Skip to content

Commit 2b8f244

Browse files
authored
Merge pull request #2365 from YongRhee-MSFT/docs-editor/incident-response-overview-1736362091
Update incident-response-overview.md
2 parents 9646552 + a6dadc3 commit 2b8f244

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

defender-xdr/incident-response-overview.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,12 @@ For more information, see [Automated investigation and response in Microsoft Def
5151

5252
It's not enough to respond to attacks as they occur. For extended, multi-phase attacks such as ransomware, you must proactively search for the evidence of an attack in progress and take action to stop it before it completes.
5353

54-
Advanced hunting is a query-based threat hunting tool in Microsoft Defender XDR that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. This flexible access to the Microsoft Defender XDR data enables unconstrained hunting for both known and potential threats.
54+
Advanced hunting is a query-based threat hunting tool in Microsoft Defender XDR that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities.
55+
56+
> [!TIP]
57+
> You can extend the 30 days of raw data of advanced hunting using [Microsoft XDR Streaming API](/defender-xdr/streaming-api) and [Microsoft Defender for Endpoint Streaming API](/defender-endpoint/api/raw-data-export).
58+
59+
This flexible access to the Microsoft Defender XDR data enables unconstrained hunting for both known and potential threats.
5560

5661
You can use the same threat hunting queries to build custom detection rules. These rules run automatically to check for and then respond to suspected breach activity, misconfigured machines, and other findings.
5762

0 commit comments

Comments
 (0)