{"id":89049,"date":"2019-02-28T06:00:16","date_gmt":"2019-02-28T14:00:16","guid":{"rendered":"http:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89049"},"modified":"2025-06-30T07:14:06","modified_gmt":"2025-06-30T14:14:06","slug":"announcing-microsoft-threat-experts","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/","title":{"rendered":"Announcing Microsoft Threat Experts"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><em><strong>Update [8\/3\/2022]<\/strong>: We&#8217;re announcing the general availability of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/03\/microsoft-defender-experts-for-hunting-proactively-hunts-threats\/\">Microsoft Defender Experts for Hunting<\/a>. Defender Experts for Hunting is for customers who have a robust security operations center but want Microsoft to help them proactively hunt for threats across Microsoft Defender data, including endpoints, Office 365, cloud applications, and identity. <a href=\"https:\/\/aka.ms\/DefenderExpertsForHuntingGetStarted\">Learn more<\/a> about how to <a href=\"https:\/\/aka.ms\/DEX4HuntingCustomerInterestForm\">apply<\/a>, set up, and use the service.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019re excited to introduce <strong>Microsoft Threat Experts<\/strong>, an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/solutions\/security\">Microsoft 365<\/a>. This new managed threat hunting service in <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Microsoft Defender Advanced Threat Protection<\/a> provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Experts enables SOCs to jump-start threat investigations by providing context-rich intelligence. This release of the service includes 2 capabilities:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Microsoft-Defender-ATP\/Microsoft-Threat-Experts-reaches-general-availability\/ba-p\/502493\"><strong>Targeted attack notifications<\/strong><\/a>: Alerts that are tailored to organizations provide as much information as can be quickly delivered to bring attention to critical threats in their network, including the timeline, scope of breach, and the methods of intrusion.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/28\/experts-on-demand-your-direct-line-to-microsoft-security-insight-guidance-and-expertise\/\"><strong>Experts on demand<\/strong><\/a>: When a threat exceeds the SOC\u2019s capability to investigate, or when more actionable information is needed, security experts provide technical consultation on relevant detections and adversaries. In cases where a full incident response becomes necessary, seamless transition to Microsoft incident response (IR) services is available.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Microsoft Threat Experts\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/SdHvpkJjfVI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Microsoft Threat Experts<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With Microsoft Threat Experts, SOCs can further improve defenses by tapping into our world-class security analysts. These experts deeply understand the security landscape and attacker techniques, have intimate knowledge of operating systems, and know how to get the most out of Microsoft Defender ATP\u2019s features and capabilities. Our experience in battling attackers across more than a billion devices worldwide, together with the artificial intelligence (AI) necessary to harness such unprecedented optics and scale, makes our expert team unique and unmatched in the industry.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The next sections describe the two components of this new service in more detail.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"targeted-attack-notifications\">Targeted attack notifications<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Experts provides proactive hunting for the most important threats, such as human adversary intrusions, hands-on-keyboard attacks, and advanced attacks like cyberespionage. The managed threat hunting service includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Threat monitoring and analysis, reducing attacker dwell time and risk to business<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Hunter-trained AI to discover and prioritize both known and unknown attacks<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Identifying the most important risks, helping SOCs maximize time and energy<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Scope of compromise and as much context as can be quickly delivered to enable fast SOC response<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1900\" height=\"1080\" src=\"http:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-alert.png\" alt=\"Custom Threat Experts alert in Windows Defender Security Center\" class=\"wp-image-89052\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-alert.png 1900w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-alert-300x171.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-alert-768x437.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-alert-1024x582.png 1024w\" sizes=\"auto, (max-width: 1900px) 100vw, 1900px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Custom Threat Experts alert in Microsoft Defender Security Center<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"experts-on-demand\">Experts on demand<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Customers can partner with Microsoft security experts, who can be engaged directly from within Microsoft Defender Security Center, for timely and accurate response. Experts provide insights needed to better understand complex threats, from the latest zero-day exploit to the root cause of a suspicious network connection. Through Microsoft Threat Experts, customers can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Get additional clarification on alerts including root cause or scope of the incident<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Gain clarity into suspicious machine behavior and recommended next steps if faced with an advanced attacker<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Seamlessly transition to Microsoft Incident Response (IR) services when necessary<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1900\" height=\"1080\" src=\"http:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-button.png\" alt=\"Ask a Threat Expert button in Windows Defender Security Center\" class=\"wp-image-89053\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-button.png 1900w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-button-300x171.