Skip to content

Commit 960b27b

Browse files
committed
fixing defender portal
1 parent 4563f0f commit 960b27b

10 files changed

+16
-16
lines changed

articles/sentinel/audit-sentinel-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Use the **AzureActivity** table when auditing activity in your SOC environment w
4141
1. Query the data using Kusto Query Language (KQL), like you would any other table:
4242

4343
- In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)** page.
44-
- In Microsoft's unified security operations platform, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page.
44+
- In the Defender portal, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page.
4545

4646
The **AzureActivity** table includes data from many services, including Microsoft Sentinel. To filter in only data from Microsoft Sentinel, start your query with the following code:
4747

articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ Use the options in the **Conditions** area to define conditions for your automat
9494

9595
Analytic rule name values include only analytics rules, and don't include other types of rules, such as threat intelligence or anomaly rules.
9696

97-
- Rules you create for when an incident is created or updated support a large variety of conditions, depending on your environment. These options start with whether your workspace is onboarded to the unified security operations (SecOps) platform:
97+
- Rules you create for when an incident is created or updated support a large variety of conditions, depending on your environment. These options start with you've onboarded Microsoft Sentinel to the Defender portal:
9898

99-
#### [Onboarded workspaces](#tab/onboarded)
99+
#### [Onboarded to the Defender portal](#tab/onboarded)
100100

101101
If your workspace is onboarded to the Defender portal, start by selecting one of the following operators, in either the Azure or the Defender portal:
102102

@@ -110,7 +110,7 @@ Use the options in the **Conditions** area to define conditions for your automat
110110

111111
:::image type="content" source="media/create-manage-use-automation-rules/conditions-onboarded.png" alt-text="Screenshot of automation rule conditions when your workspace is onboarded to the Defender portal.":::
112112

113-
#### [Workspaces not onboarded](#tab/not-onboarded)
113+
#### [Not onboarded to the Defender portal](#tab/not-onboarded)
114114

115115
If your workspace isn't onboarded to the Defender portal, start by defining the following condition properties:
116116

@@ -145,7 +145,7 @@ Use the options in the **Conditions** area to define conditions for your automat
145145
1. Select an operator from the next drop-down box to the right.
146146
:::image type="content" source="media/create-manage-use-automation-rules/select-operator.png" alt-text="Screenshot of selecting a condition operator for automation rules.":::
147147

148-
The list of operators you can choose from varies according to the selected trigger and property. When working with the unified SecOps platform recommend that you use the **Analytic rule name** condition instead of an incident title.
148+
The list of operators you can choose from varies according to the selected trigger and property. When working in the Defender portal, we recommend that you use the **Analytic rule name** condition instead of an incident title.
149149

150150
#### Conditions available with the create trigger
151151

articles/sentinel/fusion.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Fusion is enabled by default in Microsoft Sentinel, as an [analytics rule](detec
4242

4343
You might want to opt out of Fusion if you've enabled [Customer-Managed Keys (CMK)](customer-managed-keys.md) in your workspace. Microsoft Sentinel currently uses 30 days of historical data to train the Fusion engine's machine learning algorithms, and this data is always encrypted using Microsoft’s keys as it passes through the machine learning pipeline. However, the training data is not encrypted using CMK. To opt out of Fusion, disable the **Advanced Multistage Attack Detection** analytics rule in Microsoft Sentinel. For more information, see [Configure Fusion rules](configure-fusion-rules.md#configure-fusion-rules).
4444

45-
Fusion is disabled in Microsoft Sentinel workspaces that are onboarded to Microsoft's [unified security operations (SecOps) platform in the Microsoft Defender portal](https://aka.ms/unified-soc-announcement). Instead, when working with Microsoft's unified SecOps platform, functionality provided by Fusion is replaced by the Microsoft Defender XDR correlation engine.
45+
Fusion is disabled when Microsoft Sentinel is [onboarded to the Defender portal](https://aka.ms/unified-soc-announcement). Instead, when working in the Defender portal, functionality provided by Fusion is replaced by the Microsoft Defender XDR correlation engine.
4646

4747
## Fusion for emerging threats (Preview)
4848

articles/sentinel/geographical-availability-data-residency.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ Data used by the service, including customer data, might be stored and processed
3333
|Data type |Location |
3434
|---------|---------|
3535
|**Raw data** | Stored in the same region as the Azure Log Analytics workspace associated with Microsoft Sentinel. For more information, see [Supported regions](#supported-regions). <br><br>Raw data is processed in one of the following locations: <br>- For Log Analytics workspaces located in Europe, customer data is processed in Europe. <br>- For Log Analytics workspaces located in Israel, customer data is processed in Israel. <br>- For Log Analytics workspaces located in any of the China 21Vianet regions, customer data is processed in China 21Vianet. <br>- For workspaces located in any other location, customer data is processed in a US region. |
36-
|**Processed data and configuration data** | - For workspaces onboarded to Microsoft's unified security operation's platform, processed data and configuration data might be stored and processed in Microsoft Defender XDR regions. For more information, see [Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy). <br><br>- For workspaces not onboarded to Microsoft's unified security operations platform, processed data and configuration data is stored and processed using the same methodology as raw data. |
36+
|**Processed data and configuration data** | - When Microsoft Sentinel is onboarded to the Defender portal, processed data and configuration data might be stored and processed in Microsoft Defender XDR regions. For more information, see [Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy). <br><br>- When Microsoft Sentinel isn't onboarded to the Defender portal, processed data and configuration data is stored and processed using the same methodology as raw data. |
3737

