Skip to content

Commit 04f5b51

Browse files
Merge pull request #215212 from yelevin/patch-2
Removed New! designations
2 parents 2504f6f + cf85bc3 commit 04f5b51

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.service: microsoft-sentinel
1414

1515
Microsoft Sentinel's [Microsoft 365 Defender](/microsoft-365/security/mtp/microsoft-threat-protection) connector with incident integration allows you to stream all Microsoft 365 Defender incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft 365 Defender incidents include all their alerts, entities, and other relevant information, and they group together, and are enriched by, alerts from Microsoft 365 Defender's component services **Microsoft Defender for Endpoint**, **Microsoft Defender for Identity**, **Microsoft Defender for Office 365**, and **Microsoft Defender for Cloud Apps**, as well as alerts from other services such as **Microsoft Purview Data Loss Prevention (DLP)** and **Azure Active Directory Identity Protection (AADIP)**.
1616

17-
The connector also lets you stream **advanced hunting** events from *all* of the above components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
17+
The connector also lets you stream **advanced hunting** events from *all* of the above Defender components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
1818

1919
For more information about incident integration and advanced hunting event collection, see [Microsoft 365 Defender integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
2020

@@ -110,7 +110,7 @@ Verify that you've satisfied the [prerequisites](#prerequisites-for-active-direc
110110
| **[EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)** | Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
111111
| **[EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)** | Information about URLs on emails |
112112

113-
# [Defender for Identity (New!)](#tab/MDI)
113+
# [Defender for Identity](#tab/MDI)
114114

115115
| Table name | Events type |
116116
|-|-|
@@ -119,13 +119,13 @@ Verify that you've satisfied the [prerequisites](#prerequisites-for-active-direc
119119
| **[IdentityLogonEvents](/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table)** | Authentication activities made through your on-premises Active Directory, as captured by Microsoft Defender for Identity <br><br>Authentication activities related to Microsoft online services, as captured by Microsoft Defender for Cloud Apps |
120120
| **[IdentityQueryEvents](/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table)** | Information about queries performed against Active Directory objects such as users, groups, devices, and domains |
121121

122-
# [Defender for Cloud Apps (New!)](#tab/MDCA)
122+
# [Defender for Cloud Apps](#tab/MDCA)
123123

124124
| Table name | Events type |
125125
|-|-|
126126
| **[CloudAppEvents](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table)** | Information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps |
127127

128-
# [Defender alerts (New!)](#tab/MDA)
128+
# [Defender alerts](#tab/MDA)
129129

130130
| Table name | Events type |
131131
|-|-|
@@ -179,7 +179,7 @@ In the **Next steps** tab, you’ll find some useful workbooks, sample queries,
179179

180180
## Next steps
181181

182-
In this document, you learned how to integrate Microsoft 365 Defender incidents, and advanced hunting event data from Microsoft Defender for Endpoint and Defender for Office 365, into Microsoft Sentinel, using the Microsoft 365 Defender connector. To learn more about Microsoft Sentinel, see the following articles:
182+
In this document, you learned how to integrate Microsoft 365 Defender incidents, and advanced hunting event data from Microsoft Defender component services, into Microsoft Sentinel, using the Microsoft 365 Defender connector. To learn more about Microsoft Sentinel, see the following articles:
183183

184184
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
185185
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).

0 commit comments

Comments
 (0)