You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/submission-guide.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
ms.topic: conceptual
18
18
search.appverid: met150
19
-
ms.date: 08/18/2023
19
+
ms.date: 05/10/2024
20
20
---
21
21
22
22
# Submit files for analysis
@@ -28,6 +28,9 @@ If you have a file that you suspect might be malware or is being incorrectly det
28
28
29
29
## How do I submit a file to Microsoft for analysis?
30
30
31
+
> [!IMPORTANT]
32
+
> Starting May 20, 2024, [file submissions](https://www.microsoft.com/en-us/wdsi/filesubmission) will be transitioning to a new [Microsoft Entra ID](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id). If your tenant requires admin consent to continue accessing this service, refer to [Overview of user and admin consent](/entra/identity/enterprise-apps/user-admin-consent-overview) and grant access to app ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read.
33
+
31
34
### Send a malware file
32
35
33
36
You can send files that you think might be malware or files that were incorrectly detected through the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission).
@@ -37,7 +40,6 @@ You can complete a quick analysis by providing detailed information about the pr
37
40
After you sign in, you'll be able to track your submissions.
38
41
39
42
> [!NOTE]
40
-
>
41
43
> You can use the Microsoft Security Intelligence submission feature even if you don't have Microsoft Defender for Endpoint Plan 2 or Microsoft Defender for Office Plan 2.
Web components are details describing a web page or server infrastructure gleaned from Microsoft performing a web crawl or scan. These components let you understand the makeup of a webpage or the technology and services driving a specific piece of infrastructure.
@@ -400,17 +401,17 @@ Our host pair data includes the following information:
400
401
- Have any of the connected artifacts been blocklisted?
401
402
- Have any of the connected artifacts been tagged (for example, phishing, APT, malicious, suspicious, specific threat actor)?
402
403
- Is this host redirecting users to malicious content?
@@ -433,19 +434,19 @@ Our cookie data includes the following information:
433
434
**Questions this data set might help answer**
434
435
435
436
- What other websites are issuing the same cookies?
436
-
437
-

438
-
437
+
438
+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cookies-issue.png" alt-text="Data Sets Cookies Domains Issuing Same Cookie." lightbox="/defender/threat-intelligence/media/data-sets-cookies-issue.png":::
439
+
439
440
- What other websites are tracking the same cookies?
440
-
441
-

442
-
441
+
442
+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cookies-same.png" alt-text="Data Sets Cookies Domains Tracking Same Cookie." lightbox="/defender/threat-intelligence/media/data-sets-cookies-same.png":::
443
+
443
444
- Does the cookie domain match my query?
444
445
445
446
- How many cookies are associated with the artifact?
446
-
447
-

448
-
447
+
448
+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cookies-number.png" alt-text="Data Sets Cookies Number Associated with Artifact." lightbox="/defender/threat-intelligence/media/data-sets-cookies-number.png":::
449
+
449
450
- Are there unique cookie names or domains?
450
451
451
452
- What are the time periods associated with cookies?
@@ -475,21 +476,19 @@ Our services data includes the following information:
475
476
**Questions this data set might help answer**
476
477
477
478
- What applications are running on a particular port for a given IP address?
0 commit comments