Skip to content

Commit 149be74

Browse files
committed
reduce character count for alt text
1 parent 02c431e commit 149be74

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

ATPDocs/investigate-security-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Some alerts have extra tabs, such as details about:
7272

7373
For example:
7474

75-
:::image type="content" source="media/understanding-security-alerts/involved-entities.png" alt-text="Screenshot showing the Microsoft Defender for Identity alert report for Network mapping reconnaissance (DNS). The Summary tab is selected, displaying details such as title, description, start and end times, severity, status, and a link to view in browser. Other tabs include Source Computer, DNS Servers, Network Activities, and Related." lightbox="media/understanding-security-alerts/involved-entities.png":::
75+
:::image type="content" source="media/understanding-security-alerts/involved-entities.png" alt-text="Screenshot showing a Microsoft Defender for Identity alert summary for network mapping reconnaissance (DNS), with summary details." lightbox="media/understanding-security-alerts/involved-entities.png":::
7676

7777
## How can I use Defender for Identity information in an investigation?
7878

@@ -90,7 +90,7 @@ Includes the data Defender for Identity learned from Active Directory about the
9090

9191
Includes all data Defender for Identity profiled on the entity. Defender for Identity uses the network and event activities captured to learn about the environment's users and computers. Defender for Identity profiles relevant information per entity. This information contributes Defender for Identity's threat identification capabilities.
9292

93-
:::image type="content" source="media/understanding-security-alerts/related-entities.png" alt-text="Screenshot showing the Related Entities tab of a Microsoft Defender for Identity alert report for Network mapping reconnaissance (DNS). The table lists related entities with columns for ID, Type, Name, Unique Entity JSON, and Unique Entity Profile JSON. Two computer entities are shown, including one named DC1." lightbox="media/understanding-security-alerts/related-entities.png":::
93+
:::image type="content" source="media/understanding-security-alerts/related-entities.png" alt-text="Screenshot showing the Related Entities tab of a Microsoft Defender for Identity alert report for Network mapping reconnaissance (DNS)." lightbox="media/understanding-security-alerts/related-entities.png":::
9494

9595

9696
For more information about how to work with Defender for Identity security alerts, see [Working with security alerts](/defender-for-identity/understanding-security-alerts).

ATPDocs/understanding-security-alerts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Alerts from the last seven days are displayed with the following information:
2727
- First activity
2828
- Last activity
2929

30-
:::image type="content" source="media/understanding-security-alerts/filtered-alerts.png" alt-text="Screenshot showing the Alerts page in the Microsoft Defender portal, filtered for new alerts from Microsoft Defender for Identity. Two alerts are listed with the name Suspected brute-force. Each entry includes columns for severity, investigation state, status, category, detection source, impacted assets, and timestamps for first and last activity." lightbox="media/understanding-security-alerts/filtered-alerts.png":::
30+
:::image type="content" source="media/understanding-security-alerts/filtered-alerts.png" alt-text="Screenshot showing the Alerts page in the Defender portal. Two alerts named Suspected brute-force are listed with full alert details." lightbox="media/understanding-security-alerts/filtered-alerts.png":::
3131

3232

3333

@@ -117,7 +117,7 @@ You can create a new incident from the alert or link to an existing incident.
117117
### Assign alerts
118118
If an alert isn't yet assigned, you can select Assign to me to assign the alert to yourself.
119119

120-
:::image type="content" source="media/understanding-security-alerts/alert-state.png" alt-text="Screenshot showing the Alert state section in the Microsoft Defender portal. The Classification field is marked as “Not Set” with a link to “Set Classification.” The Assigned to field shows “Unassigned” with a link labeled “Assign to me.” This section allows users to manage alert ownership and classification." lightbox="media/understanding-security-alerts/alert-state.png":::
120+
:::image type="content" source="media/understanding-security-alerts/alert-state.png" alt-text="Screenshot that shows how to assign an alert to yourself." lightbox="media/understanding-security-alerts/alert-state.png":::
121121

122122
### Add comments to an alert
123123
You can add comments to an alert to provide additional context or information. This is useful for sharing insights with your team or documenting your investigation process.
@@ -142,7 +142,7 @@ Following proper investigation, all Defender for Identity security alerts can be
142142

143143
- **False positive (FP)**: A false alarm, meaning the activity didn't happen.
144144

145-
:::image type="content" source="media/understanding-security-alerts/classify-alert.png" alt-text="Screenshot showing a Microsoft Defender alert titled “Suspected brute-force attack (LDAP).” The alert is labeled with severity Medium, status New, and classification Unknown. Below, a classification banner includes a message to classify the alert, with buttons labeled “True alert” and “False alert” for user response." lightbox="media/understanding-security-alerts/classify-alert.png":::
145+
:::image type="content" source="media/understanding-security-alerts/classify-alert.png" alt-text="Screenshot that shows how to classify an alert as a true or false alert." lightbox="media/understanding-security-alerts/classify-alert.png":::
146146

147147
> [!NOTE]
148148
> An increase of alerts of the exact same type typically reduces the suspicious/importance level of the alert. For repeated alerts, verify configurations, and use security alert details and definitions to understand exactly what is happening that trigger the repeats.

0 commit comments

Comments
 (0)