3838
### Supported regions
3939

40-
Regions supported for Microsoft Sentinel raw data, and for processed and configuration data in workspaces not onboarded to Microsoft's unified security operations platform, include:
40+
Regions supported for Microsoft Sentinel raw data, and for processed and configuration data in workspaces not onboarded to the Defender portal, include:
4141

4242
|Continent | Country/Region | Azure Region |
4343
|---------|---------|---------|

articles/sentinel/microsoft-365-defender-sentinel-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,5 +166,5 @@ The Defender XDR connector also lets you stream **advanced hunting** events&mdas
166166
In this document, you learned the benefits of enabling the Defender XDR connector in Microsoft Sentinel.
167167

168168
- [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md)
169-
- To use Microsoft's unified SecOps platform in the Defender portal, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/defender-xdr/microsoft-sentinel-onboard).
169+
- To use Microsoft Sentinel in the Defender portal, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/defender-xdr/microsoft-sentinel-onboard).
170170
- Check [availability of different Microsoft Defender XDR data types](microsoft-365-defender-cloud-support.md) in the different Microsoft 365 and Azure clouds.

articles/sentinel/mitre-coverage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Having a scheduled rule with MITRE techniques applied running regularly in your
102102

103103
When incidents are created for alerts that are surfaced by rules with MITRE techniques configured, the techniques are also added to the incidents.
104104

105-
For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md). If your workspace is onboarded to Microsoft's unified security operations (SecOps) platform, then [investigate incidents in the Microsoft Defender portal](/defender-xdr/investigate-incidents) instead.
105+
For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md). If Microsoft Sentinel is onboarded to the Defender portal, then [investigate incidents in the Microsoft Defender portal](/defender-xdr/investigate-incidents) instead.
106106

107107
- **Threat hunting**:
108108

articles/sentinel/sap/deploy-data-connector-agent-container.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ Now that you created a VM and a Key Vault, your next step is to create a new age
202202
203203
This procedure describes how to create a new agent and connect it to your SAP system using the Azure or Defender portals. We recommend that your **security** team perform this procedure with help from the **SAP BASIS** team.
204204
205-
Deploying the data connector agent from the portal is supported from both the Azure portal, and the Defender portal if you onboarded your workspace to the unified security operations platform.
205+
Deploying the data connector agent from the portal is supported from both the Azure portal, and the Defender portal when Microsoft Sentinel is onboarded to the Defender portal.
206206
207207
While deployment is also supported from the command line, we recommend that you use the portal for typical deployments. Data connector agents deployed using the command line can be managed only via the command line, and not via the portal. For more information, see [Deploy an SAP data connector agent from the command line](deploy-command-line.md).
208208

articles/sentinel/sap/deployment-attack-disrupt.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: usx-security
1717

1818
Microsoft Defender XDR correlates millions of individual signals to identify active ransomware campaigns or other sophisticated attacks in the environment with high confidence. While an attack is in progress, Defender XDR disrupts the attack by automatically containing compromised assets that the attacker is using through automatic attack disruption. Automatic attack disruption limits lateral movement early on and reduces the overall impact of an attack, from associated costs to loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online.
1919

20-
When you add a new SAP system to Microsoft Sentinel, your default configuration includes attack disruption functionality in the unified security operations platform. This article describes how to ensure that your SAP system is ready to support automatic attack disruption for SAP in the Microsoft Defender portal.
20+
When you add a new SAP system to Microsoft Sentinel, your default configuration includes attack disruption functionality in the Defender portal. This article describes how to ensure that your SAP system is ready to support automatic attack disruption for SAP in the Microsoft Defender portal.
2121

2222
For a video demonstration of attack disruption for SAP, watch the following video:
2323
<br><br>
@@ -30,7 +30,7 @@ Content in this article is intended for your **security**, **infrastructure**, a
3030
3131
## Attack disruption for SAP and the unified security operations platform
3232

33-
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant roles are applied in Azure and your SAP system. However, automatic attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
33+
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant roles are applied in Azure and your SAP system. However, automatic attack disruption itself surfaces only in the Microsoft Defender portal.
3434

3535
For more information, see [Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption).
3636

articles/sentinel/sap/update-sap-data-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,9 +88,9 @@ Be sure to check for any other available updates, such as SAP change requests.
8888

8989
## Update your system for attack disruption
9090

91-
Automatic attack disruption for SAP is supported with the unified security operations platform in the Microsoft Defender portal, and requires:
91+
Automatic attack disruption for SAP is supported in the Microsoft Defender portal, and requires:
9292

93-
- A workspace [onboarded to the unified security operations platform](../microsoft-sentinel-defender-portal.md).
93+
- A workspace [onboarded to the Defender portal](../microsoft-sentinel-defender-portal.md).
9494

9595
- A Microsoft Sentinel SAP data connector agent, version 90847355 or higher. [Check your current agent version](#verify-your-current-data-connector-agent-version) and update it if you need to.
9696

articles/sentinel/sentinel-security-copilot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This integration primarily supports the standalone experience accessed through [
4141

4242
Microsoft Sentinel data integrates with Security Copilot in two ways.
4343

44-
- In Microsoft's unified security operations platform, Copilot in Microsoft Defender XDR benefits from unified incidents integrated with Microsoft Sentinel.
44+
- In the Defender portal, Copilot in Microsoft Defender XDR benefits from unified incidents integrated with Microsoft Sentinel.
4545
- In the standalone experience, Microsoft Sentinel provides two plugins to integrate with Security Copilot:
4646
<br>**Microsoft Sentinel (Preview)**
4747
<br>**Natural language to KQL for Microsoft Sentinel (Preview)**.

0 commit comments

Comments
 (0)