You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/threat-analytics.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.custom:
19
19
- cx-ta
20
20
ms.topic: conceptual
21
21
ms.subservice: edr
22
-
ms.date: 11/12/2024
22
+
ms.date: 02/25/2025
23
23
---
24
24
25
25
# Track and respond to emerging threats through threat analytics
@@ -63,7 +63,7 @@ Each report provides an analysis of a tracked threat and extensive guidance on h
63
63
The following roles and permissions are required to access Threat analytics in the Defender portal:
64
64
65
65
-**Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
66
-
-**Vulnerability management (read)** and **Secure Score (read)**—to see related exposure data and recommended actions
66
+
-**Vulnerability management (read)** and **Exposure Management (read)**—to see related exposure data and recommended actions
67
67
68
68
By default, access to services available in the Defender portal are managed collectively using [Microsoft Entra global roles](/defender-xdr/m365d-permissions). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac) for centralized permissions management, we recommend creating custom roles for each service. [Learn more about creating custom roles](/defender-xdr/custom-roles)
Copy file name to clipboardExpand all lines: defender-office-365/step-by-step-guides/defense-in-depth-guide.md
+30-32Lines changed: 30 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier3
16
16
ms.topic: how-to
17
17
search.appverid: met150
18
-
ms.date: 01/31/2023
18
+
ms.date: 02/24/2025
19
19
---
20
20
21
21
# Getting the best security value from Microsoft Defender for Office 365 when you have third party email filtering
@@ -31,90 +31,88 @@ The following information details how to get the most out of your investment, br
31
31
32
32
- Mailboxes hosted in Office 365
33
33
- One or more of:
34
-
- Microsoft Defender for Office 365 Plan 1 for protection features
35
-
- Microsoft Defender for Office 365 Plan 2 for most other features (included in E5 plans)
36
-
- Microsoft Defender for Office 365 Trial (available to all customers at aka.ms/tryMDO)
37
-
- Sufficient permissions to configure the features discussed below
34
+
- Microsoft Defender for Office 365 Plan 1 for protection features.
35
+
- Microsoft Defender for Office 365 Plan 2 for most other features (included in E5 plans).
36
+
- Microsoft Defender for Office 365 Trial (available to all customers at <https://aka.ms/tryMDO>).
37
+
- Sufficient permissions to configure the features discussed in this article.
38
38
39
39
## Step 1 – Understand the value you already have
40
40
41
41
### Built-in protection features
42
42
43
-
- Built-in protection offers a base level of unobtrusive protection, and includes malware, zero day (Safe Attachments), and URL protection (Safe Links) in email (including internal email), SharePoint Online, OneDrive, and Teams. URL protection provided in this state is via API call only. It doesn't wrap or rewrite URLs but does require a supported Outlook client. You can create your own custom policies to expand your protection.
43
+
- Built-in protection offers a base level of unobtrusive protection, and includes malware, zero day (Safe Attachments), and URL protection (Safe Links) in email (including internal email), SharePoint, OneDrive, and Microsoft Teams. URL protection provided in this state is via API call only. It doesn't wrap or rewrite URLs but does require a supported Outlook client. You can create your own custom policies to expand your protection.
44
44
45
-
**Read more & watch an overview video of Safe Links here:**[Complete Safe Links overview](../safe-links-about.md)
45
+
**Read more & watch an overview video of Safe Links here:**[Complete Safe Links overview](../safe-links-about.md)
46
46
47
-
**Read more about Safe Attachments here:**[Safe Attachments](../safe-attachments-about.md)
47
+
**Read more about Safe Attachments here:**[Safe Attachments](../safe-attachments-about.md)
48
48
49
49
### Detection, investigation, response, and hunting features
50
50
51
51
- When alerts fire in Microsoft Defender for Office 365, they're automatically correlated, and combined into Incidents to help reduce the alert fatigue on security staff. Automated Investigation and Response (AIR) triggers investigations to help remediate and contain threats.
52
52
53
-
**Read more, watch an overview video and get started here :**[Incident response with Microsoft Defender XDR](/defender-xdr/incidents-overview)
53
+
**Read more, watch an overview video and get started here :**[Incident response with Microsoft Defender XDR](/defender-xdr/incidents-overview)
54
54
55
55
- Threat Analytics is our in-product, detailed threat intelligence solution from expert Microsoft security researchers. Threat Analytics contains detailed reports that are designed to get you up to speed on the latest threat groups, attack techniques, how to protect your organization with Indicators of Compromise (IOC) and much more.
