Skip to content

Commit 3c8004f

Browse files
committed
updated TOC and XDR pages
1 parent d92a247 commit 3c8004f

File tree

5 files changed

+151
-241
lines changed

5 files changed

+151
-241
lines changed

defender-xdr/TOC.yml

Lines changed: 89 additions & 143 deletions
Original file line numberDiff line numberDiff line change
@@ -18,30 +18,8 @@
1818
href: usgov.md
1919
- name: Industry tests
2020
href: ./top-scoring-industry-tests.md
21-
- name: Microsoft Defender portal services
22-
items:
23-
- name: Portal overview
24-
href: microsoft-365-defender-portal.md
25-
- name: Defender for Endpoint
26-
href: microsoft-365-security-center-mde.md
27-
- name: Defender for IoT
28-
href: /defender-for-iot/microsoft-defender-iot
29-
- name: Defender for Office 365
30-
href: microsoft-365-security-center-mdo.md
31-
- name: Defender for Identity
32-
href: /defender-for-identity/microsoft-365-security-center-mdi.md?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json&tabs=defender-portal
33-
- name: Defender for Cloud Apps
34-
href: /defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps.md?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json&tabs=defender-portal
35-
- name: Defender for Cloud
36-
href: microsoft-365-security-center-defender-cloud.md
37-
- name: Microsoft Sentinel
38-
items:
39-
- name: Integration overview
40-
href: /azure/sentinel/microsoft-365-defender-sentinel-integration?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json&tabs=defender-portal
41-
- name: Experience in Defender portal
42-
href: /azure/sentinel/microsoft-sentinel-defender-portal?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
43-
- name: Connect Microsoft Sentinel to Microsoft Defender
44-
href: microsoft-sentinel-onboard.md
21+
- name: Microsoft Defender XDR in the Microsoft Defender portal
22+
href: microsoft-365-defender-portal.md
4523
- name: Plan
4624
items:
4725
- name: Prerequisites
@@ -74,40 +52,12 @@
7452
href: deploy-supported-services.md
7553
- name: 3. Train your security staff
7654
href: microsoft-365-defender-train-security-staff.md
77-
- name : Guides and FAQs
78-
items:
79-
- name: Setup guides for Microsoft Defender XDR
80-
href: deploy-configure-m365-defender.md
81-
- name: Turning on Microsoft Defender XDR FAQs
82-
href: m365d-enable-faq.md
83-
- name: Guides for your security staff
84-
items:
85-
- name: Respond to your first incident
86-
href: respond-first-incident-365-defender.md
87-
- name: Analyze your first incident
88-
href: respond-first-incident-analyze.md
89-
- name: Remediate your first incident
90-
href: respond-first-incident-remediate.md
91-
- name: Additional incident examples
92-
items:
93-
- name: Phishing email
94-
href: first-incident-path-phishing.md
95-
- name: Identity
96-
href: first-incident-path-identity.md
55+
- name: Setup guides for Microsoft Defender XDR
56+
href: deploy-configure-m365-defender.md
57+
- name: Turning on Microsoft Defender XDR FAQs
58+
href: m365d-enable-faq.md
9759
- name: Protect against threats
9860
items:
99-
- name: Microsoft Secure Score
100-
items:
101-
- name: Overview
102-
href: microsoft-secure-score.md
103-
- name: What's new
104-
href: microsoft-secure-score-whats-new.md
105-
- name: Assess your security posture
106-
href: microsoft-secure-score-improvement-actions.md
107-
- name: Track your score history and meet goals
108-
href: microsoft-secure-score-history-metrics-trends.md
109-
- name: Data storage and privacy
110-
href: secure-score-data-storage-privacy.md
11161
- name: Protect your endpoints
11262
href: /defender-endpoint
11363
- name: Protect your identities
@@ -128,67 +78,51 @@
12878
href: /defender-for-identity/notifications?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
12979
- name: Protect your Office 365 workloads
13080
href: /defender-office-365
131-
- name: Create Custom Defender XDR reports
132-
href: defender-xdr-custom-reports.md
81+
- name: Microsoft Secure Score
82+
items:
83+
- name: Overview
84+
href: microsoft-secure-score.md
85+
- name: What's new
86+
href: microsoft-secure-score-whats-new.md
87+
- name: Assess your security posture
88+
href: microsoft-secure-score-improvement-actions.md
89+
- name: Track your score history and meet goals
90+
href: microsoft-secure-score-history-metrics-trends.md
91+
- name: Data storage and privacy
92+
href: secure-score-data-storage-privacy.md
13393
- name: Investigate and respond to threats
13494
items:
135-
- name: Overview
136-
href: incidents-overview.md
137-
- name: Correlation and merging
138-
href: alerts-incidents-correlation.md
139-
- name: Respond to incidents
140-
items:
141-
- name: Overview
142-
href: incident-response-overview.md
143-
