{"id":3218,"date":"2026-04-16T16:15:56","date_gmt":"2026-04-16T16:15:56","guid":{"rendered":"https:\/\/modern-workplace.uk\/?p=3218"},"modified":"2026-04-16T16:15:57","modified_gmt":"2026-04-16T16:15:57","slug":"from-threat-counts-to-posture-a-new-way-to-read-your-defender-data","status":"publish","type":"post","link":"https:\/\/modern-workplace.uk\/?p=3218","title":{"rendered":"From Threat Counts to Posture: A New Way to Read Your Defender Data"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">Microsoft has announced something at RSA 2026 that deserves more attention than it has received so far: a brand-new report inside the Microsoft Defender portal called the <strong>Protection and Posture Insights report<\/strong>.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">If you manage Microsoft 365 security for an organisation, this one matters, and here&#8217;s why.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">What Is It?<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The Protection and Posture Insights report is a dedicated view inside the Defender portal that gives you a personalized, tenant-specific picture of the threats being directed at your environment and how Defender is responding to them.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">This is different from the generic threat dashboards and email protection status reports that have existed for a while. Those tell you what Defender caught across broad categories. This report tells you what was happening specifically in your tenant  which campaigns were targeting your users, which techniques were being used, who was in the firing line, and where your risk is concentrated.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Built entirely on your own telemetry, there&#8217;s no averaging across a generic baseline. The data is yours.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165636.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"686\" height=\"452\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165636.jpg\" alt=\"\" class=\"wp-image-3219\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165636.jpg 686w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165636-300x198.jpg 300w\" sizes=\"auto, (max-width: 686px) 100vw, 686px\" \/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>What&#8217;s Actually Inside It?<\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Having had the chance to look at the report for a live tenant, here&#8217;s how it&#8217;s structured and what each section genuinely delivers.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Executive Summary<\/strong><br>A high-level overview of the period: how many threats were observed, how they were handled, and what the overall protection picture looks like. Designed to be readable by someone who doesn&#8217;t live in the Defender portal day-to-day.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165929.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"170\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165929.jpg\" alt=\"\" class=\"wp-image-3221\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165929.jpg 620w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-165929-300x82.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Effectiveness<\/strong><br>This section answers the headline question: how well is Defender actually performing for this tenant? It breaks down what was caught versus what reached users, giving you a defensible answer to &#8220;is this working?&#8221; rather than just a volume count.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170131.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"262\" height=\"147\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170131.jpg\" alt=\"\" class=\"wp-image-3222\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Threat Landscape &amp; Threat Classification<\/strong><br>A breakdown of the threat types observed during the reporting period \u2014 spam, phishing, malware \u2014 with classification detail. This is where you start to understand the <em>character<\/em> of attacks hitting your organisation, not just the numbers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170328.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"301\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170328.jpg\" alt=\"\" class=\"wp-image-3223\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170328.jpg 685w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170328-300x132.jpg 300w\" sizes=\"auto, (max-width: 685px) 100vw, 685px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Zero-Day Threats (Detonation)<\/strong><br>One of the more technically interesting sections. This covers threats that were caught specifically via Safe Attachments detonation analysis,  i.e., files or URLs where Defender had no prior signal and had to run them in a sandboxed environment to determine they were malicious. The presence of this section in the report gives you visibility into how much of your protection depends on that detonation layer versus signature-based detection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170505.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"331\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170505.jpg\" alt=\"\" class=\"wp-image-3224\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170505.jpg 696w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170505-300x143.jpg 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Priority Accounts<\/strong><br>If you&#8217;ve configured Priority Accounts in Defender (executives, finance, IT admins), this section shows you whether they are being targeted at a higher rate than the general user population, and how those threats were handled. This is a useful data point for board-level conversations about targeted risk.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Policy Coverage<\/strong><br>This is arguably the most operationally useful section for an administrator. It maps your current policy configuration against the threats that were observed, surfacing any coverage gaps. If a threat type is hitting your organisation but you don&#8217;t have the relevant policy configured to catch it optimally, this is where that shows up.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170606.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"318\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170606.jpg\" alt=\"\" class=\"wp-image-3225\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170606.jpg 732w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170606-300x130.jpg 300w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Delivery Locations<\/strong><br>Where did threats end up? Inbox, junk, quarantine, blocked pre-delivery? This section shows the distribution across delivery outcomes, which helps you understand whether your policies are catching threats early or whether too much is reaching users before being remediated.