Skip to content

Commit 2a1c6bd

Browse files
Merge branch 'main' into 81940ea2-517d-44b3-88d8-77301766ee05_45
2 parents 1e36a0f + 0720152 commit 2a1c6bd

File tree

5 files changed

+25
-17
lines changed

5 files changed

+25
-17
lines changed

defender-endpoint/api/collect-investigation-package.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,19 +15,19 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 03/21/2025
18+
ms.date: 06/03/2025
1919
---
2020

2121
# Collect investigation package API
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../../includes/microsoft-defender.md)]
2424

2525
**Applies to:**
26+
2627
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
2728
- [Microsoft Defender for Endpoint](../microsoft-defender-endpoint.md)
2829
- [Microsoft Defender XDR](/defender-xdr)
2930

30-
3131
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3232
3333
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
@@ -40,11 +40,7 @@ Collect investigation package from a device.
4040

4141
## Limitations
4242

43-
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
44-
45-
> [!IMPORTANT]
46-
>
47-
> - These response actions are only available for devices on Windows 10, version 1703 or later, and on Windows 11.
43+
- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
4844

4945
## Permissions
5046

defender-endpoint/device-discovery-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ audience: ITPro
1313
ms.collection:
1414
- m365-security
1515
- tier3
16-
ms.topic: conceptual
16+
ms.topic: faq
1717
search.appverid: met150
1818
ms.date: 03/04/2025
1919
---

defender-endpoint/ios-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection:
1111
- m365-security
1212
- tier3
1313
- mde-ios
14-
ms.topic: conceptual
14+
ms.topic: faq
1515
ms.subservice: ios
1616
search.appverid: met150
1717
ms.date: 01/22/2025

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- Tier1
15-
ms.topic: conceptual
15+
ms.topic: faq
1616
search.appverid: met150
1717
ms.date: 05/02/2025
1818
---

defender-xdr/advanced-hunting-overview.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: Overview - Advanced hunting
33
description: Learn about advanced hunting queries in Microsoft Defender and how to use them to proactively find threats and weaknesses in your network
44
ms.service: defender-xdr
5-
ms.pagetype: security
65
f1.keywords:
76
- NOCSH
87
ms.author: maccruz
@@ -20,7 +19,7 @@ ms.custom:
2019
- seo-marvel-apr2020
2120
ms.topic: overview
2221
search.appverid: met150
23-
ms.date: 10/18/2024
22+
ms.date: 06/03/2025
2423
appliesto:
2524
- Microsoft Defender XDR
2625
- Microsoft Sentinel in the Microsoft Defender portal
@@ -51,47 +50,60 @@ Advanced hunting supports queries that check a broader data set coming from:
5150

5251
To use advanced hunting, [turn on Microsoft Defender XDR](m365d-enable.md). Or to use advanced hunting with Microsoft Sentinel, [connect Microsoft Sentinel to the Defender portal](/unified-secops-platform/microsoft-sentinel-onboard).
5352

54-
5553
For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see the [video](https://learn-video.azurefd.net/vod/player?id=ffdedc73-6edf-45a9-8c90-566296e8d4ec).
5654

57-
58-
5955
## Get access
56+
6057
To use advanced hunting or other [Microsoft Defender XDR](microsoft-365-defender.md) capabilities, you need an appropriate role in Microsoft Entra ID. [Read about required roles and permissions for advanced hunting](custom-roles.md).
6158

6259
Also, your access to endpoint data is determined by role-based access control (RBAC) settings in Microsoft Defender for Endpoint. [Read about managing access to Microsoft Defender XDR](m365d-permissions.md).
6360

6461

6562
## Data freshness and update frequency
63+
6664
Advanced hunting data can be categorized into two distinct types, each consolidated differently.
6765

6866
### **Event or activity data**
67+
6968
Event or activity data populates tables about alerts, security events, system events, and routine assessments. Advanced hunting receives this data almost immediately after the sensors that collect them successfully transmit them to the corresponding cloud services. For example, you can query event data from healthy sensors on workstations or domain controllers almost immediately after they are available on Microsoft Defender for Endpoint and Microsoft Defender for Identity.
7069

7170
To collect even more event properties, you have the option of turning on [aggregated reporting](/defender-endpoint/aggregated-reporting).
7271

7372
### **Entity data**
73+
7474
Entity data populates tables with information about users and devices. This data comes from both relatively static data sources and dynamic sources, such as Active Directory entries and event logs. To provide fresh data, tables are updated with any new information every 15 minutes, adding rows that might not be fully populated. Every 24 hours, data is consolidated to insert a record that contains the latest, most comprehensive data set about each entity.
7575

7676

7777
## Time zone
78+
7879
### Queries
80+
7981
Advanced hunting data uses the UTC (Universal Time Coordinated) timezone.
8082
![Screenshot of custom time range.](/defender/media/custom-time-range.png)
8183

8284
Queries should be created in UTC.
8385

8486
### Results
85-
Advanced hunting results are converted to the [timezone](m365d-time-zone.md) set in Microsoft Defender XDR.
8687

88+
Advanced hunting results are converted to the [timezone](m365d-time-zone.md) set in Microsoft Defender XDR.
89+
90+
## To extend the 30 days retention for Advanced Hunting, you can use Streaming APIs
8791

92+
In order to extend the 30 days retention for Advanced Hunting, see the following resources:
8893

94+
- Microsoft Defender XDR [Streaming API](/defender-xdr/streaming-api)
95+
- Microsoft Defender for Endpoint [Raw Data Streaming API](/defender-endpoint/api/raw-data-export)
96+
97+
> [!NOTE]
98+
> The data retained is from the first (1st) day that you implement and enable the streaming api.
99+
100+
## Related content
89101

90-
## Related topics
91102
- [Choose between guided and advanced hunting modes](advanced-hunting-modes.md)
92103
- [Build hunting queries using guided mode](advanced-hunting-query-builder.md)
93104
- [Learn the query language](advanced-hunting-query-language.md)
94105
- [Understand the schema](advanced-hunting-schema-tables.md)
95106
- [Microsoft Graph security API](/graph/api/resources/security-api-overview#advanced-hunting)
96107
- [Custom detections overview](custom-detections-overview.md)
108+
97109
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)