www.microsoft.com Open in urlscan Pro
2a02:26f0:6c00:292::356e  Public Scan

URL: https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence
Submission: On October 07 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: searchFormGET https://www.microsoft.com/en-us/security/site-search

<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest=""
  data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
  data-m="{&quot;cN&quot;:&quot;GlobalNav_Search_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c9c4c1m1r1a1&quot;}" aria-expanded="false"
  style="overflow-x: visible;">
  <input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-autocomplete="list" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search"
    name="q" role="combobox" placeholder="Search Microsoft Security" data-m="{&quot;cN&quot;:&quot;SearchBox_nav&quot;,&quot;id&quot;:&quot;n1c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" data-toggle="tooltip"
    data-placement="right" title="Search Microsoft Security" style="overflow-x: visible;">
  <button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{&quot;cN&quot;:&quot;Search_nav&quot;,&quot;id&quot;:&quot;n2c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}"
    data-bi-mto="true" aria-expanded="false" style="overflow-x: visible;">
    <span role="presentation" style="overflow-x: visible;">Search</span>
    <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft Security</span>
  </button>
  <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
    <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
      data-m="{&quot;cN&quot;:&quot;search suggestions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" style="overflow-x: visible;"></ul>
  </div>
</form>

Text Content

We use optional cookies to improve your experience on our websites, such as
through social media connections, and to display personalized advertising based
on your online activity. If you reject optional cookies, only cookies necessary
to provide you the services will be used. You may change your selection by
clicking “Manage Cookies” at the bottom of the page. Privacy Statement
Third-Party Cookies

Accept Reject Manage cookies
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
 * Home
 * Solutions
    * Cloud security
    * Frontline workers
    * Identity & access
    * Industrial & critical infrastructure
    * Information protection & governance
    * IoT security
    * Passwordless authentication
    * Phishing
    * Ransomware
    * Risk management
    * Secure remote work
    * SIEM & XDR
    * Small & medium business
    * Zero Trust

 * Products
    * Product families Product families
      * Microsoft Defender
      * Microsoft Entra
      * Microsoft Priva
      * Microsoft Purview
    * Identity & access Identity & access
      * Azure Active Directory part of Microsoft Entra
      * Microsoft Entra Permissions Management
      * Microsoft Entra Verified ID
      * Azure Key Vault
    * SIEM & XDR SIEM & XDR
      * Microsoft Sentinel
      * Microsoft Defender for Cloud
      * Microsoft 365 Defender
      * Microsoft Defender for Endpoint
      * Microsoft Defender for Office 365
      * Microsoft Defender for Identity
      * Microsoft Defender for Cloud Apps
      * Microsoft Defender Vulnerability Management
      * Microsoft Defender Threat Intelligence
    * Cloud security Cloud security
      * Microsoft Defender for Cloud
      * Microsoft Defender External Attack Surface Management
      * Azure Firewall
      * Azure Web App Firewall
      * Azure DDoS Protection
      * GitHub Advanced Security
    * Endpoint security Endpoint security
      * Microsoft 365 Defender
      * Microsoft Defender for Endpoint
      * Microsoft Defender for IoT
      * Microsoft Defender for Business
      * Microsoft Defender Vulnerability Management
    * Risk management & privacy Risk management & privacy
      * Microsoft Purview Insider Risk Management
      * Microsoft Purview Communication Compliance
      * Microsoft Purview eDiscovery
      * Microsoft Purview Compliance Manager
      * Microsoft Purview Audit
      * Microsoft Priva Risk Management
      * Microsoft Priva Subject Rights Requests
    * Information protection Information protection
      * Microsoft Purview Information Protection
      * Microsoft Purview Data Lifecycle Management
      * Microsoft Purview Data Loss Prevention
    * Device management Device management
      * Microsoft Endpoint Manager

 * Services
    * Microsoft Security Experts
    * Microsoft Defender Experts for Hunting
    * Microsoft Security Services for Enterprise
    * Microsoft Security Services for Incident Response
    * Microsoft Security Services for Modernization

 * Partners
 * Resources
    * Get started Get started
      * Customer stories
      * Security 101
      * Product trials
      * How we protect Microsoft
    * Reports and analysis Reports and analysis
      * Industry recognition
      * Microsoft Security Insider
      * Microsoft Digital Defense Report
      * Security Response Center
    * Community Community
      * Microsoft Security Blog
      * Microsoft Security Events
      * Microsoft Tech Community
    * Documentation and training Documentation and training
      * Documentation
      * Technical Content Library
      * Training & certifications
    * Additional sites Additional sites
      * Compliance Program for Microsoft Cloud
      * Microsoft Trust Center
      * Security Engineering Portal
      * Service Trust Portal

