{"id":35977,"date":"2020-07-09T16:00:27","date_gmt":"2020-07-09T16:00:27","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91530"},"modified":"2020-07-09T16:00:27","modified_gmt":"2020-07-09T16:00:27","slug":"inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/","title":{"rendered":"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents"},"content":{"rendered":"<p>Cybersecurity incidents are never contained to just one of your organization\u2019s assets. Most attacks involve multiple elements across domains, including email, endpoints, identities, and applications. To rapidly understand and address incidents, your Security Operations Center (SOC) analysts need to be able to see and track all the signals from each domain, correlate and group alerts that are related, prioritize them based on their severity level, and remediate all affected assets to return them and your workforce to a secure state.<\/p>\n<p>Getting a unified view of an attack is a top SOC analyst priority in quickly building the end-to-end picture of attacks and tracking all relevant details necessary for effective remediation. Navigating multiple products and switching between tools introduce friction that slows down <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/12\/23\/ciso-series-lessons-learned-from-the-microsoft-soc-part-3b-a-day-in-the-life\/\">investigations<\/a>, giving attackers more time to inflict damage.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/integrated-threat-protection\">Microsoft Threat Protection (MTP)<\/a> addresses this critical SOC need through <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/mtp\/incidents-overview?view=o365-worldwide\">incidents<\/a>, which empower SOC analysts by automatically fusing attack evidence and providing a consolidated view of an attack chain and affected assets, as well as a single-click remediation with easy-to-read analyst workflows. MTP harnesses the power of multiple solutions in the Microsoft 365 security portfolio \u2013 Office 365 Advanced Threat Protection (ATP), Azure ATP, Microsoft Defender ATP, and Microsoft Cloud App Security \u2013 to deliver cross-domain visibility and coordinated defense.<\/p>\n<h2>A complete look at the attack chain to prevent attack sprawl<\/h2>\n<p>A typical attack starts with a phishing email that installs malware on an endpoint. The malware then steals the user\u2019s credentials, which the attackers utilize to access resources on other endpoints, on-premises applications, and cloud services. Individual security solutions that focus on only one domain may alert on and remediate a portion of the attack but will likely miss other parts of the attacker operations, putting an organization at risk while creating a false sense of security.<\/p>\n<p>The incidents view in Microsoft Threat Protection solves this challenge by providing a single place to view and investigate an attack across stages, from initial access to impact. Based on individual detection leads, MTP uses artificial intelligence (AI) to automatically expand an investigation, like an experienced analyst would, and gather related telemetry and other alerts that belong to the same attack. MTP also uses AI to continually analyze the vast amount of available data and, if necessary, suggest more evidence for the analyst to add to the incident. This enables your SOC analysts to focus on what matters, while MTP saves them time and helps discover undetected evidence.<\/p>\n<p>Even if you don\u2019t have all the Microsoft 365 security solutions in your organization, MTP incidents correlate threat data for the services you have deployed, reducing the clutter and providing one view of the attack, including all relevant alerts, impacted assets and associated risk levels, remediation actions and status.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91531\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/incidents-overview.png\" alt=\"Screenshot of Microsoft 365 security center showing the overview tab of the Incidents view\" width=\"1919\" height=\"946\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/incidents-overview.png 1919w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/incidents-overview-300x148.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/incidents-overview-1024x505.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/incidents-overview-768x379.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/incidents-overview-1536x757.png 1536w\" sizes=\"auto, (max-width: 1919px) 100vw, 1919px\"><\/p>\n<h2>Streamlining investigations across domains<\/h2>\n<p>Microsoft Threat Protection simplifies the complex task of investigating end-to-end attacks by allowing SOC analysts to pivot and see entities \u2013 devices, files, users, emails, and processes \u2013 in the right context within a single view.<\/p>\n<p>MTP breaks down the silos and combines all alerts and insights automatically across Microsoft 365 services to reveal the full picture, helping ease digital forensics work for SOC analysts. This also enables analysts to gain comprehensive understanding of attacks that they wouldn\u2019t otherwise get from isolated out-of-context alerts.<\/p>\n<p>But MTP doesn\u2019t stop there. To help support effective triage processes, MTP prioritizes incidents, illustrates the attack chain progression, shows the attack timeline, and generates a comprehensive name for the incident. With just one click, analysts can answer questions like: Does a file observed on one device exist on other devices? Which email messages did a file come from, and was this file also shared through a cloud app?