Skip to content

Commit 759c54d

Browse files
authored
Merge pull request #1273 from MicrosoftDocs/poliveria-analyst-report-09042024
updated analyst report
2 parents 1808c37 + 6582054 commit 759c54d

File tree

5 files changed

+117
-66
lines changed

5 files changed

+117
-66
lines changed
155 KB
Loading

defender-endpoint/threat-analytics-analyst-reports.md

Lines changed: 61 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -31,71 +31,98 @@ ms.date: 12/18/2020
3131
3232
Each [threat analytics report](threat-analytics.md) includes dynamic sections and a comprehensive written section called the _analyst report_. To access this section, open the report about the tracked threat and select the **Analyst report** tab.
3333

34-
:::image type="content" source="media/ta-analyst-report-small.png" alt-text="The analyst report section of a threat analytics report" lightbox="media/ta-analyst-report-small.png":::
34+
:::image type="content" source="media/ta_analystreport.png" alt-text="The analyst report section of a threat analytics report" lightbox="media/ta_analystreport.png":::
3535

3636
_Analyst report section of a threat analytics report_
3737

38+
## Know the different analyst report types
39+
A threat analytics report can be classified under one of the following report types:
40+
- **Activity profile** – Provides information on a specific attack campaign that’s often associated with a threat actor. This report discusses how an attack happened, why should you care about it, and how Microsoft protects its customers from it. An activity profile might also include details like timeline of events, attack chains, and behaviors and methodologies.
41+
- **Actor profile** – Provides information about a specific Microsoft-tracked threat actor behind notable cyberattacks. This report discusses the actor’s motivations, industry and/or geographical targets, and their tactics, techniques, and procedures (TTPs). An actor profile might also include information about the actor’s attack infrastructure, malware (custom or open source) and exploits they used, and notable events or campaigns that they were part of.
42+
- **Technique profile** – Provides information about a specific technique used by threat actors—for example, malicious use of PowerShell or credential harvesting in business email compromise (BEC)—and how Microsoft protects its customers by detecting activity associated with the technique.
43+
- **Threat overview** – Summarizes multiple profile reports into a narrative that paints a broader picture of a threat that uses or is related to these reports. For example, threat actors use different techniques to steal on-premise credentials, and a threat overview about on-premise credential theft might link to technique profiles on brute-force attacks, Kerberos attacks, or information-stealing malware. Microsoft Threat Intelligence uses their sensors on the top threats affecting customer environments to assess which threat might merit this report type.
44+
- **Tool profile** – Provides information about a specific custom or open-source tool that’s often associated with a threat actor. This report discusses the tool’s capabilities, the goals the threat actor using it might be trying to accomplish, and how Microsoft protects its customers by detecting activity associated with it.
45+
- **Vulnerability profile** – Provides information about a specific Common Vulnerabilities and Exposures (CVE) ID or group of similar CVEs affecting a product. A vulnerability profile typically discusses noteworthy vulnerabilities, such as those being used by threat actors and notable attack campaigns. It covers one or more of the following types of information: type of vulnerability, impacted services, zero-day or in-the-wild exploitation, severity score and potential impact, and Microsoft’s coverage.
46+
3847
## Scan the analyst report
3948

4049
Each section of the analyst report is designed to provide actionable information. While reports vary, most reports include the sections described in the following table.
4150

42-
<br>
51+
| Report section | Description |
52+
|--|--|
53+
| Executive summary | Snapshot of the threat, which might include when it was first seen, its motivations, notable events, major targets, and distinct tools and techniques. You can use this information to further assess how to prioritize the threat in the context of your industry, geographic location, and network. |
54+
| Overview | Technical analysis about the threat, which, depending on the report type, might include the details of an attack and how attackers might use a new technique or attack surface.<br><br>This section also has different headings and further subsections, depending on the report type, to provide more context and details. For example, a vulnerability profile has a separate section that lists **Impacted technologies**, while an actor profile might include **Tools and TTPs** and **Attribution** sections. |
55+
| Detections/Hunting queries | Specific and generic [detections](#understand-how-each-threat-can-be-detected) provided by Microsoft security solutions that can surface activity or components associated with the threat. <br><br>This section also provides [hunting queries](#find-subtle-threat-artifacts-using-advanced-hunting) for proactively identifying possible threat activity. Most queries are provided to supplement detections, especially for locating potentially malicious components or behaviors that couldn't be dynamically assessed to be malicious. |
56+
| MITRE ATT&CK techniques observed | How observed techniques map to the [MITRE ATT&CK attack framework](https://attack.mitre.org/) |
57+
| [Recommendations](#apply-additional-mitigations) | Actionable steps that can stop or help reduce the impact of the threat. This section also includes mitigations that aren't tracked dynamically as part of the threat analytics report. |
58+
| References | Microsoft and third-party publications referenced by analysts during the creation of the report. Threat analytics content is based on data validated by Microsoft researchers. Information from publicly available, third-party sources are identified clearly as such. |
59+
| Change log | The time the report was published and when significant changes were made to the report. |
4360