 * Contact sales
 * More
 * Start free trial

 * All Microsoft
    * * Microsoft Security
      * Azure
      * Dynamics 365
      * Microsoft 365
      * Microsoft Teams
      * Windows 365
    * Tech & innovation Tech & innovation
      * Microsoft Cloud
      * AI
      * Azure Space
      * Mixed reality
      * Microsoft HoloLens
      * Microsoft Viva
      * Quantum computing
      * Sustainability
    * Industries Industries
      * Education
      * Automotive
      * Financial services
      * Government
      * Healthcare
      * Manufacturing
      * Retail
      * All industries
    * Partners Partners
      * Find a partner
      * Become a partner
      * Partner Network
      * Find an advertising partner
      * Become an advertising partner
      * Azure Marketplace
      * AppSource
    * Resources Resources
      * Blog
      * Microsoft Advertising
      * Developer Center
      * Documentation
      * Events
      * Licensing
      * Microsoft Learn
      * Microsoft Research
    * View Sitemap

Search Search Microsoft Security

Cancel
Sign in to your account
Sign in



MICROSOFT DEFENDER THREAT INTELLIGENCE

Help protect your organization from modern adversaries and threats like
ransomware.

Contact Sales
Microsoft Defender Threat Intelligence
 * Contact Sales





STOP RANSOMWARE WITH MICROSOFT SECURITY

Don’t just react to threats. Get ahead of them. Watch this digital event to
learn how to safeguard your organization from today’s attacks – and be ready for
tomorrow’s.

Watch now



UNCOVER YOUR ADVERSARIES

Help eliminate modern threats and their infrastructure with dynamic threat
intelligence.


IDENTIFY ATTACKERS AND THEIR TOOLS

Understand how your online connections work and identify your potential threat
exposures with a complete map of the internet.


ACCELERATE DETECTION AND REMEDIATION

Discover the full scope of an attack. Understand an online adversary’s entire
toolkit, prevent access by all their machines and known entities, and
continuously block a single IP address or domain.


ENHANCE YOUR SECURITY TOOLS AND WORKFLOWS

Extend the reach and visibility of your existing security investments. Use the
raw cyberthreat intelligence of effective security tools to gain more context
and understand threats more deeply.





MICROSOFT DEFENDER THREAT INTELLIGENCE

Gain an unparalleled view of the ever-changing threat landscape. Defender Threat
Intelligence maps the entire internet to expose threat actors and their
infrastructure. Get the cyberthreat intelligence you need to block an entire
attack and keep your organization safe from complex threats like ransomware.

Watch the video

Play



Play Skip ahead to live broadcast. LIVE 00:00 / 00:00
0
More options

0
Full Screen





CAPABILITIES

Uncover and help eliminate threats with Defender Threat Intelligence.

Get continuous threat intelligence
 * Get continuous threat intelligence
 * Expose adversaries and their methods
 * Enhance alert investigations
 * Accelerate incident response
 * Hunt threats as a team
 * Expand prevention and improve security posture


GET CONTINUOUS THREAT INTELLIGENCE

Scan the internet to create a complete picture of day-to-day changes. Create
threat intelligence for your own business to understand and reduce exposure.




EXPOSE ADVERSARIES AND THEIR METHODS

Understand the group behind an online attack, their methods, and how they
typically operate.




ENHANCE ALERT INVESTIGATIONS

Combine Microsoft Sentinel and Microsoft 365 Defender incident data with
external threat intelligence to uncover the full scale of a threat or attack.




ACCELERATE INCIDENT RESPONSE

Investigate and remove a single malicious IP or domain and all the known
entities and resources operated by an attacker or threat family.




HUNT THREATS AS A TEAM

Easily collaborate on investigations across global teams using the Defender
Threat Intelligence workbench. Share insights across the organization.




EXPAND PREVENTION AND IMPROVE SECURITY POSTURE

Export lists of malicious entities, IPs, and domains. Block internal resources
from accessing dangerous internet resources and help stop outside threats.


Get continuous threat intelligence
Expose adversaries and their methods
Enhance alert investigations
Accelerate incident response
Hunt threats as a team
Expand prevention and improve security posture


GET CONTINUOUS THREAT INTELLIGENCE

Scan the internet to create a complete picture of day-to-day changes. Create
threat intelligence for your own business to understand and reduce exposure.




EXPOSE ADVERSARIES AND THEIR METHODS

Understand the group behind an online attack, their methods, and how they
typically operate.




ENHANCE ALERT INVESTIGATIONS

Combine Microsoft Sentinel and Microsoft 365 Defender incident data with
external threat intelligence to uncover the full scale of a threat or attack.




ACCELERATE INCIDENT RESPONSE

Investigate and remove a single malicious IP or domain and all the known
entities and resources operated by an attacker or threat family.




HUNT THREATS AS A TEAM

Easily collaborate on investigations across global teams using the Defender
Threat Intelligence workbench. Share insights across the organization.




EXPAND PREVENTION AND IMPROVE SECURITY POSTURE

Export lists of malicious entities, IPs, and domains. Block internal resources
from accessing dangerous internet resources and help stop outside threats.






HOW MICROSOFT DEFENDER THREAT INTELLIGENCE WORKS

Microsoft tracks over 24 trillion signals daily, helping security teams identify
vulnerabilities with greater efficacy and stay ahead of today's threats.

