You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/copilot-in-defender-device-summary.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,20 +40,20 @@ The device summary capability is available in the Microsoft Defender portal thro
40
40
41
41
The device summary generated by Copilot contains noteworthy information about the device, including:
42
42
43
-
- The status of important Defender XDR protection capabilities, like attack surface reduction and tamper protection
44
-
- Any significant user activity observed, like unusual log in attempts
43
+
- The status of important Microsoft Defender XDR protection capabilities, like attack surface reduction and tamper protection
44
+
- Any significant user activity observed, like unusual sign-in attempts
45
45
- A list of vulnerable software installed in the device
46
46
- The status of other security features, like firewall settings, that contribute to the device's risk
47
47
- Other notable insights that signify the device's status, like when the device was last seen active
48
48
- Device insights delivered by Microsoft Intune, like information on the device's primary user, device group, or discovered apps
49
49
50
50
You can access the device summary capability through the following ways:
51
51
52
-
1. From the main menu, open the Device inventory page by selecting **Devices** under Assets. Choose a device to investigate from the list. Upon opening the device page, Copilot automatically summarizes the device information of the chosen device and displays the summary in the Copilot pane.
52
+
- From the main menu, open the Device inventory page by selecting **Devices** under Assets. Choose a device to investigate from the list. Upon opening the device page, Copilot automatically summarizes the device information of the chosen device and displays the summary in the Copilot pane.
53
53
54
54
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page.png":::
55
55
56
-
2. From an incident page, you can choose a device on the incident graph and then select **Device details** (1). On the device pane, select **Summarize** (2) to generate the device summary. The summary is displayed in the Copilot pane.
56
+
- From an incident page, you can choose a device on the incident graph and then select **Device details** (1). On the device pane, select **Summarize** (2) to generate the device summary. The summary is displayed in the Copilot pane.
57
57
58
58
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-incident-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-incident.png":::
Copy file name to clipboardExpand all lines: defender-xdr/copilot-in-defender-file-analysis.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,13 +48,13 @@ The file analysis results generated by Copilot usually contains the following in
48
48
49
49
You can access the file analysis capability through the following ways:
50
50
51
-
1. Open a file page. Copilot automatically generates an analysis upon opening a file page. The results, which shows the overview information by default, are then displayed on the Copilot pane.
51
+
- Open a file page. Copilot automatically generates an analysis upon opening a file page. The results, which show the overview information by default, are then displayed on the Copilot pane.
52
52
:::image type="content" source="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-small.png" alt-text="Screenshot of the file analysis results in Copilot in Defender with the Show details option highlighted." lightbox="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis.png":::
53
53
Select **Show details** (shown above) to display the full results or **Hide details** (highlighted below) to minimize the results.
54
54
:::image type="content" source="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-hide-small.png" alt-text="Screenshot of the file analysis results in Copilot in Defender with the Hide details option highlighted." lightbox="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-hide.png":::
55
-
2. From an incident page, choose a file to investigate in the [attack story](investigate-incidents.md#attack-story) graph. You can also choose a file to investigate in an alert page.
55
+
- From an incident page, choose a file to investigate in the [attack story](investigate-incidents.md#attack-story) graph. You can also choose a file to investigate in an alert page.
56
56
:::image type="content" source="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-attack-story-small.png" alt-text="Screenshot of the attack story graph with the file entities highlighted." lightbox="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-attack-story.png":::
57
-
Select a file to investigate then select **Analyze** on the side pane to begin analysis. The results are then displayed on the Copilot pane.
57
+
Select a file to investigate, then select **Analyze** on the side pane to begin analysis. The results are then displayed on the Copilot pane.
58
58
:::image type="content" source="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-file-pane-small.png" alt-text="Screenshot of the incident page with the file analysis button highlighted." lightbox="/defender/media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-file-pane.png":::
59
59
60
60
You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the file analysis card.
Copy file name to clipboardExpand all lines: defender-xdr/manage-incidents.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,23 +34,23 @@ Incident management is critical to ensuring that incidents are named, assigned,
34
34
35
35
You can manage incidents from **Incidents & alerts > Incidents** on the quick launch of the Microsoft Defender portal ([security.microsoft.com](https://security.microsoft.com)). Here's an example.
36
36
37
-
:::image type="content" source="/defender/media/incidents-queue/fig1-manageincidents.png" alt-text="Highlighting the manage incident option within the incident queue and quick launch pane in the Microsoft Defender portal" lightbox="/defender/media/incidents-queue/fig1-manageincidents.png":::
37
+
:::image type="content" source="/defender/media/incidents-queue/fig1-manageincidents.png" alt-text="Screenshot highlighting the manage incident option within the incident queue and quick launch pane in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/fig1-manageincidents.png":::
38
38
39
39
Here are the ways you can manage your incidents:
40
40
41
-
-[Edit the incident name](#edit-the-incident-name)
42
-
-[Assign or change severity](#assign-or-change-incident-severity)
43
-
-[Add incident tags](#add-incident-tags)
44
-
-[Assign the incident to a user account](#assign-an-incident)
45
-
-[Resolve them](#resolve-an-incident)
46
-
-[Specify its classification](#specify-the-classification)
47
-
-[Add comments](#add-comments)
48
-
- Assess the activity audit and add comments in the [Activity log](#activity-log)
49
-
-[Export incident data to PDF](#export-incident-data-to-pdf)
41
+
-[Edit the incident name](#edit-the-incident-name).