44-
****
61+
## Understand how each threat can be detected
4562

46-
|Report section|Description|
47-
|---|---|
48-
|Executive summary|Overview of the threat, including when it was first seen, its motivations, notable events, major targets, and distinct tools and techniques. You can use this information to further assess how to prioritize the threat in the context of your industry, geographic location, and network.|
49-
|Analysis|Technical information about the threats, including the details of an attack and how attackers might utilize a new technique or attack surface|
50-
|MITRE ATT&CK techniques observed|How observed techniques map to the [MITRE ATT&CK attack framework](https://attack.mitre.org/)|
51-
|[Mitigations](#apply-additional-mitigations)|Recommendations that can stop or help reduce the impact of the threat. This section also includes mitigations that aren't tracked dynamically as part of the threat analytics report.|
52-
|[Detection details](#understand-how-each-threat-can-be-detected)|Specific and generic detections provided by Microsoft security solutions that can surface activity or components associated with the threat.|
53-
|[Advanced hunting](#find-subtle-threat-artifacts-using-advanced-hunting)|[Advanced hunting queries](/defender-xdr/advanced-hunting-overview) for proactively identifying possible threat activity. Most queries are provided to supplement detections, especially for locating potentially malicious components or behaviors that couldn't be dynamically assessed to be malicious.|
54-
|References|Microsoft and third-party publications referenced by analysts during the creation of the report. Threat analytics content is based on data validated by Microsoft researchers. Information from publicly available, third-party sources are identified clearly as such.|
55-
|Change log|The time the report was published and when significant changes were made to the report.|
56-
|
63+
The analyst report also provides information from various Microsoft solutions that can help detect the threat. It lists detections specific to this threat from each of the products listed in the following sections, as applicable. Alerts from these threat-specific detections show up in the alert status cards of the Threat analytics page.
5764

58-
## Apply additional mitigations
65+
Some analyst reports also mention alerts that are designed to generically flag suspicious behavior and might not be associated with the tracked threat. In such cases, the report will clearly state that the alert can be triggered by unrelated threat activity and that it isn’t monitored in the status cards provided in the Threat analytics page.
5966

60-
Threat analytics dynamically tracks the [status of security updates](threat-analytics.md#endpoints-exposure-know-the-deployment-status-of-security-updates) and [secure configurations](threat-analytics.md#recommended-actions-review-list-of-mitigations-and-the-status-of-your-devices). These types of information are available as charts and tables in the **Endpoints exposures** and **Recommended actions** tabs.
6167

62-
In addition to these tracked mitigations, the analyst report also discusses mitigations that are _not_ dynamically monitored. Here are some examples of important mitigations that are not dynamically tracked:
68+
### Microsoft Defender Antivirus
6369

64-
- Block emails with _.lnk_ attachments or other suspicious file types
65-
- Randomize local administrator passwords
66-
- Educate end users about phishing email and other threat vectors
67-
- Turn on specific [attack surface reduction rules](attack-surface-reduction.md)
70+
Antivirus detections are available on devices with [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-windows.md) turned on. These detections are linked to their respective malware encyclopedia descriptions in the [Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/threats/), when available.
6871

69-
While you can use the **Endpoints exposures** and **Recommended actions** tabs to assess your security posture against a threat, these recommendations let you take additional steps towards improving your security posture. Carefully read all the mitigation guidance in the analyst report and apply them whenever possible.
72+
### Microsoft Defender for Endpoint
7073

71-
## Understand how each threat can be detected
74+
Endpoint detection and response (EDR) alerts are raised for devices onboarded to [Microsoft Defender for Endpoint](onboard-configure.md). These alerts rely on security signals collected by the Defender for Endpoint sensor and other endpoint capabilities—such as antivirus, network protection, tamper protection—that serve as powerful signal sources.
75+
76+
### Microsoft Defender for Office 365
7277

73-
The analyst report also provides the detections from Microsoft Defender Antivirus and _endpoint detection and response_ (EDR) capabilities.
78+
Detections and mitigations from [Defender for Office 365](/defender-office-365/mdo-about) are also included in analyst reports. Defender for Office 365 is a seamless integration into Microsoft 365 subscriptions that protects against threats in email, links (URLs), file attachments, and collaboration tools.
7479

75-
### Antivirus detections
80+
### Microsoft Defender for Identity
7681

77-
These detections are available on devices with [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-windows.md) turned on. When these detections occur on devices that have been onboarded to Microsoft Defender for Endpoint, they also trigger alerts that light up the charts in the report.
82+
[Defender for Identity](/defender-for-identity/what-is) is a cloud-based security solution that helps secure your identity monitoring across your organization. It uses signals from both on-premises Active Directory and cloud identities to help you better identify, detect, and investigate advanced threats directed at your organization.
7883

79-
> [!NOTE]
80-
> The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
84+
### Microsoft Defender for Cloud Apps
8185

82-
### Endpoint detection and response (EDR) alerts
86+
[Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) delivers full protection for SaaS applications, helping you monitor and protect your cloud app data, using fundamental cloud access security broker (CASB) functionality, SaaS Security Posture Management (SSPM) features, advanced threat protection, and app-to-app protection.
8387