- name: Prioritize incidents
144-
href: incident-queue.md
145-
- name: Manage incidents
146-
href: manage-incidents.md
147-
- name: Export incidents queue to CSV file
148-
href: export-incidents-queue.md
149-
- name: Investigate incidents
150-
items:
151-
- name: Incidents
152-
href: investigate-incidents.md
153-
- name: Unlink alerts from incidents
154-
href: unlink-alert-from-incident.md
155-
- name: Investigate data loss prevention alerts with Microsoft Defender XDR
156-
href: dlp-investigate-alerts-defender.md
157-
- name: Investigate data loss prevention alerts with Microsoft Sentinel
158-
href: dlp-investigate-alerts-sentinel.md
159-
- name: Investigate and respond to container threats
160-
href: investigate-respond-container-threats.md
161-
- name: Alerts
162-
href: investigate-alerts.md
163-
- name: Alert classification playbooks
164-
items:
165-
- name: Overview
166-
href: alert-classification-playbooks.md
167-
- name: Suspicious email forwarding activity
168-
href: alert-grading-playbook-email-forwarding.md
169-
- name: Suspicious inbox forwarding rules
170-
href: alert-grading-playbook-inbox-forwarding-rules.md
171-
- name: Suspicious inbox manipulation rules
172-
href: alert-grading-playbook-inbox-manipulation-rules.md
173-
- name: Suspicious password-spray-related IP address
174-
href: alert-classification-suspicious-ip-password-spray.md
175-
- name: Malicious exchange connectors
176-
href: alert-classification-malicious-exchange-connectors.md
177-
- name: Password spray attacks
178-
href: alert-classification-password-spray-attack.md
179-
- name: Entity pages
180-
items:
181-
- name: User
182-
href: investigate-users.md
183-
- name: Device
184-
href: entity-page-device.md
185-
- name: IP
186-
href: entity-page-ip.md
187-
- name: Incident response playbooks
188-
href: /security/operations/incident-response-playbooks
189-
- name: Investigate domains and URLs associated with Microsoft Defender XDR
190-
href: /defender-endpoint/investigate-domain
191-
- name: Manage automated investigation and response
95+
- name: Overview
96+
href: incidents-overview.md
97+
- name: Correlation and merging
98+
href: alerts-incidents-correlation.md
99+
- name: Prioritize incidents
100+
href: incident-queue.md
101+
- name: Manage incidents
102+
href: manage-incidents.md
103+
- name: Investigate incidents
104+
items:
105+
- name: Incidents
106+
href: investigate-incidents.md
107+
- name: Unlink alerts from incidents
108+
href: unlink-alert-from-incident.md
109+
- name: Alerts
110+
href: investigate-alerts.md
111+
- name: Entity pages
112+
items:
113+
- name: User
114+
href: investigate-users.md
115+
- name: Device
116+
href: entity-page-device.md
117+
- name: IP
118+
href: entity-page-ip.md
119+
- name: Investigate data loss prevention alerts with Microsoft Defender XDR
120+
href: dlp-investigate-alerts-defender.md
121+
- name: Investigate data loss prevention alerts with Microsoft Sentinel
122+
href: dlp-investigate-alerts-sentinel.md
123+
- name: Investigate and respond to container threats
124+
href: investigate-respond-container-threats.md
125+
- name: Configure and manage automated investigation and response
192126
items:
193127
- name: Overview
194128
href: m365d-autoir.md
@@ -204,21 +138,21 @@
204138
href: m365d-autoir-results.md
205139
- name: Address false positives and negatives
206140
href: m365d-autoir-report-false-positives-negatives.md
207-
- name: Manage automatic attack disruption
141+
- name: Manage attack disruption
208142
items:
209143
- name: Overview
210144
href: automatic-attack-disruption.md
211145
- name: Configure capabilities
212146
href: configure-attack-disruption.md
213147
- name: View details and results
214148
href: autoad-results.md
215-
- name: Manage the deception capability
149+
- name: Manage the deception capability
216150
items:
217151
- name: Overview
218152
href: deception-overview.md
219153
- name: Configure capabilities
220154
href: configure-deception.md
221-
- name: Search for threats with advanced hunting
155+
- name: Search for threats with advanced hunting
222156
items:
223157
- name: Overview
224158
href: advanced-hunting-overview.md
@@ -394,17 +328,15 @@
394328
href: advanced-hunting-limits.md
395329
- name: Extend data coverage
396330
href: advanced-hunting-extend-data.md
397-
- name: Track and respond to emerging threats
331+
- name: Track and respond to emerging threats
398332
items:
399333
- name: Threat analytics overview
400334
href: threat-analytics.md
401335
- name: Understand the analyst report
402336
href: threat-analytics-analyst-reports.md
403337
- name: Defender Threat Intelligence in Microsoft Defender XDR
404338
href: defender-threat-intelligence.md