42
+
-[Assign or change severity](#assign-or-change-incident-severity).
43
+
-[Add incident tags](#add-incident-tags).
44
+
-[Assign the incident to a user account](#assign-an-incident).
45
+
-[Resolve them](#resolve-an-incident).
46
+
-[Specify its classification](#specify-the-classification).
47
+
-[Add comments](#add-comments).
48
+
- Assess the activity audit and add comments in the [Activity log](#activity-log).
49
+
-[Export incident data to PDF](#export-incident-data-to-pdf).
50
50
51
51
You can manage incidents from the **Manage incident** pane for an incident. Here's an example.
52
52
53
-
:::image type="content" source="/defender/media/incidents-queue/fig2-new-manageincidents.png" alt-text="The Manage incident pane in the Microsoft Defender portal" lightbox="/defender/media/incidents-queue/fig2-new-manageincidents.png":::
53
+
:::image type="content" source="/defender/media/incidents-queue/fig2-new-manageincidents.png" alt-text="Screenshot showing the Manage incident pane in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/fig2-new-manageincidents.png":::
54
54
55
55
You can display this pane from the **Manage incident** link on the:
56
56
@@ -72,13 +72,13 @@ You can edit the incident name from the **Incident name** field on the **Manage
72
72
73
73
## Assign or change incident severity
74
74
75
-
You can assign or change the severity of an incident from the **Severity** field on the **Manage incident** pane. The severity of an incident is determined by the highest severity of the alerts associated with it. The severity of an incident can be set to high, medium, low, or informational.
75
+
You can assign or change the severity of an incident from the **Severity** field on the **Manage incident** pane. The severity of an incident is determined by the highest severity of the alerts associated with it. The severity of an incident can be set to *high*, *medium*, *low*, or *informational*.
76
76
77
77
## Add incident tags
78
78
79
79
You can add custom tags to an incident, for example to flag a group of incidents with a common characteristic. You can later filter the incident queue for all incidents that contain a specific tag.
80
80
81
-
The option to select from a list of previously-used and selected tags appear after you start typing.
81
+
The option to select from a list of previouslyused and selected tags appear after you start typing.
82
82
83
83
## Assign an incident
84
84
@@ -119,15 +119,15 @@ All comments are added to the historical events of the incident. You can see the
119
119
120
120
The **Activity log** displays a list of all the comments and actions performed on the incident, known as *Audits and comments*. All changes made to the incident, whether by a user or by the system, are recorded in the activity log. The activity log is available from the **Activity log** option on the incident page or on the incident side pane.
121
121
122
-
:::image type="content" source="/defender/media/incidents-queue/fig3-manageincidents-new.png" alt-text="Highlighting the activity log option from the incident page in the Microsoft Defender portal" lightbox="/defender/media/incidents-queue/fig3-manageincidents-new.png":::
122
+
:::image type="content" source="/defender/media/incidents-queue/fig3-manageincidents-new.png" alt-text="Screenshot highlighting the activity log option from the incident page in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/fig3-manageincidents-new.png":::
123
123
124
124
You can filter the activities within the log by comments and actions. Click the **Content: Audits, Comments** then select the content type to filter activities. Here's an example.
125
125
126
-
:::image type="content" source="/defender/media/incidents-queue/fig4-manageincidents.png" alt-text="Highlighting the filter options within the activity log pane from the incident page in the Microsoft Defender portal" lightbox="/defender/media/incidents-queue/fig4-manageincidents.png":::
126
+
:::image type="content" source="/defender/media/incidents-queue/fig4-manageincidents.png" alt-text="Screenshot highlighting the filter options within the activity log pane from the incident page in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/fig4-manageincidents.png":::
127
127
128
128
You can also add your own comments using the comment box available within the activity log. The comment box accepts text and formatting, links, and images.
129
129
130
-
:::image type="content" source="/defender/media/incidents-queue/fig5-res-manageincidents.png" alt-text="Highlighting the comment box from the incident page in the Microsoft Defender portal" lightbox="/defender/media/incidents-queue/fig5-manageincidents.png":::
130
+
:::image type="content" source="/defender/media/incidents-queue/fig5-res-manageincidents.png" alt-text="Screenshot highlighting the comment box from the incident page in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/fig5-manageincidents.png":::
Copy file name to clipboardExpand all lines: defender-xdr/security-copilot-in-microsoft-365-defender.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ ms.date: 04/01/2024
33
33
- Microsoft Defender XDR
34
34
- Microsoft Defender unified security operations center (SOC) platform
35
35
36
-
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Copilot for Security is embedded in the Microsoft Defender portal to enable security teams to efficiently summarize incidents, analyze scripts and codes, analyze files, summarize device information, use guided responses to resolve incidents, generate KQL queries, create incident reports.
