|
18 | 18 | href: usgov.md
|
19 | 19 | - name: Industry tests
|
20 | 20 | href: ./top-scoring-industry-tests.md
|
21 |
| - - name: Microsoft Defender portal services |
22 |
| - items: |
23 |
| - - name: Portal overview |
24 |
| - href: microsoft-365-defender-portal.md |
25 |
| - - name: Defender for Endpoint |
26 |
| - href: microsoft-365-security-center-mde.md |
27 |
| - - name: Defender for IoT |
28 |
| - href: /defender-for-iot/microsoft-defender-iot |
29 |
| - - name: Defender for Office 365 |
30 |
| - href: microsoft-365-security-center-mdo.md |
31 |
| - - name: Defender for Identity |
32 |
| - href: /defender-for-identity/microsoft-365-security-center-mdi.md?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json&tabs=defender-portal |
33 |
| - - name: Defender for Cloud Apps |
34 |
| - href: /defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps.md?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json&tabs=defender-portal |
35 |
| - - name: Defender for Cloud |
36 |
| - href: microsoft-365-security-center-defender-cloud.md |
37 |
| - - name: Microsoft Sentinel |
38 |
| - items: |
39 |
| - - name: Integration overview |
40 |
| - href: /azure/sentinel/microsoft-365-defender-sentinel-integration?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json&tabs=defender-portal |
41 |
| - - name: Experience in Defender portal |
42 |
| - href: /azure/sentinel/microsoft-sentinel-defender-portal?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json |
43 |
| - - name: Connect Microsoft Sentinel to Microsoft Defender |
44 |
| - href: microsoft-sentinel-onboard.md |
| 21 | + - name: Microsoft Defender XDR in the Microsoft Defender portal |
| 22 | + href: microsoft-365-defender-portal.md |
45 | 23 | - name: Plan
|
46 | 24 | items:
|
47 | 25 | - name: Prerequisites
|
|
74 | 52 | href: deploy-supported-services.md
|
75 | 53 | - name: 3. Train your security staff
|
76 | 54 | href: microsoft-365-defender-train-security-staff.md
|
77 |
| - - name : Guides and FAQs |
78 |
| - items: |
79 |
| - - name: Setup guides for Microsoft Defender XDR |
80 |
| - href: deploy-configure-m365-defender.md |
81 |
| - - name: Turning on Microsoft Defender XDR FAQs |
82 |
| - href: m365d-enable-faq.md |
83 |
| - - name: Guides for your security staff |
84 |
| - items: |
85 |
| - - name: Respond to your first incident |
86 |
| - href: respond-first-incident-365-defender.md |
87 |
| - - name: Analyze your first incident |
88 |
| - href: respond-first-incident-analyze.md |
89 |
| - - name: Remediate your first incident |
90 |
| - href: respond-first-incident-remediate.md |
91 |
| - - name: Additional incident examples |
92 |
| - items: |
93 |
| - - name: Phishing email |
94 |
| - href: first-incident-path-phishing.md |
95 |
| - - name: Identity |
96 |
| - href: first-incident-path-identity.md |
| 55 | + - name: Setup guides for Microsoft Defender XDR |
| 56 | + href: deploy-configure-m365-defender.md |
| 57 | + - name: Turning on Microsoft Defender XDR FAQs |
| 58 | + href: m365d-enable-faq.md |
97 | 59 | - name: Protect against threats
|
98 | 60 | items:
|
99 |
| - - name: Microsoft Secure Score |
100 |
| - items: |
101 |
| - - name: Overview |
102 |
| - href: microsoft-secure-score.md |
103 |
| - - name: What's new |
104 |
| - href: microsoft-secure-score-whats-new.md |
105 |
| - - name: Assess your security posture |
106 |
| - href: microsoft-secure-score-improvement-actions.md |
107 |
| - - name: Track your score history and meet goals |
108 |
| - href: microsoft-secure-score-history-metrics-trends.md |
109 |
| - - name: Data storage and privacy |
110 |
| - href: secure-score-data-storage-privacy.md |
111 | 61 | - name: Protect your endpoints
|
112 | 62 | href: /defender-endpoint
|
113 | 63 | - name: Protect your identities
|
|
128 | 78 | href: /defender-for-identity/notifications?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
|
129 | 79 | - name: Protect your Office 365 workloads
|
