Skip to content

Commit 34c94fc

Browse files
authored
Merge pull request #3578 from MicrosoftDocs/diannegali-xdrfreshapril
xdr article updates
2 parents 3875bc5 + a5a66fa commit 34c94fc

20 files changed

+69
-80
lines changed

defender-xdr/api-articles.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,27 +18,23 @@ search.appverid:
1818
- MOE150
1919
- MET150
2020
ms.custom: api
21-
ms.date: 02/08/2024
21+
ms.date: 04/25/2025
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Other security and threat protection APIs
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- Microsoft Defender XDR API
31-
32-
> [!IMPORTANT]
33-
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
34-
3530
> [!NOTE]
36-
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
31+
> The **Microsoft Graph security API** is a unified schema and interface that integrates with various Microsoft security solutions and Microsoft security partners. To get started, see [Use the Microsoft Graph security API](/graph/api/resources/security-api-overview).
3732
3833
The following resources provide more information about APIs available for other Microsoft security solutions, beyond the Microsoft Defender XDR API.
3934

4035
- [Microsoft Defender for Endpoint](/defender-endpoint/api/apis-intro)
4136
- [Microsoft Defender for Office 365](/office/office-365-management-api/)
4237
- [Microsoft Defender for Cloud Apps](/cloud-app-security/api-introduction)
38+
- [Microsoft Defender Threat Intelligence](/graph/api/resources/security-threatintelligence-overview)
4339

4440
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/api-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ appliesto:
2828
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2929

3030
> [!NOTE]
31-
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
31+
> The **Microsoft Graph security API** is a unified schema and interface that integrates with various Microsoft security solutions and Microsoft security partners. To get started, see [Use the Microsoft Graph security API](/graph/api/resources/security-api-overview).
3232
3333
> [!IMPORTANT]
3434
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

defender-xdr/api-update-incidents.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,17 +18,15 @@ search.appverid:
1818
- MOE150
1919
- MET150
2020
ms.custom: api
21-
ms.date: 04/09/2024
21+
ms.date: 04/25/2025
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Update incidents API
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- [Microsoft Defender XDR](microsoft-365-defender.md)
31-
3230
> [!NOTE]
3331
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview). For information about the new _update incident_ API using MS Graph security API, see [Update incident](/graph/api/security-incident-update).
3432

defender-xdr/autoad-results.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 06/19/2024
11+
ms.date: 04/25/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
@@ -31,9 +31,9 @@ When an automatic attack disruption triggers in Microsoft Defender XDR, the deta
3131

3232
## Review the incident graph
3333

34-
Microsoft Defender XDR automatic attack disruption is built in in the incident view. Review the incident graph to get the entire attack story and assess the attack disruption impact and status.
34+
Microsoft Defender XDR automatic attack disruption is built-in in the incident view. Review the incident graph to get the entire attack story and assess the attack disruption impact and status.
3535

36-
Here are some examples of what it looks like:
36+
The incident page includes the following information:
3737

3838
- Disrupted incidents include a tag for 'Attack Disruption' and the specific threat type identified (i.e., ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.
3939
- A highlighted notification below the incident title indicating that the incident was disrupted.
@@ -96,6 +96,7 @@ IdentityDirectoryEvents
9696

9797
The above query was adapted from a [Microsoft Defender for Identity - Attack Disruption query](https://github.com/alexverboon/Hunting-Queries-Detection-Rules/blob/main/Defender%20For%20Identity/MDI-AttackDisruption.md#microsoft-365-defender).
9898

99-
## Next step
99+
## Related content
100100

101-
- [Get email notifications for response actions](m365d-response-actions-notifications.md)
101+
- [Exclude assets from automated response actions](automatic-attack-disruption-exclusions.md)
102+
- [Get email notifications for response actions](m365d-response-actions-notifications.md)

defender-xdr/automatic-attack-disruption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 02/20/2025
21+
ms.date: 04/25/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
---

defender-xdr/configure-attack-disruption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 02/16/2025
12+
ms.date: 04/25/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2

defender-xdr/configure-deception.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: how-to
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 01/12/2024
19+
ms.date: 04/25/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
#customer intent: As a security analyst, I want to learn how to configure the deception capability so that I can protect my organization from high-impact attacks that use human-operated lateral movement.

