https://store-images.s-microsoft.com/image/apps.20216.14540497-470b-4ba0-9976-939d6410c2ed.31c36b94-3fab-4e53-bafc-d4a7aac1aba9.3f32d705-a9a2-4012-ac1f-3a060919b5b2

VMRay Connector to Microsoft Defender for Office

by VMRay GmbH

Understand the threat - Enrich alerts&indicators - Clear verdict and IOCs in Defender

VMRay Connector for Microsoft Defender for Office

Enhance your protection against phishing threat by:

  • Gaining a clear understanding of the threats you face
  • Protecting against active threats in real time
  • Streamlining triage of Microsoft Defender for Office (MDO) alerts
  • Accelerating incident response and investigation

Offer Description

The VMRay Connector for Microsoft Defender for Office (MDO) continuously monitors Defender alerts to extract and analyze URLs found in alert evidence or via the Graph API.

VMRay performs recursive dynamic analysis of each URL to reveal attacker intent and uncover all stages of the attack chain. By simulating real user behavior, VMRay’s auto-UI technology can expose phishing attempts, credential harvesting, or malware delivery activities.

All Defender alerts are automatically enriched with the results of VMRay’s analysis, including:

  • VMRay verdict (malicious, suspicious, clean)
  • Threat classification and name
  • VMRay Threat Indicators (VTIs) providing a quick overview of malicious or suspicious behaviors of the malware

Malicious and suspicious Indicators of Compromise (IOCs) uncovered by VMRay are automatically added to Defender indicators. This enables proactive blocking of similar threats—preventing future infection attempts before they reach your network.

When deeper investigation is required, Incident Responders can access the complete analysis directly in the VMRay Console. Detailed artifacts such as MITRE ATT&CK mapping, PCAP files, memory dumps, process trees, and extracted malware configurations provide comprehensive visibility into the threat’s behavior at the time of the attack.

Who Benefits from this Integration

SOC Analysts:
Gain immediate, actionable insight into each threat. Analysts can quickly triage alerts within the Defender console using enriched data from VMRay, helping them prioritize and respond efficiently without manual IOC creation.

Incident Responders:
Start investigations with a full understanding of how the threat operated during the attack. For instance, if a user-reported email contained a malicious URL that is no longer active, responders can still access the full malware sample, IOCs, and TTPs from VMRay to accelerate threat hunting and containment.

Cyber Threat Intelligence (CTI) Teams:
Receive real-time IOCs extracted from active threats. These indicators can be automatically shared with Microsoft Sentinel or Threat Intelligence Platforms (TIPs). Cross-referencing these IOCs with other intelligence sources can help identify the threat actor behind the campaign.

Key Benefits and Pain Points Addressed

  • Prioritize critical threats by understanding attacker intent and allocating resources effectively
  • Empower resource-constrained SOCs with enriched Defender alerts that simplify triage and reduce manual effort
  • Block persistent attackers who rotate URLs or payloads to evade detection and deliver zero-day malware
  • Uncover elusive, short-lived attacks that would otherwise go undetected

At a glance

https://store-images.s-microsoft.com/image/apps.51305.14540497-470b-4ba0-9976-939d6410c2ed.b1e2762d-c5fb-4a5f-8807-c4028d340a9f.6b463380-e2f5-48a5-b6ea-13997c7bf615
/staticstorage/20251203.1/assets/videoOverlay_62a424ca921ff733.png
https://store-images.s-microsoft.com/image/apps.37988.14540497-470b-4ba0-9976-939d6410c2ed.b1e2762d-c5fb-4a5f-8807-c4028d340a9f.3501c571-1207-4f41-87cc-14c6db6b60aa
https://store-images.s-microsoft.com/image/apps.32061.14540497-470b-4ba0-9976-939d6410c2ed.b1e2762d-c5fb-4a5f-8807-c4028d340a9f.9245b739-87f2-484e-b611-bf2c6c78a9ed
https://store-images.s-microsoft.com/image/apps.47910.14540497-470b-4ba0-9976-939d6410c2ed.b1e2762d-c5fb-4a5f-8807-c4028d340a9f.ae2b9bcb-809d-48e4-bf7f-5c49cae02f2e
https://store-images.s-microsoft.com/image/apps.36766.14540497-470b-4ba0-9976-939d6410c2ed.b1e2762d-c5fb-4a5f-8807-c4028d340a9f.a0ac9f62-ab6b-4657-9b57-4d549703becc
https://store-images.s-microsoft.com/image/apps.62078.14540497-470b-4ba0-9976-939d6410c2ed.b1e2762d-c5fb-4a5f-8807-c4028d340a9f.de969a97-c9a4-4072-950e-95d0e518db94