

If threats were detected on devices, you'll see that information in this row.Īs threats are detected and alerts are triggered, incidents are created. Scroll down to the Vulnerable devices row. In the Microsoft 365 Defender portal ( ), in the navigation pane, choose Reports > General > Security report.Ģ. When threats are detected on devices, your security team needs to know so that any needed actions, such as isolating a device, can be taken promptly.ġ. Select the History tab to view a list of completed actions.
Premium hive defender manual#
Such actions can arise from antivirus or antimalware protection, automated investigations, manual response activities, or live response sessions.ģ. Select the Pending tab to view and approve (or reject) any pending actions. In the Microsoft 365 Defender portal ( ), in the navigation pane, choose Action center.Ģ. Remediation actions are tracked in the Action center.ġ. Depending on the particular threat and how your security settings are configured, remediation actions might be taken automatically or only upon approval, which is why these should be monitored regularly. Review pending actions in the Action centerĪs threats are detected, remediation actions come into play. Communicate with peers and management about the impact of security efforts Detect and respond to areas that require investigation or action to improve the current state Quickly understand and identify high-level takeaways about the state of security in your organization If it isn't, select Improve score to see more details and security recommendations to improve this score.īeing aware of your exposure score helps you to: If it's in the acceptable or "High" range, you can move on. Take a look at your Organization exposure score. In the Microsoft 365 Defender portal ( ), in the navigation pane, select Vulnerability management > Dashboard.Ģ. A high exposure score means your devices are more vulnerable to exploitation.ġ. Get a snapshot of threat vulnerability by looking at your vulnerability management dashboard, which reflects how vulnerable your organization is to cybersecurity threats. Security operations tasks to perform Daily tasks TaskĬheck your threat vulnerability management dashboard You can use this guidance to make decisions about security incident priorities and tasks your security team will perform in the Microsoft Defender portal ( ). If you do already have a security operations guide, review it against the recommendations in this article. If you're new to Microsoft 365 Business Premium, or if your business doesn't have a security operations guide in place yet, use this article as a starting point.
