Skip to content

Commit 1548904

Browse files
authored
Merge branch 'main' into patch-6
2 parents 3d5261d + d554595 commit 1548904

File tree

7 files changed

+120
-157
lines changed

7 files changed

+120
-157
lines changed

.openpublishing.redirection.defender.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,16 @@
109109
"source_path": "defender-endpoint/defender-endpoint-demonstration-amsi.md",
110110
"redirect_url": "/defender-endpoint/mde-demonstration-amsi",
111111
"redirect_document_id": true
112-
}
112+
},
113+
{
114+
"source_path": "defender-xdr/tickets.md",
115+
"redirect_url": "/defender-xdr/troubleshoot",
116+
"redirect_document_id": true
117+
},
118+
{
119+
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
120+
"redirect_url": "/defender-xdr/troubleshoot",
121+
"redirect_document_id": false
122+
}
113123
]
114124
}

defender-office-365/air-about.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
10-
ms.date: 06/09/2023
10+
ms.date: 10/22/2024
1111
ms.localizationpriority: medium
1212
search.appverid:
1313
- MET150
@@ -79,7 +79,9 @@ In addition, make sure to review your organization's [alert policies](alert-poli
7979

8080
## Which alert policies trigger automated investigations?
8181

82-
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
82+
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. If these alerts are disabled or replaced by custom alerts, AIR isn't triggered.
83+
84+
The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
8385

8486
|Alert|Severity|How the alert is generated|
8587
|---|---|---|

defender-office-365/attack-simulation-training-faq.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,10 @@ A: Several options are available to target users:
256256
- Include all users (currently available to organizations with less than 40,000 users).
257257
- Choose specific users.
258258
- Select users from a CSV file (one email address per line).
259-
- Microsoft Entra group-based targeting.
259+
- Microsoft Entra group-based targeting. The following group types are supported:
260+
- Microsoft 365 Groups (static and dynamic)
261+
- Distribution groups (static only)
262+
- Mail-enabled security groups (static only)
260263

261264
We find that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
262265

@@ -282,7 +285,7 @@ Managing a large CSV file or adding many individual recipients can be cumbersome
282285
> [!TIP]
283286
> Currently, shared mailboxes aren't supported in Attack simulation training. Simulations should target user mailboxes or groups containing user mailboxes.
284287
>
285-
> Distribution groups are expanded and the list of users is generated at the time of saving the simulation or simulation automation.
288+
> Groups are expanded and the list of users is generated at the time of saving the simulation, simulation automation, or training campaign.
286289
287290
### Q: Are the limits for the number of simulations that can be deployed during a specific time interval?
288291

defender-xdr/TOC.yml

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -549,18 +549,14 @@
549549
href: configure-email-notifications.md
550550
- name: Set time zone
551551
href: m365d-time-zone.md
552-
- name: Troubleshoot service issues
553-
href: troubleshoot.md
554552
- name: Set up dynamic rules for devices
555553
href: configure-asset-rules.md
556554
- name: Provide feedback
557555
href: feedback.md
558556
- name: Provide managed service provider (MSSP) access
559557
href: mssp-access.md
560-
- name: Create ServiceNow tickets and tasks
561-
items:
562-
- name: ServiceNow integration overview
563-
href: ./tickets.md
558+
- name: Troubleshoot service issues
559+
href: troubleshoot.md
564560
- name: Microsoft Defender XDR APIs
565561
items:
566562
- name: Overview
@@ -627,8 +623,6 @@
627623
href: /defender-endpoint/technological-partners
628624
- name: Professional services supported by Microsoft Defender XDR
629625
href: /defender-endpoint/professional-services
630-
- name: Understand threat intelligence concepts
631-
href: /defender-endpoint/threat-indicator-concepts
632626
- name: Bi-directional connector for Microsoft Sentinel
633627
href: microsoft-365-defender-integration-with-azure-sentinel.md
634628
- name: Resources
@@ -641,8 +635,8 @@
641635
href: criteria.md
642636
- name: Submit files for analysis
643637
href: submission-guide.md
644-
- name: Troubleshoot MSI portal errors caused by admin block
645-
href: portal-submission-troubleshooting.md
638+
- name: Understand threat intelligence concepts
639+
href: /defender-endpoint/threat-indicator-concepts
646640
- name: Microsoft virus initiative
647641
href: virus-initiative-criteria.md
648642
- name: Software developer FAQ

defender-xdr/portal-submission-troubleshooting.md

Lines changed: 0 additions & 99 deletions
This file was deleted.

defender-xdr/tickets.md

Lines changed: 0 additions & 34 deletions
This file was deleted.

0 commit comments

Comments
 (0)