You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/autoir-investigation-results.md
+4-10Lines changed: 4 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,22 +20,18 @@ ms.custom:
20
20
- autoir
21
21
- admindeeplinkDEFENDER
22
22
ms.reviewer: evaldm, isco
23
-
ms.date: 04/04/2025
23
+
ms.date: 11/30/2025
24
24
appliesto:
25
25
- Microsoft Defender for Endpoint Plan 2
26
26
27
27
---
28
28
# View the details and results of an automated investigation
29
29
30
-
31
30
With Microsoft Defender for Endpoint, when an [automated investigation](automated-investigations.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
32
31
33
-
## (NEW!) Unified investigation page
34
-
35
-
The investigation page is updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about).
32
+
## Unified investigation page
36
33
37
-
> [!TIP]
38
-
> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
34
+
The unified investigation page includes information across your devices, email, and collaboration content. It defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). For more information, see [Details and results of an automated investigation](/defender-xdr/m365d-autoir-results).
39
35
40
36
## Open the investigation details view
41
37
@@ -69,9 +65,7 @@ Use an incident details page to view detailed information about an incident, inc
69
65
70
66
## Investigation details
71
67
72
-
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
73
-
74
-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
68
+
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. In the investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
75
69
76
70
> [!NOTE]
77
71
> - The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription doesn't include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -345,6 +345,10 @@ Example:
345
345
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
346
346
> The rule ID shouldn't have any leading or trailing spaces.
347
347
348
+
> [!NOTE]
349
+
> Microsoft rebranded Windows Defender Antivirus to Microsoft Defender Antivirus beginning with Windows 10 version 20H1.
350
+
> Group Policy paths on earlier Windows versions may still reference Windows Defender Antivirus, while newer builds show Microsoft Defender Antivirus. Both names refer to the same policy location.
Copy file name to clipboardExpand all lines: defender-endpoint/time-settings.md
+7-17Lines changed: 7 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
2
title: Microsoft Defender XDR time zone settings
3
-
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings and view license information.
3
+
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings.
4
4
ms.service: defender-endpoint
5
-
ms.author: bagol
6
-
author: batamig
5
+
ms.author: painbar
6
+
author: paulinbar
7
7
ms.localizationpriority: medium
8
8
manager: bagol
9
9
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: article
14
14
ms.subservice: reference
15
15
search.appverid: met150
16
-
ms.date: 05/05/2025
16
+
ms.date: 11/30/2025
17
17
appliesto:
18
18
- Microsoft Defender for Endpoint Plan 1
19
19
- Microsoft Defender for Endpoint Plan 2
@@ -22,9 +22,7 @@ appliesto:
22
22
# Microsoft Defender XDR time zone settings
23
23
24
24
25
-
This article describes time zone settings and options. You can use **Time zone** menu to configure the time zone and view license information.
26
-
27
-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-1" lightbox="media/atp-time-zone.png":::
25
+
This article describes how to configure time zone settings and options.
28
26
29
27
> [!NOTE]
30
28
> Changing the time zone setting in the [Microsoft Defender portal](https://security.microsoft.com) only affects how times are displayed. It doesn't affect the actual scheduling of operations, such as antivirus scans, which continue to follow the local system time or UTC settings, depending on how they're configured.
@@ -33,10 +31,6 @@ This article describes time zone settings and options. You can use **Time zone**
33
31
34
32
The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks. Cyberforensic investigations often rely on time stamps to piece together the sequence of events. It's important that your system reflects the correct time zone settings. Defender for Endpoint can display either Coordinated Universal Time (UTC) or local time.
35
33
36
-
Your current time zone setting is shown in the **Timezone** menu in the Microsoft Defender portal.
37
-
38
-
:::image type="content" source="media/atp-time-zone-menu.png" alt-text="The Time zone settings-2" lightbox="media/atp-time-zone-menu.png":::
39
-
40
34
### UTC time zone
41
35
42
36
Defender for Endpoint uses UTC time by default. Keeping this time zone displays all system timestamps (alerts, events, and others) in UTC for all users. This configuration can help security analysts working in different locations across the globe to use the same time stamps while investigating events.