84-
EDR alerts are raised for [devices onboarded to Microsoft Defender for Endpoint](onboard-configure.md). These alerts generally rely on security signals collected by the Microsoft Defender for Endpoint sensor and other endpoint capabilities (such as antivirus, network protection, tamper protection) that serve as powerful signal sources.
88+
### Microsoft Defender for Cloud
8589

86-
Like the list of antivirus detections, some EDR alerts are designed to generically flag suspicious behavior that might not be associated with the tracked threat. In such cases, the report will clearly identify the alert as "generic" and that it doesn't influence any of the charts in the report.
90+
[Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) is a cloud-native application protection platform (CNAPP) made up of security measures and practices that are designed to protect cloud-based applications from various threats and vulnerabilities.
8791

8892
## Find subtle threat artifacts using advanced hunting
8993

90-
While detections allow you to identify and stop the tracked threat automatically, many attack activities leave subtle traces that require additional inspection. Some attack activities exhibit behaviors that can also be normal, so detecting them dynamically can result in operational noise or even false positives.
94+
While detections allow you to identify and stop the tracked threat automatically, many attack activities leave subtle traces that require more inspection. Some attack activities exhibit behaviors that can also be normal, so detecting them dynamically can result in operational noise or even false positives. Hunting queries let you proactively locate these potentially malicious components or behaviors.
95+
96+
### Microsoft Defender XDR advanced hunting queries
9197

92-
[Advanced hunting](/defender-xdr/advanced-hunting-overview) provides a query interface based on Kusto Query Language that simplifies locating subtle indicators of threat activity. It also allows you to surface contextual information and verify whether indicators are connected to a threat.
98+
[Advanced hunting](/defender-xdr/advanced-hunting-overview/) provides a query interface based on Kusto Query Language that simplifies locating subtle indicators of threat activity. It also lets you surface contextual information and verify whether indicators are connected to a threat.
9399

94100
Advanced hunting queries in the analyst reports have been vetted by Microsoft analysts and are ready for you to run in the [advanced hunting query editor](https://security.microsoft.com/advanced-hunting). You can also use the queries to create [custom detection rules](/defender-xdr/custom-detection-rules) that trigger alerts for future matches.
95101

96-
## Related topics
102+
### Microsoft Sentinel queries
103+
104+
Analyst reports could also include applicable [hunting queries for Microsoft Sentinel customers](/azure/sentinel/hunting?tabs=azure-portal).
105+
106+
Microsoft Sentinel has powerful hunting search and query tools to hunt for security threats across your organization's data sources. To help you look proactively for new anomalies that aren't detected by your security apps or even by your scheduled analytics rules, Sentinel hunting queries guide you into asking the right questions to find issues in the data you already have on your network.
107+
108+
109+
## Apply additional mitigations
110+
111+
Threat analytics dynamically tracks the status of certain [security updates](threat-analytics.md#endpoints-exposure-know-the-deployment-status-of-security-updates) and [secure configurations](threat-analytics.md#recommended-actions-review-list-of-mitigations-and-the-status-of-your-devices). These types of information are available as charts and tables in the **Endpoints exposures** and **Recommended actions** tabs, and are repeatable recommendations that apply to this threat and might apply to other threats, too.
112+
113+
In addition to these tracked recommendations, the analyst report could also discuss mitigations that are *not* dynamically monitored because they’re specific to just the threat or situation being discussed in the report. Here are some examples of important mitigations that aren’t dynamically tracked:
114+
115+
- Block emails with _.lnk_ attachments or other suspicious file types
116+
- Randomize local administrator passwords
117+
- Educate end users about phishing email and other threat vectors
118+
- Turn on specific [attack surface reduction rules](attack-surface-reduction.md)
119+
120+
While you can use the **Endpoints exposures** and **Recommended actions** tabs to assess your security posture against a threat, these recommendations let you take other steps towards improving your security posture. Carefully read all the mitigation guidance in the analyst report and apply them whenever possible.
121+
122+
## See also
97123

98124
- [Threat analytics overview](threat-analytics.md)
99125
- [Proactively find threats with advanced hunting](/defender-xdr/advanced-hunting-overview)
100126
- [Custom detection rules](/defender-xdr/custom-detection-rules)
127+
101128
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-xdr/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -374,10 +374,10 @@
374374
items:
375375
- name: Threat analytics overview
376376
href: threat-analytics.md
377-
- name: Defender Threat Intelligence in Microsoft Defender XDR
378-
href: defender-threat-intelligence.md
379377
- name: Understand the analyst report
380378
href: threat-analytics-analyst-reports.md
379+
- name: Defender Threat Intelligence in Microsoft Defender XDR
380+
href: defender-threat-intelligence.md
381381
- name: Endpoint Attack Notifications
382382
href: /defender-endpoint/endpoint-attack-notifications
383383
- name: Collaborate with Microsoft Defender Experts for Hunting

0 commit comments

Comments
 (0)