Skip to content

Commit a382313

Browse files
Merge pull request #270737 from batamig/patch-401
Removing SAP attack disrupt
2 parents dd26626 + 1e58c77 commit a382313

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/sentinel/microsoft-sentinel-defender-portal.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ The following table describes the new or improved capabilities available in the
2424
|Capabilities |Description |
2525
|---------|---------|
2626
|Advanced hunting | Query from a single portal across different data sets to make hunting more efficient and remove the need for context-switching. View and query all data including data from Microsoft security services and Microsoft Sentinel. Use all your existing Microsoft Sentinel workspace content, including queries and functions.<br><br> For more information, see [Advanced hunting in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2264410).|
27-
|Attack disrupt | Deploy automatic attack disruption in the Microsoft Defender portal for SAP, together with Microsoft Sentinel integrated into the Microsoft Defender portal and the Microsoft Sentinel solution for SAP applications. For example, contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack. <br><br>Attack disrupt for SAP is available in the Defender portal only.<br><br> For more information, see the following articles: <br> - [Automatic attack disruption in the Microsoft Defender portal](/microsoft-365/security/defender/automatic-attack-disruption) <br>- [Configure automatic attack disruption capabilities in Microsoft Defender XDR](/microsoft-365/security/defender/configure-attack-disruption)<br>- [Microsoft Sentinel solution for SAP® applications overview](/azure/sentinel/sap/solution-overview) <br>- [Deploy automatic attack disruption for SAP](https://go.microsoft.com/fwlink/p/?linkid=2264356) |
2827
|Unified entities| Entity pages for devices, users, IP addresses, and Azure resources in the Defender portal display information from Microsoft Sentinel and Defender data sources. These entity pages give you an expanded context for your investigations of incidents and alerts in the Defender portal.<br><br>For more information, see [Investigate entities with entity pages in Microsoft Sentinel](/azure/sentinel/entity-pages).|
2928
|Unified incidents| Manage and investigate security incidents in a single location and from a single queue in the Defender portal. Incidents include:<br>- Data from the breadth of sources<br>- AI analytics tools of security information and event management (SIEM)<br>- Context and mitigation tools offered by extended detection and response (XDR) <br><br> For more information, see [Incident response in the Microsoft Defender portal](/microsoft-365/security/defender/incidents-overview).|
3029

0 commit comments

Comments
 (0)