Skip to content

Commit 3acb880

Browse files
Merge pull request #2752 from MicrosoftDocs/main
Publish main to live, 02/13, 11:00 AM IST
2 parents 69d8383 + 0128a3f commit 3acb880

File tree

12 files changed

+43
-24
lines changed

12 files changed

+43
-24
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,31 @@
171171
"redirect_url": "/defender-xdr/",
172172
"redirect_document_id": false
173173
},
174+
{
175+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
176+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
177+
"redirect_document_id": false
178+
},
179+
{
180+
"source_path": "defender-xdr/malware-naming.md",
181+
"redirect_url": "/unified-secops-platform/malware-naming",
182+
"redirect_document_id": false
183+
},
184+
{
185+
"source_path": "defender-xdr/criteria.md",
186+
"redirect_url": "/unified-secops-platform/criteria",
187+
"redirect_document_id": false
188+
},
189+
{
190+
"source_path": "defender-xdr/submission-guide.md",
191+
"redirect_url": "/unified-secops-platform/submission-guide",
192+
"redirect_document_id": false
193+
},
194+
{
195+
"source_path": "defender-xdr/virus-initiative-criteria.md",
196+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
197+
"redirect_document_id": false
198+
},
174199
{
175200
"source_path": "defender-xdr/tickets.md",
176201
"redirect_url": "/defender-xdr/troubleshoot",

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
1515
ms.service: defender-office-365
1616
search.appverid: met150
17-
ms.date: 02/04/2025
17+
ms.date: 02/12/2025
1818
appliesto:
1919
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -58,7 +58,7 @@ Admins configure user reported messages to go to a specified reporting mailbox,
5858

5959
If user reporting is turned off and a non-Microsoft add-in button is selected, the **Report** button isn't available in supported versions of Outlook.
6060

61-
- The built-in **Report** button in Outlook on the web, Outlook for Android, and the new Outlook for Windows supports reporting messages from shared mailboxes or other mailboxes by a delegate.
61+
- The built-in **Report** button in Outlook on the web, Outlook for Mac, Outlook for Android, and the new Outlook for Windows supports reporting messages from shared mailboxes or other mailboxes by a delegate.
6262
- Shared mailboxes require Send As or Send On Behalf permission for the user.
6363
- Other mailboxes require Send As or Send On Behalf permission _and_ Read and Manage permissions for the delegate.
6464

defender-xdr/TOC.yml

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -581,17 +581,9 @@
581581
- name: Responding to ransomware attacks
582582
href: playbook-responding-ransomware-m365-defender.md
583583
- name: Threat actor naming
584-
href: microsoft-threat-actor-naming.md
585-
- name: Malware names
586-
href: malware-naming.md
587-
- name: How Microsoft identifies malware and PUA
588-
href: criteria.md
589-
- name: Submit files for analysis
590-
href: submission-guide.md
584+
href: /unified-secops-platform/microsoft-threat-actor-naming
591585
- name: Understand threat intelligence concepts
592586
href: /defender-endpoint/threat-indicator-concepts
593-
- name: Microsoft virus initiative
594-
href: virus-initiative-criteria.md
595587
- name: Software developer FAQ
596588
href: developer-faq.yml
597589
- name: Microsoft Defender XDR docs

unified-secops-platform/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,12 +108,14 @@
108108
- name: Resources
109109
items:
110110
- name: Threat actor naming
111-
href: /defender-xdr/microsoft-threat-actor-naming?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
111+
href: microsoft-threat-actor-naming.md
112+
- name: Malware names
113+
href: malware-naming.md
112114
- name: Identification of malware and unwanted apps
113-
href: /defender-xdr/criteria?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
115+
href: criteria.md
114116
- name: Submit files for analysis
115-
href: /defender-xdr/submission-guide?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
117+
href: submission-guide.md
116118
- name: Microsoft virus initiative
117-
href: /defender-xdr/virus-initiative-criteria?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
119+
href: virus-initiative-criteria.md
118120
- name: Microsoft security portals
119121
href: /defender-xdr/portals?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json

defender-xdr/criteria.md renamed to unified-secops-platform/criteria.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft identifies malware and potentially unwanted applications
33
ms.reviewer: andanut, elahehsamani
44
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp

defender-xdr/malware-naming.md renamed to unified-secops-platform/malware-naming.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft names malware
33
ms.reviewer:
44
description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp
@@ -19,7 +19,7 @@ ms.date: 01/29/2024
1919

2020
We name the malware and unwanted software that we detect according to the Computer Antivirus Research Organization (CARO) malware naming scheme. The scheme uses the following format:
2121

22-
![How Microsoft determines names malware](/defender/media/security-intelligence-images/naming-malware.png)
22+
![How Microsoft determines names malware](media/malware-naming/naming-malware.png)
2323

2424
When our analysts research a particular threat, they determine what each of the components name is.
2525

File renamed without changes.
File renamed without changes.
File renamed without changes.

defender-xdr/microsoft-threat-actor-naming.md renamed to unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft names threat actors
33
ms.reviewer:
44
description: Learn how Microsoft names threat actors and how to use the naming convention to identify associated intelligence.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.mktglfcycl: secure
77
ms.sitesec: library
88
ms.localizationpriority: medium
@@ -24,7 +24,7 @@ ms.date: 12/19/2024
2424

2525
Microsoft uses a naming taxonomy for threat actors aligned with the theme of weather. We intend to bring better clarity to customers and other security researchers with this taxonomy. We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves. We also aim to aid security researchers, who are already confronted with an overwhelming amount of threat intelligence data.
2626

27-
:::image type="content" source="/defender/media/threat-actor-naming/threat-actor-categories.png" alt-text="Nation-state actors based on Microsoft naming" lightbox="/defender/media/threat-actor-naming/threat-actor-categories-lg.png":::
27+
:::image type="content" source="media/microsoft-threat-actor-naming/threat-actor-categories.png" alt-text="Nation-state actors based on Microsoft naming" lightbox="media/microsoft-threat-actor-naming/threat-actor-categories-lg.png":::
2828

2929
Microsoft categorizes threat actors into five key groups:
3030

@@ -185,7 +185,7 @@ Read our announcement about this taxonomy for more information: [https://aka.ms/
185185

186186
## Putting intelligence into the hands of security professionals
187187

188-
[Intel profiles in Microsoft Defender Threat Intelligence](defender-threat-intelligence.md) bring crucial insights about threat actors. These insights enable security teams to get the context they need as they prepare for and respond to threats.
188+
[Intel profiles in Microsoft Defender Threat Intelligence](/defender-xdr/defender-threat-intelligence) bring crucial insights about threat actors. These insights enable security teams to get the context they need as they prepare for and respond to threats.
189189

190190
Additionally, the Microsoft Defender Threat Intelligence Intel Profiles API provides the most up-to-date threat actor infrastructure visibility in the industry today. Updated information is crucial in enabling threat intelligence and security operations (SecOps) teams to streamline their advanced threat hunting and analysis workflows. Learn more about this API in the documentation: [Use the threat intelligence APIs in Microsoft Graph (preview)](/graph/api/resources/security-threatintelligence-overview).
191191

0 commit comments

Comments
 (0)