defender-xdr/configure-email-notifications.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,21 +10,20 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- tier2
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
search.appverid: met150
1515
ms.date: 01/17/2025
16+
appliesto:
17+
- Microsoft Defender XDR
18+
- Microsoft Defender for Endpoint Plan 1
19+
- Microsoft Defender for Endpoint Plan 2
20+
- Microsoft Defender for Business
1621
---
1722

1823
# Configure alert notifications
1924

2025
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2126

22-
**Applies to:**
23-
- [Microsoft Defender XDR](microsoft-365-defender.md)
24-
- [Microsoft Defender for Endpoint Plan 1](/defender-endpoint/microsoft-defender-endpoint)
25-
- [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
26-
- [Microsoft Defender for Business](/defender-business/mdb-overview)
27-
2827
You can configure Microsoft Defender XDR to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity.
2928

3029
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up email notifications for specific users (not roles or groups).

defender-xdr/configure-event-hub.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,16 @@ ms.collection:
1414
- m365-security
1515
- tier2
1616
ms.custom: admindeeplinkDEFENDER
17-
ms.topic: conceptual
18-
ms.date: 06/21/2024
17+
ms.topic: concept-article
18+
ms.date: 04/25/2025
19+
appliesto:
20+
- Microsoft Defender XDR
1921
---
2022

2123
# Configure your Event Hubs
2224

2325
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2426

25-
**Applies to:**
26-
- [Microsoft Defender XDR](microsoft-365-defender.md)
27-
2827
> [!NOTE]
2928
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
3029
@@ -71,11 +70,11 @@ This client secret value is used by Microsoft Graph APIs to authenticate this ap
7170
Go **to Event Hub \> Add** and select the pricing tier, throughput units and Auto-Inflate (requires standard pricing and under features) appropriate for the load you're expecting. For more information, see [Pricing - Event Hubs \| Microsoft Azure](https://azure.microsoft.com/pricing/details/event-hubs/).
7271

7372
> [!NOTE]
74-
> You can use an existing event-hub, but the throughput and scaling are set at the namespace level so it is recommended to place an event-hub in its own namespace.
73+
> You can use an existing event-hub, but the throughput and scaling are set at the namespace level. Microsoft recommends to place an event-hub in its own namespace.
7574
7675
:::image type="content" source="/defender/media/ebc4ca37c342ad1da75c4aee4018e51a.png" alt-text="The event hubs section in the Microsoft Azure portal" lightbox="/defender/media/ebc4ca37c342ad1da75c4aee4018e51a.png":::
7776

78-
1. You'll also need the Resource ID of this Event Hubs Namespace. Go to your Azure Event Hubs namespace page \> Properties. Copy the text under Resource ID and record it for use during the Microsoft 365 Configuration section below.
77+
1. You need the Resource ID of this Event Hubs Namespace. Go to your Azure Event Hubs namespace page \> Properties. Copy the text under Resource ID and record it for use during the Microsoft 365 Configuration.
7978

8079
:::image type="content" source="/defender/media/759498162a4e93cbf17c4130d704d164.png" alt-text="The event hubs properties section in the Microsoft Azure portal" lightbox="/defender/media/759498162a4e93cbf17c4130d704d164.png":::
8180

@@ -86,7 +85,7 @@ You're required to add permissions to the following roles to entities that are i
8685
- **Contributor**: The permissions related to this role are added to entity who logs in to the Microsoft Defender portal.
8786
- **Reader** and **Azure Event Hub data Receiver**: The permissions related to these roles are assigned to the entity who is already assigned the role of a **Service Principal** and logs in to the Microsoft Entra application.
8887

89-
To ensure that these roles have been added, perform the following step:
88+
To ensure that these roles are added, perform the following step:
9089

9190
Go to **Event Hub Namespace** \> **Access Control (IAM)** \> **Add** and verify under **Role assignments**.
9291

@@ -96,16 +95,16 @@ Go to **Event Hub Namespace** \> **Access Control (IAM)** \> **Add** and verify
9695