405-
- name: Endpoint Attack Notifications
406-
href: /defender-endpoint/endpoint-attack-notifications
407-
- name: Collaborate with Microsoft Defender Experts for Hunting
339+
- name: Collaborate with Microsoft Defender Experts for Hunting
408340
items:
409341
- name: Overview
410342
href: defender-experts-for-hunting.md
@@ -420,7 +352,7 @@
420352
href: experts-on-demand.md
421353
- name: Understand Defender Experts for Hunting reports
422354
href: defender-experts-report.md
423-
- name: Collaborate with Microsoft Defender Experts for XDR
355+
- name: Collaborate with Microsoft Defender Experts for XDR
424356
items:
425357
- name: Overview
426358
href: dex-xdr-overview.md
@@ -458,7 +390,7 @@
458390
href: dex-xdr-permissions.md
459391
- name: Troubleshooting Defender Experts app permissions in Microsoft Teams
460392
href: teams-restrictions-dexapp.md
461-
- name: Investigate and respond with Microsoft Copilot in Microsoft Defender
393+
- name: Investigate and respond with Microsoft Copilot in Microsoft Defender
462394
items:
463395
- name: Overview
464396
href: security-copilot-in-microsoft-365-defender.md
@@ -478,12 +410,6 @@
478410
href: advanced-hunting-security-copilot.md
479411
- name: Create incident reports
480412
href: security-copilot-m365d-create-incident-report.md
481-
- name: Ransomware playbooks
482-
items:
483-
- name: Detecting human-operated ransomware attacks with Microsoft Defender XDR
484-
href: playbook-detecting-ransomware-m365-defender.md
485-
- name: Responding to ransomware attacks
486-
href: playbook-responding-ransomware-m365-defender.md
487413
- name: Enhance security operations
488414
items:
489415
- name: Security operations guide
@@ -561,7 +487,7 @@
561487
items:
562488
- name: Audit activities and events
563489
href: microsoft-xdr-auditing.md
564-
- name: Portal actions
490+
- name: Configure email notifications
565491
items:
566492
- name: Configure notifications
567493
items:
@@ -573,16 +499,14 @@
573499
href: m365d-threat-analytics-notifications.md
574500
- name: Configure alert notifications
575501
href: configure-email-notifications.md
576-
- name: Set time zone
577-
href: m365d-time-zone.md
578-
- name: Set up dynamic rules for devices
579-
href: configure-asset-rules.md
580-
- name: Provide feedback
581-
href: feedback.md
582-
- name: Provide managed service provider (MSSP) access
583-
href: mssp-access.md
502+
- name: Asset rule management
503+
href: configure-asset-rules.md
504+
- name: Provide managed service provider (MSSP) access
505+
href: mssp-access.md
584506
- name: Troubleshoot service issues
585-
href: troubleshoot.md
507+
href: troubleshoot.md
508+
- name: Create Custom Defender XDR reports
509+
href: defender-xdr-custom-reports.md
586510
- name: Microsoft Defender XDR APIs
587511
items:
588512
- name: Overview
@@ -649,8 +573,6 @@
649573
href: /defender-endpoint/technological-partners
650574
- name: Professional services supported by Microsoft Defender XDR
651575
href: /defender-endpoint/professional-services
652-
- name: Bi-directional connector for Microsoft Sentinel
653-
href: microsoft-365-defender-integration-with-azure-sentinel.md
654576
- name: Resources
655577
items:
656578
- name: Threat actor naming
@@ -666,7 +588,31 @@
666588
- name: Microsoft virus initiative
667589
href: virus-initiative-criteria.md
668590
- name: Software developer FAQ
669-
href: developer-faq.yml
591+
href: developer-faq.yml
592+
- name: Alert classification playbooks
593+
items:
594+
- name: Overview
595+
href: alert-classification-playbooks.md
596+
- name: Suspicious email forwarding activity
597+
href: alert-grading-playbook-email-forwarding.md
598+
- name: Suspicious inbox forwarding rules
599+
href: alert-grading-playbook-inbox-forwarding-rules.md
600+
- name: Suspicious inbox manipulation rules
601+
href: alert-grading-playbook-inbox-manipulation-rules.md
602+
- name: Suspicious password-spray-related IP address
603+
href: alert-classification-suspicious-ip-password-spray.md
604+
- name: Malicious Exchange connectors
605+
href: alert-classification-malicious-exchange-connectors.md
606+
- name: Password spray attacks
607+
href: alert-classification-password-spray-attack.md
608+
- name: Incident response playbooks
609+
href: /security/operations/incident-response-playbooks
610+
- name: Ransomware playbooks
611+
items:
612+
- name: Detecting human-operated ransomware attacks with Microsoft Defender XDR
613+
href: playbook-detecting-ransomware-m365-defender.md
614+
- name: Responding to ransomware attacks
615+
href: playbook-responding-ransomware-m365-defender.md
670616
- name: Microsoft Defender XDR docs
671617
items:
672618
- name: Defender for Office 365

