Understand the Defender Experts for Hunting report in Microsoft 365 Defender

Applies to:

Microsoft Defender Experts for Hunting layers human intelligence and expert-trained technology to help Microsoft 365 Defender customers understand the significant threats they face. It highlights how Defender Expert's threat hunting skills, thorough understanding of the threat landscape, and knowledge of emerging threats can help you identify, prioritize, and address those threats in your environment.

The Defender Experts for Hunting service generates reports to help you understand all the threats the hunting service surfaced in your environment, alongside the alerts generated by your Microsoft 365 Defender products. You can view the report in the current (running) month, or in one-, three-, or six-month periods.

To view the report in your Microsoft 365 Defender portal, go to Reports, select Defender Experts > Defender Experts for Hunting report. Each section of the report is designed to provide more insights into the threats and suspicious activities our Defender Experts found in your environment.

Refer to the following screenshot of a sample report:

Screenshot of a Defender Experts for Hunting report.

Identify prevalent threats and other potential attack entry points

Signals from Microsoft 365 Defender and investigations by Defender Experts for Hunting help identify suspicious activities in your environment. Significant threat activities will have corresponding Defender Experts Notifications, which also provide recommendations to remediate and defend your organization.

The report provides you with the total number of Defender Experts Notifications our experts have sent for your chosen period:

Screenshot of the top section of the report showing the number of threats identified

To view these notifications, select View Defender Experts Notifications. This button redirects you to the Microsoft 365 Defender incidents page. Defender Expert for Hunting alerts or Defender Experts Notifications are labeled with Defender Experts.

Note

The View Defender Experts Notifications button only appears if the number of threats identified is at least 1.

All other identified suspicious activities are summarized in a table in the Threat categories section of the report. The columns represent the different threat attack tactics and categories to help you visualize what an activity is trying to achieve in each attack phase so you can plan the corresponding containment and remediation actions.

If an activity has a related Defender Expert Notification, its corresponding icon also appears under the activity name. Selecting an identified suspicious activity opens a flyout panel detailing the impacted devices and users:

Screenshot of a flyout panel displaying a list of devices impacted by a detected suspicious activity.

If applicable, the page also provides links to view related Defender Expert Notifications.

Know and understand the security weak spots in your environment

The Top trending suspicious activities section of the report identifies up to 20 suspicious activities that were consistently observed in your environment in the last three months, sorted based on their severity rating and frequency of occurrence:

Screenshot of the Top trending suspicious activities section of the report.

By showing the most critical and frequently observed activities, you can assess and evaluate their impact and develop strategies to prevent or mitigate potential threats to your environment

Select View details in each card to open a flyout panel detailing the impacted devices and users. If applicable, the page also provides links to view related Defender Expert Notifications.