You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -63,7 +64,10 @@ The following table outlines the roles and permissions required to access threat
63
64
| Threat Analytics | Alerts and incidents data: <ul><li>View data- security operations</li></ul>Defender Vulnerability Management mitigations:<ul><li>View data - Threat and vulnerability management</li></ul> | Alerts and incidents data:<ul> <li>View-only manage alerts</li> <li>Manage alerts</li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> </ul> Prevented email attempts: <ul><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> | Not available for Defender for Cloud Apps or MDI users |
64
65
65
66
>[!IMPORTANT]
66
-
> If you wish to gain visibility on alerts, incidents, recommended actions, and other threat intelligence the threat analytics reports provide beyond Defender for Endpoint, you'll need to have the products and roles described in the previous table.
67
+
> You'll have visibility to all threat analytics reports even if you have just one of the products and its corresponding roles described in the previous table. However, you're required to have each product and roles to see that product’s specific incidents, assets, exposure, and recommended actions associated with the threat.
68
+
69
+
[Learn more about custom roles in role-based access control for Microsoft Defender XDR](/defender-xdr/custom-roles)
70
+
67
71
68
72
## View the threat analytics dashboard
69
73
@@ -197,27 +201,16 @@ You can set up email notifications that will send you updates on threat analytic
197
201
198
202
## Other report details and limitations
199
203
200
-
> [!NOTE]
201
-
> As part of the unified security experience, threat analytics is now available not just for Microsoft Defender for Endpoint, but also for Microsoft Defender for Office 365 license holders.
202
-
>
203
-
> If you are not using the Microsoft 365 security portal (Microsoft Defender XDR), you can also see the report details (without the Microsoft Defender for Office data) in the Microsoft Defender Security Center portal (Microsoft Defender for Endpoint).
204
-
205
-
To access threat analytics reports, you need certain roles and permissions. See [Custom roles in role-based access control for Microsoft Defender XDR](/defender-xdr/custom-roles) for details.
206
-
207
-
- To view alerts, incidents, or impacted assets data, you need to have permissions to Microsoft Defender for Office or Microsoft Defender for Endpoint alerts data, or both.
208
-
- To view prevented email attempts, you need to have permissions to Microsoft Defender for Office hunting data.
209
-
- To view mitigations, you need to have permissions to Defender Vulnerability Management data in Microsoft Defender for Endpoint.
210
204
211
205
When looking at the threat analytics data, remember the following factors:
212
206
213
-
- Charts reflect only mitigations that are tracked. Check the report overview for more mitigations that aren't shown in the charts.
214
-
- Mitigations don't guarantee complete resilience. The provided mitigations reflect the best possible actions needed to improve resiliency.
215
-
- Devices are counted as "unavailable" if they haven't transmitted data to the service.
216
-
- Antivirus-related statistics are based on Microsoft Defender Antivirus settings. Devices with third-party antivirus solutions can appear as "exposed."
207
+
- The checklist in the **Recommended actions** tab only displays recommendations tracked in [Microsoft Secure Score](/defender-xdr/microsoft-secure-score). Check the **Analyst report** tab for more recommended actions that aren't tracked in Secure Score.
208
+
- The recommended actions don’t guarantee complete resilience and only reflect the best possible actions needed to improve it.
217
209
218
210
## See also
219
211
220
212
-[Proactively find threats with advanced hunting](/defender-xdr/advanced-hunting-overview)
221
213
-[Understand the analyst report section](threat-analytics-analyst-reports.md)
222
214
-[Assess and resolve security weaknesses and exposures](/defender-vulnerability-management/defender-vulnerability-management)
215
+
223
216
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
@@ -61,6 +62,11 @@ The following table outlines the roles and permissions required to access Threat
61
62
|---------|---------|---------|---------|
62
63
| Threat Analytics | Alerts and incidents data: <ul><li>View data- security operations</li></ul>Defender Vulnerability Management mitigations:<ul><li>View data - Threat and vulnerability management</li></ul> | Alerts and incidents data:<ul> <li>View-only manage alerts</li> <li>Manage alerts</li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> </ul> Prevented email attempts: <ul><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> | Not available for Defender for Cloud Apps or MDI users |
63
64
65
+
>[!IMPORTANT]
66
+
> You'll have visibility to all threat analytics reports even if you have just one of the products and its corresponding roles described in the previous table. However, you're required to have each product and roles to see that product’s specific incidents, assets, exposure, and recommended actions associated with the threat.
67
+
68
+
[Learn more about custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md)
69
+
64
70
## View the threat analytics dashboard
65
71
66
72
The threat analytics dashboard ([security.microsoft.com/threatanalytics3](https://security.microsoft.com/threatanalytics3)) highlights the reports that are most relevant to your organization. It summarizes the threats in the following sections:
@@ -194,27 +200,16 @@ You can set up email notifications that will send you updates on threat analytic
194
200
195
201
## Other report details and limitations
196
202
197
-
> [!NOTE]
198
-
> As part of the unified security experience, threat analytics is now available not just for Microsoft Defender for Endpoint, but also for Microsoft Defender for Office 365 license holders.
199
-
>
200
-
> If you are not using the Microsoft 365 security portal (Microsoft Defender XDR), you can also see the report details (without the Microsoft Defender for Office data) in the Microsoft Defender Security Center portal (Microsoft Defender for Endpoint).
201
-
202
-
To access threat analytics reports, you need certain roles and permissions. See [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md) for details.
203
-
204
-
- To view alerts, incidents, or impacted assets data, you need to have permissions to Microsoft Defender for Office or Microsoft Defender for Endpoint alerts data, or both.
205
-
- To view prevented email attempts, you need to have permissions to Microsoft Defender for Office hunting data.
206
-
- To view mitigations, you need to have permissions to Defender Vulnerability Management data in Microsoft Defender for Endpoint.
207
-
208
203
When looking at the threat analytics data, remember the following factors:
209
204
210
-
- Charts reflect only mitigations that are tracked. Check the report overview for more mitigations that aren't shown in the charts.
211
-
- Mitigations don't guarantee complete resilience. The provided mitigations reflect the best possible actions needed to improve resiliency.
212
-
- Devices are counted as "unavailable" if they haven't transmitted data to the service.
213
-
- Antivirus-related statistics are based on Microsoft Defender Antivirus settings. Devices with third-party antivirus solutions can appear as "exposed."
205
+
- The checklist in the **Recommended actions** tab only displays recommendations tracked in [Microsoft Secure Score](microsoft-secure-score.md). Check the **Analyst report** tab for more recommended actions that aren't tracked in Secure Score.
206
+
- The recommended actions don’t guarantee complete resilience and only reflect the best possible actions needed to improve it.
207
+
214
208
215
209
## See also
216
210
217
211
-[Proactively find threats with advanced hunting](advanced-hunting-overview.md)
218
212
-[Understand the analyst report section](threat-analytics-analyst-reports.md)
219
213
-[Assess and resolve security weaknesses and exposures](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
0 commit comments