You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/technological-partners.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Technological partners of Microsoft Defender XDR
3
3
ms.reviewer:
4
-
description: View technological partners of Microsoft 365 Defender to enhance detection, investigation, and threat intelligence capabilities of the platform.
4
+
description: View technological partners of Microsoft Defender XDR to enhance detection, investigation, and threat intelligence capabilities of the platform.
5
5
ms.service: defender-endpoint
6
6
ms.subservice: reference
7
7
ms.author: deniseb
@@ -14,7 +14,7 @@ ms.collection:
14
14
- tier3
15
15
ms.topic: article
16
16
search.appverid: met150
17
-
ms.date: 09/21/2024
17
+
ms.date: 06/03/2025
18
18
---
19
19
20
20
# Technological partners of Microsoft Defender XDR
@@ -23,7 +23,7 @@ ms.date: 09/21/2024
23
23
24
24
- Microsoft Defender XDR
25
25
- Microsoft Defender for Endpoint
26
-
- Microsoft Defender for Vulnerability Management
26
+
- Microsoft Defender Vulnerability Management
27
27
- Microsoft Defender for Office 365
28
28
- Microsoft Defender for Identity
29
29
- Microsoft Defender for Cloud Apps
@@ -33,7 +33,7 @@ ms.date: 09/21/2024
33
33
> [!NOTE]
34
34
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
35
35
36
-
Microsoft Defender XDR supports third-party integrations to help secure users with effective threat protection, detection, investigation, and response, in various security fields of endpoints, vulnerability management, email, identities, cloud apps.
36
+
Microsoft Defender XDR supports non-Microsoft software integration to help secure users with effective threat protection, detection, investigation, and response, in various security fields of endpoints, vulnerability management, email, identities, cloud apps.
37
37
38
38
The following are the solution's categories:
39
39
@@ -55,18 +55,18 @@ The following are the solution's categories:
55
55
56
56
|Product name|Vendor|Description|
57
57
|---|---|---|
58
-
|[Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
58
+
|[Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information, and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
59
59
|[Splunk](https://go.microsoft.com/fwlink/?linkid=2201963)|Splunk|The Microsoft Defender for Endpoint Add-on allows Splunk users to ingest all of the alerts and supporting information to their Splunk.|
60
60
|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|ArcSight allows multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
61
61
|[Elastic Security](https://go.microsoft.com/fwlink/?linkid=2201772)|Elastic|Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.|
62
-
|[IBM Security QRadar SIEM](https://go.microsoft.com/fwlink/?linkid=2201876)|IBM|IBM Security QRadar SIEM enables centralized visibility and intelligent security analytics to detect, investigate and respond to your critical cybersecurity threats.|
62
+
|[IBM Security QRadar SIEM](https://go.microsoft.com/fwlink/?linkid=2201876)|IBM|IBM Security QRadar SIEM enables centralized visibility and intelligent security analytics to detect, investigate, and respond to your critical cybersecurity threats.|
63
63
|[AttackIQ Platform](https://go.microsoft.com/fwlink/?linkid=2201971)|AttackIQ|AttackIQ Platform validates whether MDE is configured properly by launching continuous attacks safely on production assets.|
64
64
65
65
### Security orchestration, automation, and response (SOAR)
66
66
67
67
|Product name|Vendor|Description|
68
68
|---|---|---|
69
-
|[Microsoft Sentinel](https://go.microsoft.com/fwlink/?linkid=2201962)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
69
+
|[Microsoft Sentinel](https://go.microsoft.com/fwlink/?linkid=2201962)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information, and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
70
70
|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|ArcSight provides multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
71
71
|[Splunk SOAR](https://go.microsoft.com/fwlink/?linkid=2201773)|Splunk|Splunk SOAR orchestrates workflows and automates tasks in seconds to work smarter and respond faster.|
72
72
|[Security Incident Response](https://go.microsoft.com/fwlink/?linkid=2201874)|ServiceNow|The ServiceNow® Security Incident Response application tracks the progress of security incidents from discovery and initial analysis, through containment, eradication, and recovery, and into the final post-incident review, knowledge base article creation, and closure.|
@@ -100,7 +100,7 @@ The following are the solution's categories:
100
100
|[Aruba ClearPass Policy Manager](https://go.microsoft.com/fwlink/?linkid=2201878)|Aruba, a Hewlett Packard Enterprise company|Network Access Control applies consistent policies and granular security controls to wired and wireless networks|
101
101
|[Vectra Network Detection and Response (NDR)](https://go.microsoft.com/fwlink/?linkid=2201969)|Vectra|Vectra applies AI & security research to detect and respond to cyber-attacks in real time.|
102
102
|[Blue Hexagon for Network](https://go.microsoft.com/fwlink/?linkid=2201780)|Blue Hexagon|Blue Hexagon built the industry's first real-time deep learning platform for network threat protection.|
103
-
|[CyberMDX](https://go.microsoft.com/fwlink/?linkid=2201880)|CyberMDX|Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention and repose into your Microsoft Defender for Endpoint environment.|
103
+
|[CyberMDX](https://go.microsoft.com/fwlink/?linkid=2201880)|CyberMDX|Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention, and response into your Microsoft Defender for Endpoint environment.|
104
104
|[HYAS Protect](https://www.hyas.com/hyas-protect)|HYAS|HYAS Protect utilizes authoritative knowledge of attacker infrastructure to proactively protect MDE endpoints from cyber attacks.|
105
105
|[Better Mobile Security Platform](https://go.microsoft.com/fwlink/?linkid=2202043)|Better Mobile Security Inc.|Provides solution for Threat, Phishing, and Privacy Protection and Simulation.|
106
106
|[Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2201965)|Skybox security|Global security posture management leader with solutions for vulnerability management and network security policy management.|
0 commit comments