Skip to content

Commit ac497c6

Browse files
committed
Merge branch 'main' into diannegali-mtourbac
2 parents 005b58f + f671f79 commit ac497c6

18 files changed

+91
-11
lines changed

defender-xdr/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -497,7 +497,9 @@
497497
- name: Troubleshoot service issues
498498
href: troubleshoot.md
499499
- name: Create Custom Defender XDR reports
500-
href: defender-xdr-custom-reports.md
500+
href: defender-xdr-custom-reports.md
501+
- name: Visualize impact with the unified security summary
502+
href: security-summary-report.md
501503
- name: Microsoft Defender XDR APIs
502504
items:
503505
- name: Overview
Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
---
2+
title: Visualize security impact with the unified security summary
3+
description: Learn how to use the unified security summary in the Microsoft Defender portal to visualize your security impact and achievements.
4+
ms.service: defender-xdr
5+
ms.localizationpriority: medium
6+
audience: ITPro
7+
author: diannegali
8+
ms.author: diannegali
9+
ms.date: 05/07/2025
10+
manager: deniseb
11+
ms.topic: how-to
12+
ms.collection:
13+
- m365-security
14+
- tier2
15+
search.appverid: met150
16+
appliesto:
17+
- Microsoft Defender XDR
18+
#customer intent: As a SOC analyst, I want to know how to showcase security achievements and impact using data from the Microsoft Defender portal.
19+
---
20+
# Highlight security impact and achievements with the unified security summary
21+
22+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
23+
24+
Security operations center (SOC) teams can easily showcase their security achievements and the impact of Microsoft Defender using the unified security summary. Having the summary readily available in the Microsoft Defender portal streamlines the process for SOC teams to generate security reports, saving time usually spent on collecting data from various sources and creating reports tailored to their audiences. SOC teams can readily communicate performance and achievements to their stakeholders with the summary.
25+
26+
The unified security summary highlights the following information:
27+
28+
- **Posture**: Your organization’s posture includes data from [Microsoft Secure Score](microsoft-secure-score.md), threat protection information related to ransomware and phishing prevention, [exposure score](/defender-vulnerability-management/tvm-exposure-score) based on Microsoft Defender Vulnerability Management, and the number of onboarded devices to Microsoft Defender for Endpoint
29+
:::image type="content" source="/defender/media/security-summary/summary-posture-small.png" alt-text="Screenshot of the Posture section in the security summary report" lightbox="/defender/media/security-summary/summary-posture.png":::
30+
- **Detection**: This section contains the number of [alerts and incidents](incidents-overview.md), including how many alerts were consolidated into incidents, the number of alerts grouped into incidents, and information on active detection rules and the corresponding response actions produced by those rules
31+
:::image type="content" source="/defender/media/security-summary/summary-detection-small.png" alt-text="Screenshot of the Detection section in the security summary report" lightbox="/defender/media/security-summary/summary-detection.png":::
32+
- **Protection**: Cards under this section include data from Microsoft’s automatic investigation and response features like the total number of [attacks disrupted](automatic-attack-disruption.md), a list of the disruption incidents, the number of malicious activities blocked by Microsoft Defender Antivirus, and the number of malicious emails and URLs blocked
33+
:::image type="content" source="/defender/media/security-summary/summary-protection-small.png" alt-text="Screenshot of the Protection section in the security summary report" lightbox="/defender/media/security-summary/summary-protection.png":::
34+
- **Investigation and response**: This section contains the number of active and resolved alerts and incidents, top 10 critical incidents with each incident’s status and affected number of assets, the number of [automated investigation and response actions](m365d-autoir.md) taken on impacted assets, and the number of email messages where malicious files were automatically identified and extracted through [Microsoft Defender for Office 365 Zero-hour auto purge (ZAP)](/defender-office-365/zero-hour-auto-purge)
35+
:::image type="content" source="/defender/media/security-summary/summary-investigation-small.png" alt-text="Screenshot of the Investigation and Response section in the security summary report" lightbox="/defender/media/security-summary/summary-investigation.png":::
36+
- **Copilot-powered investigation and response**: This section contains the number of [analyzed files](copilot-in-defender-file-analysis.md) and [scripts](security-copilot-m365d-script-analysis.md) where Microsoft Copilot in Defender was used.
