Skip to content

Commit 0b2f2f7

Browse files
authored
Merge branch 'cwatson-usxtoc' into main
2 parents f407439 + 18bf72d commit 0b2f2f7

File tree

9 files changed

+986
-0
lines changed

9 files changed

+986
-0
lines changed
Lines changed: 200 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,200 @@
1+
- name: Microsoft unified security operations platform
2+
href: index.yml
3+
expanded: true
4+
items:
5+
- name: Overview
6+
items:
7+
- name: What's the Microsoft unified security operations platform?
8+
href: overview-unified-security.md
9+
- name: What's new
10+
href: /defender-xdr/unified-soc-platform/whats-new.md
11+
- name: Defender portal service integration
12+
items:
13+
- name: Overview
14+
href: overview-defender-portal.md
15+
- name: Defender XDR
16+
href: /defender-xdr/microsoft-365-defender
17+
- name: Security Exposure Management
18+
href: /security-exposure-management/get-started-exposure-management
19+
- name: Microsoft Copilot for Security in the Defender portal
20+
href: /defender-xdr/security-copilot-in-microsoft-365-defender
21+
- name: Plan ## Leverage existing zero trust articles? One article for USX all up planning (like guide that links out).
22+
items:
23+
- name: Zero trust security ## Discuss principles around Zero Trust security, link to the Zero Trust doc set as needed.
24+
items:
25+
- name: Microsoft Sentinel and Microsoft Defender XDR
26+
href: /security/operations/siem-xdr-overview
27+
- name: Microsoft Defender XDR
28+
href: /defender-xdr/zero-trust-with-microsoft-365-defender
29+
- name: Microsoft Defender for Cloud
30+
href: /azure/defender-for-cloud/zero-trust
31+
- name: Microsoft Defender for Cloud Apps
32+
href: /defender-cloud-apps/zero-trust
33+
- name: Microsoft Defender for Identity
34+
href: /defender-for-identity/zero-trust
35+
- name: Microsoft Defender for IoT
36+
href: /azure/defender-for-iot/organizations/concept-zero-trust
37+
- name: Plan for unified security operations ## NEW article that covers specific to USX all up and link out to service topics
38+
href: /defender-xdr/prerequisites ## PLACEHOLDER LINK
39+
- name: Deploy ## Need new high level article. Put post deployment links at the end of article. Single article outlining deployment steps for Defender portal services. Point to services for more details. NEW article title: Deploy the Microsoft unified security operations
40+
Items:
41+
- name: Connect Microsoft Sentinel to Microsoft Defender
42+
href: /defender-xdr/microsoft-sentinel-onboard
43+
- name: Prevent attacks ## (Pre-breach) - Renamed from reduce risks. one article that summarizes how to do that with USX
44+
items:
45+
- name: Overview ## NEW Single article or perhaps a couple of articles that summarize our pre-breach protection philosophy, with links to relevant service articles. The article should align with the info about preventing attacks that;s in the datasheet. "Through a single portal, continuously monitor your digital environment, assess risk, and implement posture improvements using security controls across all platforms, cloud, and hybrid infrastructure".
46+
href: /azure/sentinel/sap/deployment-attack-disrupt ## PLACEHOLDER LINK
47+
- name: Microsoft Secure Score ## Write a single article or two that condenses all the info in the Protect against threats/Microsoft Secure Score section. Or because this is going away, we just link in all the articles? Or put them in reference?
48+
items:
49+
- name: Overview
50+
href: /defender-xdr/microsoft-secure-score.md
51+
- name: What's new
52+
href: /defender-xdr/microsoft-secure-score-whats-new.md
53+
- name: Assess your security posture
54+
href: /defender-xdr/microsoft-secure-score-improvement-actions.md
55+
- name: Track your score history and meet goals
56+
href: /defender-xdr/microsoft-secure-score-history-metrics-trends.md
57+
- name: Data storage and privacy
58+
href: /defender-xdr/secure-score-data-storage-privacy.md
59+
- name: Detect threats ## Have each writer provide article and then we summarize in one article. Our outline and scope should align to datasheet: "Get visiblity into, and disrupt attacks in real time across identities, endpoints, email, cloud apps, data in hybrid and multicloud environments"
60+
href: /azure/sentinel/threat-detection ## PLACEHOLDER LINK
