OpenText’s Core Threat Detection and Response has taken a significant step toward tighter Microsoft alignment, with expanded integrations that position the product as a first‑class partner for Defender for Endpoint, Microsoft Entra ID (identity), and Microsoft Security Copilot—delivered through Azure and now broadly available via the Azure Marketplace and OpenText’s Cloud Editions lineup.
OpenText announced the next generation of its cybersecurity offerings earlier in 2025, introducing OpenText Core Threat Detection and Response as a central element of the OpenText Cybersecurity Cloud. The product is designed to combine behavioral analytics, unsupervised machine learning, and threat‑hunting services into an open XDR architecture that ingests telemetry from endpoints, identity systems, and third‑party security tools. OpenText has emphasized Azure as the primary delivery platform for the product and has published integration kits and an Azure Marketplace listing to ease deployment for Microsoft‑centric customers.
These developments were reaffirmed in October 2025 when OpenText expanded the availability of the product and highlighted deeper operational ties with Microsoft Security tooling—most notably Microsoft Defender for Endpoint, Microsoft Entra ID, and Microsoft Security Copilot—framing the move as a way to reduce alert noise and accelerate investigations.
Key differentiators to watch:
Enterprises should also review contract clauses relating to:
That said, buyers should treat vendor claims as starting points for validation. The most defensible path is a well‑scoped pilot: confirm real‑world detection gains, measure analyst productivity improvements, and validate that Copilot‑driven workflows actually shorten incident lifecycles. Properly executed, the combination of OpenText Core Threat Detection and Response with Microsoft telemetry could materially strengthen an organization’s ability to detect sophisticated identity‑centric attacks and reduce costly insider risks; but the benefits will depend on disciplined rollout, governance, and ongoing model stewardship.
OpenText’s move underscores a broader market reality: security vendors and platform providers are converging around identity‑and‑behavioral‑first detection models, and Microsoft’s growing AI security stack is shaping how those solutions must operate. For Windows administrators and SOC leaders, the opportunity is real—so long as the rollout is practical, measurable, and governed with the same rigor used for any mission‑critical security investment.
Source: Investing.com India OpenText expands threat detection capabilities with Microsoft integrations By Investing.com
Background
OpenText announced the next generation of its cybersecurity offerings earlier in 2025, introducing OpenText Core Threat Detection and Response as a central element of the OpenText Cybersecurity Cloud. The product is designed to combine behavioral analytics, unsupervised machine learning, and threat‑hunting services into an open XDR architecture that ingests telemetry from endpoints, identity systems, and third‑party security tools. OpenText has emphasized Azure as the primary delivery platform for the product and has published integration kits and an Azure Marketplace listing to ease deployment for Microsoft‑centric customers. These developments were reaffirmed in October 2025 when OpenText expanded the availability of the product and highlighted deeper operational ties with Microsoft Security tooling—most notably Microsoft Defender for Endpoint, Microsoft Entra ID, and Microsoft Security Copilot—framing the move as a way to reduce alert noise and accelerate investigations.
What the new integrations actually bring
Deep endpoint and identity telemetry fusion
At the heart of the announcement is a strategy many security operations teams have wanted for years: fuse endpoint telemetry with identity context to produce higher‑confidence detections. OpenText claims its solution extends Microsoft Defender for Endpoint telemetry with behavior‑based indicators, and then enriches that signal with identity signals from Microsoft Entra ID to surface incidents that often evade signature‑based controls—credential misuse, lateral movement, early‑stage ransomware activity, and certain insider behaviors. This identity‑centric approach is critical for catching sophisticated attacks that hide in legitimate credentials.Microsoft Security Copilot augmentation
OpenText is positioning its product to feed Copilot for Security with richer, context‑aware signals—behavioral indicators and identity context—so analysts get more concise, higher‑confidence summaries and guided playbooks during triage. In practical terms this means the output delivered to a Security Copilot workflow should have fewer false positives and more actionable steps, accelerating mean time to respond. Microsoft’s own Security Copilot roadmap toward agentic, automated security workflows makes this an attractive point of integration for customers already experimenting with AI‑augmented SOC workflows.Open XDR and the Threat Integration Studio
OpenText’s Threat Integration Studio—advertised as the ingestion layer for external telemetry—lets organizations bring in data from non‑Microsoft sources (SIEMs, network tools, application logs, cloud services). The stated benefit is a single pane of glass for correlation and hunting across multi‑vendor fleets, while keeping Microsoft telemetry as the backbone for endpoint and identity signals. This opens a path for organizations that want Microsoft as the primary telemetry source but need to keep investments in other products.Technical overview: what’s under the hood
AI, behavior analytics, and “hundreds of algorithms” (vendor claims)
OpenText describes the product as using a combination of unsupervised machine learning, behavioral risk scoring, and a large library of detection models. These marketing phrases are common in modern XDR offerings; they indicate a mixture of:- anomaly detection models (to spot deviations from baselines),
- entity‑and‑user risk scoring (to prioritize alerts),
- correlation and story‑building engines (to join events into incidents), and
- natural‑language explanation layers (to translate findings into analyst‑friendly summaries).
