March 31, 2023
Microsoft Security

Microsoft 365 Defender: Threat analytics

Microsoft Security logo

Threat analytics in Microsoft 365 Defender is presented as built-in threat intelligence that helps security teams respond to emerging, high-risk threats without spelunking through five different portals and a haunted spreadsheet. The video shows where to find it (top nav, plus a home-page card that flags threats active on your network) and what you get when you open a threat: a short summary, an Alerts over time view spanning active and resolved alerts, and posture insights that include email detections and mitigations alongside endpoint data. It then walks through the analyst report from the Microsoft Threat Intelligence team—deep-dive analysis that can include attack-chain diagrams, MITRE techniques, recommended mitigations, detection details, and sometimes Advanced Hunting queries—before exploring the threat-specific tabs: Related incidents, Impacted assets (devices and mailboxes with trending charts), Prevented email attempts (delivery actions/locations), and Exposure and mitigations with links into Microsoft Defender Vulnerability Management for secure configuration and vulnerability insights.

We produced this as a “read, assess, act” demo that keeps the workflow crisp: understand the threat, see your exposure, and move straight into remediation. In preproduction we shaped the narrative around what security teams actually need in the moment, in production we captured clean screens with professional voiceover and paced music, and in post we trimmed the noise so the tabs, charts, and next steps land quickly. The result is a walkthrough that helps viewers turn threat intel into action—faster incident handling, clearer asset impact, and a tighter feedback loop on mitigations—delivered with closed captions, audio description, and thumbnails.

Microsoft Security logo
Share this video