• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Microsoft Launches Defender Experts for Hunting

Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint.

August 3, 2022 Zachary Comeau Leave a Comment

Microsoft Entra Verified ID
Dvoevnore /stock.adobe,com

Microsoft is helping organizations add to their security operations center’s threat hunting capabilities with Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint.

According to Microsoft, experts will hunt for suspicious activity across endpoints, Office 365, cloud app and identities, and hand off that contextual alert information and remediation instructions to the customers’ security professionals so they can quickly respond.

The company says the new service includes advanced threat hunting and analysis that helps expose advanced threats and identify the scope of impact of the malicious activity associated with human attackers or hand-on-keyboard attacks.

Notifications will show up as incidents in Microsoft 365 Defender to help improve incident response with specific information about the scope and method of entry.

For help on a specific threat, users can click an “Ask Defender Experts” button in the Microsoft 365 Defender portal to get expert advice about threats the organization is facing. Security professionals can also ask for help on specific incidents, nation-state actors or an attack vector.

Those experts will share their learnings back into the automated tools they used to help improve threat discovery and prioritization, and an interactive report that summarizes what was found will be generated.

In a blog, Microsoft bills the new offering as a way to help understaffed and under-skilled IT and security teams respond to a constant barrage of cybersecurity threats, with Microsoft saying it blocked more than 9.6 billion malware threats and more than 35.7 billion phishing and malicious emails in 2021. With attacks extending to identity, cloud apps and email, coupled with the cybersecurity skills crisis, organizations are having a hard time protecting all of their IT assets.

This is how the service works, according to Microsoft:

  • Step 1: Microsoft Defender Experts monitor telemetry and look for malicious activity across the Microsoft 365 Defender platform associated with human adversaries or hands-on-keyboard attacks.
  • Step 2: If a threat is found to be valid, analysts conduct a deep-dive investigation, harnessing machine learning and gathering threat details, including scope and method of entry, to help protect your organization’s endpoints, email, cloud apps, and identities.
  • Step 3: Our AI system and human hunters prioritize threat signals. Defender expert notifications appear in Microsoft 365 Defender, alerting you to the threat and sharing threat details.

Tagged With: Cybersecurity, Defender, Microsoft

Related Content:

  • Avocor W Series 8 All-in-One Videoconferencing Displays That Make Meetings Easier
  • DTEN ONboard DTEN Launches ONboard for Zoom Whiteboard
  • GoTo Connect, GoTo Resolve GoTo Brings IT Helpdesk Support to GoTo Connect
  • Zoom macOS Update Zoom on macOS Devices Now

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.