130 | 80 | href: /defender-office-365
|
131 |
| - - name: Create Custom Defender XDR reports |
132 |
| - href: defender-xdr-custom-reports.md |
| 81 | + - name: Microsoft Secure Score |
| 82 | + items: |
| 83 | + - name: Overview |
| 84 | + href: microsoft-secure-score.md |
| 85 | + - name: What's new |
| 86 | + href: microsoft-secure-score-whats-new.md |
| 87 | + - name: Assess your security posture |
| 88 | + href: microsoft-secure-score-improvement-actions.md |
| 89 | + - name: Track your score history and meet goals |
| 90 | + href: microsoft-secure-score-history-metrics-trends.md |
| 91 | + - name: Data storage and privacy |
| 92 | + href: secure-score-data-storage-privacy.md |
133 | 93 | - name: Investigate and respond to threats
|
134 | 94 | items:
|
135 |
| - - name: Overview |
136 |
| - href: incidents-overview.md |
137 |
| - - name: Correlation and merging |
138 |
| - href: alerts-incidents-correlation.md |
139 |
| - - name: Respond to incidents |
140 |
| - items: |
141 |
| - - name: Overview |
142 |
| - href: incident-response-overview.md |
143 |
| - - name: Prioritize incidents |
144 |
| - href: incident-queue.md |
145 |
| - - name: Manage incidents |
146 |
| - href: manage-incidents.md |
147 |
| - - name: Export incidents queue to CSV file |
148 |
| - href: export-incidents-queue.md |
149 |
| - - name: Investigate incidents |
150 |
| - items: |
151 |
| - - name: Incidents |
152 |
| - href: investigate-incidents.md |
153 |
| - - name: Unlink alerts from incidents |
154 |
| - href: unlink-alert-from-incident.md |
155 |
| - - name: Investigate data loss prevention alerts with Microsoft Defender XDR |
156 |
| - href: dlp-investigate-alerts-defender.md |
157 |
| - - name: Investigate data loss prevention alerts with Microsoft Sentinel |
158 |
| - href: dlp-investigate-alerts-sentinel.md |
159 |
| - - name: Investigate and respond to container threats |
160 |
| - href: investigate-respond-container-threats.md |
161 |
| - - name: Alerts |
162 |
| - href: investigate-alerts.md |
163 |
| - - name: Alert classification playbooks |
164 |
| - items: |
165 |
| - - name: Overview |
166 |
| - href: alert-classification-playbooks.md |
167 |
| - - name: Suspicious email forwarding activity |
168 |
| - href: alert-grading-playbook-email-forwarding.md |
169 |
| - - name: Suspicious inbox forwarding rules |
170 |
| - href: alert-grading-playbook-inbox-forwarding-rules.md |
171 |
| - - name: Suspicious inbox manipulation rules |
172 |
| - href: alert-grading-playbook-inbox-manipulation-rules.md |
173 |
| - - name: Suspicious password-spray-related IP address |
174 |
| - href: alert-classification-suspicious-ip-password-spray.md |
175 |
| - - name: Malicious exchange connectors |
176 |
| - href: alert-classification-malicious-exchange-connectors.md |
177 |
| - - name: Password spray attacks |
178 |
| - href: alert-classification-password-spray-attack.md |
179 |
| - - name: Entity pages |
180 |
| - items: |
181 |
| - - name: User |
182 |
| - href: investigate-users.md |
183 |
| - - name: Device |
184 |
| - href: entity-page-device.md |
185 |
| - - name: IP |
186 |
| - href: entity-page-ip.md |
187 |
| - - name: Incident response playbooks |
188 |
| - href: /security/operations/incident-response-playbooks |
189 |
| - - name: Investigate domains and URLs associated with Microsoft Defender XDR |
190 |
| - href: /defender-endpoint/investigate-domain |
191 |
| - - name: Manage automated investigation and response |
| 95 | + - name: Overview |
| 96 | + href: incidents-overview.md |
| 97 | + - name: Correlation and merging |
| 98 | + href: alerts-incidents-correlation.md |
| 99 | + - name: Prioritize incidents |
| 100 | + href: incident-queue.md |
| 101 | + - name: Manage incidents |
| 102 | + href: manage-incidents.md |
| 103 | + - name: Investigate incidents |
| 104 | + items: |
| 105 | + - name: Incidents |
| 106 | + href: investigate-incidents.md |
| 107 | + - name: Unlink alerts from incidents |
