December 20, 2022
Microsoft Security

Microsoft Defender Experts for Hunting explainer

Microsoft Security logo

This animation shows how Microsoft Defender Experts for Hunting uses chip-to-cloud signals across Microsoft 365 Defender to find and validate threats—then tells a specific story: a large-scale adversary-in-the-middle attack that led to a business email compromise campaign. It explains how attackers proxy traffic between a user and a legitimate site, steal credentials, intercept session cookies, and gain access even with MFA enabled. From there, the BEC campaign escalates into mailbox access, data enumeration, mailbox rules, payment fraud, and more—while Microsoft 365 Defender surfaces clues like unusual sign-ins, impossible travel, and suspicious inbox manipulation. The payoff: Defender Experts correlates cross-domain signals, notifies customers with full context and remediation steps, shares the hunting queries used, and feeds intelligence back to improve protection at scale—closing with aka.ms/DefenderExpertsforHunting.

We produced this as a mini cyber-thriller with a practical ending—because “here’s the attack” is only useful if “here’s what to do next” shows up on time. We shaped the narrative around cause-and-effect, then used animation timing to keep the escalation clear without turning it into acronym soup. Voiceover stays calm, visuals keep the thread unbroken, and sound design adds momentum without stealing clarity. Final delivery included closed captions, audio description, and thumbnails—so the story and the guidance travel well.

Microsoft Security logo
Share this video