9796
**Option 1:**
9897

99-
You can create an Event Hubs within your Namespace and **all** the Event Types (Tables) you select to export will be written into this **one** Event Hub.
98+
You can create Event Hubs within your Namespace and **all** the Event Types (Tables) you select to export are written into this **one** Event Hub.
10099

101100
**Option 2:**
102101

103102
Instead of exporting all the Event Types (Tables) into one Event Hub, you can export each table into different Event Hubs inside your Event Hubs Namespace (one Event Hub per Event Type).
104103

105-
In this option, Microsoft Defender XDR will create Event Hubs for you.
104+
In this option, Microsoft Defender XDR creates Event Hubs for you.
106105

107106
> [!NOTE]
108-
> If you are using an Event Hub Namespace that is **not** part of an Event Hub Cluster, you will only be able to choose up to 10 Event Types (Tables) to export in each Export Settings you define, due to an Azure limitation of 10 Event Hub per Event Hub Namespace.
107+
> If you are using an Event Hub Namespace that is **not** part of an Event Hub Cluster, you're only able to choose up to 10 Event Types (Tables) to export in each Export Settings you define, due to an Azure limitation of 10 Event Hub per Event Hub Namespace.
109108
110109
For example:
111110

@@ -119,7 +118,7 @@ The Partition Count allows for more throughput via parallelism, so it's recommen
119118

120119
:::image type="content" source="/defender/media/1db04b8ec02a6298d7cc70419ac6e6a9.png" alt-text="An event hubs creation section in the Microsoft Azure portal" lightbox="/defender/media/1db04b8ec02a6298d7cc70419ac6e6a9.png":::
121120

122-
For these Event Hubs (not namespace), you'll need to configure a Shared Access Policy with Send, Listen Claims. Click on your **Event Hub** \> **Shared access policies** \> **+ Add** and then give it a Policy name (not used elsewhere) and check **Send** and **Listen**.
121+
For these Event Hubs (not namespace), you need to configure a Shared Access Policy with Send, Listen Claims. Click on your **Event Hub** \> **Shared access policies** \> **+ Add** and then give it a Policy name (not used elsewhere) and check **Send** and **Listen**.
123122

124123
:::image type="content" source="/defender/media/1867d13f46dc6a0f4cdae6cf00df24db.png" alt-text="The Shared access policies page in the Microsoft Azure portal" lightbox="/defender/media/1867d13f46dc6a0f4cdae6cf00df24db.png":::
125124

@@ -133,23 +132,23 @@ For these Event Hubs (not namespace), you'll need to configure a Shared Access P
133132

134133
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> with an account that meets all the following role requirements:
135134

136-
- Contributor role at the Event Hubs *Namespace* Resource level or higher for the Event Hubs that you'll be exporting to. Without this permission, you'll get an export error when you try to save the settings.
135+
- Contributor role at the Event Hubs *Namespace* Resource level or higher for the Event Hubs that you're be exporting to. An export error occurs when you try to save the settings without this permission.
137136

138137
- Security Admin Role on the tenant tied to Microsoft Defender XDR and Azure.
139138

140139
:::image type="content" source="/defender/media/55d5b1c21dd58692fb12a6c1c35bd4fa.png" alt-text="The Settings page of the Microsoft Defender portal" lightbox="/defender/media/55d5b1c21dd58692fb12a6c1c35bd4fa.png":::
141140

142141
1. Click on **Raw Data Export \> +Add**.
143142

144-
You'll now use the data that you recorded above.
143+
Use the data that you previously recorded.
145144

146145
**Name**: This value is local and should be whatever works in your environment.
147146

148147
**Forward events to event hub**: Select this checkbox.
149148

150149
**Event-Hub Resource ID**: This value is the Event Hubs Namespace Resource ID you recorded when you set up the Event Hubs.
151150

152-
**Event-Hub name**: If you created an Event Hubs inside your Event Hubs Namespace, paste the Event Hubs name you recorded above.
151+
**Event-Hub name**: If you created an Event Hubs inside your Event Hubs Namespace, paste the Event Hubs name you previously recorded.
153152

