Skip to content

Commit 3587cdf

Browse files
Merge pull request #390 from MicrosoftDocs/main
Publish main to live, 05/10, 3:30 PM IST
2 parents fa74895 + 41401c6 commit 3587cdf

25 files changed

+57
-56
lines changed

defender-xdr/submission-guide.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 08/18/2023
19+
ms.date: 05/10/2024
2020
---
2121

2222
# Submit files for analysis
@@ -28,6 +28,9 @@ If you have a file that you suspect might be malware or is being incorrectly det
2828
2929
## How do I submit a file to Microsoft for analysis?
3030

31+
> [!IMPORTANT]
32+
> Starting May 20, 2024, [file submissions](https://www.microsoft.com/en-us/wdsi/filesubmission) will be transitioning to a new [Microsoft Entra ID](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id). If your tenant requires admin consent to continue accessing this service, refer to [Overview of user and admin consent](/entra/identity/enterprise-apps/user-admin-consent-overview) and grant access to app ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read.
33+
3134
### Send a malware file
3235

3336
You can send files that you think might be malware or files that were incorrectly detected through the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission).
@@ -37,7 +40,6 @@ You can complete a quick analysis by providing detailed information about the pr
3740
After you sign in, you'll be able to track your submissions.
3841

3942
> [!NOTE]
40-
>
4143
> You can use the Microsoft Security Intelligence submission feature even if you don't have Microsoft Defender for Endpoint Plan 2 or Microsoft Defender for Office Plan 2.
4244
4345
### Submit a suspected email attachment

defender/threat-intelligence/data-sets.md

Lines changed: 45 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -249,8 +249,9 @@ When you expand on an SHA-1 hash, you see the following details:
249249
![Data Sets CertificateFree Provider](media/dataSetsCertificateFreeProvider.png)
250250

251251
- Over what timeframe has the certificate been observed in use?
252+
253+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cert-first-last-seen.png" alt-text="Data Sets Certificates Observation Dates." lightbox="/defender/threat-intelligence/media/data-sets-cert-first-last-seen.png":::
252254

253-
![Data Sets Certificates Observation Dates](media/dataSetsCertificatesObservationDates.png)
254255

255256
## Subdomains
256257

@@ -266,12 +267,12 @@ Our subdomain data includes the following information:
266267
**Questions this data set might help answer**
267268

268269
- Are there more subdomains associated with the higher-level domain?
269-
270-
![Data Sets Sub domains](media/dataSetsSubdomains.png)
270+
271+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-subdomains-01.png" alt-text="Data Sets Subdomains." lightbox="/defender/threat-intelligence/media/data-sets-subdomains-01.png":::
271272

272273
- Are any of the subdomains associated with malicious activity?
273-
274-
![Data Sets Sub domains Malicious](media/dataSetsSubdomainsMalicious.png)
274+
275+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-subdomains-02.png" alt-text="Data Sets Subdomains Malicious." lightbox="/defender/threat-intelligence/media/data-sets-subdomains-02.png":::
275276

276277
- If I own this domain, do any of the subdomains look unfamiliar?
277278

@@ -299,31 +300,31 @@ Our tracker data set includes IDs from providers like Google, Yandex, Mixpanel,
299300
**Questions this data set might help answer**
300301

301302
- Are there other resources using the same analytics IDs?
302-
303-
![Data Sets Trackers Pivot Analytics Account](media/dataSetsTrackersPivotAnalyticsAccount.gif)
303+
304+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-trackers-analytics.png" alt-text="Data Sets Trackers Pivot Analytics Account." lightbox="/defender/threat-intelligence/media/data-sets-trackers-analytics.png":::
304305

305306
- Are these resources associated with the organization, or are they attempting to conduct an infringement attack?
306307

307308
- Is there any overlap between trackers–are they shared with other websites?
308309

309-
- What are the types of trackers found within the web page?
310-
311-
![Data Sets Trackers Types](media/dataSetsTrackersTypes.png)
312-
310+
- What are the types of trackers found within the web page?
311+
312+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-trackers-types.png" alt-text="Data Sets Trackers Types." lightbox="/defender/threat-intelligence/media/data-sets-trackers-types.png":::
313+
313314
- What is the length of time for trackers?
314-
315-
![Data Sets Trackers LengthOf Time](media/dataSetsTrackersLengthOfTime.png)
315+
316+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-trackers-first-last-seen.png" alt-text="Data Sets Trackers Length Of Time." lightbox="/defender/threat-intelligence/media/data-sets-trackers-first-last-seen.png":::
316317

317318
- What is the frequency of change for tracker values–do they come, go, or remain?
318319

319320
- Are there any trackers linking to website cloning software (for example, *MarkOfTheWeb* or *HTTrack*)?
320-
321-
![Data Sets TrackersHt Track](media/dataSetsTrackersHtTrack.png)
322-
321+
322+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-trackers-httrack.png" alt-text="Data Sets Trackers HtTrack." lightbox="/defender/threat-intelligence/media/data-sets-trackers-httrack.png":::
323+
323324
- Are there any trackers linking to malicious command-and-control (C2) server malware (for example, *JARM*)?
324-
325-
![Data Sets Trackers JARM](media/dataSetsTrackersJARM.png)
326-
325+
326+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-trackers-jarm.png" alt-text="Data Sets Trackers JARM." lightbox="/defender/threat-intelligence/media/data-sets-trackers-jarm.png":::
327+
327328
## Components
328329