<\/p>\n<p>In addition, SOC analysts can easily search for additional related activities with <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/mtp\/advanced-hunting-go-hunt\">Go hunt<\/a>, which automatically creates and runs an <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/mtp\/mtp-autoir\">advanced hunting query<\/a> based on information from the incident. SOC analysts can also use attack-specific insights gained during hunting to capture fine-tuned logic and nuances in a <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/mtp\/custom-detection-rules\">custom detection<\/a>. Custom detections continuously hunt for new activities and pull new findings to the relevant incident automatically, further enriching your view of the attack.<\/p>\n<h2>A clear view of the remediation status<\/h2>\n<p>When your organization is under attack, it\u2019s essential to act swiftly but thoughtfully through a thorough understanding at any point in time of the remediation status of all affected assets and entities. MTP incidents play a critical part in remediation by:<\/p>\n<ul>\n<li>Removing some of the burden off the analysts\u2019 shoulders by launching <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/mtp\/mtp-autoir\">automated investigation and response<\/a> (AIR) self-healing playbooks that conduct in-depth asset-based investigation and work to find and remediate all malicious evidence (attack tools, malware), persistence methods (Oauth apps, ASEP in devices), exfiltration activities (email FWD rules, SPO shares),<\/li>\n<li>Orchestrating cross-asset and cross-domain playbook invocations, tracking attacker activity across the environment<\/li>\n<li>Providing a comprehensive view of the remediation status based on actions taken by AIR, in addition to manual actions by the analyst<\/li>\n<\/ul>\n<p>When the investigation is complete, MTP incidents capture the investigation comments for record-keeping and knowledge-sharing with peers, with easy and in-context information for reference.<\/p>\n<h2>Microsoft Threat Protection provides the SOC with a complete picture of attacks in real-time<\/h2>\n<p>The <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/mtp\/incidents-overview?view=o365-worldwide\">incidents<\/a> view in <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/integrated-threat-protection\">Microsoft Threat Protection<\/a> correlates alerts and all affected entities into a cohesive view that enables your SOC to determine the full scope of threats across your Microsoft 365 services. Armed with a complete picture of attacks in real-time, your SOCs are better empowered to defend your organization against threats.<\/p>\n<p>MTP delivers coordinated defense by leveraging the power of multiple Microsoft 365 security solutions. Through automation, built-in intelligence, and end-to-end visibility into malicious activities, MTP detects, correlates, blocks, remediates, and prevents attacks.<\/p>\n<p>Existing Microsoft 365 <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/mtp\/prerequisites?view=o365-worldwide\">licenses<\/a> provide access to Microsoft Threat Protection features in Microsoft 365 security center without additional cost or deployment. Learn how Microsoft Threat Protection can help your organization to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/integrated-threat-protection\">stop attacks with coordinated defense<\/a>.<\/p>\n<p>To learn more about coordinated defense, read these blog posts in the Inside Microsoft Threat Protection series:<\/p>\n<p><strong><em>Idan Pelleg<\/em><\/strong><\/p>\n<p><em>Microsoft Threat Protection Team<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/09\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The incidents view in Microsoft Threat Protection empowers SOC analysts by automatically fusing attack evidence and providing a consolidated view of an attack chain and affected assets, as well as a single-click remediation with easy-to-read analyst workflows.<br \/>\nThe post Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35978,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,4619,7221,4952,8729],"class_list":["post-35977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-incidents","tag-microsoft-security-intelligence","tag-microsoft-threat-protection","tag-mtp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-09T16:00:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1919\" \/>\n\t<meta property=\"og:image:height\" content=\"946\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents\",\"datePublished\":\"2020-07-09T16:00:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/\"},\"wordCount\":1004,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png\",\"keywords\":[\"Cybersecurity\",\"Incidents\",\"Microsoft security intelligence\",\"Microsoft Threat Protection\",\"MTP\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/\",\"name\":\"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png\",\"datePublished\":\"2020-07-09T16:00:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png\",\"width\":1919,\"height\":946},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/","og_locale":"en_US","og_type":"article","og_title":"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-09T16:00:27+00:00","og_image":[{"width":1919,"height":946,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents","datePublished":"2020-07-09T16:00:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/"},"wordCount":1004,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png","keywords":["Cybersecurity","Incidents","Microsoft security intelligence","Microsoft Threat Protection","MTP"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/","url":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/","name":"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png","datePublished":"2020-07-09T16:00:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents.png","width":1919,"height":946},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35977"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35978"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}