Supercharge your SecOps effectiveness with XDR
Get incident-level visibility across the cyberattack chain with Microsoft Defender XDR (formerly Microsoft 365 Defender). Take your SOC team to the next level with automatic disruption of advanced cyberattacks and accelerated response across endpoints & IoT, hybrid identities, email & collaboration tool, software as a service (SaaS) applications, cloud workloads, and data.
Endpoints
Discover and secure endpoint and network devices across your multiplatform enterprise.
Identities
Manage and secure hybrid identities and simplify employee, partner, and customer access.
SaaS apps
Get visibility, control data, and detect cyberthreats across cloud services and apps.
Email and collaboration tools
Protect your email and collaboration tools from advanced cyberthreats, such as phishing and business email compromise.
Microsoft Defender XDR key capabilities
Unify security with XDR.

See Copilot in Microsoft Defender XDRWatch how Copilot helps you investigate and complete complex tasks such as cyberthreat hunting, reverse-engineering malware, and incident reporting.

Copilot helps you investigate and complete complex tasks such as cyberthreat hunting, reverse-engineering malware, and incident reporting.
Copilot in Microsoft Defender XDR
Microsoft Sentinel benefit for Microsoft 365 E5, A5, F5, and G5 customers
Integrated threat protection with SIEM and XDR
Get the context and automation you need to stop sophisticated, cross-domain attacks across your entire organization with security information and event management (SIEM) and extended detection and response (XDR) from Microsoft.
Microsoft 365 E5, A5, F5, and G5 and Microsoft 365 E5, A5, F5, and G5 Security customers can get a data grant of up to 5 MB per user per day of Microsoft 365 data ingestion into Microsoft Sentinel.




Comprehensive security
Get end-to-end visibility across your resources, including users, devices, applications, and infrastructure.
Detect advanced threats
Defend against modern attacks with AI-driven SIEM and XDR capabilities.
Investigate prioritized incidents Surface critical incidents and hunt suspicious activities at scale.
Enable efficient and effective response Respond to incidents rapidly with built-in orchestration and automation of common tasks.