defender-xdr/export-incidents-queue.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ ms.date: 07/11/2022
2727

2828

2929
**Applies to:**
30+
3031
- Microsoft Defender XDR
3132

3233
The **Export** feature allows you to export the data in the incident queue that is displayed according to the applied filters and time ranges. It's available in the form of a button named **Export**, as displayed in the following screenshot:
@@ -42,7 +43,8 @@ For example, for the data on the CSV file, you can apply filters to view the fol
4243
- Data regarding who is your most productive analyst.
4344

4445
> [!NOTE]
45-
> The maximum number of records you can export to a CSV file is 10,000.
46+
> The maximum number of records you can export to a CSV file is 10,000.
4647
4748
If you have thoughts or suggestions about the new **Export** feature (the **Export** button) for the incident queue, contact Microsoft team or send your feedback through the Microsoft Defender portal.
49+
4850
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/incident-queue.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 01/06/2025
21+
ms.date: 01/10/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -51,6 +51,17 @@ The incident queue has customizable columns that give you visibility into differ
5151

5252
:::image type="content" source="/defender/media/incidents-queue/incidents-ss-incidents-3.png" alt-text="Screenshot of Incident page filter and column controls." lightbox="/defender/media/incidents-queue/incidents-ss-incidents-3.png":::
5353

54+
The **Export** feature allows you to export the data in the incident queue that is displayed according to the applied filters and time ranges. It's available in the form of a button named **Export**, as displayed in the following screenshot:
55+
56+
:::image type="content" source="/defender/media/defender/incidents-queue-with-export-button.png" alt-text="Shows the Export button in the Incidents page of the Microsoft Defender portal":::
57+
58+
When you click the **Export** button, the data is exported to a CSV file. You can apply various filters and time ranges to the incidents queue (not just in the context of exporting the data, but in a generic context). When you select **Export**, whichever filters and/or time ranges are applied to the incidents queue, such data is exported to the CSV file.
59+
60+
Once you export the incidents queue-related data onto the CSV file, you can analyze the data and filter it further, based on your requirements.
61+
62+
> [!NOTE]
63+
> The maximum number of records you can export to a CSV file is 10,000.
64+
5465
### Incident names
5566

5667
For more visibility at a glance, Microsoft Defender XDR generates incident names automatically, based on alert attributes such as the number of endpoints affected, users affected, detection sources, or categories. This specific naming allows you to quickly understand the scope of the incident.

0 commit comments

Comments
 (0)