10
Magnifying the Unseen – Threat Intelligence and Reports
Embarking on a journey through threat intelligence, this chapter starts with the genesis of the concept and the meticulous methods utilized by Microsoft to gather solid threat data. We will probe into how this knowledge is effectively applied across the Defender product range, emphasizing the importance of real-time insights in shaping proactive defenses. The chapter unveils an assortment of Microsoft’s available threat intelligence reports, scrutinizing their content and the role they play in shaping cybersecurity tactics. At the same time, we explore the comprehensive Defender Threat Intelligence (Defender TI) offering, which can further improve an organization’s threat intelligence ...
Get Mastering Microsoft Defender for Office 365 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.