Skip to content

Commit 6c0b430

Browse files
batamigcwatson-cat
andauthored
Apply suggestions from code review
Co-authored-by: Catherine Watson <[email protected]>
1 parent 391d2cc commit 6c0b430

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

articles/sentinel/microsoft-sentinel-defender-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The following table describes the new or improved capabilities available in the
3232
| Capabilities | Description |
3333
| ----------------- | ------------------------ |
3434
| Advanced hunting | Query from a single portal across different data sets to make hunting more efficient and remove the need for context-switching. Use Security Copilot to help generate your KQL. View and query all data including data from Microsoft security services and Microsoft Sentinel. Use all your existing Microsoft Sentinel workspace content, including queries and functions.<br><br> For more information, see the following articles:<br>- [Advanced hunting in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2264410)<br>- [Security Copilot in advanced hunting](/defender-xdr/advanced-hunting-security-copilot) |
35-
| Case management | Manage SecOps cases natively in the Defender portal without losing security context. Define your own case workflow with custom status values. Assign tasks to collaborators and configure due dates. Handle escalations and complex cases by linking multiple incidents to a case.</br></br>For more information, see [Manage cases natively in the Microsoft Defender portal](/unified-secops-platform/cases-overview).
35+
| Case management | Manage SecOps cases natively in the Defender portal without losing security context. Define your own case workflow with custom status values. Assign tasks to collaborators and configure due dates. Handle escalations and complex cases by linking multiple incidents to a case.</br></br>For more information, see [Manage cases natively in Microsoft's unified security operations platforml](/unified-secops-platform/cases-overview).
3636
| Microsoft Copilot in Microsoft Defender | When investigating incidents in the Defender portal, <br>- [Summarize incidents](/defender-xdr/security-copilot-m365d-incident-summary) <br>- [Analyze scripts](/defender-xdr/security-copilot-m365d-script-analysis)<br>- [Analyze files](/defender-xdr/copilot-in-defender-file-analysis)<br>- [Create incident reports](/defender-xdr/security-copilot-m365d-create-incident-report) <br><br>When hunting for threats in advanced hunting, create ready-to-run KQL queries by using the query assistant. For more information, see [Microsoft Security Copilot in advanced hunting](/defender-xdr/advanced-hunting-security-copilot).|
3737
| SOC optimizations | Get high-fidelity and actionable recommendations to help you identify areas to:<br>- Reduce costs <br>- Add security controls<br>- Add missing data<br>SOC optimizations are available in the Defender and Azure portals, are tailored to your environment, and are based on your current coverage and threat landscape. <br><br>For more information, see the following articles:<br>- [Optimize your security operations](soc-optimization/soc-optimization-access.md) <br>- [Use SOC optimizations programmatically](soc-optimization/soc-optimization-api.md)<br>- [SOC optimization reference of recommendations](soc-optimization/soc-optimization-reference.md) |
3838

@@ -84,7 +84,7 @@ The following limitations also apply to Microsoft Sentinel in Defender portal wi
8484

8585
## Quick reference
8686

87-
Some Microsoft Sentinel capabilities, like the unified incident queue, are integrated with Microsoft Defender XDR in the Defender portal. Many other Microsoft Sentinel capabilities are available in the **Microsoft Sentinel** section of the Defender portal.
87+
Some Microsoft Sentinel capabilities, like the unified incident queue, are integrated with Microsoft Defender XDR in Microsoft's unified security operations platform. Many other Microsoft Sentinel capabilities are available in the **Microsoft Sentinel** section of the Defender portal.
8888

8989
The following image shows the **Microsoft Sentinel** menu in the Defender portal:
9090

articles/sentinel/sap/deployment-attack-disrupt.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: usx-security
1717

1818
Microsoft Defender XDR correlates millions of individual signals to identify active ransomware campaigns or other sophisticated attacks in the environment with high confidence. While an attack is in progress, Defender XDR disrupts the attack by automatically containing compromised assets that the attacker is using through automatic attack disruption. Automatic attack disruption limits lateral movement early on and reduces the overall impact of an attack, from associated costs to loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online.
1919

20-
When you add a new SAP system to Microsoft Sentinel, your default configuration includes attack disruption functionality in the Defender portal. This article describes how to ensure that your SAP system is ready to support automatic attack disruption for SAP in the Microsoft Defender portal.
20+
When you add a new SAP system to Microsoft Sentinel, your default configuration includes attack disruption functionality in Microsoft's unified security operations platform. This article describes how to ensure that your SAP system is ready to support automatic attack disruption for SAP in the Microsoft Defender portal.
2121

2222
For a video demonstration of attack disruption for SAP, watch the following video:
2323
<br><br>
@@ -28,7 +28,7 @@ Content in this article is intended for your **security**, **infrastructure**, a
2828
> [!NOTE]
2929
> Attack disruption requires a data connector agent and isn't supported for the [SAP agentless solution](deployment-overview.md#data-connector) (limited preview).
3030
31-
## Attack disruption for SAP in the Microsoft Defender portal
31+
## Attack disruption for SAP in Microsoft's unified security operations platform
3232

3333
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant roles are applied in Azure and your SAP system. However, automatic attack disruption itself surfaces only in the Microsoft Defender portal.
3434

articles/sentinel/sap/update-sap-data-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Be sure to check for any other available updates, such as SAP change requests.
8888

8989
## Update your system for attack disruption
9090

91-
Automatic attack disruption for SAP is supported in the Microsoft Defender portal, and requires:
91+
Automatic attack disruption for SAP is supported in Microsoft's unified security operations platform, and requires:
9292

9393
- A workspace [onboarded to the Defender portal](../microsoft-sentinel-defender-portal.md).
9494

articles/sentinel/sentinel-security-copilot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This integration primarily supports the standalone experience accessed through [
4141

4242
Microsoft Sentinel data integrates with Security Copilot in two ways.
4343

44-
- In the Defender portal, Copilot in Microsoft Defender XDR benefits from unified incidents integrated with Microsoft Sentinel.
44+
- In Microsoft's unified security operations platform, Copilot in Microsoft Defender XDR benefits from unified incidents integrated with Microsoft Sentinel.
4545
- In the standalone experience, Microsoft Sentinel provides two plugins to integrate with Security Copilot:
4646
<br>**Microsoft Sentinel (Preview)**
4747
<br>**Natural language to KQL for Microsoft Sentinel (Preview)**.

articles/sentinel/understand-threat-intelligence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ For more information, see [Connect Microsoft Sentinel to STIX/TAXII threat intel
125125

126126
## Create and manage threat intelligence
127127

128-
Threat intelligence powered by Microsoft Sentinel is managed next to Microsoft Defender Threat Intelligence (MDTI) and Threat Analytics in the Defender portal.
128+
Threat intelligence powered by Microsoft Sentinel is managed next to Microsoft Defender Threat Intelligence (MDTI) and Threat Analytics in Microsoft's unified SecOps platform.
129129

130130
:::image type="content" source="media/understand-threat-intelligence/intel-management-defender-portal.png" alt-text="Screenshot showing intel management page in the Defender portal." lightbox="media/understand-threat-intelligence/intel-management-defender-portal.png":::
131131

0 commit comments

Comments
 (0)