You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/microsoft-365-security-center-mde.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,21 +63,21 @@ Proactively search for threats, malware, and malicious activity across your endp
63
63
64
64
[Custom detection rules](custom-detection-rules.md) can be built from advanced hunting queries to help you proactively watch for events that might be indicative of breach activity and misconfigured devices.
65
65
66
-
#### Actions and submissions
66
+
#### Action center and submissions
67
67
68
-
The [Action center](m365d-action-center.md) shows you the investigations created by automated investigation and response capabilities. This automated, self-healing in the Microsoft Defender portal can help security teams by automatically responding to specific events. You can view actions applied to devices, the status of the actions, and approve or reject the automated actions.
68
+
The [Action center](m365d-action-center.md) shows you the investigations created by automated investigation and response capabilities. This automated self-healing in the Microsoft Defender portal can help security teams by automatically responding to specific events. You can view actions applied to devices, the status of the actions, and approve or reject the automated actions. Navigate to the Action center page under **Investigation & response > Actions & submissions > Action center**.
69
69
70
70
:::image type="content" source="/defender/media/portal/mde-in-portal/action-center-mde-small.png" alt-text="Screenshot of the Action center in the Microsoft Defender portal." lightbox="/defender/media/portal/mde-in-portal/action-center-mde.png":::
71
71
72
-
You can submit files, email attachments, and URLs to Microsoft Defender for analysis in the [Submission portal](submission-guide.md). You can also view the status of the submissions and the results of the analysis.
72
+
You can submit files, email attachments, and URLs to Microsoft Defender for analysis in the [Submission portal](/defender-endpoint/admin-submissions-mde.md). You can also view the status of the submissions and the results of the analysis. Navigate to the submssions page under **Investigation & response > Actions & submissions > Submissions**.
73
73
74
74
### Device inventory
75
75
76
76
The **Assets > Devices** page contains the [device inventory](/defender-endpoint/machines-view-overview), which lists all the devices in your organization where alerts were generated. You can view the details of the devices, including the IP address, criticality level, device category, and device type.
77
77
78
78
:::image type="content" source="/defender/media/portal/mde-in-portal/device-inventory-mde-small.png" alt-text="Screenshot of the Device inventory page in the Microsoft Defender portal." lightbox="/defender/media/portal/mde-in-portal/device-inventory-mde.png":::
79
79
80
-
### Microsoft Defender for Vulnerability Management and configuration management
80
+
### Microsoft Defender for Vulnerability Management and endpoint configuration management
81
81
82
82
You can find [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) dashboard under **Endpoints > Vulnerability management**. Defender for Vulnerability Management helps you discover, prioritize, and remediate vulnerabilities in your network. Know more about [prerequisites and permissions](/defender-vulnerability-management/tvm-prerequisites) and how to [onboard devices to Defender Vulnerability Management](/defender-vulnerability-management/mdvm-onboard-devices.md).
83
83
@@ -118,7 +118,7 @@ To manage roles, permissions, and device groups for endpoints, navigate to *Perm
118
118
119
119
Alternately, you can navigate to *Endpoints roles & groups* in the **System > Permissions** page.
120
120
121
-
#### APIs and MSSP
121
+
#### APIs and MSSPs
122
122
123
123
The Microsoft Defender XDR alerts API is the official API that enables customers to work with alerts across all Defender XDR products using a single integration. For more information, see [Migrate from the MDE SIEM API to the Microsoft Defender XDR alerts API](/defender-endpoint/configure-siem).
124
124
@@ -133,7 +133,7 @@ You can create rules and policies to manage indicators, filter web content, mana
-[Filter web content](/defender-endpoint/web-content-filtering)
135
135
136
-
#### Configuration management
136
+
#### Security setting management
137
137
138
138
In **Settings > Endpoints > Configuration management > Enforcement scope**, you can allow Microsoft Intune security settings to be enforced by Microsoft Defender for Endpoint. For more information, see [Use Microsoft Intune to configure and manage Microsoft Defender Antivirus](/defender-endpoint/use-intune-config-manager-microsoft-defender-antivirus).
0 commit comments