View full size
More about the diagram



INTEGRATED THREAT PROTECTION WITH SIEM AND XDR

Microsoft empowers your organization’s defenders by putting the right tools and
intelligence in the hands of the right people. Combine security information and
event management (SIEM) and extended detection and response (XDR) to increase
efficiency and effectiveness while securing your digital estate.


Microsoft 365 Defender Microsoft Sentinel Microsoft Defender for Cloud


MICROSOFT 365 DEFENDER

Prevent and detect attacks across your Microsoft 365 workloads with built-in XDR
capabilities.

Learn more about Microsoft 365 Defender


MICROSOFT SENTINEL

Aggregate security data and correlate alerts from virtually any source with
cloud-native SIEM from Microsoft.

Learn more about Microsoft Sentinel


MICROSOFT DEFENDER FOR CLOUD

Help protect your multicloud and hybrid cloud workloads with built-in XDR
capabilities.

Learn more about Microsoft Defender for Cloud


MICROSOFT 365 DEFENDER

Prevent and detect attacks across your Microsoft 365 workloads with built-in XDR
capabilities.

Learn more about Microsoft 365 Defender


MICROSOFT SENTINEL

Aggregate security data and correlate alerts from virtually any source with
cloud-native SIEM from Microsoft.

Learn more about Microsoft Sentinel


MICROSOFT DEFENDER FOR CLOUD

Help protect your multicloud and hybrid cloud workloads with built-in XDR
capabilities.

Learn more about Microsoft Defender for Cloud




RELATED PRODUCTS

Use best-in-class Microsoft security products to help prevent and detect attacks
across your organization.

Learn more


MICROSOFT SENTINEL

See and stop threats across your entire enterprise with intelligent security
analytics.

Learn more


MICROSOFT DEFENDER FOR CLOUD

Increase protection in your multicloud and hybrid environments.

Learn more


MICROSOFT DEFENDER EXTERNAL ATTACK SURFACE MANAGEMENT

Understand your security posture beyond the firewall.

Learn more




ADDITIONAL RESOURCES




ANNOUNCEMENT

READ THE THREAT INTELLIGENCE BLOG

Learn about the new threat intelligence offerings from Microsoft.

Learn more


INFOGRAPHIC

HELP PROTECT YOUR BUSINESS WITH THREAT INTELLIGENCE

Learn how to use internet threat intelligence to defend your organization
against attacks.

Learn more


DOCUMENTATION

BEST PRACTICES AND IMPLEMENTATION

Get started with threat intelligence solutions for your organization today.

Learn more


INFOGRAPHIC

THE SCALE AND SCOPE OF CYBERCRIME IN 60 SECONDS

During a cyberattack, every second counts. We’ve condensed a year’s worth of
cybersecurity research into one 60-second window.

Learn more



PROTECT EVERYTHING

Make your future more secure. Explore your security options today.

Contact Sales
Start free trial




--------------------------------------------------------------------------------

Follow Microsoft
 * LinkedIn
 * Twitter
 * Blog

What's new
 * Surface Laptop Go 2
 * Surface Pro 8
 * Surface Laptop Studio
 * Surface Pro X
 * Surface Go 3
 * Surface Duo 2
 * Surface Pro 7+
 * Windows 11 apps

Microsoft Store
 * Account profile
 * Download Center
 * Microsoft Store support
 * Returns
 * Order tracking
 * Virtual workshops and training
 * Microsoft Store Promise
 * Flexible Payments

Education
 * Microsoft in education
 * Devices for education
 * Microsoft Teams for Education
 * Microsoft 365 Education
 * Education consultation appointment
 * Educator training and development
 * Deals for students and parents
 * Azure for students

Business
 * Microsoft Cloud
 * Microsoft Security
 * Dynamics 365
 * Microsoft 365
 * Microsoft Power Platform
 * Microsoft Teams
 * Microsoft Industry
 * Small Business

Developer & IT
 * Azure
 * Developer Center
 * Documentation
 * Microsoft Learn
 * Microsoft Tech Community
 * Azure Marketplace
 * AppSource
 * Visual Studio

Company
 * Careers
 * About Microsoft
 * Company news
 * Privacy at Microsoft
 * Investors
 * Diversity and inclusion
 * Accessibility
 * Sustainability

English (United States)
 * Sitemap
 * Contact Microsoft
 * Privacy
 * Manage cookies
 * Terms of use
 * Trademarks
 * Safety & eco
 * About our ads
 * © Microsoft 2022

Video player

Close dialog
Modal dialog

Microsoft Defender Threat Intelligence is a complete threat intelligence
platform. It helps security professionals analyze and act upon signals collected
from the internet by a global collection network and processed by security
experts and machine learning. These data sets show the infrastructure
connections across the global threat landscape, uncovering an organization’s
external attack surface and enabling teams to investigate the tools and systems
used to attack it. Defender Threat Intelligence provides external context for
internal security incidents via SIEM and XDR capabilities in Microsoft Sentinel
and Microsoft 365 Defender.

Dialog closed