Microsoft Defender for Business security operations guide
If you're new to Defender for Business, or if your business doesn't have a security operations guide in place yet, use this article as a starting point. If you do already have a security operations guide, review it against the recommendations in this article.
You can use this guidance to make decisions about security incident priorities and tasks your security team will perform in the Microsoft Defender portal (https://security.microsoft.com).
Security operations tasks to perform
Daily tasks
Task | Description |
---|---|
Check your threat vulnerability management dashboard | Get a snapshot of threat vulnerability by looking at your vulnerability management dashboard, which reflects how vulnerable your organization is to cybersecurity threats. A high exposure score means your devices are more vulnerable to exploitation. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, select Vulnerability management > Dashboard. 2. Take a look at your Organization exposure score. If it's in the acceptable or "High" range, you can move on. If it isn't, select Improve score to see more details and security recommendations to improve this score. Being aware of your exposure score helps you to: - Quickly understand and identify high-level takeaways about the state of security in your organization - Detect and respond to areas that require investigation or action to improve the current state - Communicate with peers and management about the impact of security efforts |
Review pending actions in the Action center | As threats are detected, remediation actions come into play. Depending on the particular threat and how your security settings are configured, remediation actions might be taken automatically or only upon approval, which is why these should be monitored regularly. Remediation actions are tracked in the Action center. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, choose Action center. 2. Select the Pending tab to view and approve (or reject) any pending actions. Such actions can arise from antivirus or antimalware protection, automated investigations, manual response activities, or live response sessions. 3. Select the History tab to view a list of completed actions. |
Review devices with threat detections | When threats are detected on devices, your security team needs to know so that any needed actions, such as isolating a device, can be taken promptly. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, choose Reports > General > Security report. 2. Scroll down to the Vulnerable devices row. If threats were detected on devices, you'll see that information in this row. |
Learn about new incidents or alerts | As threats are detected and alerts are triggered, incidents are created. Your company's security team can view and manage incidents in the Microsoft 365 Defender portal. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation menu, select Incidents. Incidents are displayed on the page with associated alerts. 2. Select an alert to open its flyout pane, where you can learn more about the alert. 3. In the flyout, you can see the alert title, view a list of assets (such as endpoints or user accounts) that were affected, take available actions, and use links to view more information and even open the details page for the selected alert. |
Run a scan or automated investigation | Your security team can initiate a scan or an automated investigation on a device that has a high risk level or detected threats. Depending on the results of the scan or automated investigation, remediation actions can occur automatically or upon approval. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, choose Assets > Devices. 2. Select a device to open its flyout panel, and review the information that is displayed. - Select the ellipsis (...) to open the actions menu. - Select an action, such as Run antivirus scan or Initiate Automated Investigation. |
Weekly tasks
Task | Description |
---|---|
Monitor and improve your security score | Microsoft Secure Score is a measurement of your organization's security posture. Higher numbers indicate that fewer improvement actions are needed. By using Secure Score, you can: - Report on the current state of your organization's security posture. - Improve your security posture by providing discoverability, visibility, guidance, and control. - Compare with benchmarks and establish key performance indicators (KPIs). To check your score, follow these steps: 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane choose Secure score. 2. Review and make decisions about the remediations and actions in order to improve your overall Microsoft secure score. |
