Microsoft expands Defender XDR

Microsoft has introduced new AI-driven capabilities within Microsoft Defender XDR, designed to reduce alert fatigue and improve efficiency for Security Operations Centers (SOC). At the same time, the company announced an expansion of its Microsoft Incident Response services to help organizations strengthen cyber resilience before incidents occur.

Smarter Incident Prioritization with AI

One of the key updates is an AI-powered incident prioritization system integrated into Microsoft Defender. Using machine learning, the system assigns each incident a priority score from 0 to 1000, along with a clear explanation of the factors influencing the rating. The goal is to help security analysts quickly identify which incidents require immediate action. The new prioritization model works across native Microsoft alerts, custom detection rules, and third-party security signals.

Incidents are visually categorized for faster triage:

Red (85+) – high priority

Orange (15-85) – medium priority

Gray (<15) – low priority

The system leverages a ranking methodology similar to the BM25 algorithm used in search engines, allowing it to balance signal rarity, repetition, and incident complexity. Unusual alert patterns and uncommon combinations of techniques are treated as higher-value signals.

Expanded Microsoft Incident Response Services

In parallel, Microsoft announced new proactive Incident Response services to improve organizational preparedness, including:

Incident response planning based on real-world attack scenarios;

Dedicated monitoring support during high-profile events;

A new cyber range simulation service, allowing security teams to practice detection, investigation, and containment in a controlled Microsoft-based environment;

Advisory services with industry-specific guidance and real threat intelligence insights;

Compromise assessments for mergers and acquisitions to evaluate potential hidden breaches.

Microsoft emphasizes that AI-driven prioritization within Defender XDR is intended to act as a force multiplier for SOC teams, accelerating triage, increasing analyst confidence, and improving response outcomes by focusing attention on the most impactful threats.

More like this

Blog

February 13, 2026

Blog

February 6, 2026

Blog

February 4, 2026

Blog

January 30, 2026

Blog

January 28, 2026

Top News

Blog

February 13, 2026

Blog

February 6, 2026

Blog

February 4, 2026