0
1.0.4
Yokohama, Xanadu, Washington DC
Microsoft Defender for EDR Integration for Threat Intelligence Security Center (TISC) enables Cyber Threat Intelligence (CTI) analysts to automatically push malicious or suspicious IP addresses, domains, url, file hashes, and more from the TISC to Microsoft Defender for continuous monitoring and real-time alerting.
Automatically push malicious or suspicious IP addresses, domains, file hashes, and URLs to Microsoft Defender for continuous monitoring and real-time alerting.
Fixed:
- Issue with missing runtime inputs during the initial setup of the Microsoft Defender integration.
- Corrected logic related to the Observable Expiration Period, which was not functioning as expected.
Dependencies:
- Threat intelligence security center