This demo introduces unified indicators of compromise (IoCs) across the Microsoft 365 Defender portal—so SecOps teams can manage indicators like file hashes, IPs, domains, and URLs in one place. It shows where to create and manage IoCs, how indicators can be set to allow, block, or warn, and how they apply across products like Defender for Endpoint and Defender for Office 365. The walkthrough also touches on tracking indicator status and using IoCs as a fast way to operationalize threat intel.
We produced this as a crisp “turn intel into enforcement” walkthrough: minimal theory, clear steps, and a flow that mirrors how analysts work when something urgent lands in their inbox. The edit focuses on the indicator decisions and their security impact, so viewers walk away with a repeatable pattern they can use immediately. Final delivery includes closed captions, audio description, and thumbnails.