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-button-768x437.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-button-1024x582.png 1024w\" sizes=\"auto, (max-width: 1900px) 100vw, 1900px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Ask a Threat Expert button in Microsoft Defender Security Center<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"partnership-for-improved-security\">Partnership for improved security<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In today\u2019s climate of cybersecurity challenges, organizations must fend off relentless attacks even as they go through their journey of building and maturing their security capabilities. Through Microsoft Threat Experts, customers can partner with Microsoft throughout this journey to augment security operations capabilities to prevent, detect, and respond to threats. Customers and Microsoft can build upon each other\u2019s expertise, intelligence, and insight through this partnership, forming stronger defense against adversaries.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To illustrate the depth of intelligence and the value of the service to customers\u2019 security defenses and overall security posture, we published two <a href=\"https:\/\/aka.ms\/wdatp-mte-case-studies\">case studies for Microsoft Threat Experts<\/a> on (1) human adversary-based activities related to a <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8440\">zero-day vulnerability<\/a> and (2) complex &#8220;<a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/09\/27\/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av\/\">living off the land<\/a>&#8221; threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender ATP customers can now <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-atp\/configure-microsoft-threat-experts\">apply for preview<\/a> through the Microsoft Defender Security Center. We will contact customers via email to confirm their participation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here are useful references:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-atp\/configure-microsoft-threat-experts#view-the-targeted-attack-notification\">View the targeted attack notification<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-atp\/configure-email-notifications-windows-defender-advanced-threat-protection\">Configure email alert notification<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-atp\/configure-microsoft-threat-experts#ask-a-microsoft-threat-expert-about-suspicious-cybersecurity-activities-in-your-organization\">Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization <\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-atp\/configure-microsoft-threat-experts#sample-questions-to-ask-microsoft-threat-experts\">Sample questions to ask Microsoft Threat Experts<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Not yet reaping the benefits of Microsoft Defender ATP\u2019s <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/12\/03\/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp\/\">industry-leading optics and detection capabilities<\/a>? <strong><a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Sign up for free trial<\/a> <\/strong>today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"update-april-30-2019-microsoft-threat-experts-reaches-general-availability\">Update (April 30, 2019): Microsoft Threat Experts reaches general availability<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">On April 30, 2019, we announced the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Microsoft-Threat-Experts-reaches-general-availability\/ba-p\/502493\">general availability of Microsoft Threat Experts targeted attack notification capability<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"update-october-28-2019-experts-on-demand-is-generally-available\">Update (October 28, 2019): Experts on demand is generally available<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">On October 28, we announced the general availability of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/28\/experts-on-demand-your-direct-line-to-microsoft-security-insight-guidance-and-expertise\/\">Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"talk-to-us\">Talk to us<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Questions, concerns, or insights on this story? Join discussions at the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-Advanced-Threat\/ct-p\/WindowsDefenderAdvanced\">Microsoft Defender ATP community<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Follow us on Twitter <strong><a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noopener noreferrer\">@MsftSecIntel<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It is an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of Microsoft 365.<\/p>\n","protected":false},"author":55,"featured_media":89057,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[90076,87040,86932],"footnotes":""},"post_tag":[],"threat-intelligence":[],"content-type":[3663],"job-role":[],"product":[],"topic":[3687],"coauthors":[3380],"class_list":["post-89049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-threat-intelligence","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-8-1694638266-352","review-flag-artif-1694638272-22","review-flag-gener-1694638270-216","review-flag-new-1694638263-340","review-flag-partn-1694638263-177","review-flag-partn-1694638263-597"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Announcing Microsoft Threat Experts | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides additional context &amp; insights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing Microsoft Threat Experts | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It is an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of Microsoft 365.