| 108 | + href: unlink-alert-from-incident.md |
| 109 | + - name: Alerts |
| 110 | + href: investigate-alerts.md |
| 111 | + - name: Entity pages |
| 112 | + items: |
| 113 | + - name: User |
| 114 | + href: investigate-users.md |
| 115 | + - name: Device |
| 116 | + href: entity-page-device.md |
| 117 | + - name: IP |
| 118 | + href: entity-page-ip.md |
| 119 | + - name: Investigate data loss prevention alerts with Microsoft Defender XDR |
| 120 | + href: dlp-investigate-alerts-defender.md |
| 121 | + - name: Investigate data loss prevention alerts with Microsoft Sentinel |
| 122 | + href: dlp-investigate-alerts-sentinel.md |
| 123 | + - name: Investigate and respond to container threats |
| 124 | + href: investigate-respond-container-threats.md |
| 125 | + - name: Configure and manage automated investigation and response |
192 | 126 | items:
|
193 | 127 | - name: Overview
|
194 | 128 | href: m365d-autoir.md
|
|
204 | 138 | href: m365d-autoir-results.md
|
205 | 139 | - name: Address false positives and negatives
|
206 | 140 | href: m365d-autoir-report-false-positives-negatives.md
|
207 |
| - - name: Manage automatic attack disruption |
| 141 | + - name: Manage attack disruption |
208 | 142 | items:
|
209 | 143 | - name: Overview
|
210 | 144 | href: automatic-attack-disruption.md
|
211 | 145 | - name: Configure capabilities
|
212 | 146 | href: configure-attack-disruption.md
|
213 | 147 | - name: View details and results
|
214 | 148 | href: autoad-results.md
|
215 |
| - - name: Manage the deception capability |
| 149 | + - name: Manage the deception capability |
216 | 150 | items:
|
217 | 151 | - name: Overview
|
218 | 152 | href: deception-overview.md
|
219 | 153 | - name: Configure capabilities
|
220 | 154 | href: configure-deception.md
|
221 |
| - - name: Search for threats with advanced hunting |
| 155 | + - name: Search for threats with advanced hunting |
222 | 156 | items:
|
223 | 157 | - name: Overview
|
224 | 158 | href: advanced-hunting-overview.md
|
|
394 | 328 | href: advanced-hunting-limits.md
|
395 | 329 | - name: Extend data coverage
|
396 | 330 | href: advanced-hunting-extend-data.md
|
397 |
| - - name: Track and respond to emerging threats |
| 331 | + - name: Track and respond to emerging threats |
398 | 332 | items:
|
399 | 333 | - name: Threat analytics overview
|
400 | 334 | href: threat-analytics.md
|
401 | 335 | - name: Understand the analyst report
|
402 | 336 | href: threat-analytics-analyst-reports.md
|
403 | 337 | - name: Defender Threat Intelligence in Microsoft Defender XDR
|
404 | 338 | href: defender-threat-intelligence.md
|
405 |
| - - name: Endpoint Attack Notifications |
406 |
| - href: /defender-endpoint/endpoint-attack-notifications |
407 |
| - - name: Collaborate with Microsoft Defender Experts for Hunting |
| 339 | + - name: Collaborate with Microsoft Defender Experts for Hunting |
408 | 340 | items:
|
409 | 341 | - name: Overview
|
410 | 342 | href: defender-experts-for-hunting.md
|
|
420 | 352 | href: experts-on-demand.md
|
421 | 353 | - name: Understand Defender Experts for Hunting reports
|
422 | 354 | href: defender-experts-report.md
|
423 |
| - - name: Collaborate with Microsoft Defender Experts for XDR |
| 355 | + - name: Collaborate with Microsoft Defender Experts for XDR |
424 | 356 | items:
|
425 | 357 | - name: Overview
|
426 | 358 | href: dex-xdr-overview.md
|
|
458 | 390 | href: dex-xdr-permissions.md
|
459 | 391 | - name: Troubleshooting Defender Experts app permissions in Microsoft Teams
|
460 | 392 | href: teams-restrictions-dexapp.md
|
461 |
| - - name: Investigate and respond with Microsoft Copilot in Microsoft Defender |
| 393 | + - name: Investigate and respond with Microsoft Copilot in Microsoft Defender |
462 | 394 | items:
|
463 | 395 | - name: Overview
|
464 | 396 | href: security-copilot-in-microsoft-365-defender.md
|
|
478 | 410 | href: advanced-hunting-security-copilot.md
|
479 | 411 | - name: Create incident reports
|
