Skip to content

Commit 0128a3f

Browse files
Merge pull request #2751 from v-thepet/migrate3
Move remaining 5 articles, art-redirect-toc
2 parents 8b879f6 + 7f3f619 commit 0128a3f

File tree

11 files changed

+41
-22
lines changed

11 files changed

+41
-22
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,31 @@
171171
"redirect_url": "/defender-xdr/",
172172
"redirect_document_id": false
173173
},
174+
{
175+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
176+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
177+
"redirect_document_id": false
178+
},
179+
{
180+
"source_path": "defender-xdr/malware-naming.md",
181+
"redirect_url": "/unified-secops-platform/malware-naming",
182+
"redirect_document_id": false
183+
},
184+
{
185+
"source_path": "defender-xdr/criteria.md",
186+
"redirect_url": "/unified-secops-platform/criteria",
187+
"redirect_document_id": false
188+
},
189+
{
190+
"source_path": "defender-xdr/submission-guide.md",
191+
"redirect_url": "/unified-secops-platform/submission-guide",
192+
"redirect_document_id": false
193+
},
194+
{
195+
"source_path": "defender-xdr/virus-initiative-criteria.md",
196+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
197+
"redirect_document_id": false
198+
},
174199
{
175200
"source_path": "defender-xdr/tickets.md",
176201
"redirect_url": "/defender-xdr/troubleshoot",

defender-xdr/TOC.yml

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -581,17 +581,9 @@
581581
- name: Responding to ransomware attacks
582582
href: playbook-responding-ransomware-m365-defender.md
583583
- name: Threat actor naming
584-
href: microsoft-threat-actor-naming.md
585-
- name: Malware names
586-
href: malware-naming.md
587-
- name: How Microsoft identifies malware and PUA
588-
href: criteria.md
589-
- name: Submit files for analysis
590-
href: submission-guide.md
584+
href: /unified-secops-platform/microsoft-threat-actor-naming
591585
- name: Understand threat intelligence concepts
592586
href: /defender-endpoint/threat-indicator-concepts
593-
- name: Microsoft virus initiative
594-
href: virus-initiative-criteria.md
595587
- name: Software developer FAQ
596588
href: developer-faq.yml
597589
- name: Microsoft Defender XDR docs

unified-secops-platform/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,12 +108,14 @@
108108
- name: Resources
109109
items:
110110
- name: Threat actor naming
111-
href: /defender-xdr/microsoft-threat-actor-naming?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
111+
href: microsoft-threat-actor-naming.md
112+
- name: Malware names
113+
href: malware-naming.md
112114
- name: Identification of malware and unwanted apps
113-
href: /defender-xdr/criteria?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
115+
href: criteria.md
114116
- name: Submit files for analysis
115-
href: /defender-xdr/submission-guide?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
117+
href: submission-guide.md
116118
- name: Microsoft virus initiative
117-
href: /defender-xdr/virus-initiative-criteria?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
119+
href: virus-initiative-criteria.md
118120
- name: Microsoft security portals
119121
href: /defender-xdr/portals?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json

defender-xdr/criteria.md renamed to unified-secops-platform/criteria.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft identifies malware and potentially unwanted applications
33
ms.reviewer: andanut, elahehsamani
44
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp

defender-xdr/malware-naming.md renamed to unified-secops-platform/malware-naming.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft names malware
33
ms.reviewer:
44
description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp
@@ -19,7 +19,7 @@ ms.date: 01/29/2024
1919

2020
We name the malware and unwanted software that we detect according to the Computer Antivirus Research Organization (CARO) malware naming scheme. The scheme uses the following format:
2121

22-
![How Microsoft determines names malware](/defender/media/security-intelligence-images/naming-malware.png)
22+
![How Microsoft determines names malware](media/malware-naming/naming-malware.png)
2323

2424
When our analysts research a particular threat, they determine what each of the components name is.
2525

File renamed without changes.
File renamed without changes.
File renamed without changes.

defender-xdr/microsoft-threat-actor-naming.md renamed to unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft names threat actors
33
ms.reviewer:
44
description: Learn how Microsoft names threat actors and how to use the naming convention to identify associated intelligence.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.mktglfcycl: secure
77
ms.sitesec: library
88
ms.localizationpriority: medium
@@ -24,7 +24,7 @@ ms.date: 12/19/2024
2424

2525
Microsoft uses a naming taxonomy for threat actors aligned with the theme of weather. We intend to bring better clarity to customers and other security researchers with this taxonomy. We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves. We also aim to aid security researchers, who are already confronted with an overwhelming amount of threat intelligence data.
2626

27-
:::image type="content" source="/defender/media/threat-actor-naming/threat-actor-categories.png" alt-text="Nation-state actors based on Microsoft naming" lightbox="/defender/media/threat-actor-naming/threat-actor-categories-lg.png":::
27+
:::image type="content" source="media/microsoft-threat-actor-naming/threat-actor-categories.png" alt-text="Nation-state actors based on Microsoft naming" lightbox="media/microsoft-threat-actor-naming/threat-actor-categories-lg.png":::
2828

2929
Microsoft categorizes threat actors into five key groups:
3030

@@ -185,7 +185,7 @@ Read our announcement about this taxonomy for more information: [https://aka.ms/
185185

186186
## Putting intelligence into the hands of security professionals
187187

188-
[Intel profiles in Microsoft Defender Threat Intelligence](defender-threat-intelligence.md) bring crucial insights about threat actors. These insights enable security teams to get the context they need as they prepare for and respond to threats.
188+
[Intel profiles in Microsoft Defender Threat Intelligence](/defender-xdr/defender-threat-intelligence) bring crucial insights about threat actors. These insights enable security teams to get the context they need as they prepare for and respond to threats.
189189

190190
Additionally, the Microsoft Defender Threat Intelligence Intel Profiles API provides the most up-to-date threat actor infrastructure visibility in the industry today. Updated information is crucial in enabling threat intelligence and security operations (SecOps) teams to streamline their advanced threat hunting and analysis workflows. Learn more about this API in the documentation: [Use the threat intelligence APIs in Microsoft Graph (preview)](/graph/api/resources/security-threatintelligence-overview).
191191

defender-xdr/submission-guide.md renamed to unified-secops-platform/submission-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Submit files for analysis by Microsoft
33
description: Learn how to submit files to Microsoft for malware analysis, how to track your submissions, and dispute detections.
44
ms.reviewer:
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp
@@ -21,7 +21,7 @@ ms.date: 05/10/2024
2121
If you have a file that you suspect might be malware or is being incorrectly detected, you can submit it to us for analysis. This page has answers to some common questions about submitting a file for analysis.
2222

2323
> [!TIP]
24-
> If your organization's subscription includes [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint), [Microsoft Defender for Office 365 Plan 2](/defender-office-365/mdo-about), or [Microsoft Defender XDR](microsoft-365-defender.md), you can use the [new unified submissions portal](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770). To learn more, see [Submit files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde).
24+
> If your organization's subscription includes [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint), [Microsoft Defender for Office 365 Plan 2](/defender-office-365/mdo-about), or [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender), you can use the [new unified submissions portal](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770). To learn more, see [Submit files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde).
2525
2626
## How do I submit a file to Microsoft for analysis?
2727

0 commit comments

Comments
 (0)