Deployment model and data flow
- The product is available via Azure Marketplace, simplifying procurement and subscription management for Azure customers. This also means data residency, routing, and network topology choices will be influenced by Azure architecture and tenancy.
- Telemetry ingestion typically happens via APIs and sensor integrations: Defender for Endpoint provides endpoint events, Entra provides identity/access events, and other connectors stream logs into OpenText’s ingestion layer.
- Once ingested, telemetry is correlated and scored; high‑confidence incidents are presented to analysts (and optionally forwarded into Security Copilot workflows for AI‑assisted response).
Why this matters: security operations gains
Reduced alert noise, improved signal‑to‑investigation ratio
One of the federation problems in modern SOCs is volume: too many alerts, too little context. By fusing endpoint behavior with identity context and applying behavioral scoring, OpenText aims to reduce noise and deliver fewer, more precise incident prompts to analysts. That outcome is the most practical, near‑term operational advantage for teams struggling with backlog and burnout.Identity‑centric detections catch credential misuse earlier
A disproportionate number of breaches today start with credential compromise or malicious insiders. Bringing Entra ID signals into detection logic lets an XDR system prioritize anomalies where user behavior is inconsistent with prior access patterns—exactly the sort of use case Ponemon and others highlight as expensive when missed. OpenText expressly links its product to tackling insider risk, citing industry research on the rising cost of insider incidents.Better Copilot outputs = faster analyst decisions
Feeding Copilot for Security with richer context—behavioral indicators, identity correlation, and incident storylines—should reduce the need for manual evidence collection during triage. Analysts can move from signal to containment faster when Copilot recommendations are based on cross‑source correlation rather than siloed alerts. Microsoft’s own Security Copilot enhancements are being designed for that expectation.Critical analysis: strengths, limitations, and risks
Strengths
- Tight Microsoft alignment. For Azure and Microsoft‑centric enterprises, the native integrations reduce friction and accelerate time‑to‑value. Azure Marketplace availability lowers procurement barriers.
- Identity + endpoint fusion. Combining Entra ID with Defender for Endpoint telemetry is a clear operational win for identity‑forward threats and lateral movement detection.
- Open XDR posture. The threat integration studio promises continued investments in extensibility—important for mixed‑vendor environments.
- AI assistance for analysts. Copilot augmentation and natural‑language explanation layers can materially shorten investigation cycles when implemented responsibly.
Limitations and caveats
- Vendor claims vs. independent verification. Statements such as “hundreds of AI algorithms” and reductions in false positives are marketing claims. Independent, third‑party evaluations or SOC‑level telemetry are required to quantify real-world improvements. These claims should be treated as vendor guidance until validated in a customer pilot. Flagged for caution.
- Data residency and privacy. Moving telemetry into cloud‑hosted detection systems raises data residency, retention, and compliance considerations. Azure tenancy choices and contractual clauses need review before deployment in regulated industries.
- Copilot dependence risk. AI‑augmented suggestions are only as good as the inputs. If integrations or enrichments are incomplete, Copilot outputs may omit crucial context. Organizations must maintain analyst oversight and enforce playbook reviews.
- Operational integration complexity. Even with marketplace availability, mapping existing SIEM workflows, ticketing systems, and custom telemetry into a new open XDR platform requires engineering work and process redesign. Implementation timelines and professional services costs must be factored.
- Model drift and maintenance. Behavioral models change as environments change. Without rigorous model monitoring and timely retraining, detection efficacy can degrade—an endemic risk for ML‑based security products.
How it compares: where OpenText fits in the market
OpenText is positioning Core Threat Detection and Response as a comprehensive layer for Microsoft customers—competing in the same landscape as other XDR/MDR vendors that emphasize identity‑and‑endpoint fusion, such as Vectra and others who have also extended Azure and Microsoft detections. Vendors differ on detection depth, managed services, and integration breadth; OpenText’s long history in enterprise content and records management gives it an advantage in content‑centric use cases where file access and content governance intersect with security telemetry.Key differentiators to watch:
- Vendor strength in identity signals (Entra ID integration here is a plus).