56
56
57
-
**Read more, watch an overview video and get started here :**[Threat analytics in Microsoft Defender XDR](/defender-xdr/threat-analytics)
57
+
**Read more, watch an overview video and get started here :**[Threat analytics in Microsoft Defender XDR](/defender-xdr/threat-analytics)
58
58
59
-
- Explorer can be used to hunt threats, visualize mail flow patterns, spot trends, and identify the impact of changes you make during tuning Defender for Office 365. You can also quickly delete messages from your organization with a few simple clicks.
59
+
- Explorer can be used to hunt threats, visualize mail flow patterns, spot trends, and identify the affect of changes you make during tuning Defender for Office 365. You can also quickly delete messages from your organization with a few simple clicks.
60
60
61
-
**Read more, and get started here:**[Threat Explorer and Real-time detections](../threat-explorer-real-time-detections-about.md)
61
+
**Read more, and get started here:**[Threat Explorer and Real-time detections](../threat-explorer-real-time-detections-about.md)
62
+
63
+
- Advanced hunting can be used to proactively hunt for threats in your organization, using shared queries from the community to help you get started. You can also use custom detections to set up alerts when personalized criteria are met.
64
+
65
+
**Read more, watch an overview video and get started here:**[Overview - Advanced hunting](/defender-xdr/advanced-hunting-overview)
62
66
63
67
## Step 2 – Enhance the value further with these simple steps
64
68
65
69
### Additional protection features
66
70
67
71
- Consider enabling policies beyond the built-in Protection. Enabling time-of-click protection, or impersonation protection, for example, to add extra layers or fill gaps missing from your third party protection. If you have a mail flow rule (also known as a transport rule) or connection filter that overrides verdicts (also known as an SCL=-1 rule) you need to address this configuration before turning on other protection features.
68
72
69
-
**Read more here:**[Anti-phishing policies](../anti-phishing-policies-about.md)
73
+
**Read more here:**[Anti-phishing policies](../anti-phishing-policies-about.md)
70
74
71
-
- If your current security provider is configured to modify messages *in any way*, it's important to note that authentication signals can impact the ability for Defender for Office 365 to protect you against attacks such as spoofing. If your third party supports Authenticated Received Chain (ARC), then enabling this is a highly recommended step in your journey to advanced dual filtering. Moving any message modification configuration to Defender for Office 365 is also an alternative.
75
+
- If your current security provider is configured to modify messages *in any way*, it's important to note that authentication signals can affect the ability for Defender for Office 365 to protect you against attacks such as spoofing. If your third party supports Authenticated Received Chain (ARC), we highly recommend enabling ARC in your journey to advanced dual filtering. Moving any message modification configuration to Defender for Office 365 is also an alternative.
72
76
73
-
**Read more here:**[Configure trusted ARC sealers.](../email-authentication-arc-configure.md)
77
+
**Read more here:**[Configure trusted ARC sealers](../email-authentication-arc-configure.md)
74
78
75
79
- Enhanced Filtering for connectors allows IP address and sender information to be preserved through the third party. This feature improves accuracy for the filtering (protection) stack, post breach capabilities & authentication improvements.
76
80
77
-
**Read more here:**[Enhanced filtering for connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors)
81
+
**Read more here:**[Enhanced filtering for connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors)
78
82
79
83
- Priority account protection offers enhanced visibility for accounts in tooling, along with additional protection when in an advanced defense in-depth configuration state.
80
84
81
-
**Read more here:**[Priority account protection](protect-your-c-suite-with-priority-account-protection.md)
85
+
**Read more here:**[Priority account protection](protect-your-c-suite-with-priority-account-protection.md)
82
86
83
87
- Advanced Delivery should be configured to deliver any third party phish simulations correctly, and if you have a Security Operations mailbox, consider defining it as a SecOps mailbox to ensure emails *don't* get removed from the mailbox due to threats.
84
88
85
-
**Read more here:**[Advanced delivery](../advanced-delivery-policy-configure.md)
86
-
87
-
- You can configure user reported settings to allow users to report good or bad messages to Microsoft, to a designated reporting mailbox (to integrate with current security workflows) or both. Admins can use the **User reported** tab on the **Submissions** page to triage false positives and false negative user reported messages.
89
+
**Read more here:**[Advanced delivery](../advanced-delivery-policy-configure.md)
88
90
89
-
**Read more here:**[Deploy and configure the report message add-in to users.](deploy-and-configure-the-report-message-add-in.md)
90
-
91
-
### Detection, investigation, response, and hunting features
92
-
93
-
- Advanced hunting can be used to proactively hunt for threats in your organization, using shared queries from the community to help you get started. You can also use custom detections to set up alerts when personalized criteria are met.
