Loading...

Investigate incidents more effectively with the new attack story view in Microsoft 365 Defender

Investigate incidents more effectively with the new attack story view in Microsoft 365 Defender

One of the biggest efficiency drains for security operations center teams (SOC) is the constant switching of context – between different security tools or even between the various views within one solution when they’re looking for different types of information. These disconnected solutions and views cause SOC teams to lose valuable time while trying to manually piece together related signals.

 

Microsoft 365 Defender on the other hand correlates billions of signals across endpoints, cloud and on-prem identities, email, documents, and cloud apps and groups them into incidents – giving security teams a more effective way to investigate and remediate threats in a unified experience.

 

Today we’re excited to announce that we made the investigation experience even better with the introduction of attack story view in Microsoft 365 Defender - to help analysts stop breaches faster. In the new incident investigation experience in Microsoft 365 Defender, analysts can now easily navigate between affected assets or drill deep into the details of individual alerts, while always retaining the full context of the incident.

 

When you select an incident from the incident queue in Microsoft 365 Defender, the new attack story view is now the centerpiece of the investigation experience. It is a visual and interactive view of all affected resources, and it enables security analysts to understand the incident context at any point during their investigation. In addition, analysts can interact with the attack story view to determine next steps or take action from a dropdown with options.

 

Image 1 shows the new attack story view – it allows you to easily identify that in this case several users, files, an endpoint, an email account, as well as external domains are affected.  

 

Image 1 – New attack story view in Microsoft 365 DefenderImage 1 – New attack story view in Microsoft 365 Defender

 

 

Image 2 shows you what interacting with the new incident page looks like and how the views dynamically adjust to your actions. On the left-hand side of image 2 you can see the list of alerts tied to this incident – as analysts select the different alerts, the attack story view automatically adjusts to zoom in on the relevant alert and the incident page adjusts to provide all relevant details tied to this alert.

 

 

Image-2 Interactive views on the new incident pageImage-2 Interactive views on the new incident page

 

 

Alternatively, analysts can also engage directly with the graph to review the entity details by clicking on the relevant asset (image 3) and even select the action they want to take to further investigate or start remediation as shown in image 4.

Image 3 – Interact with the attack story view to retrieve device informationImage 3 – Interact with the attack story view to retrieve device information

 

 

 

 

Image 4: Select any of the available actions for further investigation or to start remediationImage 4: Select any of the available actions for further investigation or to start remediation

 

 

The new attack story view changes the game for SOC teams – gone are the days of never-ending context switching and trying not to lose sight of the overall incident and affected assets. The interactive view will make the investigation and response more intuitive and most importantly - help respond to threats faster and limit the impact of an attack.

 

 

For more information, check out these resources:

 

 

 

 

Published on:

Learn more
Microsoft 365 Defender Blog articles
Microsoft 365 Defender Blog articles

Microsoft 365 Defender Blog articles

Share post:

Related posts

Microsoft SharePoint: Storage insights will be included in Microsoft 365 admin center usage reports

Microsoft SharePoint will add a new Storage tab to the Microsoft 365 admin center usage reports, providing insights on quota consumption and s...

5 hours ago

Microsoft Viva Insights | Copilot Analytics: Unified experience for Copilot Dashboard and Insights analyst workbench

Microsoft Viva Insights will introduce a unified Copilot Analytics experience for Copilot Dashboard users and Viva Insights analysts. This rol...

5 hours ago

Microsoft Viva Engage: Centralized admin role management from the Engage admin center

Microsoft Viva Engage is launching centralized admin role management in mid-May 2025, simplifying role assignments and management. This update...

5 hours ago

Microsoft 365 Copilot for Sales – Seamlessly Capture Sales Meetings with Automatic Recordings

We are announcing the ability to seamlessly Capture Sales Meetings with Automatic Recordings for Microsoft 365 Copilot for Sales. This feature...

1 day ago

Microsoft Teams: Call quality reports for Bring Your Own Device (BYOD) rooms in the Pro Management portal

Admins can now access detailed call quality reports for BYOD rooms in the Pro Management portal, requiring a Teams Shared Devices license. Thi...

1 day ago

Microsoft Teams: Unified attachment flow on Teams Mobile

Microsoft Teams is introducing a new content picker for the Teams Mobile Android app, allowing users to attach any type of content easily. The...

1 day ago

Microsoft 365: Dynamic rules for Microsoft 365 Backup to simplify backup management at scale

Dynamic rules for Microsoft 365 Backup, released in April 2025, automate backup policies based on distribution lists and security group member...

1 day ago

Microsoft Copilot(Microsoft 365 Mobile Apps): Advanced Data Analysis in Copilot Chat

Advanced Data Analysis in Microsoft 365 Mobile Apps’ Copilot Chat will roll out globally from mid-May to late May 2025. It enables users...

1 day ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy