Skip to content

Commit 13fb7b8

Browse files
committed
cat's comments and updated images
1 parent 28216fe commit 13fb7b8

File tree

5 files changed

+23
-5
lines changed

5 files changed

+23
-5
lines changed
61.5 KB
Loading
224 KB
Loading
75 KB
Loading
91 KB
Loading

unified-secops-platform/respond-threats-overview.md

Lines changed: 23 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: unified-secops-platform
66
ms.author: bagol
77
author: batamig
88
ms.localizationpriority: medium
9-
ms.date: 02/16/2025
9+
ms.date: 02/23/2025
1010
ms.collection:
1111
- M365-security-compliance
1212
- tier1
@@ -31,6 +31,8 @@ In the Defender portal, unified support for incident correlation and integrated
3131

3232
In the Defender portal, related alerts from across multiple attack surfaces are grouped into a single incident, improving the efficiency of incident response. Correlating alerts from various sources such as endpoints, identities, email, and cloud workloads helps security teams gain a holistic view of an attack campaign. This comprehensive perspective allows analysts to understand the full scope of an incident, identify the root cause, and determine the most effective remediation actions.
3333

34+
The following image shows a sample collection of alerts collected into a single incident in the Defender portal. In this example, alerts from Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender XDR, Microsoft Defender for Office 365, and Microsoft Sentinel are all included in the same incident.
35+
3436
:::image type="content" source="media/respond-threats-overview/unified-incidents.png" alt-text="Screenshot of an incident with alerts from services across the Defender portal." lightbox="media/respond-threats-overview/unified-incidents.png":::
3537

3638
For more information, see [Alert correlation and incident merging in the Microsoft Defender portal](/defender-xdr/alerts-incidents-correlation).
@@ -41,6 +43,8 @@ Threat intelligence integrates across Defender portal services to enrich alerts
4143

4244
Continuous updates to threat intelligence feeds keep security teams ahead of emerging threats and improve the organization's overall resilience.
4345

46+
The following image shows an example of the incidents related to the **Human-operated ransomware** threat type in **Threat intelligence** area of the Defender portal.
47+
4448
:::image type="content" source="media/respond-threats-overview/threat-analytics.png" alt-text="Screenshot of a list of related incidents to a specific threat." lightbox="media/respond-threats-overview/threat-analytics.png":::
4549

4650
For more information, see [Uncover adversaries with threat intelligence in Microsoft's unified SecOps platform](threat-intelligence-overview.md).
@@ -53,8 +57,14 @@ Microsoft Defender XDR unifies threat protection by automating security across e
5357

5458
Automatic attack disruption boosts a SOC team's response by rapidly detecting and containing threats before escalation. It uses AI detection, predefined playbooks, and real-time threat intelligence to identify attack patterns and trigger immediate actions, such as isolating compromised endpoints or blocking malicious connections. This approach reduces the window for attackers and minimizes incident impact.
5559

60+
The following image shows an example of an incident tagged with attack disruption actions. The link in the notification takes you to a filtered view of the **Action center**, listing all the relevant automated attack disrupt actions taken.
61+
5662
:::image type="content" source="media/respond-threats-overview/attack-disrupt.png" alt-text="Screenshot of an incident with attack disruption actions."lightbox="media/respond-threats-overview/attack-disrupt.png":::
5763

64+
The following image shows the **Action center** in this scenario. Select each item in the grid to show more details about the automated actions taken.
65+
66+
:::image type="content" source="media/respond-threats-overview/action-center.png" alt-text="Screenshot of the Action center with automatic attack disruption actions displayed.":::
67+
5868
Automated attack disruption also improves collaboration across SOC teams by streamlining communication and responses. It alerts analysts and can suggest or execute actions based on predefined policies. This orchestration accelerates decision-making and ensures security teams can scale their efforts efficiently despite increasing threats.
5969

6070
Use Microsoft Defender XDR's automatic attack disruption to enhance your environment's overall resilience, reduce response times, and strengthen your organization's cybersecurity posture. For more information, see [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json).
@@ -65,6 +75,8 @@ Microsoft Defender XDR's AIR capabilities help security operations teams manage
6575

6676
Acting as a virtual analyst, AIR mimics ideal investigation steps, working 24/7 to reduce response times and free up the security team for other tasks. When an alert triggers an incident, AIR initiates an automated investigation, resulting in verdicts such as *malicious*, *suspicious*, or *no threats*, and identifying necessary remediation actions, such as quarantining files or stopping processes.
6777

78+
The following image shows the automated investigation steps taken by Microsoft Defender XDR for the incident in our example. On the **Investigations** tab, select each investigation to view more details on the side.
79+
6880
:::image type="content" source="media/respond-threats-overview/investigations.png" alt-text="Screenshot of the Investigations tab, showing automated investigation steps taken by Microsoft Defender XDR." lightbox="media/respond-threats-overview/investigations.png":::
6981

7082
Organizations can configure AIR capabilities to suit their needs, choosing either automatic remediation actions or ones that require security team approval. This automation significantly enhances the efficiency and effectiveness of security operations.
@@ -77,21 +89,23 @@ Microsoft Defender XDR's guided response features, powered by Microsoft Security
7789

7890
Guided responses are shown together with other Copilot recommendations, as actionable cards that describe the suggested action, the targeted entity, and the rationale behind the recommendation. This structured approach enables incident response teams to confidently and swiftly apply appropriate measures, enhancing overall security posture.
7991

80-
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-status.png" alt-text="Screenshot of the Guided response area in an incident's Copilot side pane.":::
92+
The following image shows a sample of the **Guided response** section of the Copilot pane for a specific incident. If you have a lot of recommended actions to sort through, select the **Status** filter to show only some of the actions at a time
93+
94+
:::image type="content" source="media/respond-threats-overview/guided-response.png" alt-text="Screenshot of the Guided response section of the Copilot pane for a specific incident.":::
8195

8296
For more information, see [Triage and investigate incidents with guided responses from Microsoft Copilot in Microsoft Defender](/defender-xdr/security-copilot-m365d-guided-response).
8397

8498
## Microsoft Sentinel threat response features
8599

86100
Microsoft Sentinel provides cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) features for intelligent security analytics and threat intelligence across the enterprise. This section describes how Microsoft Sentinel features add to your threat detection and response capabilities.
87101

88-
For more information, see [Connect Microsoft Sentinel to the Microsoft Defender portal](/defender-xdr/microsoft-sentinel-onboard).
89-
90102
### Automation rules
91103

92104
Microsoft Sentinel automation rules allow SOC teams to streamline and automate incident handling processes, ensuring structured responses across your environment. Automation rules can perform basic steps, such as adding incident tasks, suppressing noisy incidents, and changing incident statuses. They can also automate responses for multiple detections simultaneously, control the order of actions executed, and perform automation for limited time periods only, such as during testing or maintenance windows.
93105

94-
:::image type="content" source="media/respond-threats-overview/automation-rule.png" alt-text="Screenshot of a sample automation rule." lightbox="media/respond-threats-overview/automation-rule.png":::
106+
The following image shows an example of the sorts of configurations available for Microsoft Sentinel automation rules.
107+
108+
:::image type="content" source="media/respond-threats-overview/automation-rule.png" alt-text="Screenshot of a sample automation rule in Microsoft Sentinel." lightbox="media/respond-threats-overview/automation-rule.png":::
95109

96110
In Microsoft's unified SecOps platform, automation rules with incident triggers apply universally across both Microsoft Sentinel and Microsoft Defender XDR incidents, ensuring cohesive and comprehensive incident management.
97111

@@ -103,6 +117,8 @@ Microsoft Sentinel playbooks are built using Azure Logic Apps and are automated
103117

104118
Common use cases for Microsoft Sentinel playbooks include data enrichment, bi-directional synchronization with ticketing systems, orchestration of incident management through communication platforms like Microsoft Teams or Slack, and immediate threat response actions. Microsoft Sentinel provides many playbooks out-of-the-box in solutions available from the **Content hub**.
105119

120+
The following image shows the Microsoft Sentinel **Content hub**, filtered for out-of-the-box playbooks available together with Microsoft Sentinel solutions.
121+
106122
:::image type="content" source="media/respond-threats-overview/playbooks.png" alt-text="Screenshot of many playbooks available from the Content hub." lightbox="media/respond-threats-overview/playbooks.png":::
107123

108124
To create and manage these playbooks, specific roles and permissions are required, and extra charges may apply for the usage of Azure Logic Apps. For more information, see [Automate threat response with playbooks in Microsoft Sentinel](/azure/sentinel/automation/automate-responses-with-playbooks).
@@ -111,6 +127,8 @@ To create and manage these playbooks, specific roles and permissions are require
111127

112128
[Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) enables organizations to identify and mitigate potential attack paths before they can be exploited. Microsoft Security Exposure Management treats attack paths like incidents, providing a proactive approach to managing vulnerabilities and misconfigurations, and aiding in responses to in-progress attacks.
113129

130+
The following image shows an example of the number of attack paths detected over time in Microsoft Security Exposure Management.
131+
114132
:::image type="content" source="media/respond-threats-overview/attack-paths.png" alt-text="Screenshot of the Attack paths Overview page." lightbox="media/respond-threats-overview/attack-paths.png":::
115133

116134
An attack path analysis maps out potential attack vectors, providing remediation recommendations to reduce risk. Microsoft Security Exposure Management's security scoring system helps to prioritize vulnerabilities and misconfigurations that pose the greatest threat, and automated recommendations suggest the measures needed to strengthen an organization's overall security posture.

0 commit comments

Comments
 (0)