61+
- name: Hunt for threats ## Seperating this out because per PM hunting might happen in different scenarios. Also wanting it higher level as advanced hunting is one of the things highlighted for USX.
62+
items:
63+
- name: Overview
64+
href: /defender-xdr/advanced-hunting-overview ## PLACEHOLDER - Need overview article about the hunting features across services. Advanced hunting, custom detections, hunts in Sentinel
65+
- name: Search with advanced hunting
66+
items:
67+
- name: Overview
68+
href: /defender-xdr/advanced-hunting-overview
69+
- name: Advanced hunting in the Microsoft Defender portal
70+
href: /defender-xdr/advanced-hunting-microsoft-defender
71+
- name: Guided and advanced modes
72+
href: /defender-xdr/advanced-hunting-modes
73+
- name: Generate KQL queries with Security Copilot
74+
href: /defender-xdr/advanced-hunting-security-copilot
75+
- name: Build hunting queries using guided mode
76+
href: /defender-xdr/advanced-hunting-query-builder
77+
- name: Work with query results
78+
href: /defender-xdr/advanced-hunting-query-results
79+
- name: Take action on query results
80+
href: /defender-xdr/advanced-hunting-take-action
81+
- name: Hunt for ransomware
82+
href: /defender-xdr/advanced-hunting-find-ransomware
83+
- name: Learn the query language
84+
href: /defender-xdr/advanced-hunting-query-language
85+
- name: Get expert training
86+
href: /defender-xdr/advanced-hunting-expert-training
87+
- name: Use shared queries
88+
href: /defender-xdr/advanced-hunting-shared-queries
89+
- name: Investigate incidents ## could be incidents, threats, posture findings. Need an overview article for USX. Current overviews (XDR/Sentinel) don't appear to be updated for USX.
90+
items:
91+
- name: Overview
92+
href: /defender-xdr/investigate-incidents ## Would need update to apply to USX. Per Dianne, this isn't XDR specific.
93+
- name: Alerts, incidents, and correlation
94+
href: /defender-xdr/alerts-incidents-correlation
95+
- name: Manage incidents
96+
href: /defender-xdr/manage-incidents
97+
- name: Investigate alerts
98+
href: /defender-xdr/investigate-alerts
99+
- name: Investigate incidents in Copilot for Security ## This article is specific to Sentinel in the context of using outside of USX and with XDR in USX. We don't think it applies to Sentinel only but need to confirm with PM. Austin thought title w/o mentioning Sentinel is misleading. We might need to leave this out of TOC or as part of plan/deploy to integrate Sentinel w/ Copilot features.
100+
href: /azure/sentinel/sentinel-security-copilot
101+
- name: Investigate with Microsoft Copilot in Microsoft Defender ## Copied entire section from XDR TOC
102+
items:
103+
- name: Overview
104+
href: /defender-xdr/security-copilot-in-microsoft-365-defender.md
105+
- name: Summarize incidents
106+
href: /defender-xdr/security-copilot-m365d-incident-summary.md
107+
- name: Run script analysis
108+
href: /defender-xdr/security-copilot-m365d-script-analysis.md
109+
- name: Analyze files
110+
href: /defender-xdr/copilot-in-defender-file-analysis.md
111+
- name: Generate device summaries
112+
href: /defender-xdr/copilot-in-defender-device-summary.md
113+
- name: Use guided responses
114+
href: /defender-xdr/security-copilot-m365d-guided-response.md
115+
- name: Generate KQL queries
116+
href: /defender-xdr/advanced-hunting-security-copilot.md
117+
- name: Create incident reports
118+
href: /defender-xdr/security-copilot-m365d-create-incident-report.md
119+
- name: Investigate entities
120+
items:
121+
- name: Overview
122+
href: /azure/sentinel/entity-pages?tabs=azure-portal
123+
- name: User entity pages
124+
href: /defender-xdr/investigate-users.md
125+
- name: Device entity pages
126+
href: /defender-xdr/entity-page-device.md
127+
- name: IP entity pages
128+
href: /defender-xdr/entity-page-ip.md
129+
- name: Respond to threats
130+
items:
131+
- name: Overview
132+
href: /defender-xdr/incidents-overview
133+
- name: Prioritize incidents
134+
href: /defender-xdr/incident-queue
135+
- name: Automatic attack disruption
136+
items:
137+
- name: Overview
138+
href: /defender-xdr/automatic-attack-disruption
139+
- name: Configure capabilities
140+
href: /defender-xdr/configure-attack-disruption
141+
- name: View results
