Skip to content

Commit 090025c

Browse files
Merge branch 'main' into docs-editor/whats-new-1755499423
2 parents 3c5c8c5 + 099933c commit 090025c

35 files changed

+69
-37
lines changed

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
88
# How to investigate anomaly detection alerts
99

1010

11-
1211
Microsoft Defender for Cloud Apps provides security detections and alerts for malicious activities. The purpose of this guide is to provide you with general and practical information on each alert, to help with your investigation and remediation tasks. Included in this guide is general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm. Finally, some alerts might be in preview, so regularly review the official documentation for updated alert status.
1312

1413
> [!IMPORTANT]

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
5555

5656
| Type | Name |
5757
| ---- | ---- |
58-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
5959
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
6060
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
6161

unified-secops-platform/criteria.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: How Microsoft identifies malware and potentially unwanted applications
33
ms.reviewer: andanut, elahehsamani
44
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.localizationpriority: medium
78
ms.author: dansimp
89
author: dansimp

unified-secops-platform/defender-xdr-portal.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Microsoft Defender XDR in the Microsoft Defender Portal
33
description: Learn about the services and features available with Microsoft Defender XDR in the Microsoft Defender portal.
44
search.appverid: met150
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.author: bagol
78
author: batamig
89
ms.localizationpriority: medium

unified-secops-platform/detect-threats-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Threat detection in the Microsoft Defender portal
33
description: Learn about the features that help detect threats in the Microsoft unified security platform
44
search.appverid: met150
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.author: austinmc
78
author: austinmccollum
89
ms.localizationpriority: medium

unified-secops-platform/gov-support.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@ title: Microsoft Defender Portal Service Support for US Government Customers
33
description: Learn about support in the Microsoft Defender portal for US Government clouds.
44
author: batamig
55
ms.author: bagol
6-
ms.service: unified-secops-platform
6+
ms.service: microsoft-defender
7+
ms.subservice: unified-security-operations
78
ms.topic: concept-article #Don't change.
89
ms.date: 06/22/2025
910
ms.collection:

unified-secops-platform/hunting-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Threat hunting features across the Microsoft Defender portal
33
description: Learn about threat hunting features across the Microsoft Defender portal
44
search.appverid: met150
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.author: austinmc
78
author: austinmccollum
89
ms.localizationpriority: medium

unified-secops-platform/index.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ summary: Bring together the full capabilities of Microsoft Sentinel, Microsoft D
66
metadata:
77
title: Unified security operations documentation # Required; page title displayed in search results. Include the brand. < 60 chars.
88
description: Bring together the full capabilities of Microsoft Sentinel, Defender XDR, Microsoft Security Exposure Management, and generative AI into the Defender portal. # Required; article description that is displayed in search results. < 160 chars.
9-
ms.service: unified-secops-platform #Required; use either service or product per approved list.
9+
ms.service: microsoft-defender
10+
ms.subservice: unified-security-operations #Required; use either service or product per approved list.
1011
ms.topic: landing-page # Required
1112
ms.collection: usx-security # Optional; Remove if no collection is used.
1213
ms.author: bagol

unified-secops-platform/malware-naming.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
title: How Microsoft names malware
33
description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
4-
ms.service: unified-secops-platform
4+
ms.service: microsoft-defender
5+
ms.subservice: unified-security-operations
56
ms.localizationpriority: medium
67
ms.author: dansimp
78
author: dansimp

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
title: Connect Microsoft Sentinel to the Microsoft Defender portal
33
description: Learn how to connect your Microsoft Sentinel environment to the Defender portal to unify your security operations.
4-
ms.service: unified-secops-platform
4+
ms.service: microsoft-defender
5+
ms.subservice: unified-security-operations
56
f1.keywords:
67
- NOCSH
78
ms.author: bagol

0 commit comments

Comments
 (0)