Skip to content

Commit 1ed2cb9

Browse files
Merge pull request #976 from MicrosoftDocs/main
publish main to live, 10:30 AM 7/18/2024
2 parents d82fea1 + 6cd8e83 commit 1ed2cb9

6 files changed

+22
-10
lines changed

defender-xdr/advanced-hunting-take-action.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,9 @@ Apart from device-focused remediation steps, you can also take some actions on e
8181

8282
- `Move to mailbox folder` - select this action to move the email messages to Junk, Inbox, or Deleted items folder
8383

84-
:::image type="content" source="media/advanced-hunting-take-actions-email.png" alt-text="Screenshot of the option Take actions in the Microsoft Defender portal." lightbox="media/advanced-hunting-take-actions-email.png":::
84+
Note that you can move email results consisting of quarantined items (for instance, in the case of false positives) by selecting the **Inbox** option.
85+
86+
:::image type="content" source="media/advanced-hunting-quarantine-results.png" alt-text="Screenshot of the Inbox option under take actions pane in the Microsoft Defender portal." lightbox="media/advanced-hunting-quarantine-results.png":::
8587

8688
- `Delete email` - select this action to move email messages to the Deleted items folder (**Soft delete**) or delete them permanently (**Hard delete**)
8789

defender-xdr/custom-detection-rules.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -223,7 +223,9 @@ For more details on user actions, read [Remediation actions in Microsoft Defende
223223

224224
#### Actions on emails
225225

226-
- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders).
226+
- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders). Specifically, you can move email results from quarantined items (for instance, in the case of false positives) by selecting the **Inbox** option.
227+
228+
:::image type="content" source="media/advanced-hunting-custom-quarantine-results.png" alt-text="Screenshot of the Inbox option under custom detections in the Microsoft Defender portal." lightbox="media/advanced-hunting-custom-quarantine-results.png":::
227229

228230
- Alternatively, you can select **Delete email** and then choose to either move the emails to Deleted Items (**Soft delete**) or delete the selected emails permanently (**Hard delete**).
229231

68.8 KB
Loading
75.6 KB
Loading

defender-xdr/microsoft-365-defender.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,22 @@ description: Microsoft Defender XDR is a coordinated threat protection solution
44
search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
7-
- NOCSH
7+
- NOCSH
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
1111
audience: ITPro
1212
ms.custom:
13-
- admindeeplinkDEFENDER
14-
- intro-overview
13+
- admindeeplinkDEFENDER
14+
- intro-overview
1515
ms.collection:
1616
- essentials-overview
1717
- tier1
1818
ms.topic: conceptual
1919
adobe-target: true
20-
ms.date: 03/28/2024
20+
ms.date: 07/18/2024
2121
appliesto:
22-
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
22+
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2323
manager: deniseb
2424
---
2525

@@ -36,11 +36,11 @@ Microsoft Defender XDR helps security teams protect and detect their organizatio
3636
- [**Microsoft Defender for Identity**](/defender-for-identity/what-is)
3737
- [**Microsoft Defender for Cloud Apps**](/defender-cloud-apps/what-is-defender-for-cloud-apps)
3838
- [**Microsoft Defender Vulnerability Management**](/defender-vulnerability-management/defender-vulnerability-management)
39+
- [**Microsoft Defender for Cloud**](/azure/defender-for-cloud/defender-for-cloud-introduction)
3940
- [**Microsoft Entra ID Protection**](/azure/active-directory/identity-protection/overview-identity-protection)
4041
- [**Microsoft Data Loss Prevention**](/microsoft-365/compliance/dlp-learn-about-dlp)
4142
- [**App Governance**](/defender-cloud-apps/app-governance-manage-app-governance)
4243

43-
4444
With the integrated Microsoft Defender XDR solution, security professionals can stitch together the threat signals that each of these products receive and determine the full scope and impact of the threat; how it entered the environment, what it's affected, and how it's currently impacting the organization. Microsoft Defender XDR takes automatic action to prevent or stop the attack and self-heal affected mailboxes, endpoints, and user identities.
4545

4646
<a name='microsoft-365-defender-protection'></a>
@@ -49,15 +49,17 @@ With the integrated Microsoft Defender XDR solution, security professionals can
4949

5050
Microsoft Defender XDR services protect:
5151

52-
- **Endpoints with Defender for Endpoint** - Defender for Endpoint is a unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response.
52+
- **Endpoints with Defender for Endpoint** - Microsoft Defender for Endpoint is a unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response.
5353

5454
- **Assets with Defender Vulnerability Management** - Microsoft Defender Vulnerability Management delivers continuous asset visibility, intelligent risk-based assessments, and built-in remediation tools to help your security and IT teams prioritize and address critical vulnerabilities and misconfigurations across your organization.
5555

5656
- **Email and collaboration with Defender for Office 365** - Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.
5757

5858
- **Identities with Defender for Identity and Microsoft Entra ID Protection** - Microsoft Defender for Identity is a cloud-based security solution that uses your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Microsoft Entra ID Protection uses the learnings Microsoft acquired from their position in organizations with Microsoft Entra ID, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users.
5959

60-
- **Applications with Microsoft Defender for Cloud Apps** - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
60+
- **Applications with Defender for Cloud Apps** - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
61+
62+
- **Cloud workloads and applications** **with Defender for Cloud** - Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) combining capabilities of a development security operations (DevSecOps), a cloud security posture (CPSM), and a cloud workload protection platform (CWPP) to protect cloud-based applications from threats and vulnerabilities.
6163

6264
Microsoft Defender XDR's unique cross-product layer augments the individual service components to:
6365

defender-xdr/whats-new.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,13 +50,19 @@ You can also get product updates and important notifications through the [messag
5050

5151
- (GA) The **[UrlClickEvents](advanced-hunting-urlclickevents-table.md)** table in advanced hunting is now generally available. Use this table to get information about [Safe Links](/defender-office-365/safe-links-about) clicks from email messages, Microsoft Teams, and Office 365 apps in supported desktop, mobile, and web apps.
5252

53+
- (GA) You can now **release or move email messages from quarantine** back to the user's inbox directly from [Take actions in advanced hunting](advanced-hunting-take-action.md#take-various-actions-on-emails) and in [custom detections](custom-detection-rules.md#actions-on-emails). This allows security operators to manage false positives more efficiently and without losing context.
54+
55+
5356

5457
## June 2024
5558

5659
- (Preview) **[Content distribution through tenant groups in multitenant management](mto-tenantgroups.md)** is now available. Content distribution helps you manage content at scale across tenants in multitenant management in Microsoft Defender XDR. In content distribution, you can create tenant groups to copy existing content, like custom detection rules, from the source tenant to the target tenants you assign during tenant group creation. The content then runs on the target tenant's devices or device groups that you set in the tenant group scope.
5760

5861
- (Preview) You can now filter your Microsoft Defender for Cloud alerts by the associated **alert subscription ID** in the Incidents and Alerts queues. For more information, see [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).
5962

63+
64+
65+
6066
## May 2024
6167

6268
- (GA) The endpoint security policies page is now available in multitenant management in Microsoft Defender XDR. Create, edit, and delete security policies for your tenants' devices from the **Endpoint security policies** page. For more information, see [Endpoint security policies in multitenant management](mto-endpoint-security-policy.md).

0 commit comments

Comments
 (0)