142+
href: /defender-xdr/autoad-results
143+
- name: Review remediations in the action center
144+
href: /defender-xdr/m365d-action-center
145+
- name: Optimize your security operations
146+
items:
147+
- name: Overview
148+
href: /azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal
149+
- name: Interact with recommendations programatically
150+
href: /azure/sentinel/soc-optimization/soc-optimization-api
151+
- name: SOC optimization reference
152+
href: /azure/sentinel/soc-optimization/soc-optimization-reference
153+
- name: Manage your unified SOC ## Need article w/ overview about settings? What else needs to go here? Several other things like permissions and costs would get referenced by planning guide.
154+
items:
155+
- name: Manage multiple tenants ## Work will start soon to integrate Sentinel into one or more of these articles. Copied in entire section from XDR library
156+
items:
157+
- name: Overview
158+
href: /defender-xdr/mto-overview
159+
- name: Set up multi-tenant management
160+
href: /defender-xdr/mto-requirements
161+
- name: Manage incidents and alerts
162+
href: /defender-xdr/mto-incidents-alerts
163+
- name: Advanced hunting
164+
href: /defender-xdr/mto-advanced-hunting.md
165+
- name: Multitenant devices
166+
href: /defender-xdr/mto-tenant-devices.md
167+
- name: Vulnerability management
168+
href: /defender-xdr/mto-dashboard.md
169+
- name: Manage tenants
170+
href: /defender-xdr/mto-tenants.md
171+
- name: Manage endpoint security policies
172+
href: /defender-xdr/mto-endpoint-security-policy.md
173+
- name: Manage content distribution with tenant groups
174+
href: /defender-xdr/mto-tenantgroups.md
175+
- name: Configure notifications
176+
items:
177+
- name: Get incident notifications
178+
href: /defender-xdr/m365d-notifications-incidents
179+
- name: Configure alert notifications
180+
href: /defender-xdr/configure-email-notifications
181+
- name: Resources
182+
items:
183+
- name: Threat actor naming
184+
href: /defender-xdr/microsoft-threat-actor-naming
185+
- name: Identification of malware and unwanted apps
186+
href: /defender-xdr/criteria
187+
- name: Submit files for analysis
188+
href: /defender-xdr/submission-guide
189+
- name: Microsoft virus initiative
190+
href: /defender-xdr/virus-initiative-criteria
191+
- name: Microsoft security portals
192+
href: /defender-xdr/portals
193+
- name: Operation guides
194+
items:
195+
- name: Incident response
196+
items:
197+
- name: Overview
198+
href: incident-response-overview.md
199+
- name: Incident response
200+
href: incident-response-planning.md
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
- name: 'Microsoft Defender'
2+
tocHref: /defender/
3+
topicHref: /defender/index
4+
items:
5+
- name: 'Microsoft unified security operations platform'
6+
tocHref: /unified-secops-platform/
7+
topicHref: /defender-xdr/unified-secops-platform/index
8+
- name: 'Microsoft unified security operations platform'
9+
tocHref: /security/zero-trust/
10+
topicHref: /defender-xdr/unified-secops-platform/index
11+
- name: Unified security operations platform
12+
tocHref: /defender-for-identity/
13+
topicHref: /defender-xdr/unified-secops-platform/index
14+
15+
## Microsoft Sentinel override
16+
- name: 'Microsoft Defender'
17+
tocHref: /azure/
18+
topicHref: /defender/index
19+
items:
20+
- name: 'Unified security operations platform'
21+
tocHref: /azure/sentinel/
22+
topicHref: /defender-xdr/unified-secops-platform/index
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: Microsoft Defender XDR in the Defender portal
3+
description: Learn about Microsoft Defender XDR in the Defender portal
4+
search.appverid: met150
5+
ms.service: unified-secops-platform
6+
ms.author: cwatson
7+
author: cwatson-cat
8+
ms.localizationpriority: medium
9+
ms.date: 10/08/2024
10+
audience: ITPro
11+
ms.collection:
12+
- M365-security-compliance
13+
- tier1
14+
- usx-security
15+
ms.topic: conceptual
16+
---
17+
18+
# Defender XDR in the Defender portal
19+
20+
Microsoft's unified security platform combines services in the [Microsoft Defender portal](https://security.microsoft.com). In the Defender portal, you can monitor and manage pre-breach and post-breach security across your organization's on-premises and multicloud assets and workloads.
