Skip to content

Commit d9a2fae

Browse files
committed
Learn Editor: Update apivendorecosystem.md
1 parent aed5e53 commit d9a2fae

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

defender-office-365/apivendorecosystem.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -45,22 +45,22 @@ Integration features are available to customers with Microsoft Defender for Offi
4545

4646
## Getting Started
4747

48-
**Check License Eligibility**
48+
1. **Check License Eligibility**
4949

5050
1. Ensure your tenant has MDO P2 or Microsoft 365 E5 licenses.
5151

52-
**Select a Partner**
52+
1. **Select a Partner**
53+
54+
1. Choose from approved API vendors listed above.
55+
56+
1. **Enable Integration**
57+
58+
1. Upon onboarding to the strategic integration partner, their solution is seamlessly and automatically incorporated into your security architecture.
59+
60+
1. **Monitor and Manage**
61+
62+
1. Use the unified dashboards and quarantine to monitor threat activity and take action.
5363

54-
1. Choose from approved API vendors listed above.
55-
56-
**Enable Integration**
57-
58-
1. Upon onboarding to the strategic integration partner, their solution is seamlessly and automatically incorporated into your security architecture.
59-
60-
**Monitor and Manage**
61-
62-
1. Use the unified dashboards and quarantine to monitor threat activity and take action.
63-
6464
## Understanding the Integration
6565

6666
The integration works by allowing the third-party to pass in details on a specific message regarding the verdict, confidence level, and any threat details they would like to share via a private Microsoft Graph API. Microsoft Defender for Office 365 acknowledges the verdict provided and determine what the highest verdict on a message was. MDO updates the message and/or logs with the verdict information, moving the message to the user policy-specified location. You'll be able to see the results of this integration in multiple unified experiences, including Reporting, Advanced Hunting, Email Entity, Quarantine, and Threat Explorer.

0 commit comments

Comments
 (0)