You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/describe-threat-protection-with-microsoft-365-defender/includes/6b-describe-defender-threat-intelligence.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,9 @@ Threat analytics helps you understand how emerging threats impact your organizat
16
16
17
17
The threat analytics dashboard surfaces the reports most relevant to your organization in three categories:
18
18
19
-
-**Latest threats—the most recently published or updated threat reports, along with the number of active and resolved alerts.
20
-
-**High-impact threats—threats with the highest number of active and resolved alerts in your organization.
21
-
-**Highest exposure—threats to which your organization has the highest exposure, calculated based on the severity of associated vulnerabilities and the number of devices in your organization that could be exploited.
19
+
-**Latest threats**—the most recently published or updated threat reports, along with the number of active and resolved alerts.
20
+
-**High-impact threats**—threats with the highest number of active and resolved alerts in your organization.
21
+
-**Highest exposure**—threats to which your organization has the highest exposure, calculated based on the severity of associated vulnerabilities and the number of devices in your organization that could be exploited.
22
22
23
23
### Intel profiles
24
24
@@ -60,8 +60,8 @@ Microsoft Security Copilot integrates with Defender TI. With the Defender TI plu
60
60
61
61
Copilot includes two built-in promptbooks for Defender TI:
62
62
63
-
-**Vulnerability impact assessment—generates a report summarizing the intelligence for a known vulnerability, including steps on how to address it.
64
-
-**Threat actor profile—generates a report profiling a known threat actor group, including suggestions to defend against their common tools and tactics.
63
+
-**Vulnerability impact assessment**—generates a report summarizing the intelligence for a known vulnerability, including steps on how to address it.
64
+
-**Threat actor profile**—generates a report profiling a known threat actor group, including suggestions to defend against their common tools and tactics.
65
65
66
66
Copilot is also embedded directly in the Threat intelligence section of the Microsoft Defender portal. On any of the following pages, you can use available prompts or enter your own:
0 commit comments