Skip to content

Commit aeafdbe

Browse files
authored
Merge pull request #5726 from MicrosoftDocs/poliveria-ti-11242025
Update threat analytics doc for clarity and Sentinel info
2 parents 12d9766 + ad3c3b1 commit aeafdbe

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

defender-xdr/threat-analytics.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.custom:
2020
- cx-ta
2121
- seo-marvel-apr2020
2222
search.appverid: met150
23-
ms.date: 11/03/2025
23+
ms.date: 11/24/2025
2424
---
2525

2626
# Threat analytics in Microsoft Defender
@@ -62,6 +62,8 @@ To access Threat analytics in the Defender portal, you need a license for at lea
6262

6363
>[!NOTE]
6464
> The Microsoft Defender for Endpoint P1 license is an exception to this prerequisite and doesn't grant Threat analytics access.
65+
>
66+
> Microsoft Sentinel SIEM customers have access to certain Threat analytics sections or tabs only. [Learn more](/azure/sentinel/threat-analytics-sentinel)
6567
6668
The following roles and permissions are also required to access Threat analytics:
6769
- **Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
@@ -137,7 +139,7 @@ The **Overview** section provides a preview of the detailed analyst report. It a
137139
Each report includes the following details about a threat, whenever applicable or available, providing you a quick glance of what the threat is and how it might impact your organization:
138140
- **Aliases**—lists the publicly disclosed names given by other security vendors to the threat
139141
- **Origin**—shows the country or region the threat originated from
140-
- **Related intelligence**—lists other threat analytics reports that relevant or are related to the threat
142+
- **Related intelligence**—lists other threat analytics reports that are relevant or related to the threat
141143
- **Targets**—lists the countries or regions and industries targeted by the threat
142144
- **MITRE attack techniques**—lists the threat’s observed tactics, techniques, and procedures (TTPs) according to the [MITRE ATT&CK framework](https://attack.mitre.org/)
143145

@@ -148,8 +150,8 @@ Each report includes charts designed to provide information about the organizati
148150
- **Related incidents**—provides an overview of the impact of the tracked threat to your organization with the following data:
149151
- Number of active alerts and the number of active incidents they're associated with
150152
- Severity of active incidents
151-
- **Alerts over time**—shows the number of related **Active** and **Resolved** alerts over time. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should be showing alerts resolved within a few days.
152-
- **Impacted assets**—shows the number of distinct assets that currently have at least one active alert associated with the tracked threat. Alerts are triggered for mailboxes that received threat emails. Review both org- and user-level policies for overrides that cause the delivery of threat emails.
153+
- **Alerts over time**—shows the number of related **Active** and **Resolved** alerts over time. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should show alerts resolved within a few days.
154+
- **Impacted assets**—shows the number of distinct assets that currently have at least one active alert associated with the tracked threat. Alerts are triggered for mailboxes that receive threat emails. Review both org- and user-level policies for overrides that cause the delivery of threat emails.
153155

154156
#### Review security resilience and posture
155157

@@ -221,7 +223,7 @@ Threat analytics leverages and integrates various Microsoft Defender and [Micros
221223

222224
### Set up the Threat Intelligence Briefing Agent (preview)
223225

224-
You can set up the Threat Intelligence Briefing Agent to get timely, relevant threat intelligence reports with detailed technical analysis based on the latest threat actor activity and both internal and external vulnerability exposure. The agent correlates Microsoft threat data and customer signals to add critical context to threat information in a matter of minutes, saving analyst teams hours or even days spent on intelligence gathering and correlation.
226+
Set up the Threat Intelligence Briefing Agent to get timely, relevant threat intelligence reports with detailed technical analysis based on the latest threat actor activity and both internal and external vulnerability exposure. The agent correlates Microsoft threat data and customer signals to add critical context to threat information in a matter of minutes, saving analyst teams hours or even days spent on intelligence gathering and correlation.
225227

226228
Once deployed, the Threat Intelligence Briefing Agent appears as a banner at the top of the Threat analytics page.
227229

@@ -231,19 +233,19 @@ Once deployed, the Threat Intelligence Briefing Agent appears as a banner at the
231233

232234
### Set up custom detections and link them to Threat analytics reports
233235

234-
You can set up [custom detection rules](custom-detection-rules.md#2-create-new-rule-and-provide-alert-details) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
236+
Set up [custom detection rules](custom-detection-rules.md#2-create-new-rule-and-provide-alert-details) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
235237

236238
:::image type="content" source="/defender/media/threat-analytics/ta-custom-detection.png" alt-text="Screenshot of custom detection setup page with Threat analytics option highlighted." lightbox="/defender/media/threat-analytics/ta-custom-detection.png":::
237239

238240
[Learn more about creating and managing custom detections rules](custom-detection-rules.md)
239241

240242
### Set up email notifications for report updates
241243

242-
You can set up email notifications that send you updates on Threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
244+
Set up email notifications that send you updates on Threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
243245

244246
## Other report details and limitations
245247

246-
When you look at the threat analytics data, remember the following factors:
248+
When you review the threat analytics data, consider the following factors:
247249

248250
- The checklist in the **Recommended actions** tab only displays recommendations tracked in [Microsoft Secure Score](microsoft-secure-score.md). Check the **Analyst report** tab for more recommended actions that aren't tracked in Secure Score.
249251
- The recommended actions don't guarantee complete resilience and only reflect the best possible actions needed to improve it.

0 commit comments

Comments
 (0)