| Defender XDR service | Threat detection specialty |
40
40
|---|---|
41
41
|[**Microsoft Defender for Endpoint**](/defender-endpoint/microsoft-defender-endpoint)| Microsoft Defender antivirus detects polymorphic malware with behavior-based and heuristic analytics on endpoints such as mobile devices, desktops, and more.|
42
42
|[**Microsoft Defender for Office 365**](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet)| Detects phishing, malware, weaponized links and more in email, Teams, and OneDrive.|
43
-
|[**Microsoft Defender for Identity**](/defender-for-identity/what-is)| Detects privilege escalation, lateral movement, discovery, defense evasion, persistence, and more across on-premises identities.|
43
+
|[**Microsoft Defender for Identity**](/defender-for-identity/what-is)| Detects privilege escalation, lateral movement, discovery, defense evasion, persistence, and more across both on-premises and cloud identities.|
44
44
|[**Microsoft Defender for Cloud Apps**](/defender-cloud-apps/what-is-defender-for-cloud-apps)| Detects suspicious activities through user and entity behavioral analytics (UEBA) across cloud applications.|
45
45
|[**Microsoft Defender Vulnerability Management**](/defender-vulnerability-management/defender-vulnerability-management)| Detects vulnerabilities in devices providing meaningful context for investigations.|
46
46
|[**Microsoft Entra ID Protection**](/azure/active-directory/identity-protection/overview-identity-protection)| Detects risks associated with sign-ins like impossible travel, verified threat actor IPs, leaked credentials, password sprays and more.|
47
47
|[**Microsoft Data Loss Prevention**](/microsoft-365/compliance/dlp-learn-about-dlp)| Detects risks and behavior associated with oversharing and exfiltration of sensitive information across Microsoft 365 services, Office applications, endpoints, and more.|
48
-
|[**App Governance**](/defender-cloud-apps/app-governance-manage-app-governance)| Detects anomalies in cloud app activity, especially when noncompliant, malicious, or risky apps are used.|
49
48
50
49
For more information, see [What is Microsoft Defender XDR?](/defender-xdr/microsoft-365-defender)
51
50
52
51
## Microsoft Sentinel threat detection
53
52
54
-
Microsoft Sentinel enables data collection from a vast number of Microsoft and non-Microsoft sources, but doesn't stop there. With Microsoft Sentinel's threat management capabilities, you gain the tools needed to detect and organize threats to your environment.
53
+
Microsoft Sentinel connected to the Defender portal enables data collection from a vast number of Microsoft and non-Microsoft sources, but doesn't stop there. With Microsoft Sentinel's threat management capabilities, you gain the tools needed to detect and organize threats to your environment.
55
54
56
55
:::image type="content" source="/azure/sentinel/media/overview/mitre-coverage-defender.png" alt-text="Screenshot showing MITRE ATT&CK coverage in Microsoft Sentinel." lightbox="/azure/sentinel/media/overview/mitre-coverage-defender.png":::
57
56
@@ -63,9 +62,11 @@ Microsoft Sentinel enables data collection from a vast number of Microsoft and n
63
62
| Workbooks | Detect threats with visual insights, especially to monitor the health of your data collection and understand gaps that prevent proper threat detection. |[Visualize your data with workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal)|
64
63
| Summary rules | Optimizes noisy, high volume logs to detect threat in low-security value data. |[Generate alerts on threat intelligence matches against network data](/azure/sentinel/summary-rules#generate-alerts-on-threat-intelligence-matches-against-network-data)|
65
64
65
+
For more information, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/defender-xdr/microsoft-sentinel-onboard).
66
+
66
67
## Microsoft Defender for Cloud threat detection
67
68
68
-
Defender for Cloud provides threat detection to generate alerts and incidents by continuously monitoring your clouds' assets with advanced security analytics. Those signals are integrated directly into the Defender portal for correlation and severity classification. Although Defender for cloud is licensed separately from Defender for XDR, each extra plan enabled in Defender for Cloud adds to the detection signals streamed into Defender portal. For more information, see [Alerts and incidents in Microsoft Defender XDR](/azure/defender-for-cloud/concept-integration-365).
69
+
Defender for Cloud provides threat detection to generate alerts and incidents by continuously monitoring your clouds' assets with advanced security analytics. Those signals are integrated directly into the Defender portal for correlation and severity classification. Each plan enabled in Defender for Cloud adds to the detection signals streamed into Defender portal. For more information, see [Alerts and incidents in Microsoft Defender XDR](/azure/defender-for-cloud/concept-integration-365).
69
70
70
71
Defender for Cloud detects threats across a wide variety of workloads. The following table gives examples of some of the threats it detects. For more information on specific alerts, see [Security alerts reference list](/azure/defender-for-cloud/alerts-reference).
0 commit comments