480 | 412 | href: security-copilot-m365d-create-incident-report.md
|
481 |
| - - name: Ransomware playbooks |
482 |
| - items: |
483 |
| - - name: Detecting human-operated ransomware attacks with Microsoft Defender XDR |
484 |
| - href: playbook-detecting-ransomware-m365-defender.md |
485 |
| - - name: Responding to ransomware attacks |
486 |
| - href: playbook-responding-ransomware-m365-defender.md |
487 | 413 | - name: Enhance security operations
|
488 | 414 | items:
|
489 | 415 | - name: Security operations guide
|
|
561 | 487 | items:
|
562 | 488 | - name: Audit activities and events
|
563 | 489 | href: microsoft-xdr-auditing.md
|
564 |
| - - name: Portal actions |
| 490 | + - name: Configure email notifications |
565 | 491 | items:
|
566 | 492 | - name: Configure notifications
|
567 | 493 | items:
|
|
573 | 499 | href: m365d-threat-analytics-notifications.md
|
574 | 500 | - name: Configure alert notifications
|
575 | 501 | href: configure-email-notifications.md
|
576 |
| - - name: Set time zone |
577 |
| - href: m365d-time-zone.md |
578 |
| - - name: Set up dynamic rules for devices |
579 |
| - href: configure-asset-rules.md |
580 |
| - - name: Provide feedback |
581 |
| - href: feedback.md |
582 |
| - - name: Provide managed service provider (MSSP) access |
583 |
| - href: mssp-access.md |
| 502 | + - name: Asset rule management |
| 503 | + href: configure-asset-rules.md |
| 504 | + - name: Provide managed service provider (MSSP) access |
| 505 | + href: mssp-access.md |
584 | 506 | - name: Troubleshoot service issues
|
585 |
| - href: troubleshoot.md |
| 507 | + href: troubleshoot.md |
| 508 | + - name: Create Custom Defender XDR reports |
| 509 | + href: defender-xdr-custom-reports.md |
586 | 510 | - name: Microsoft Defender XDR APIs
|
587 | 511 | items:
|
588 | 512 | - name: Overview
|
|
649 | 573 | href: /defender-endpoint/technological-partners
|
650 | 574 | - name: Professional services supported by Microsoft Defender XDR
|
651 | 575 | href: /defender-endpoint/professional-services
|
652 |
| - - name: Bi-directional connector for Microsoft Sentinel |
653 |
| - href: microsoft-365-defender-integration-with-azure-sentinel.md |
654 | 576 | - name: Resources
|
655 | 577 | items:
|
656 | 578 | - name: Threat actor naming
|
|
666 | 588 | - name: Microsoft virus initiative
|
667 | 589 | href: virus-initiative-criteria.md
|
668 | 590 | - name: Software developer FAQ
|
669 |
| - href: developer-faq.yml |
| 591 | + href: developer-faq.yml |
| 592 | + - name: Alert classification playbooks |
| 593 | + items: |
| 594 | + - name: Overview |
| 595 | + href: alert-classification-playbooks.md |
| 596 | + - name: Suspicious email forwarding activity |
| 597 | + href: alert-grading-playbook-email-forwarding.md |
| 598 | + - name: Suspicious inbox forwarding rules |
| 599 | + href: alert-grading-playbook-inbox-forwarding-rules.md |
| 600 | + - name: Suspicious inbox manipulation rules |
| 601 | + href: alert-grading-playbook-inbox-manipulation-rules.md |
| 602 | + - name: Suspicious password-spray-related IP address |
| 603 | + href: alert-classification-suspicious-ip-password-spray.md |
| 604 | + - name: Malicious Exchange connectors |
| 605 | + href: alert-classification-malicious-exchange-connectors.md |
| 606 | + - name: Password spray attacks |
| 607 | + href: alert-classification-password-spray-attack.md |
| 608 | + - name: Incident response playbooks |
| 609 | + href: /security/operations/incident-response-playbooks |
| 610 | + - name: Ransomware playbooks |
| 611 | + items: |
| 612 | + - name: Detecting human-operated ransomware attacks with Microsoft Defender XDR |
| 613 | + href: playbook-detecting-ransomware-m365-defender.md |
| 614 | + - name: Responding to ransomware attacks |
| 615 | + href: playbook-responding-ransomware-m365-defender.md |
670 | 616 | - name: Microsoft Defender XDR docs
|
671 | 617 | items:
|
672 | 618 | - name: Defender for Office 365
|
|
0 commit comments