https://store-images.s-microsoft.com/image/apps.63914.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.375358e8-55d3-48c2-b4a0-3311892569b6

BI for Defender

by PowerStacks Corporation

(14 ratings)

Easily create custom Power BI reports and dashboards from Microsoft Defender with this app.

 
This app requires: 
 
Microsoft Defender for Endpoint serves as a robust enterprise endpoint security platform, aimed at fortifying networks against advanced threats by providing prevention, detection, investigation, and response capabilities. Despite its strengths, the native reporting features have limitations.
 
PowerStacks has developed BI for Defender to extend the reporting capabilities of Defender. Our business intelligence product solutions run in the industry standard Microsoft Power BI service making it easy to share and access your data from anywhere on any device.
 
BI for Defender is a customizable reporting solution that connects to the live data in Defender. In addition to the unlimited custom reports that can be created using the simple point and click interface of Power BI, BI for Defender is currently shipping with out-of-the-box reports. Each of these reports is fully interactive, meaning that you can simply select and element on a page to see more information.
 
Reports included with BI for Defender: 
 
  • Summary: The Summary page offers a comprehensive snapshot of your Defender for Endpoint environment, presenting key metrics such as the percentage of devices in each exposure level, vulnerability count by severity, and device distribution by management platform and OS version.
  • Device Info: Navigate your Defender for Endpoint ecosystem with precision on the Device Info page, where you can access crucial details about each device, including its state, exposure level, OS details, last known IP address, management platform, and last seen date.
  • Vulnerabilities: Uncover potential security risks on the Vulnerabilities page, which provides in-depth insights into vulnerabilities categorized by CVE, along with associated device counts, vulnerability descriptions, and actionable recommendations for resolution.
  • Missing Security Updates: Strengthen your security posture by addressing missing updates efficiently with the Missing Security Updates page. Gain visibility into missing updates details, exposure impact scores, and receive actionable recommendations to enhance your Microsoft Secure Score.
  • Process Events: Efficiently manage and monitor running processes on computers through the Process Events page, which offers a detailed list of processes, resource utilization metrics, and real-time reporting for a comprehensive understanding of your Defender for Endpoint environment.

At a glance

https://store-images.s-microsoft.com/image/apps.26230.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.cb8146f5-7514-44ce-b16d-2281541ba8ec
/staticstorage/linux/20241105.1/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.24108.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.881580a2-22a2-40ab-8f4e-917eb66ae313
https://store-images.s-microsoft.com/image/apps.56650.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.696420b9-f9d6-4db3-af46-8759a89733b9
https://store-images.s-microsoft.com/image/apps.34043.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.84c5e41c-1901-4e8b-abf7-568ac5d62768
https://store-images.s-microsoft.com/image/apps.33208.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.ab8864f6-9986-46ef-abeb-3803a52005e3
https://store-images.s-microsoft.com/image/apps.45474.0ab022af-0104-48f4-af22-da07e1dbfdfe.5dda35f8-0e55-4295-a5a9-a359cdd2c4b1.343135d7-38e5-4d9f-b553-9f7e041fa49c