Skip to content

Commit 1a2ecae

Browse files
Merge pull request #4384 from DeCohen/WI445254-remove-reference-to-investigation-priority-score
Remove references to Investigation Priority Score in the docs
2 parents 71a8135 + f12e21c commit 1a2ecae

File tree

5 files changed

+4
-37
lines changed

5 files changed

+4
-37
lines changed

ATPDocs/investigate-assets.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Investigate assets
33
description: This article explains how to investigate suspicious users, computers, and devices with Microsoft Defender for Identity.
4-
ms.date: 01/17/2024
4+
ms.date: 07/01/2025
55
ms.topic: how-to
66
ms.reviewer: LiorShapiraa
77
---
@@ -46,8 +46,7 @@ Find identity information in the following Microsoft Defender XDR areas:
4646

4747
For example, the following image shows the details on an identity details page:
4848

49-
![Screenshot of a specific user's page in the Microsoft Defender portal.](media/investigate-assets/image.png)
50-
49+
:::image type="content" source="media/investigate-assets/investigate-assets.png" alt-text="Screenshot that shows a specific user's page in the Microsoft Defender portal." lightbox="media/investigate-assets/investigate-assets.png":::
5150

5251

5352
### Identity details
@@ -57,7 +56,7 @@ When you investigate a specific identity, you'll see the following details on an
5756

5857
|Identity details page area |Description |
5958
|---------|---------|
60-
|[Overview tab](/microsoft-365/security/defender/investigate-users#overview) | General identity data, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts and more important information. <br><br>Use the **Overview** tab to also view graphs for incidents and alerts, the investigation priority score, an organizational tree, entity tags, and a scored activity timeline. |
59+
|[Overview tab](/microsoft-365/security/defender/investigate-users#overview) | General identity data, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts and more important information. <br><br>Use the **Overview** tab to also view graphs for incidents and alerts, and an organizational tree, entity tags. |
6160
|[Incidents and alerts](/microsoft-365/security/defender/investigate-users#incidents-and-alerts) | Lists active incidents and alerts involving the user from the last 180 days, including details like alert severity and the time the alert was generated. |
6261
|[Observed in organization](/microsoft-365/security/defender/investigate-users#observed-in-organization) | Includes the following sub-areas: <br>- **Devices**: The devices that the identity signed in to, including most and least used in the last 180 days. <br>- **Locations**: The identity's observed locations over the last 30 days. <br>- **Groups**: All observed on-premises groups for the identity. <br> - **Lateral movement paths** - all profiled lateral movement paths from the on-premises environment. |
6362
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline) | The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br>Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
413 KB
Loading

ATPDocs/migrate-from-ata-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ In contrast to the ATA sensor, the Defender for Identity sensor also uses data s
2727

2828
- Support for [multi-forest environments](deploy/multi-forest.md)
2929
- [Microsoft Secure Score posture assessments](/defender-for-identity/security-assessment)
30-
- [UEBA capabilities](/cloud-app-security/tutorial-ueba)
3130
- Direct integrations with other services like Microsoft Defender for Cloud Apps and Microsoft Entra for a hybrid view of what's taking place in both on-premises and hybrid environments
3231
- And more
3332

ATPDocs/ops-guide/ops-guide-daily.md

Lines changed: 0 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -52,35 +52,6 @@ For more information, see [Work with Defender for Identity's ITDR dashboard (Pre
5252

5353
1. When the incident is remediated, resolve it to resolve all linked and related active alerts and set a classification.
5454

55-
## Investigate users with a high investigation score
56-
57-
**Where**: In Microsoft Defender XDR and in Microsoft Entra.
58-
59-
In Microsoft Defender XDR:
60-
61-
1. Check the **Users at risk** widget on the **Home** page or the **Entra ID users at risk** on the **Identities > Dashboard** page.
62-
63-
1. If you have users listed at *High risk*:
64-
65-
- Select **View all users** to review high risk identities in Microsoft Entra.
66-
- Go to the **Identities** page and sort the grid to view users with high **Investigation priority** scores at the top. Select an identity to view the identity details page, including more details in the **Investigation priority** widget.
67-
68-
The investigation priority widget includes the calculated investigation priority score breakdown and a two-week trend for an identity, including whether the identity score is on the high percentile for that tenant.
69-
70-
Find more identity-related information on:
71-
72-
- Individual alert or incident details pages
73-
- Device details pages
74-
- Advanced hunting queries
75-
- The Action center page
76-
77-
**Persona**: SOC analysts
78-
79-
For more information, see:
80-
81-
- [Investigate users in Microsoft Defender XDR](/microsoft-365/security/defender/investigate-users)
82-
- [Investigate assets](../investigate-assets.md)
83-
- [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md)
8455

8556
## Configure tuning rules for benign true positives / false positive alerts
8657

ATPDocs/technical-faq.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,6 @@ sections:
6868
6969
- **[Microsoft Secure Score posture assessments](/defender-for-identity/security-assessment)**: Identifies common misconfigurations and exploitable components and provides remediation paths to reduce the attack surface.
7070
71-
- **[UEBA capabilities](/cloud-app-security/tutorial-ueba)**: Insights into individual user risk through user investigation priority scoring. The score can assist SecOps in their investigations and help analysts understand unusual activities for the user and the organization.
72-
7371
- **Native integrations**: Integrates with Microsoft Defender for Cloud Apps and Microsoft Entra ID Protection to provide a hybrid view of what's taking place in both on-premises and hybrid environments.
7472
7573
- **Contributes to Microsoft Defender XDR**: Contributes alert and threat data to Microsoft Defender XDR. Microsoft Defender XDR uses the Microsoft 365 security portfolio (identities, endpoints, data, and applications) to automatically analyze cross-domain threat data, building a complete picture of each attack in a single dashboard.
@@ -150,7 +148,7 @@ sections:
150148
151149
- question: Does Microsoft Defender for Identity require synchronizing users to Microsoft Entra ID?
152150
answer: |
153-
Microsoft Defender for Identity provides security value for all Active Directory accounts including those that are not synced to Microsoft Entra ID. User accounts that are synced to Microsoft Entra ID will also benefit of security value provided by Microsoft Entra ID (based on license level) and of Investigation Priority Scoring.
151+
Microsoft Defender for Identity provides security value for all Active Directory accounts including those that are not synced to Microsoft Entra ID. User accounts that are synced to Microsoft Entra ID benefit from the security value provided by Microsoft Entra ID based on license level. For more detailse see: [Identity inventory](/defender-for-identity/identity-inventory).
154152
155153
- name: WinPcap and Npcap drivers
156154
questions:

0 commit comments

Comments
 (0)