37+
:::image type="content" source="/defender/media/security-summary/summary-copilot-small.png" alt-text="Screenshot of the Copilot section in the security summary report" lightbox="/defender/media/security-summary/summary-copilot.png":::
38+
39+
SOC teams can use the unified security summary to highlight the impact of their day-to-day operations. They can also emphasize how Microsoft’s automated actions impact the efficient protection of their organization with features like automatic attack disruption stopping attacks before it becomes widespread.
40+
41+
## Prerequisites
42+
43+
> [!IMPORTANT]
44+
> Data for the unified security summary is based on the Microsoft security products and services present in the organization. Data is limited only to the Microsoft products which the user has provisioned access to. For example, if the organization has Microsoft Defender for Endpoint and Microsoft Defender for Office 365, the summary will only show data from these two products.
45+
46+
Users must have the following permissions to view the unified security summary:
47+
48+
- Security data basics (read)
49+
- Vulnerability management (read)
50+
51+
Additionally, users must have permissions to view all devices in the organization.
52+
53+
## View the unified security summary
54+
55+
To access and share the unified security summary, follow these steps:
56+
57+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
58+
2. In the navigation, select **Reports**. Under General, select **Unified security summary**.
59+
3. The report page automatically generates data from the last 90 days by default. You can adjust the data to show the last 30 days if needed.
60+
:::image type="content" source="/defender/media/security-summary/duration-picker.png" alt-text="Screenshot highlighting the report data duration options in the security summary report":::
61+
4. Once the summary is generated, you can check the details of each card under each section.
62+
> [!TIP]
63+
> Select a card's title to know more about each card. Selecting the title opens the related Microsoft documentation page.
64+
5. You can export the summary as a PDF or CSV file. To export, select the dropdown menu on the upper right corner of the page and choose the format.
65+
:::image type="content" source="/defender/media/security-summary/export-picker.png" alt-text="Screenshot highlighting the export options in the security summary report":::
66+
6. If you choose to export the summary as a PDF, an option to customize by adding a logo of your choice is available. Select **Upload** logo to do this. Otherwise, you can select **Generate PDF** to proceed exporting the summary to a PDF file.
67+
:::image type="content" source="/defender/media/security-summary/pdf-dialog.png" alt-text="Screenshot of the export to PDF dialog box":::
68+
7. When exporting the summary as a CSV file, the file is automatically saved to your device as *Unified security summary_{date and time exported}.csv*. The file contains three columns for the card name, the field name in the card, and the value of the field. Here’s an example.
69+
:::image type="content" source="/defender/media/security-summary/csv-sample-values.png" alt-text="Screenshot of the CSV output of the security summary report":::
70+
71+
## Related content
72+
73+
- [Microsoft Defender Antivirus overview](/defender-endpoint/microsoft-defender-antivirus-window)
74+
- [Microsoft Copilot in Microsoft Defender](security-copilot-in-microsoft-365-defender.md)

defender-xdr/whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,10 @@ For more information on what's new with other Microsoft Defender security produc
3232

3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

35+
## May 2025
36+
37+
- (Preview) You can now highlight your security operations achievements and the impact of Microsoft Defender using the **unified security summary**. The unified security summary is available in the Microsoft Defender portal and streamlines the process for SOC teams to generate security reports, saving time usually spent on collecting data from various sources and creating reports. For more information, see [Visualize security impact with the unified security summary](security-summary-report.md).
38+
3539
## April 2025
3640

3741
- (Preview) You can now create data security investigations in the Microsoft Defender portal with the integration of Microsoft Purview Data Security Investigations (preview) and Microsoft Defender XDR. This integration allows security operations center (SOC) teams to enhance their investigation and response to potential data security incidents like data breaches or data leaks. For more information, see [Create data security investigations in the Microsoft Defender portal](create-dsi-in-defender.md).
52.6 KB
Loading
50.8 KB
Loading
52.3 KB
Loading
21.7 KB
Loading
70.2 KB
Loading
86.6 KB
Loading
31.4 KB
Loading

0 commit comments

Comments
 (0)