![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/thumbs_112/img2950087747714211143.png?54b71e6ca39d8779312f57bea781f440)
Microsoft Defender Threat Intelligence Education
Dynamic threat intelligence solution
![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/feature/img6419310429953862803.png?eb0c6aa3ae43f6a4ac5e44cb68931ece)
Get continuous threat intelligence
Scan the internet to create a complete picture of day-to-day changes. Create threat intelligence for your own business to understand and reduce exposure.
![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/feature/img302152412573735152.png?c02f87f6586fa2c08c0d0a459571de17)
Expose adversaries and their methods
Understand the group behind an online attack, their methods, and how they typically operate.
![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/feature/img2270984239130719085.png?676521b62e99c02fd8399302b4b6ac6b)
Enhance alert investigations
Combine Microsoft Sentinel and Microsoft 365 Defender incident data with external threat intelligence to uncover the full scale of a threat or attack.
![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/feature/img2118141606343779990.png?99bf798e9e1d2f3d428e258f4188da50)
Accelerate incident response
Investigate and remove a single malicious IP or domain and all the known entities and resources operated by an attacker or threat family.
![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/feature/img5499458851112564375.png?b7c5c37635858a90834ed23674bc2b4c)
Hunt threats as a team
Easily collaborate on investigations across global teams using the Defender Threat Intelligence workbench. Share insights across the organization.
![](https://d3bql97l1ytoxn.cloudfront.net/app_resources/customizations/APPSMART/413509/feature/img8658383913169818078.png?3deb62eabd22f22b50415fde20fb830e)
Expand prevention and improve security posture
Export lists of malicious entities, IPs, and domains. Block internal resources from accessing dangerous internet resources and help stop outside threats.