|
| 1 | +--- |
| 2 | +title: Access indicators in threat analytics in Microsoft Defender (preview) |
| 3 | +ms.reviewer: |
| 4 | +description: Learn about the indicators section of each threat analytics report and how to get access to it |
| 5 | +search.appverid: met150 |
| 6 | +ms.service: defender-xdr |
| 7 | +ms.subservice: adv-hunting |
| 8 | +f1.keywords: |
| 9 | +- NOCSH |
| 10 | +ms.author: pauloliveria |
| 11 | +author: poliveria |
| 12 | +ms.localizationpriority: medium |
| 13 | +manager: orspodek |
| 14 | +audience: ITPro |
| 15 | +ms.collection: |
| 16 | +- m365-security |
| 17 | +- tier1 |
| 18 | +ms.topic: how-to |
| 19 | +ms.custom: |
| 20 | +- cx-ti |
| 21 | +- cx-ta |
| 22 | +ms.date: 11/03/2025 |
| 23 | +--- |
| 24 | + |
| 25 | +# Get access to IOCs in threat analytics in Microsoft Defender (preview) |
| 26 | + |
| 27 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)] |
| 28 | + |
| 29 | +**Applies to:** |
| 30 | + |
| 31 | +- Microsoft Defender XDR |
| 32 | + |
| 33 | +[!INCLUDE [Prerelease](../includes/prerelease.md)] |
| 34 | + |
| 35 | +Each [threat analytics report](threat-analytics.md) includes an *indicators* section that lists all indicators of compromise (IOCs) associated with the threat. Microsoft researchers update these IOCs in real time as they find new evidence related to the threat. This information helps your security operations center (SOC) and threat intelligence analysts with remediation and proactive hunting. The list also retains expired IOCs, so you can investigate past threats and understand their impact in your environment. |
| 36 | + |
| 37 | +Because IOCs are valuable information in the context of prevalent threats and threat campaigns, only verified Microsoft Defender customers can access them. This article explains how you can check if you have access to the indicators section and how you unlock it if you don't. |
| 38 | + |
| 39 | +## View IOCs in threat analytics |
| 40 | +To access the indicators section, go to the **Threat analytics** page, open the report about the tracked threat, and select the **Indicators** tab. |
| 41 | + |
| 42 | +If you're a verified customer, you can immediately see the list of IOCs displayed in this section. |
| 43 | + |
| 44 | +:::image type="content" source="/defender-xdr/media/ta-indicators/indicators-full.png" alt-text="Screenshot of the Indicators tab in a threat analytics report." lightbox="/defender-xdr/media/ta-indicators/indicators-full.png"::: |
| 45 | + |
| 46 | +Otherwise, the page informs you that access to indicators is restricted. |
| 47 | + |
| 48 | +:::image type="content" source="/defender-xdr/media/ta-indicators/indicators-restricted.png" alt-text="Screenshot of a restricted Indicators tab in a threat analytics report." lightbox="/defender-xdr/media/ta-indicators/indicators-restricted.png"::: |
| 49 | + |
| 50 | +## Unlock access to indicators |
| 51 | +To unlock the indicators section, follow these steps: |
| 52 | + |
| 53 | +1. On the **Indicators** page, select **Complete Verification** |
| 54 | +1. On the verification page that opens, provide the required information and supporting documents, if applicable |
| 55 | +1. Select **Submit verification request** |
| 56 | + |
| 57 | +The verification process might take at least an hour. After the process completes, refresh the **Indicators** tab. If your tenant is validated successfully, you see the list of IOCs displayed in this section. |
| 58 | + |
| 59 | +>[!NOTE] |
| 60 | +>In some cases, we might require additional information during the verification process. We communicate these requirements through email. |
| 61 | +
|
| 62 | +If you still don't have access to the **Indicators** section after going through the verification process, contact the email address displayed on the page. |
| 63 | + |
| 64 | +:::image type="content" source="/defender-xdr/media/ta-indicators/indicators-contact.png" alt-text="Screenshot of a restricted Indicators tab in a threat analytics report showing the email address to contact." lightbox="/defender-xdr/media/ta-indicators/indicators-contact.png"::: |
| 65 | + |
| 66 | +## See also |
| 67 | + |
| 68 | +- [Threat analytics overview](threat-analytics.md) |
| 69 | +- [Understand the analyst report section](threat-analytics-analyst-reports.md) |
| 70 | +- [Proactively find threats with advanced hunting](advanced-hunting-overview.md) |
| 71 | + |
| 72 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)] |
0 commit comments