91
+
- You can configure user reported settings to allow users to report good or bad messages to Microsoft, to a designated reporting mailbox (to integrate with current security workflows) or both using the built-in **Report** button in [supported versions of Outlook](../submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook) or using [supported third-party solutions](../submissions-user-reported-messages-custom-mailbox.md#options-for-third-party-reporting-tools). Admins can use the **User reported** tab on the **Submissions** page to triage false positives and false negative user reported messages.
94
92
95
-
**Read more, watch an overview video and get started here:**[Overview - Advanced hunting](/defender-xdr/advanced-hunting-overview)
93
+
**Read more here:**[User reported settings](../submissions-user-reported-messages-custom-mailbox.md) and [Report phishing and suspicious emails in Outlook for admins](../submissions-outlook-report-messages.md)
96
94
97
95
### Education features
98
96
99
-
- Attack simulation training allows you to run realistic but benign cyber-attack scenarios in your organization. If you don't already have phishing simulation capabilities from your primary email security provider, Microsoft's simulated attacks can help you identify and find vulnerable users, policies, and practices. This capability contains important knowledge to have and correct *before* a real attack impacts your organization. Post simulation we assign in product or custom training to educate users about the threats they missed, ultimately reducing your organization's risk profile. With Attack simulation training, we deliver messages directly into the inbox, so the user experience is rich. This also means no security changes such as overrides needed to get simulations delivered correctly.
97
+
- Attack simulation training allows you to run realistic but benign cyber-attack scenarios in your organization. If you don't already have phishing simulation capabilities from your primary email security provider, Microsoft's simulated attacks can help you identify and find vulnerable users, policies, and practices. This capability contains important knowledge to have and correct *before* a real attack impacts your organization. Post simulation we assign in product or custom training to educate users about the threats they missed, ultimately reducing your organization's risk profile. With Attack simulation training, we deliver messages directly into the inbox, so the user experience is rich. This experience also means no security changes such as overrides needed to get simulations delivered correctly.
100
98
101
99
**Get started here:**[Get started using Attack simulation.](../attack-simulation-training-get-started.md)
102
100
103
101
**Jump right into delivering a simulation here:**[How to setup automated attacks and training within Attack simulation training](how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md)
104
102
105
103
## Step 3 and beyond, becoming a dual use hero
106
104
107
-
-Many of the detection, investigation, response, and hunting activities as previously described should be repeated by your security teams. This guidance offers a detailed description of tasks, cadence, and team assignments we would recommend.
105
+
-Your security teams should repeat many of the detection, investigation, response, and hunting activities as previously described. This guidance offers a detailed description of tasks, cadence, and team assignments we would recommend.
108
106
109
-
**Read More:**[Security Operations Guide for Defender for Office 365](../mdo-sec-ops-guide.md)
107
+
**Read More:**[Security Operations Guide for Defender for Office 365](../mdo-sec-ops-guide.md)
110
108
111
109
- Consider user experiences such as accessing multiple quarantines, or the submission / reporting of false positives and false negatives. You can mark messages detected by the third party service with a custom *X* header. For example, you can use mail flow rules to detect and quarantine email that contains the *X* header. This result also gives users a single place to access quarantined mail.
112
110
113
-
**Read More:**[How to configure quarantine permissions and policies](how-to-configure-quarantine-permissions-with-quarantine-policies.md)
111
+
**Read More:**[How to configure quarantine permissions and policies](how-to-configure-quarantine-permissions-with-quarantine-policies.md)
114
112
115
-
- The Migration guide contains lots of useful guidance on preparing and tuning your environment to ready it for a migration. But many of the steps are *also* applicable to a dual-use scenario. Simply ignore the MX switch guidance in the final steps.
113
+
- The Migration guide contains lots of useful guidance on preparing and tuning your environment to ready it for a migration. But many of the steps are *also* applicable to a dual-use scenario. Ignore the MX switch guidance in the final steps.
116
114
117
-
**Read it here:**[Migrate from a third-party protection service to Microsoft Defender for Office 365 - Office 365 | Microsoft Docs.](../migrate-to-defender-for-office-365.md)
115
+
**Read it here:**[Migrate from a third-party protection service to Microsoft Defender for Office 365 - Office 365 | Microsoft Docs.](../migrate-to-defender-for-office-365.md)
0 commit comments