- Ability to ingest and normalize non‑Microsoft telemetry (threat integration studio).
- Depth of managed services and threat hunting offerings—OpenText offers services to support detection tuning and response.
Practical guidance for Windows administrators and SOC teams
Pre‑deployment checklist
- Inventory current telemetry sources and confirm available APIs for Defender and Entra.
- Define regulatory and data residency constraints; identify required Azure tenancy/region.
- Map existing SIEM and ticketing workflows to the planned OpenText ingest paths.
- Plan a scoped pilot that includes:
- representative endpoints,
- identity events,
- at least one non‑Microsoft telemetry source to validate the Threat Integration Studio.
- Assign an internal owner for model‑monitoring and false positive triage.
Phased deployment steps
- Enable telemetry exports from Microsoft Defender for Endpoint and Entra ID into a designated staging tenant.
- Configure the OpenText connectors; validate ingestion and retention settings.
- Run parallel detection for 30–90 days: compare OpenText detections to your baseline SIEM alerts.
- Tune alert thresholds and playbooks; update ticketing automation to leverage Copilot recommendations where appropriate.
- Move into production in stages—start with high‑value business units and scale horizontally.
Operational best practices
- Maintain human oversight: require analyst sign‑off on automated containment actions for at least the first 90 days.
- Measure KPI improvements: mean time to detect, mean time to respond, and analyst time per incident.
- Establish a model‑health dashboard to detect concept drift and false positive trends.
- Keep a change log for behavioral baselines—normal business changes (e.g., mergers, large hiring events) will affect model baselines.
Business and compliance considerations
Integrating a cloud‑hosted AI detection platform into a Microsoft environment can yield ROI by preventing expensive incidents—Ponemon’s research puts the average annual cost of insider risk in the tens of millions, underscoring why identity‑centric detection is a high‑priority investment. But realizing ROI depends on disciplined deployment, tuning, and governance; the product alone will not produce savings without operational change.Enterprises should also review contract clauses relating to:
- Data ownership and permitted uses of telemetry for model training,
- SLAs for detection service availability and support,
- Auditability and exportability of detections for compliance reporting.
Independent verification and the need for pilots
OpenText’s statements about improved detection and alert reduction are compelling, but SOC leaders and CISOs should require proof in the form of:- Side‑by‑side pilot results (before/after detection counts and MTTx metrics),
- Representative red‑team validation of identity‑centric detections,
- Clear SLAs and remediation commitments from OpenText for production incidents.
What to watch next
- Expansion of Copilot agent functionality and third‑party Copilot connectors will materially change how AI workflows interact with XDR systems—OpenText’s advantage hinges on how quickly it can channel high‑confidence signals into those agentic workflows.
- Additional telemetry sources beyond endpoint and identity (cloud workloads, SaaS app telemetry, IoT) will raise the bar for any vendor claiming a comprehensive XDR posture.
- Independent testing labs and customer case studies that quantify false positive reduction and MTTx improvements will be decisive for broader adoption.
Conclusion
OpenText’s expanded Microsoft integrations represent a practical and strategic move: for Microsoft‑centric enterprises, native Defender, Entra, and Security Copilot integration simplifies deployment and makes identity‑driven threat detection more achievable. The product’s Azure Marketplace availability and open XDR approach lower the adoption friction for organizations already embedded in the Microsoft cloud.That said, buyers should treat vendor claims as starting points for validation. The most defensible path is a well‑scoped pilot: confirm real‑world detection gains, measure analyst productivity improvements, and validate that Copilot‑driven workflows actually shorten incident lifecycles. Properly executed, the combination of OpenText Core Threat Detection and Response with Microsoft telemetry could materially strengthen an organization’s ability to detect sophisticated identity‑centric attacks and reduce costly insider risks; but the benefits will depend on disciplined rollout, governance, and ongoing model stewardship.
OpenText’s move underscores a broader market reality: security vendors and platform providers are converging around identity‑and‑behavioral‑first detection models, and Microsoft’s growing AI security stack is shaping how those solutions must operate. For Windows administrators and SOC leaders, the opportunity is real—so long as the rollout is practical, measurable, and governed with the same rigor used for any mission‑critical security investment.
Source: Investing.com India OpenText expands threat detection capabilities with Microsoft integrations By Investing.com