36
+
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Copilot for Security is embedded in the Microsoft Defender portal to enable security teams to efficiently summarize incidents, analyze scripts and codes, analyze files, summarize device information, use guided responses to resolve incidents, generate KQL queries, and create incident reports.
37
37
38
38
This article provides an overview for users of the Copilot in Defender, including steps to access, key capabilities, and links to the details of these capabilities.
39
39
@@ -49,7 +49,7 @@ Enable security teams to tackle attack investigations in a timely manner with ea
49
49
50
50
### Summarize incidents quickly
51
51
52
-
Investigating incidents with multiple alerts can be a daunting task. To immediately understand an incident, you can tap Copilot to [summarize an incident](security-copilot-m365d-incident-summary.md) for you. Copilot creates an overview of the attack containing essential information for you to understand what transpired in the attack, what assets are involved, and the timeline of the attack. Copilot automatically creates a summary when you navigate to an incident's page.
52
+
Investigating incidents with multiple alerts can be a daunting task. To immediately understand an incident, you can tap Copilot to [summarize an incident](security-copilot-m365d-incident-summary.md) for you. Copilot creates an overview of the attack. The overview contains essential information for you to understand what transpired in the attack, what assets are involved, and the timeline of the attack. Copilot automatically creates a summary when you navigate to an incident's page.
53
53
54
54
:::image type="content" source="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-small.png" alt-text="Screenshot of the incident summary card on the Copilot pane as seen in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary.png":::
55
55
@@ -79,7 +79,7 @@ Copilot helps security teams quickly assess and understand suspicious files with
79
79
80
80
### Write incident reports efficiently
81
81
82
-
Security operations teams usually write reports to record important information, including what response actions were taken and the corresponding results, the team members involved, and other information to aid future security decisions and learning. Oftentimes, documenting incidents can be time-consuming. For incident reports to be effective, it must contain an incident's summary along with the actions taken, including what actions were taken by whom and when. Copilot [generates an incident report](security-copilot-m365d-create-incident-report.md) by quickly consolidating these pieces of information.
82
+
Security operations teams usually write reports to record important information, including what response actions were taken and the corresponding results, the team members involved, and other information to aid future security decisions and learning. Oftentimes, documenting incidents can be time-consuming. For an incident report to be effective, it must contain an incident's summary along with the actions taken, including what actions were taken by whom and when. Copilot [generates an incident report](security-copilot-m365d-create-incident-report.md) by quickly consolidating these pieces of information.
83
83
84
84
:::image type="content" source="/defender/media/copilot-in-defender/create-report/incident-report-main1-small.png" alt-text="Screenshot of the incident report card in the incident page showing the top half of the card." lightbox="/defender/media/copilot-in-defender/create-report/incident-report-main1.png":::
85
85
@@ -89,7 +89,7 @@ Copilot in Defender helps security teams proactively hunt for threats in their n
89
89
90
90
### Generate KQL queries from natural-language input
91
91
92
-
Security teams who use advanced hunting to proactively hunt for threats in their network can now use a query assistant that converts any natural-language question in the context of threat hunting, into a ready-to-run KQL query. The query assistant saves security teams time by generating a KQL query that can then be automatically run or further tweaked according to the analyst needs. Read more about the query assistant in [Copilot for Security in advanced hunting](advanced-hunting-security-copilot.md).
92
+
Security teams who use advanced hunting to proactively hunt for threats in their network can now use a query assistant that converts any natural-language question, in the context of threat hunting, into a ready-to-run KQL query. The query assistant saves security teams time by generating a KQL query that can then be automatically run or further tweaked according to the analyst needs. Read more about the query assistant in [Copilot for Security in advanced hunting](advanced-hunting-security-copilot.md).
93
93
94
94
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-pane.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-pane-big.png":::
95
95
@@ -111,7 +111,7 @@ Because of its continuing evolution, Copilot might miss some things. Reviewing a
111
111
112
112
All Copilot in Defender capabilities have an option for providing feedback. To provide feedback, perform the following steps:
113
113
114
-
1. Select the feedback icon  located at the bottom of any results card in the Copilot side panel.
114
+
1. Select the feedback icon  located at the bottom of any results card in the Copilot side panel.
115
115
2. Select **Confirmed, it looks great** if the results are accurate based on your assessment. You can provide more information in the next dialog box.
116
116
3. Select **Off-target, inaccurate** if any detail is incorrect or incomplete based on your assessment. You can provide more information about your assessment in the next dialog box and submit this assessment to Microsoft.
117
117
4. You can also report the results if it contains questionable or ambiguous information by selecting **Potentially harmful, inappropriate**. Provide more information about the results in the next dialog box and select Submit.
0 commit comments