@@ -55,13 +49,9 @@ The Defender for Endpoint time zone is set by default to UTC. Setting the time z
55
49
56
50
To set the time zone:
57
51
58
-
1. Select the **Time zone** menu.
59
-
60
-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-3" lightbox="media/atp-time-zone.png":::
61
-
62
-
2. Select the **Timezone UTC** indicator.
52
+
1. In the Microsoft Defender portal, go to **System** > **Settings** > **Microsoft Defender portal** > **Time zone**.
63
53
64
-
3. Select **Timezone UTC** or your local time zone, for example `-7:00`.
54
+
1. In the **Time zone**drop down menu, select either UTC or your local time zone.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-graph.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,17 +22,14 @@ appliesto:
22
22
- Microsoft Defender XDR
23
23
- Microsoft Sentinel in the Microsoft Defender portal
24
24
search.appverid: met150
25
-
ms.date: 09/30/2025
25
+
ms.date: 12/01/2025
26
26
27
27
---
28
-
# Hunt for threats using the hunting graph (Preview)
28
+
# Hunt for threats using the hunting graph
29
29
30
-
> [!IMPORTANT]
31
-
> Some information relates to prereleased product that may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
30
+
The **hunting graph** provides visualization capabilities in [advanced hunting](advanced-hunting-overview.md) by rendering threat scenarios as interactive graphs. This feature allows security operations center (SOC) analysts, threat hunters, and security researchers to conduct threat hunting and incident response more easily and intuitively, improving their efficiency and ability to assess possible security issues.
32
31
33
-
The **hunting graph** provides visualization capabilities in [advanced hunting](advanced-hunting-overview.md) by rendering threat scenarios as interactive graphs. This feature allows security operations center (SOC) analysts, threat hunters, and security researchers conduct threat hunting and incident response easily and more intuitively, improving their efficiency and ability to assess possible security issues.
34
-
35
-
Analysts often rely on [Kusto Query Language](/azure/kusto/query/) (KQL) queries to uncover relationships between entities—an approach that could be both time-consuming and prone to oversights. Hunting graph makes exploration of security data simpler and faster by visualizing these relationships, letting you trace paths and possible choke points, as well as surface insights and take various actions based on the results that tabular queries might miss.
32
+
Analysts often rely on [Kusto Query Language](/azure/kusto/query/) (KQL) queries to uncover relationships between entities. This approach can be both time-consuming and prone to oversights. The hunting graph makes exploration of security data simpler and faster by visualizing these relationships. You can trace paths and possible choke points, as well as surface insights and take various actions based on the results that tabular queries might miss.
36
33
37
34
## Get access
38
35
@@ -43,7 +40,7 @@ You must also have the following access or permissions:
43
40
-[Microsoft Sentinel data lake](/azure/sentinel/datalake/sentinel-lake-overview)
44
41
- At least [read-only](/security-exposure-management/prerequisites) access in Microsoft Security Exposure Management
45
42
46
-
## Where to find hunting graph
43
+
## Where to find the hunting graph
47
44
48
45
You can find the **hunting graph** page by going to the left navigation bar in the Microsoft Defender portal and selecting **Investigation & response** > **Hunting** > **Advanced hunting**.
49
46
@@ -55,19 +52,19 @@ A new hunting graph page appears as tab labeled **New hunt** in the advanced hun
55
52
56
53
## Hunting graph features
57
54
58
-
The interactive graphs generated in the hunting graph are composed of **nodes** and **edges** to represent entities in your environment (for example, a device, user account, or IP address, among others) and their relationships or connection properties, respectively. [Learn more about graphs and visualizations in Microsoft Defender](understand-graph-icons.md)
55
+
The interactive graphs that the hunting graph generates use **nodes** and **edges** to show entities in your environment, such as a device, user account, or IP address, and their relationships or connection properties. [Learn more about graphs and visualizations in Microsoft Defender](understand-graph-icons.md).
59
56
60
-
The lower right-hand corner of the graph also has control buttons that let you **Zoom in** and **Zoom out**, and view the graph's **Layers**.
57
+
The lower right corner of the graph has control buttons that let you **Zoom in** and **Zoom out**, and view the graph's **Layers**.
61
58
62
59
:::image type="content" source="./media/advanced-hunting-graph/hunting-graph-render.png" alt-text="Screenshot of a rendered graph in the hunting graph page." lightbox="./media/advanced-hunting-graph/hunting-graph-render.png":::
63
60
64
61
## Get started with hunting graph
65
62
66
63
### Use predefined scenarios in the hunting graph
67
64
68
-
The hunting graph lets you search with predefined scenarios, which are prebuilt advanced hunting queries that could help you answer specific and common questions for specific use cases.
65
+
The hunting graph lets you search with predefined scenarios. These scenarios are prebuilt advanced hunting queries that help you answer specific and common questions for specific use cases.