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-28T14:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T14:14:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-yoast.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It is an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of Microsoft 365.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-yoast.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"Announcing Microsoft Threat Experts\",\"datePublished\":\"2019-02-28T14:00:16+00:00\",\"dateModified\":\"2025-06-30T14:14:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\"},\"wordCount\":827,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png\",\"articleSection\":[\"Cybersecurity\",\"Microsoft 365\",\"Windows Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\",\"name\":\"Announcing Microsoft Threat Experts | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png\",\"datePublished\":\"2019-02-28T14:00:16+00:00\",\"dateModified\":\"2025-06-30T14:14:06+00:00\",\"description\":\"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides additional context & insights.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png\",\"width\":440,\"height\":268,\"caption\":\"Customers can partner with Microsoft security experts, who can be engaged directly from within Microsoft Defender Security Center.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcing Microsoft Threat Experts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/563302e3812487d025d2c51ad622061b\",\"name\":\"Windows Defender ATP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/54335dc73e555c00bac2cad75d9bf32707dd5222be918ca695565aa2941dfbc2?s=96&d=microsoft&r=g542577aedb67bf3a2a63a7744bc88ccf\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/54335dc73e555c00bac2cad75d9bf32707dd5222be918ca695565aa2941dfbc2?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/54335dc73e555c00bac2cad75d9bf32707dd5222be918ca695565aa2941dfbc2?s=96&d=microsoft&r=g\",\"caption\":\"Windows Defender ATP\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ericavena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Announcing Microsoft Threat Experts | Microsoft Security Blog","description":"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides additional context & insights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/","og_locale":"en_US","og_type":"article","og_title":"Announcing Microsoft Threat Experts | Microsoft Security Blog","og_description":"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It is an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of Microsoft 365.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-02-28T14:00:16+00:00","article_modified_time":"2025-06-30T14:14:06+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-yoast.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_description":"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It is an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of Microsoft 365.","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-yoast.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"Announcing Microsoft Threat Experts","datePublished":"2019-02-28T14:00:16+00:00","dateModified":"2025-06-30T14:14:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/"},"wordCount":827,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png","articleSection":["Cybersecurity","Microsoft 365","Windows Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/","name":"Announcing Microsoft Threat Experts | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png","datePublished":"2019-02-28T14:00:16+00:00","dateModified":"2025-06-30T14:14:06+00:00","description":"Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides additional context & insights.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/02\/Microsoft-Threat-Experts-blog-thumb-w.png","width":440,"height":268,"caption":"Customers can partner with Microsoft security experts, who can be engaged directly from within Microsoft Defender Security Center."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Announcing Microsoft Threat Experts"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/563302e3812487d025d2c51ad622061b","name":"Windows Defender ATP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/54335dc73e555c00bac2cad75d9bf32707dd5222be918ca695565aa2941dfbc2?s=96&d=microsoft&r=g542577aedb67bf3a2a63a7744bc88ccf","url":"https:\/\/secure.gravatar.com\/avatar\/54335dc73e555c00bac2cad75d9bf32707dd5222be918ca695565aa2941dfbc2?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54335dc73e555c00bac2cad75d9bf32707dd5222be918ca695565aa2941dfbc2?s=96&d=microsoft&r=g","caption":"Windows Defender ATP"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ericavena\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=89049"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89049\/revisions"}],"predecessor-version":[{"id":140877,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89049\/revisions\/140877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/89057"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=89049"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=89049"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=89049"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=89049"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=89049"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=89049"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=89049"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=89049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}