Skip to content

Commit cce5dfb

Browse files
committed
updates
1 parent 3a0823b commit cce5dfb

File tree

2 files changed

+18
-30
lines changed

2 files changed

+18
-30
lines changed

defender-endpoint/threat-analytics.md

Lines changed: 8 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ ms.date: 12/18/2023
2121

2222
# Track and respond to emerging threats through threat analytics
2323

24+
2425
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2526

2627
**Applies to:**
@@ -63,7 +64,10 @@ The following table outlines the roles and permissions required to access threat
6364
| Threat Analytics | Alerts and incidents data: <ul><li>View data- security operations</li></ul>Defender Vulnerability Management mitigations:<ul><li>View data - Threat and vulnerability management</li></ul> | Alerts and incidents data:<ul> <li>View-only manage alerts</li> <li>Manage alerts</li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> </ul> Prevented email attempts: <ul><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> | Not available for Defender for Cloud Apps or MDI users |
6465

6566
>[!IMPORTANT]
66-
> If you wish to gain visibility on alerts, incidents, recommended actions, and other threat intelligence the threat analytics reports provide beyond Defender for Endpoint, you'll need to have the products and roles described in the previous table.
67+
> You'll have visibility to all threat analytics reports even if you have just one of the products and its corresponding roles described in the previous table. However, you're required to have each product and roles to see that product’s specific incidents, assets, exposure, and recommended actions associated with the threat.
68+
69+
[Learn more about custom roles in role-based access control for Microsoft Defender XDR](/defender-xdr/custom-roles)
70+
6771

6872
## View the threat analytics dashboard
6973

@@ -197,27 +201,16 @@ You can set up email notifications that will send you updates on threat analytic
197201

198202
## Other report details and limitations
199203

200-
> [!NOTE]
201-
> As part of the unified security experience, threat analytics is now available not just for Microsoft Defender for Endpoint, but also for Microsoft Defender for Office 365 license holders.
202-
>
203-
> If you are not using the Microsoft 365 security portal (Microsoft Defender XDR), you can also see the report details (without the Microsoft Defender for Office data) in the Microsoft Defender Security Center portal (Microsoft Defender for Endpoint).
204-
205-
To access threat analytics reports, you need certain roles and permissions. See [Custom roles in role-based access control for Microsoft Defender XDR](/defender-xdr/custom-roles) for details.
206-
207-
- To view alerts, incidents, or impacted assets data, you need to have permissions to Microsoft Defender for Office or Microsoft Defender for Endpoint alerts data, or both.
208-
- To view prevented email attempts, you need to have permissions to Microsoft Defender for Office hunting data.
209-
- To view mitigations, you need to have permissions to Defender Vulnerability Management data in Microsoft Defender for Endpoint.
210204

211205
When looking at the threat analytics data, remember the following factors:
212206

213-
- Charts reflect only mitigations that are tracked. Check the report overview for more mitigations that aren't shown in the charts.
214-
- Mitigations don't guarantee complete resilience. The provided mitigations reflect the best possible actions needed to improve resiliency.
215-
- Devices are counted as "unavailable" if they haven't transmitted data to the service.
216-
- Antivirus-related statistics are based on Microsoft Defender Antivirus settings. Devices with third-party antivirus solutions can appear as "exposed."
207+
- The checklist in the **Recommended actions** tab only displays recommendations tracked in [Microsoft Secure Score](/defender-xdr/microsoft-secure-score). Check the **Analyst report** tab for more recommended actions that aren't tracked in Secure Score.
208+
- The recommended actions don’t guarantee complete resilience and only reflect the best possible actions needed to improve it.
217209

218210
## See also
219211

220212
- [Proactively find threats with advanced hunting](/defender-xdr/advanced-hunting-overview)
221213
- [Understand the analyst report section](threat-analytics-analyst-reports.md)
222214
- [Assess and resolve security weaknesses and exposures](/defender-vulnerability-management/defender-vulnerability-management)
215+
223216
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-xdr/threat-analytics.md

Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ ms.date: 09/18/2023
2222

2323
# Threat analytics in Microsoft Defender XDR
2424

25+
2526
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2627

2728
**Applies to:**
@@ -61,6 +62,11 @@ The following table outlines the roles and permissions required to access Threat
6162
|---------|---------|---------|---------|
6263
| Threat Analytics | Alerts and incidents data: <ul><li>View data- security operations</li></ul>Defender Vulnerability Management mitigations:<ul><li>View data - Threat and vulnerability management</li></ul> | Alerts and incidents data:<ul> <li>View-only manage alerts</li> <li>Manage alerts</li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> </ul> Prevented email attempts: <ul><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> | Not available for Defender for Cloud Apps or MDI users |
6364

65+
>[!IMPORTANT]
66+
> You'll have visibility to all threat analytics reports even if you have just one of the products and its corresponding roles described in the previous table. However, you're required to have each product and roles to see that product’s specific incidents, assets, exposure, and recommended actions associated with the threat.
67+
68+
[Learn more about custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md)
69+
6470
## View the threat analytics dashboard
6571

6672
The threat analytics dashboard ([security.microsoft.com/threatanalytics3](https://security.microsoft.com/threatanalytics3)) highlights the reports that are most relevant to your organization. It summarizes the threats in the following sections:
@@ -194,27 +200,16 @@ You can set up email notifications that will send you updates on threat analytic
194200

195201
## Other report details and limitations
196202

197-
> [!NOTE]
198-
> As part of the unified security experience, threat analytics is now available not just for Microsoft Defender for Endpoint, but also for Microsoft Defender for Office 365 license holders.
199-
>
200-
> If you are not using the Microsoft 365 security portal (Microsoft Defender XDR), you can also see the report details (without the Microsoft Defender for Office data) in the Microsoft Defender Security Center portal (Microsoft Defender for Endpoint).
201-
202-
To access threat analytics reports, you need certain roles and permissions. See [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md) for details.
203-
204-
- To view alerts, incidents, or impacted assets data, you need to have permissions to Microsoft Defender for Office or Microsoft Defender for Endpoint alerts data, or both.
205-
- To view prevented email attempts, you need to have permissions to Microsoft Defender for Office hunting data.
206-
- To view mitigations, you need to have permissions to Defender Vulnerability Management data in Microsoft Defender for Endpoint.
207-
208203
When looking at the threat analytics data, remember the following factors:
209204

210-
- Charts reflect only mitigations that are tracked. Check the report overview for more mitigations that aren't shown in the charts.
211-
- Mitigations don't guarantee complete resilience. The provided mitigations reflect the best possible actions needed to improve resiliency.
212-
- Devices are counted as "unavailable" if they haven't transmitted data to the service.
213-
- Antivirus-related statistics are based on Microsoft Defender Antivirus settings. Devices with third-party antivirus solutions can appear as "exposed."
205+
- The checklist in the **Recommended actions** tab only displays recommendations tracked in [Microsoft Secure Score](microsoft-secure-score.md). Check the **Analyst report** tab for more recommended actions that aren't tracked in Secure Score.
206+
- The recommended actions don’t guarantee complete resilience and only reflect the best possible actions needed to improve it.
207+
214208

215209
## See also
216210

217211
- [Proactively find threats with advanced hunting](advanced-hunting-overview.md)
218212
- [Understand the analyst report section](threat-analytics-analyst-reports.md)
219213
- [Assess and resolve security weaknesses and exposures](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
214+
220215
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)