329330
Web components are details describing a web page or server infrastructure gleaned from Microsoft performing a web crawl or scan. These components let you understand the makeup of a webpage or the technology and services driving a specific piece of infrastructure.
@@ -400,17 +401,17 @@ Our host pair data includes the following information:
400401
- Have any of the connected artifacts been blocklisted?
401402
- Have any of the connected artifacts been tagged (for example, phishing, APT, malicious, suspicious, specific threat actor)?
402403
- Is this host redirecting users to malicious content?
403-
404-
![Data Sets Host Pairs Malicious Redirect](media/dataSetsHostPairsMaliciousRedirect.png)
405-
404+
405+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-host-pairs-redirect.png" alt-text="Data Sets Host Pairs Malicious Redirect." lightbox="/defender/threat-intelligence/media/data-sets-host-pairs-redirect.png":::
406+
406407
- Are resources pulling in CSS or images to set up infringement attacks?
407-
408-
![Data Sets Host Pairs Infringement Attack](media/dataSetsHostPairsInfringementAttack.png)
409-
408+
409+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-host-pairs-img.png" alt-text="Data Sets Host Pairs Infringement Attack." lightbox="/defender/threat-intelligence/media/data-sets-host-pairs-img.png":::
410+
410411
- Are resources pulling in a script or referencing a *link.href* to set up a Magecart or skimming attack?
411-
412-
![Data Sets Host Pairs Skimmer Reference](media/dataSetsHostPairsSkimmerReference.png)
413-
412+
413+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-host-pairs-href.png" alt-text="Data Sets Host Pairs Skimmer Reference." lightbox="/defender/threat-intelligence/media/data-sets-host-pairs-href.png":::
414+
414415
- Where are users being redirected from/to?
415416

416417
- What type of redirection is taking place?
@@ -433,19 +434,19 @@ Our cookie data includes the following information:
433434
**Questions this data set might help answer**
434435

435436
- What other websites are issuing the same cookies?
436-
437-
![Data Sets Cookies Domains Issuing Same Cookie](media/dataSetsCookiesDomainsIssuingSameCookie.png)
438-
437+
438+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cookies-issue.png" alt-text="Data Sets Cookies Domains Issuing Same Cookie." lightbox="/defender/threat-intelligence/media/data-sets-cookies-issue.png":::
439+
439440
- What other websites are tracking the same cookies?
440-
441-
![Data Sets Cookies Domains Tracking Same Cookie](media/dataSetsCookiesDomainsTrackingSameCookie.png)
442-
441+
442+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cookies-same.png" alt-text="Data Sets Cookies Domains Tracking Same Cookie." lightbox="/defender/threat-intelligence/media/data-sets-cookies-same.png":::
443+
443444
- Does the cookie domain match my query?
444445

445446
- How many cookies are associated with the artifact?
446-
447-
![Data Sets Cookies Number Associated with Artifact](media/dataSetsCookiesNumberAssociatedwithArtifact.png)
448-
447+
448+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-cookies-number.png" alt-text="Data Sets Cookies Number Associated with Artifact." lightbox="/defender/threat-intelligence/media/data-sets-cookies-number.png":::
449+
449450
- Are there unique cookie names or domains?
450451

451452
- What are the time periods associated with cookies?
@@ -475,21 +476,19 @@ Our services data includes the following information:
475476
**Questions this data set might help answer**
476477

477478
- What applications are running on a particular port for a given IP address?
478-
479-
![Data Sets Services Applications Running](media/dataSetsServicesApplicationsRunning.png)
479+
480+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-services-ssh.png" alt-text="Data Sets Services Applications Running." lightbox="/defender/threat-intelligence/media/data-sets-services-ssh.png":::
480481

481482
- What version of applications are in use?
482483

483-
![Data Sets Services Version Running](media/dataSetsServicesVersionRunning.png)
484-
485484
- Are there recent changes in the open, filtered, or closed status for a given port?
486-
487-
![Data Sets Services Port Statuses](media/dataSetsServicesPortStatuses.png)
485+
486+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-services-open-close.png" alt-text="Data Sets Services Port Statuses." lightbox="/defender/threat-intelligence/media/data-sets-services-open-close.png":::
488487

489488
- Was a certificate associated with the connection?
490-
491-
![Data Sets Services Certificate Associations](media/dataSetsServicesCertificateAssociations.png)
492-
489+
490+
:::image type="content" source="/defender/threat-intelligence/media/data-sets-services-cert.png" alt-text="Data Sets Services Certificate Associations." lightbox="/defender/threat-intelligence/media/data-sets-services-cert.png":::
491+
493492
- Are vulnerable or deprecated technologies in use on a given asset?
494493

495494
![Data Sets Services Applications Running](media/dataSetsServicesApplicationsRunning.png)
389 KB
Loading
782 KB
Loading
397 KB
Loading
86.6 KB
Loading
128 KB
Loading
151 KB
Loading
117 KB
Loading
130 KB
Loading

0 commit comments

Comments
 (0)