Skip to content

Latest commit

 

History

History
112 lines (81 loc) · 7.77 KB

threat-trackers.md

File metadata and controls

112 lines (81 loc) · 7.77 KB
title f1.keywords ms.author author manager audience ms.topic ms.localizationpriority search.appverid ms.assetid ms.collection ms.custom description ms.service ms.date appliesto
Threat trackers in Microsoft Defender for Office 365 Plan 2
NOCSH
chrisda
chrisda
deniseb
ITPro
overview
medium
MET150
MOE150
a097f5ca-eac0-44a4-bbce-365f35b79ed1
m365-security
tier2
Learn about Threat Trackers, including new Noteworthy Trackers, to help your organization stay on top of security concerns.
defender-office-365
3/19/2024
✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>

Threat trackers in Microsoft Defender for Office 365 Plan 2

[!INCLUDE MDO Trial banner]

Microsoft 365 organizations that have Microsoft Defender for Office 365 Plan 2 included in their subscription or purchased as an add-on have Threat trackers. Threat trackers are queries that you create and save in Threat Explorer (also known as Explorer). You use these queries to automatically or manually discover cybersecurity threats in your organization.

For information about creating and saving queries in Threat Explorer, see Saved queries in Threat Explorer.

Permissions and licensing for Threat trackers

To use Threat trackers, you need to be assigned permissions. You have the following options:

  • Email & collaboration permissions in the Microsoft Defender portal:
    • Create, save, and modify Threat Explorer queries: Membership in the Organization Management or Security Administrator role groups.
    • Read-only access to Threat Explorer queries on the Threat tracker page: Membership in the Security Reader or Global Reader role groups.
  • Microsoft Entra permissions: Membership these roles gives users the required permissions and permissions for other features in Microsoft 365:
    • Create, save, and modify Threat Explorer queries: Membership in the Global Administrator* or Security Administrator roles.

    • Read-only access to Threat Explorer queries on the Threat tracker page: Membership in the Security Reader or Global Reader roles.

      [!IMPORTANT] * Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

To remediate messages in Threat Explorer, you need additional permissions. For more information, see Permissions and licensing for Threat Explorer and Real-time detections.

To use Threat Explorer or Threat trackers, you need to be assigned a license for Defender for Office 365 (included in your subscription or an add-on license).

Threat Explorer and Threat trackers contain data for users with Defender for Office 365 licenses assigned to them.

Threat trackers

The Threat tracker page is available in the Microsoft Defender portal at https://security.microsoft.com at Email & collaboration > Threat tracker. Or, to go directly to the Threat tracker page, use https://security.microsoft.com/threattrackerv2.

The Threat tracker page contains three tabs:

  • Saved queries: Contains all queries that you saved in Threat Explorer.
  • Tracked queries: Contains the results of queries that you saved in Threat Explorer where you selected Track query. The query automatically runs periodically, and the results are shown on this tab.
  • Trending campaigns: We populate the information on this tab to highlight new threats received in your organization.

These tabs are described in the following subsections.

Saved queries tab

The Save queries tab on the Threat tracker page at https://security.microsoft.com/threattrackerv2 contains all of your saved queries from Threat Explorer. You can use these queries without having to re-create the search filters.

The following information is shown on the Save queries tab. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: Customize columns to change the columns that are shown. By default, all available columns are selected.

  • Date created
  • Name
  • Type
  • Author
  • Last executed
  • Tracked query: This value is controlled by whether you selected Track this query when you created the query in Threat Explorer:
    • No: You need to run the query manually.
    • Yes: The query automatically runs periodically. The query and the results are also available on the Tracked queries page.
  • Actions: Select Explore to open and run the query in Threat Explorer, or to update or save a modified or unmodified copy of the query in Threat Explorer.

If you select a query, the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: Edit and :::image type="icon" source="media/m365-cc-sc-delete-icon.png" border="false"::: Delete actions that appear.

If you select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: Edit, you can update the date and Track query settings of the existing query in the details flyout that opens.

Tracked queries

The Tracked queries tab on the Threat tracker page at https://security.microsoft.com/threattrackerv2 contains the results of queries that you created in Threat Explorer where you selected Track this query. Tracked queries run automatically, giving you up-to-date information without having to remember to run the queries.

The following information is shown on the Tracked queries tab. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: Customize columns to change the columns that are shown. By default, all available columns are selected.

  • Date created
  • Name
  • Today's message count
  • Prior day message count
  • Trend: today vs. prior week
  • Actions: Select Explore to open and run the query in Threat Explorer.

If you select a query, the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: Edit action appears. If you select this action, you can update the date and Track query settings of the existing query in the details flyout that opens.

Trending campaigns tab

The Trending campaigns tab on the Threat tracker page at https://security.microsoft.com/threattrackerv2 automatically highlights new email threats that were recently received by your organization.

The following information is shown on the Trending campaigns tab. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: Customize columns to change the columns that are shown. By default, all available columns are selected.

  • Malware family
  • Prior day message count
  • Trend: today vs. prior week
  • Targeting: your company vs. global
  • Actions: Select Explore to open and run the query in Threat Explorer.