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170709.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"454\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170709.jpg\" alt=\"\" class=\"wp-image-3226\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170709.jpg 679w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-170709-300x201.jpg 300w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Detection Trends &amp; Inbound Detection Technology<\/strong><br>Trend data over the reporting period, and a breakdown of which detection technologies fired \u2014 things like URL detonation, file reputation, anti-spoofing, impersonation protection, and so on. Useful for understanding which parts of the stack are doing the heavy lifting.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Phish Threshold Policy Level<\/strong><br>Your current anti-phishing threshold setting shown in context of the threats observed. If your threshold is set conservatively relative to what&#8217;s hitting your users, this section makes that visible \u2014 without you having to cross-reference documentation and policy settings manually.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Quarantine Statistics<\/strong><br>A summary of what ended up in quarantine over the period, including volumes and categories. Useful both for operational awareness and for reviewing whether your quarantine policies are set appropriately.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Why This Matters<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Most Defender reporting up to now has been good at answering <em>volume<\/em> questions: how many phishing emails were blocked this month, how many malware attachments were quarantined. What it hasn&#8217;t done well is answer <strong>posture <\/strong>questions: are we configured correctly for the threats we&#8217;re actually seeing? Are there gaps between what&#8217;s hitting us and what we&#8217;re catching?<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The Protection and Posture Insights report shifts the frame. Instead of a count of events, you get a narrative about your environment: what attackers are trying, how your controls are performing against those specific attempts, and where the gaps are.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The Policy Coverage and Phish Threshold sections in particular are genuinely new value. These are questions that previously required an admin to manually compare their configuration against observed threat patterns. Having that surfaced in a single report (and tied to your actual telemetry rather than a generic recommendation baseline) is a meaningful step forward.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">For organisations running Defender for Office 365 Plan 2 or Defender XDR, this is worth checking as soon as it appears in your portal.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Where to Find It<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\">The report is accessible directly in the Microsoft Defender portal (security.microsoft.com). Head to Reports and look for Protection and Posture Insights under the Email &amp; Collaboration \/  Email &amp; Collaboration reports. It is being rolled out following the RSA 2026 announcement in late March, so if you don&#8217;t see it yet, it should appear in your tenant shortly.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-171002.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"460\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-171002.jpg\" alt=\"\" class=\"wp-image-3227\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-171002.jpg 600w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-171002-300x230.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-medium-font-size\">The report covers a rolling period and is exportable as a PDF, which makes it practical to include in regular security reviews or customer reporting without manual assembly.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">A Note on Licence Coverage<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Full access to this report requires Defender for Office 365 Plan 1 or Plan 2, or a Defender XDR licence. Organisations on baseline Exchange Online Protection will have limited visibility.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">If you&#8217;re assessing whether to move customers up to MDO Plan 2, the combination of this report and the broader investigation and hunting capabilities it supports makes a stronger case than it did six months ago.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">The Bigger Picture<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\">This report landed alongside two other Teams-focused announcements at RSA 2026: inline real-time warnings for vishing (Teams call impersonation), and SOC-level call investigation capabilities including advanced hunting on call events. Microsoft is making a deliberate push to bring Teams calling up to parity with email as a first-class security signal.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The Protection and Posture Insights report sits across all of that \u2014 a single place to understand what&#8217;s hitting your collaboration surface and whether your posture is right for it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&#8217;s new Protection &#038; Posture Insights report in Defender for Office 365 goes beyond blocking counts to show you what&#8217;s targeting your tenant, whether your policies are configured to catch it, and where the gaps are. Here&#8217;s what&#8217;s inside it and why it changes how you read your security data.<\/p>\n","protected":false},"author":1,"featured_media":3220,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[850,753,976],"tags":[975,959,974,962,767,961,759,960,874,964,966,969,973,963,968,971,965,972,970,967],"class_list":["post-3218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-850","category-microsoft365","category-microsoft-defender-office-365","tag-collaboration-security","tag-defender-for-office-365","tag-defender-xdr","tag-email-security","tag-m365","tag-mdo","tag-microsoft-365","tag-microsoft-365-security","tag-microsoft-defender","tag-microsoft-defender-portal","tag-phishing-protection","tag-policy-coverage","tag-priority-accounts","tag-protection-and-posture-insights","tag-rsa-2026","tag-safe-attachments","tag-security-posture","tag-security-reporting","tag-threat-protection","tag-zero-day-threats"],"_links":{"self":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts\/3218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3218"}],"version-history":[{"count":1,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts\/3218\/revisions"}],"predecessor-version":[{"id":3228,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts\/3218\/revisions\/3228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/media\/3220"}],"wp:attachment":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}