Skip to content

Commit 05299f1

Browse files
committed
Bookmark fixes
1 parent 39a68f7 commit 05299f1

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

defender-xdr/manage-incidents.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ This article shows you how to perform various incident management tasks associat
5353
**[Incident logging and reporting:](#incident-logging-and-reporting)**
5454

5555
- [Edit the incident name](#edit-the-incident-name).
56-
- Assess the activity audit and add comments in the [Activity log](#activity-log).
56+
- Assess the activity audit and add comments in the [Activity log](#view-the-activity-log-of-an-incident).
5757
- [Export incident data to PDF](#export-incident-data-to-pdf).
5858

5959
## Access the *Manage incident* pane
@@ -296,7 +296,7 @@ The incident data exported includes the following information:
296296
- The [attack story](investigate-incidents.md#attack-story) graph and threat categories
297297
- The impacted [assets](investigate-incidents.md#assets), covering up to 10 assets for each asset type
298298
- The [evidence list](investigate-incidents.md#evidence-and-response) covering up to 100 items
299-
- Supporting data, including all [related alerts](investigate-incidents.md#alerts) and activities recorded in the [activity log](#activity-log)
299+
- Supporting data, including all [related alerts](investigate-incidents.md#alerts) and activities recorded in the [activity log](#view-the-activity-log-of-an-incident)
300300

301301
Here's an example of the exported PDF:
302302

defender-xdr/respond-first-incident-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ You might assign a high priority to the incident using the information above. Yo
7979

8080
You can contribute to [incident management](manage-incidents.md) efficiency by providing essential information in incidents and alerts. When you add information to the following filters from when you triage and analyze each incident, you provide further context to that incident that other responders can take advantage of:
8181

82-
- [Classifying incidents and alerts](manage-incidents.md#specify-the-classification)
82+
- [Classifying incidents and alerts](manage-incidents.md#specify-the-incidents-classification)
8383
- Naming incidents
8484
- Adding tags
8585
- Providing comments

defender-xdr/security-copilot-m365d-create-incident-report.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Copilot in Defender creates an incident report containing the following informat
6262
- Incident creation and closure
6363
- First and last logs, whether the log was analyst-driven or automated, captured in the incident
6464
- The analysts involved in incident response
65-
- [Incident classification](manage-incidents.md#specify-the-classification), including the analyst's reason for classification that Copilot summarizes
65+
- [Incident classification](manage-incidents.md#specify-the-incidents-classification), including the analyst's reason for classification that Copilot summarizes
6666
- Investigation and remediation actions
6767
- Follow up actions like recommendations, open issues, or next steps noted by the analysts in the incident logs
6868

@@ -103,9 +103,9 @@ You can follow the steps in [export incident data to PDF](manage-incidents.md#ex
103103
Here are some recommendations to consider to ensure that Copilot generates a comprehensive and complete incident report:
104104

105105
- Classify and resolve the incident before generating the incident report.
106-
- Ensure that you write and save comments in the Microsoft Sentinel activity log or in the [Microsoft Defender XDR incident activity log](manage-incidents.md#activity-log) to include the comments in the incident report.
106+
- Ensure that you write and save comments in the Microsoft Sentinel activity log or in the [Microsoft Defender XDR incident activity log](manage-incidents.md#view-the-activity-log-of-an-incident) to include the comments in the incident report.
107107
- Write comments using comprehensive and clear language. In-depth and clear comments provide better context about the response actions. See the following steps to know how to access the comments field:
108-
- [Add comments to incidents in the Microsoft Defender portal](manage-incidents.md#add-comments)
108+
- [Add comments to incidents in the Microsoft Defender portal](manage-incidents.md#add-comments-to-an-incident)
109109
- Add comments to incidents in Microsoft Sentinel
110110
- For ServiceNow users, [enable the Microsoft Sentinel and ServiceNow bi-directional sync](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-introducing-microsoft-sentinel-solution-for/ba-p/3692840) to get more robust incident data.
111111
- Copy the generated incident report and post it to the activity log in the Microsoft Defender portal to ensure that the incident report is saved in the incident page.

defender-xdr/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ You can also get product updates and important notifications through the [messag
131131

132132
- (GA) **Dark mode** is now available in the Microsoft Defender portal. In the Defender portal, on the top right-hand side of the homepage, select **Dark mode**. Select **Light mode** to change the color mode back to the default.
133133

134-
- (GA) **Assigning severity to incidents**, **assigning an incident to a group**, and the ***go hunt*** option from the attack story graph are now generally available. Guides to learn how to [assign or change incident severity](manage-incidents.md#assign-or-change-incident-severity) and [assign an incident to a group](manage-incidents.md#assign-an-incident) are in the [Manage incidents](manage-incidents.md) page. Learn how you can use the *go hunt* option by exploring [attack story](investigate-incidents.md#attack-story).
134+
- (GA) **Assigning severity to incidents**, **assigning an incident to a group**, and the ***go hunt*** option from the attack story graph are now generally available. Guides to learn how to [assign or change incident severity](manage-incidents.md#assign-or-change-incident-severity) and [assign an incident to a group](manage-incidents.md#assign-an-owner) are in the [Manage incidents](manage-incidents.md) page. Learn how you can use the *go hunt* option by exploring [attack story](investigate-incidents.md#attack-story).
135135

136136
- (Preview) **[Custom detection rules in Microsoft Graph security API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)** are now available. Create advanced hunting custom detection rules specific to your org to proactively monitor for threats and take action.
137137

@@ -153,7 +153,7 @@ You can also get product updates and important notifications through the [messag
153153

154154
- (GA) Microsoft Defender for Cloud alerts integration with Microsoft Defender XDR is now generally available. Learn more about the integration in [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).
155155

156-
- (GA) **Activity log** is now available within an incident page. Use the activity log to view all audits and comments, and add comments to the log of an incident. For details, see [Activity log](manage-incidents.md#activity-log).
156+
- (GA) **Activity log** is now available within an incident page. Use the activity log to view all audits and comments, and add comments to the log of an incident. For details, see [Activity log](manage-incidents.md#view-the-activity-log-of-an-incident).
157157

158158
- (Preview) **[Query history](advanced-hunting-query-history.md) in advanced hunting** is now available. You can now rerun or refine queries you have run recently. Up to 30 queries in the past 28 days can be loaded in the query history pane.
159159

@@ -167,7 +167,7 @@ You can also get product updates and important notifications through the [messag
167167

168168
- The Microsoft Defender portal's incident queue has updated filters, search, and added a new function where you can create your own filter sets. For details, see [Available filters](incident-queue.md#available-filters).
169169

170-
- You can now assign incidents to a user group or another user. For details, see [Assign an incident](manage-incidents.md#assign-an-incident).
170+
- You can now assign incidents to a user group or another user. For details, see [Assign an incident](manage-incidents.md#assign-an-owner).
171171

172172
## November 2023
173173

0 commit comments

Comments
 (0)