154153
If you choose to let Microsoft Defender XDR to create Event Hubs per Event Types (Tables) for you, leave this field empty.
155154

@@ -172,15 +171,14 @@ EmailEvents
172171
|count
173172
```
174173

175-
This query will show you how many emails were received in the last hour joined across all the other tables. It will also show you if you're seeing events that could be exported to the event hubs. If this count shows 0, then you won't see any data going out to the Event Hubs.
174+
This query shows you how many emails were received in the last hour joined across all the other tables. It also shows you if you're seeing events that could be exported to the event hubs. If this count shows 0, then you won't see any data going out to the Event Hubs.
176175

177176
:::image type="content" source="/defender/media/c305e57dc6f72fa9eb035943f244738e.png" alt-text="The advanced hunting page in the Microsoft Azure portal" lightbox="/defender/media/c305e57dc6f72fa9eb035943f244738e.png":::
178177

179178
Once you've verified there's data to export, you can view the Event Hubs page to verify that messages are incoming. This process can take up to one hour.
180179

181180
1. In Azure, go to **Event Hub** \> Click on the **Namespace** \> **Event Hub** \> Click on the **Event Hub**.
182-
1. Under **Overview**, scroll down and in the Messages graph you should see Incoming Messages. If you don't see any results, then there will be no messages
183-
for your custom app to ingest.
181+
1. Under **Overview**, scroll down and in the Messages graph you should see Incoming Messages. If you don't see any results, then there are no messages for your custom app to ingest.
184182

185183
:::image type="content" source="/defender/media/e88060e315d76e74269a3fc866df047f.png" alt-text=" The Overview page in the Microsoft 365 Azure portal" lightbox="/defender/media/e88060e315d76e74269a3fc866df047f.png":::
186184

defender-xdr/configure-siem-defender.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,18 +11,17 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- tier2
14-
ms.topic: conceptual
15-
ms.date: 06/27/2024
14+
ms.topic: concept-article
15+
ms.date: 04/25/2025
16+
appliesto:
17+
- Microsoft Defender for Endpoint
18+
- Microsoft Defender XDR
1619
---
1720

1821
# Integrate your SIEM tools with Microsoft Defender XDR
1922

2023
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2124

22-
**Applies to:**
23-
- [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
24-
- [Microsoft Defender XDR](microsoft-365-defender.md)
25-
2625
<a name='pull-microsoft-365-defender-incidents-and-streaming-event-data-using-security-information-and-events-management-siem-tools'></a>
2726

2827
## Pull Microsoft Defender XDR incidents and streaming event data using security information and events management (SIEM) tools
@@ -84,14 +83,16 @@ For more information on:
8483
The new SmartConnector for Microsoft Defender XDR ingests incidents into ArcSight and maps these onto its Common Event
8584
Framework (CEF).
8685

87-
For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender).
86+
For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://www.microfocus.com/documentation/arcsight/arcsight-smartconnectors-8.4/microsoft-365-defender/index.html).
8887

8988
The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that's now retired.
9089

9190
### Elastic
9291

9392
Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.
93+
9494
The Elastic integration for Microsoft Defender XDR and Defender for Endpoint enables organizations to leverage incidents and alerts from Defender within Elastic Security to perform investigations and incident response. Elastic correlates this data with other data sources, including cloud, network, and endpoint sources using robust detection rules to find threats quickly.
95+
9596
For more information on the Elastic connector, see: [Microsoft M365 Defender | Elastic docs](https://docs.elastic.co/integrations/m365_defender)
9697

9798
## Ingesting streaming event data via Event Hubs
@@ -114,7 +115,7 @@ Use the new IBM QRadar Microsoft Defender XDR Device Support Module (DSM) that c
114115

115116
For more information on the Elastic streaming API integration, see [Microsoft M365 Defender | Elastic docs](https://docs.elastic.co/integrations/m365_defender).
116117

117-
## Related articles
118+
## Related content
118119

119120
[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
120121

0 commit comments

Comments
 (0)