Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1187397

Microsoft Defender for Endpoint: Threat actor attribution information will be removed from alert page

Plan for Change
Major Change

Message ID

MC1187397
View in Admin Center

Services

Microsoft Defender XDR

Summary

Threat actor attribution will be removed from Microsoft Defender for Endpoint alert pages on January 12, 2026, and moved to the Incident page and Threat Intelligence section. This change improves alert clarity without affecting detection or security. No admin action is needed, but update workflows accordingly.

Details

We’d like to inform you that threat actor attribution details will soon be removed from the alert page in Microsoft Defender for Endpoint. This change is designed to improve clarity and focus in alert content. Threat actor attribution is more meaningful and actionable when viewed in the context of the broader incident rather than at the individual alert level.

After this change, attribution details will be available on the Incident page and in the Threat Intelligence section within the Microsoft Defender portal.

When this will happen

January 12, 2026: Threat actor attribution information will be retired from alert pages.

How this affects your organization

Who is affected: Admins and security teams using Microsoft Defender for Endpoint.

What will happen:

  • Threat actor attribution will no longer appear on individual alert pages.
  • Attribution details will be available on the Incident page and in the Threat Intelligence experience.
  • No impact to alert generation, detection logic, or security effectiveness.

What you can do to prepare

  • No admin action is required; this change will occur automatically.
  • If your workflows currently rely on alert-level actor attribution, review incident-based investigation processes to ensure continuity.
  • Update internal workflows, playbooks, or automation rules to retrieve attribution from the Incident page or Threat Intelligence section.
  • Inform SOC and threat intelligence teams about this change.

Compliance considerations

No compliance considerations identified, review as appropriate for your organization.

Timeline

📅
Published
Nov 17, 2025
Message published to Message Center
✏️
Updated
Nov 17, 2025
Message content updated
⚠️
Action Required By
Jan 11, 2026
Action deadline
🏁
End Date
Feb 12, 2026
Message timeline ends

Tags

#Retirement

Category

📋Plan for Change

Related Messages

Similar updates

MC1222977●

Microsoft Defender for Android: End of support for Android 10 devices

Jan 28, 2026
MC1221927●

Microsoft Defender for Android ending support for enrolled personal profiles

Jan 23, 2026
MC1220762●

Retirement notice: MDE and XDR Advanced Hunting APIs retiring; migrate to Microsoft Graph Security API

Jan 22, 2026
MC1217649●

Endpoint DLP-sensitive data alerting retiring in Defender; use Purview DLP

Jan 14, 2026
MC1141957●

Upcoming Retirement of Sub-Domains Feature in Defender for Cloud Apps – Cloud Discovery

Aug 25, 2025