21+
22+
Defender XDR in the Defender portal combines protection, detection, investigation, and response to threats across your entire organization and all its components, in a central place. Defender XDR combines a number of Microsoft's security services into a single location.
23+
24+
25+
**[Defender for Office 365](/defender-office-365/mdo-about)** | Helps secure organizations with a set of prevention, detection, investigation and hunting features to protect email, and Office 365 resources.
26+
**[Defender for Endpoint](/defender-endpoint/)** | Delivers preventative protection, post-breach detection, automated investigation, and response for devices in the organization.
27+
**[Defender for Identity](/defender-for-identity/what-is)** | Provides a cloud-based security solution that uses on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
28+
**[Defender for Cloud Apps](/cloud-app-security/)** | Provides a comprehensive cross-SaaS and PaaS solution that brings deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
29+
30+
> [!NOTE]
31+
> When you open the portal, you see only the security services included in your subscriptions. For example, if you have Defender for Office 365 but not Defender for Endpoint, you see features and capabilities for Defender for Office 365, but not for device protection.
32+
33+
34+
## Investigate incidents and alerts
35+
36+
Centralizing security information creates a single place to investigate security incidents across your entire organization and all its components including:
37+
38+
- Hybrid identities
39+
- Endpoints
40+
- Cloud apps
41+
- Business apps
42+
- Email and docs
43+
- IoT
44+
- Network
45+
- Business applications
46+
- Operational technology (OT)
47+
- Infrastructure and cloud workloads
48+
49+
A primary example is **Incidents** under **Incidents & alerts**.
50+
51+
:::image type="content" source="/defender/media/incidents-queue/incidents-ss-incidents.png" alt-text="The Incidents page in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/incidents-ss-incidents.png":::
52+
53+
Selecting an incident name displays a page that demonstrates the value of centralizing security information as you get better insights into the full extend of a threat, from email, to identity, to endpoints.
54+
55+
<!-- commenting this out as the file path will move soon and I don't want to fight with this broken link anymore. File path is changing anyway. :::image type="content" source="../../media/incidents-overview/incidents-ss-incident-summary.png" alt-text="Screenshot that shows the attack story page for an incident in the Microsoft Defender portal." lightbox="../../media/incidents-overview/incidents-ss-incident-summary.png"::: -->
56+
57+
Take the time to review the incidents in your environment, drill down into each alert, and practice building an understanding of how to access the information and determine next steps in your analysis.
58+
59+
Learn more about [incidents in the Defender portal](../incidents-overview.md), and [managing incidents and alerts](../manage-incidents.md).
60+
61+
## Hunt for threats
62+
63+
You can build custom detection rules and hunt for specific threats in your environment. **Hunting** uses a query-based threat hunting tool that lets you proactively inspect events in your organization to locate threat indicators and entities. These rules run automatically to check for, and then respond to, suspected breach activity, misconfigured machines, and other findings.
64+
65+
Learn about [proactive threat hunting](../advanced-hunting-overview.md), and [hunting for threats across devices, emails, apps, and identities](../advanced-hunting-query-emails-devices.md).
66+
67+
68+
## Respond to emerging threats
69+
70+
Threat analytics is the Microsoft threat intelligence solution from expert Microsoft security researchers.In the portal, track and respond to emerging threats with these threat analytics:
71+
72+
- Active threat actors and their campaigns
73+
- Popular and new attack techniques
74+
- Critical vulnerabilities
75+
- Common attack surfaces
76+
- Prevalent malware
77+
78+
Learn about [tracking and responding to emerging threats with threat analytics](../threat-analytics.md).
79+

0 commit comments

Comments
 (0)