69
66
70
-
To start hunting using a predefined scenario, on a new hunting graph page, select **Search with Predefined scenarios**. A side panel appears where you can then perform the following steps:
67
+
To start hunting with a predefined scenario, on a new hunting graph page, select **Search with Predefined scenarios**. A side panel appears where you can then perform the following steps:
71
68
72
69
1.[Select a scenario and enter the required inputs](#step-1-select-a-scenario-and-enter-scenario-inputs)
73
70
1.[Apply filters on the graph](#step-2-apply-filters)
@@ -81,22 +78,24 @@ The following table describes the predefined scenarios in the hunting graph and
81
78
82
79
|**Scenario**|**Description**|**Inputs**|
83
80
|---|---|---|
84
-
|**Paths between two entities**| Provide two entities (nodes) to view the paths between them.<br><br>Use this scenario if you want to discover if there’s a path leading from one entity to another. |<ul><li>Start Entity<li>End Entity</ul>**Note:** Make sure to identify and input the correct start and end entities, as the generated graph will be directional. |
81
+
|**Paths between two entities**| Provide two entities (nodes) to view the paths between them.<br><br>Use this scenario if you want to discover if there’s a path leading from one entity to another. |<ul><li>Start Entity<li>End Entity</ul>|
85
82
|**Entities that have access to a key vault**| Provide a specific key vault to view paths from various entities (devices, virtual machines, containers, servers, and others) that have direct or indirect access to it.<br><br>Use this scenario in case of a breach, maintenance work, or assessment of the impact of entities that might have access to a sensitive asset like a key vault. | Target key vault |
86
83
|**Users with access to sensitive data**| Provide any sensitive data storage of interest to view users that have access to it.<br><br>Use this scenario if you want to know which entities have access to sensitive data, especially in cases when an incident indicates unusual access to confidential files. | Target storage account |
87
84
|**Critical users with access to storage accounts containing sensitive data**| This scenario identifies critical users with access to storage resources containing sensitive data.<br><br>Use this scenario to prevent, assess, and monitor unauthorized access, exposure risk, and breach impact based on the privileged users. | (None) |
88
85
|**Data exfiltration by a device**| Provide a device ID to view paths to storage accounts it has access to; for instance, to check what storage accounts a certain device can access in a bring your own device (BYOD) environment.<br><br>Use this scenario when investigating suspicious or unauthorized data transfer from corporate devices and to external sources. | Source device |
89
86
|**Paths to a highly critical Kubernetes cluster**| Provide a Kubernetes cluster with high criticality to view users, virtual machines, and containers that have access to it.<br><br>Use this scenario to assess, analyze and prioritize handling of attack paths leading to highly critical Kubernetes cluster. | Target Kubernetes cluster |
90
87
|**Identities with access to Azure DevOps repositories**| Provide an Azure DevOps (ADO) repository name to view users that have read and/or write access to said repository.<br><br>Use this scenario to identify entities with access to ADO repositories, which often contain sensitive assets and therefore valuable targets for threat actors. This scenario gives you visibility and lets you plan your response in case of a breach. | Target ADO repository |
91
88
|**Identify nodes in the highest number of paths to SQL data stores**| This scenario identifies the nodes that appear in the highest number of paths leading to SQL data stores. The scenario discovers paths in the graph where users have roles or permissions to access the SQL data stores.<br><br>Use this scenario to gain visibility to stores that might contain sensitive information, assess the impact in case of a breach, and prepare your mitigation and response. | (None) |
89
+
|**Attack paths to a critical asset**| View the potential routes through various nodes leading towards a target.<br>Use this scenario to examine potential lateral movement that could reach a critical asset through your network. | Target critical asset |
90
+
|**Entity connections**| Find the direct connections of a given entity and analyze its relationships. | Source entity<br><br>**Note:** You can use any entity as the seeding node for the graph. The graph indicates incoming and outgoing connections. |
92
91
93
92
:::image type="content" source="./media/advanced-hunting-graph/hunting-graph-select-scenario.png" alt-text="Screenshot of the predefined scenarios side panel highlighting the available options." lightbox="./media/advanced-hunting-graph/hunting-graph-select-scenario.png":::
94
93
95
94
:::image type="content" source="./media/advanced-hunting-graph/hunting-graph-input.png" alt-text="Screenshot of the predefined scenarios side panel highlighting the required scenario inputs." lightbox="./media/advanced-hunting-graph/hunting-graph-input.png":::
96
95
97
96
#### Step 2: Apply filters
98
97
99
-
You can add relevant filters to make the map view of your selected scenario more precise. For example, if you want to **Show only the shortest paths**, tick this option.
98
+
You can add relevant filters to make the map view of your selected scenario more precise. For example, if you want to **Show only the shortest paths**, select this option.
100
99
101
100
:::image type="content" source="./media/advanced-hunting-graph/hunting-graph-filter.png" alt-text="Screenshot of the predefined scenarios side panel highlighting the Show only the shortest paths filter." lightbox="./media/advanced-hunting-graph/hunting-graph-filter.png":::
102
101
@@ -113,6 +112,7 @@ To add a filter, select **Add filter** then the select any of the supported node
113
112
|**Source Node**| equals |<ul><li>Is critical<li>Is vulnerable<li>Is exposed to the internet</ul> |
:::image type="content" source="./media/advanced-hunting-graph/hunting-graph-advanced-filters.png" alt-text="Screenshot of the predefined scenarios side panel highlighting the advanced filter section." lightbox="./media/advanced-hunting-graph/hunting-graph-advanced-filters.png":::
0 commit comments