{"id":118136,"date":"2022-08-03T09:00:00","date_gmt":"2022-08-03T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=118136"},"modified":"2024-03-06T13:33:22","modified_gmt":"2024-03-06T21:33:22","slug":"microsoft-defender-experts-for-hunting-proactively-hunts-threats","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/03\/microsoft-defender-experts-for-hunting-proactively-hunts-threats\/","title":{"rendered":"Microsoft Defender Experts for Hunting proactively hunts threats"},"content":{"rendered":"\n
Today, we announced the general availability of Microsoft Defender Experts for Hunting<\/a> to support organizations and their cybersecurity employees with proactive threat hunting.<\/p>\n\n\n\n Defender Experts for Hunting was created for customers who have a robust security operations center but want Microsoft to help them proactively hunt threats using Microsoft Defender data. Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints, Microsoft Office 365, cloud applications, and identity. Our experts will investigate anything they find, then hand off the contextual alert information along with remediation instructions so you can quickly respond. Our Defender Experts for Hunting explainer video<\/a> walks you through how it works. <\/p>\n\n\n\n Capabilities include:<\/p>\n\n\n\n Bridgewater Associates, the world\u2019s largest hedge fund and one of Microsoft\u2019s first customers to implement a Zero Trust<\/a> framework, helped Microsoft develop Defender Experts for Hunting, contributing decades of knowledge on how to keep intellectual property and investment data secure. The firm now uses Defender Experts for Hunting to extend its security teams so they can focus on the most complex and immediate security issues. Igor Tsyganskiy, Chief Technology Officer at Bridgewater Associates, believes in working together to protect one another from threats.<\/p>\n\n\n\n \u201cCybersecurity is a cooperative rather than a competitive area,\u201d he said. \u201cIt takes a village to keep us all safer\u2026We are living in a digital world that is completely interconnected, and protecting ourselves singularly, separately from each other, is not going to work.\u201d<\/p>\n\n\n\n Modern adversaries are well-organized and possess skills and resources that can challenge even organizations without open cybersecurity roles. These adversaries are also relentless. Microsoft Security blocked more than 9.6 billion malware threats<\/a> and more than 35.7 billion phishing and malicious emails in 2021. They\u2019ve extended their attack focus from endpoints to identity, cloud apps, and email.<\/p>\n\n\n\n It\u2019s getting harder every day for organizations to build and maintain a full security team, let alone one with the ever-expanding skillset required to meet the range of today\u2019s security demands. Proactive threat hunting\u2014one of the best ways to identify and respond to security threats\u2014is time-consuming, and most security teams are too busy with alert triage and security posture improvement efforts to spend time on proactive hunting.<\/p>\n\n\n\n Additionally, organizations are struggling to recruit top security talent\u2014more important than ever since cybercrime is expected to cost the world USD10.5 trillion a year by 2025 (a 75 percent increase from the USD6 trillion in 2021).1<\/sup> With one in three security jobs<\/a> in the United States unfilled, cybersecurity employees often face huge workloads once hired. As a result, the average detection of a breach has been pushed out to 287 days as the number and impact of attacks continue to grow.2<\/sup><\/p>\n\n\n\n Many companies don\u2019t face daily security attacks but need deep experience with threat hunting when they do, according to Tsyganskiy. <\/p>\n\n\n\n \u201cTo manage security on its own, a company must sustain a very large and growing team,\u201d he said. \u201cIt\u2019s like trying to maintain your own police force. Given the low frequency of the most sophisticated attacks, this is an insane misallocation of resources 90 percent of the time.\u201d<\/p>\n\n\n\n Microsoft is uniquely positioned to help customers meet today\u2019s security challenges. We secure devices, identities, apps, and clouds\u2014the fundamental fabric of our customers\u2019 lives\u2014with the full scale of our comprehensive multicloud, multiplatform solutions. Plus, we understand today\u2019s security challenges because we live this fight ourselves every single day.<\/p>\n\n\n\n Now, our security expertise is your<\/em> security expertise.<\/p>\n\n\n\n Every day at Microsoft, threat hunters work alongside advanced systems to analyze billions of signals, looking for threats that might affect customers. Due to the sheer volume of data, we\u2019re meticulous about surfacing threats that customers need to be notified about as quickly and accurately as possible. <\/p>\n\n\n\n\n
More threats\u2014not enough defenders<\/h2>\n\n\n\n
Technology alone is not enough to fight cybercrime<\/h2>\n\n\n\n
How Microsoft Defender Experts for Hunting works<\/h2>\n\n\n\n