Skip to content

Commit 378f0d0

Browse files
committed
updated text
1 parent eb61928 commit 378f0d0

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

defender-xdr/investigate-incidents.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,11 +101,11 @@ The resulting logs or alerts can be linked to an incident by selecting a results
101101
If the incident or related alerts were the result of an analytics rule you've set, you can also select ***Run query*** to see other related results.
102102

103103
> [!IMPORTANT]
104-
> Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
104+
> Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.]
105105
106-
### Critical attack paths
106+
### Attack paths
107107

108-
The incident graph also contains information about **critical attack paths**. These paths allows security analysts to identify what other entities an attacker is likely to target next. To view an attack path, you can click on an entity and select **View attack path**.
108+
The incident graph also contains information about **attack paths**. These paths allows security analysts to identify what other entities an attacker is likely to target next. To view an attack path, you can click on an entity in the incident graph and select **Show attack paths**.
109109

110110
Attack paths are available for entities with the **critical asset** tag.
111111

defender-xdr/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ For more information on what's new with other Microsoft Defender security produc
3030
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3131

3232
## November 2024
33+
34+
- (Preview) **Attack paths** in the incident graph are now available in the Microsoft Defender portal. The attack story now includes potential attack paths that show the paths that attackers can potentially take after compromising a device. This feature helps you prioritize your response efforts. For more information, see [attack paths in the attack story](investigate-incidents.md#attack-paths).
3335
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
3436

3537
## October 2024

0 commit comments

Comments
 (0)