Advanced Threat Analytics

Detect suspicious activity right away

Photograph of a person in a modern factory touching the screen on a large monitor

Reduce your risk of damage and get information in a succinct, real-time view of the attack timeline with Advanced Threat Analytics. Learn, analyze, and identify normal and suspicious user or device behavior with built-in intelligence.

Why Advanced Threat Analytics

146 days

Median number of days an attacker resides within a network before detection.


Over half of all network intrusions are due to compromised user credentials.

$500 billion

Total potential cost of cybercrime to the global community.

$3.8 million

Average cost of a data breach to a company.

Depend on advanced threat protection

Detect threats fast

Behavioral analytics help you react quickly with self-learning, advanced, ready-to-analyze intelligence.

Adapt as fast as your attackers

Rely on continually updated learning that adapts to the changing nature of your users and business.

Focus on only important events

Review the attack timeline for a clear, convenient view of suspicious activity or persistent threats.

Reduce false positive fatigue

Receive alerts only after suspicious activities are contextually aggregated and verified.

Prioritize and plan next steps

Get recommendations for investigation and remediation of each suspicious activity.

Quick resources

Advanced Threat Analytics blog posts

Detect, prioritize, and investigate advanced attacks demo

Ask your questions on the Microsoft Tech Community

Additional resources