Improve your secure score for devices | Improve your security configuration by remediating issues using the security recommendations list. As you do so, your Microsoft Secure Score for Devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities going forward. It's always worth the time it takes to review and improve your score. To check your secure score, follow these steps: 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane select Secure score. 2. From the Microsoft Secure Score for Devices card in the Defender Vulnerability Management dashboard, select one of the categories. A list of recommendations related to that category displays, along with recommendations. 3.Select an item on the list to display details related to the recommendation. 4. Select Remediation options. 5. Read the description to understand the context of the issue and what to do next. Choose a due date, add notes, and select Export all remediation activity data to CSV so you can attach it to an email for follow-up. A confirmation message tells you the remediation task has been created. 6. Send a follow-up email to your IT Administrator and allow for the time that you've allotted for the remediation to propagate in the system. 7. Return to the Microsoft Secure Score for Devices card on the dashboard. The number of security controls recommendations has decreased as a result of your actions. 8. Select Security controls to go back to the Security recommendations page. The item that you addressed isn't listed there anymore, which results in your Microsoft secure score improving. |
Monthly tasks
Task | Description |
---|---|
Run security reports | Several reports are available in the Microsoft 365 Defender portal. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, select Reports. 2. Choose a report to review. Each report displays many pertinent categories for that report. 3. Select View details to see deeper information for each category. 4. Select the title of a particular threat to see details specific to it. |
Run a simulation tutorial | It's always a good idea to increase the security preparedness for you and your team through training. You can access simulation tutorials in the Microsoft 365 Defender portal. The tutorials cover several types of cyber threats. To get started, follow these steps: 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, choose Tutorials.< 2. Read the walk-through for a tutorial you're interested in running, and then download the file, or copy the script needed to run the simulation according to the instructions. |
Explore the Learning hub | Use the Learning hub to increase your knowledge of cybersecurity threats and how to address them. We recommend exploring the resources that are offered, especially in the Microsoft 365 Defender and Endpoints sections. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, choose Learning hub. 2. Select an area, such as Microsoft 365 Defender or Endpoints. 3. Select an item to learn more about each concept. Note that some resources in the Learning hub might cover functionality that isn't actually included in Defender for Business. For example, advanced hunting capabilities are included in enterprise subscriptions, such as Defender for Endpoint Plan 2 or Microsoft 365 Defender, but not in Defender for Business. Compare security features in Microsoft 365 plans for small and medium-sized businesses. |
Tasks to perform as needed
Task | Description |
---|---|
Use the Threat analytics dashboard | Use the threat analytics dashboard to get an overview of the current threat landscape by highlighting reports that are most relevant to your organization. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, select Threat analytics to display the Threat analytics dashboard. The dashboard summarizes the threats into the following sections: - Latest threats lists the most recently published or updated threat reports, along with the number of active and resolved alerts. - High-impact threats lists the threats that have the highest impact to your organization. This section lists threats with the highest number of active and resolved alerts first. - Highest exposure lists threats with the highest exposure levels first. The exposure level of a threat is calculated using two pieces of information: how severe the vulnerabilities associated with the threat are, and how many devices in your organization could be exploited by those vulnerabilities. 3. Select the title of the one you want to investigate, and read the associated report. 4. You can also review the full Analyst report for more details, or select other headings to view the related incidents, impacted assets, and exposure and mitigations. |
Remediate an item | Defender for Business includes several remediation actions. Some actions are taken automatically, and others await approval by your security team. 1. In the Microsoft 365 Defender portal (https://security.microsoft.com), in the navigation pane, go to Assets > Devices. 2. Select a device, such as one with a high risk level or exposure level. A flyout pane opens and displays more information about alerts and incidents generated for that item. 3. On the flyout, view the information that is displayed. Select the ellipsis (...) to open a menu that lists available actions. 4. Select an available action. For example, you might choose Run antivirus scan, which will cause Microsoft Defender Antivirus to start a quick scan on the device. Or, you could select Initiate Automated Investigation to trigger an automated investigation on the device. |
Remediation actions in Defender for Business
The following table summarizes remediation actions that are available in Defender for Business:
Source | Actions |
---|---|
Automated investigations | Quarantine a file Remove a registry key Kill a process Stop a service Disable a driver Remove a scheduled task |
Manual response actions | Run antivirus scan Isolate device Add an indicator to block or allow a file |
Live response | Collect forensic data Analyze a file Run a script Send a suspicious entity to Microsoft for analysis Remediate a file Proactively hunt for threats |
See also
Feedback
Submit and view feedback for