You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/manage-incidents.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ This article shows you how to perform various incident management tasks associat
53
53
**[Incident logging and reporting:](#incident-logging-and-reporting)**
54
54
55
55
-[Edit the incident name](#edit-the-incident-name).
56
-
- Assess the activity audit and add comments in the [Activity log](#activity-log).
56
+
- Assess the activity audit and add comments in the [Activity log](#view-the-activity-log-of-an-incident).
57
57
-[Export incident data to PDF](#export-incident-data-to-pdf).
58
58
59
59
## Access the *Manage incident* pane
@@ -296,7 +296,7 @@ The incident data exported includes the following information:
296
296
- The [attack story](investigate-incidents.md#attack-story) graph and threat categories
297
297
- The impacted [assets](investigate-incidents.md#assets), covering up to 10 assets for each asset type
298
298
- The [evidence list](investigate-incidents.md#evidence-and-response) covering up to 100 items
299
-
- Supporting data, including all [related alerts](investigate-incidents.md#alerts) and activities recorded in the [activity log](#activity-log)
299
+
- Supporting data, including all [related alerts](investigate-incidents.md#alerts) and activities recorded in the [activity log](#view-the-activity-log-of-an-incident)
Copy file name to clipboardExpand all lines: defender-xdr/respond-first-incident-365-defender.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ You might assign a high priority to the incident using the information above. Yo
79
79
80
80
You can contribute to [incident management](manage-incidents.md) efficiency by providing essential information in incidents and alerts. When you add information to the following filters from when you triage and analyze each incident, you provide further context to that incident that other responders can take advantage of:
81
81
82
-
-[Classifying incidents and alerts](manage-incidents.md#specify-the-classification)
82
+
-[Classifying incidents and alerts](manage-incidents.md#specify-the-incidents-classification)
Copy file name to clipboardExpand all lines: defender-xdr/security-copilot-m365d-create-incident-report.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ Copilot in Defender creates an incident report containing the following informat
62
62
- Incident creation and closure
63
63
- First and last logs, whether the log was analyst-driven or automated, captured in the incident
64
64
- The analysts involved in incident response
65
-
-[Incident classification](manage-incidents.md#specify-the-classification), including the analyst's reason for classification that Copilot summarizes
65
+
-[Incident classification](manage-incidents.md#specify-the-incidents-classification), including the analyst's reason for classification that Copilot summarizes
66
66
- Investigation and remediation actions
67
67
- Follow up actions like recommendations, open issues, or next steps noted by the analysts in the incident logs
68
68
@@ -103,9 +103,9 @@ You can follow the steps in [export incident data to PDF](manage-incidents.md#ex
103
103
Here are some recommendations to consider to ensure that Copilot generates a comprehensive and complete incident report:
104
104
105
105
- Classify and resolve the incident before generating the incident report.
106
-
- Ensure that you write and save comments in the Microsoft Sentinel activity log or in the [Microsoft Defender XDR incident activity log](manage-incidents.md#activity-log) to include the comments in the incident report.
106
+
- Ensure that you write and save comments in the Microsoft Sentinel activity log or in the [Microsoft Defender XDR incident activity log](manage-incidents.md#view-the-activity-log-of-an-incident) to include the comments in the incident report.
107
107
- Write comments using comprehensive and clear language. In-depth and clear comments provide better context about the response actions. See the following steps to know how to access the comments field:
108
-
-[Add comments to incidents in the Microsoft Defender portal](manage-incidents.md#add-comments)
108
+
-[Add comments to incidents in the Microsoft Defender portal](manage-incidents.md#add-comments-to-an-incident)
109
109
- Add comments to incidents in Microsoft Sentinel
110
110
- For ServiceNow users, [enable the Microsoft Sentinel and ServiceNow bi-directional sync](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-introducing-microsoft-sentinel-solution-for/ba-p/3692840) to get more robust incident data.
111
111
- Copy the generated incident report and post it to the activity log in the Microsoft Defender portal to ensure that the incident report is saved in the incident page.
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ You can also get product updates and important notifications through the [messag
131
131
132
132
- (GA) **Dark mode** is now available in the Microsoft Defender portal. In the Defender portal, on the top right-hand side of the homepage, select **Dark mode**. Select **Light mode** to change the color mode back to the default.
133
133
134
-
- (GA) **Assigning severity to incidents**, **assigning an incident to a group**, and the ***go hunt*** option from the attack story graph are now generally available. Guides to learn how to [assign or change incident severity](manage-incidents.md#assign-or-change-incident-severity) and [assign an incident to a group](manage-incidents.md#assign-an-incident) are in the [Manage incidents](manage-incidents.md) page. Learn how you can use the *go hunt* option by exploring [attack story](investigate-incidents.md#attack-story).
134
+
- (GA) **Assigning severity to incidents**, **assigning an incident to a group**, and the ***go hunt*** option from the attack story graph are now generally available. Guides to learn how to [assign or change incident severity](manage-incidents.md#assign-or-change-incident-severity) and [assign an incident to a group](manage-incidents.md#assign-an-owner) are in the [Manage incidents](manage-incidents.md) page. Learn how you can use the *go hunt* option by exploring [attack story](investigate-incidents.md#attack-story).
135
135
136
136
- (Preview) **[Custom detection rules in Microsoft Graph security API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)** are now available. Create advanced hunting custom detection rules specific to your org to proactively monitor for threats and take action.
137
137
@@ -153,7 +153,7 @@ You can also get product updates and important notifications through the [messag
153
153
154
154
- (GA) Microsoft Defender for Cloud alerts integration with Microsoft Defender XDR is now generally available. Learn more about the integration in [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).
155
155
156
-
- (GA) **Activity log** is now available within an incident page. Use the activity log to view all audits and comments, and add comments to the log of an incident. For details, see [Activity log](manage-incidents.md#activity-log).
156
+
- (GA) **Activity log** is now available within an incident page. Use the activity log to view all audits and comments, and add comments to the log of an incident. For details, see [Activity log](manage-incidents.md#view-the-activity-log-of-an-incident).
157
157
158
158
- (Preview) **[Query history](advanced-hunting-query-history.md) in advanced hunting** is now available. You can now rerun or refine queries you have run recently. Up to 30 queries in the past 28 days can be loaded in the query history pane.
159
159
@@ -167,7 +167,7 @@ You can also get product updates and important notifications through the [messag
167
167
168
168
- The Microsoft Defender portal's incident queue has updated filters, search, and added a new function where you can create your own filter sets. For details, see [Available filters](incident-queue.md#available-filters).
169
169
170
-
- You can now assign incidents to a user group or another user. For details, see [Assign an incident](manage-incidents.md#assign-an-incident).
170
+
- You can now assign incidents to a user group or another user. For details, see [Assign an incident](manage-incidents.md#assign-an-owner).
0 commit comments