Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies to:
- Microsoft Defender XDR
Important
Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
Each threat analytics report includes an indicators section that lists all indicators of compromise (IOCs) associated with the threat. Microsoft researchers update these IOCs in real time as they find new evidence related to the threat. This information helps your security operations center (SOC) and threat intelligence analysts with remediation and proactive hunting. The list also retains expired IOCs, so you can investigate past threats and understand their impact in your environment.
Because IOCs are valuable information in the context of prevalent threats and threat campaigns, only verified Microsoft Defender customers can access them. This article explains how you can check if you have access to the indicators section and how you unlock it if you don't.
View IOCs in threat analytics
To access the indicators section, go to the Threat analytics page, open the report about the tracked threat, and select the Indicators tab.
If you're a verified customer, you can immediately see the list of IOCs displayed in this section.
Otherwise, the page informs you that access to indicators is restricted.
Unlock access to indicators
To unlock the indicators section, follow these steps:
- On the Indicators page, select Complete Verification
- On the verification page that opens, provide the required information and supporting documents, if applicable
- Select Submit verification request
The verification process might take at least an hour. After the process completes, refresh the Indicators tab. If your tenant is validated successfully, you see the list of IOCs displayed in this section.
Note
In some cases, we might require additional information during the verification process. We communicate these requirements through email.
If you still don't have access to the Indicators section after going through the verification process, contact the email address displayed on the page.
See also
- Threat analytics overview
- Understand the analyst report section
- Proactively find threats with advanced hunting
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.