Skip to content

Commit 4f87fc9

Browse files
Merge pull request #2477 from MicrosoftDocs/main
Publish main to live, 01/17/25, 10:30 AM PT
2 parents ee8597b + 39b2450 commit 4f87fc9

10 files changed

+49
-68
lines changed

defender-endpoint/respond-machine-alerts.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,9 @@ Or, use this alternate procedure:
114114
4. Select **Package collection package available** to download the collection package.
115115

116116
![Image of download package](media/download-package.png)
117+
118+
> [!NOTE]
119+
> The collection of the investigation package may fail if a device has a low battery level or is on a metered connection.
117120
118121
### Investigation package contents for Windows devices
119122

defender-xdr/TOC.yml

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,9 @@
121121
- name: Investigate data loss prevention alerts with Microsoft Sentinel
122122
href: dlp-investigate-alerts-sentinel.md
123123
- name: Investigate and respond to container threats
124-
href: investigate-respond-container-threats.md
124+
href: investigate-respond-container-threats.md
125+
- name: Investigate insider risk threats
126+
href: irm-investigate-alerts-defender.md
125127
- name: Configure and manage automated investigation and response
126128
items:
127129
- name: Overview
@@ -428,15 +430,6 @@
428430
href: integrate-microsoft-365-defender-secops-use-cases.md
429431
- name: Step 6. SOC maintenance tasks
430432
href: integrate-microsoft-365-defender-secops-tasks.md
431-
- name: Optimize your security operations
432-
items:
433-
- name: SOC optimization overview
434-
display name: SOC optimization
435-
href: /azure/sentinel/soc-optimization/soc-optimization-access?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
436-
- name: Use SOC optimizations programmatically
437-
href: /azure/sentinel/soc-optimization/soc-optimization-api?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
438-
- name: SOC optimization reference
439-
href: /azure/sentinel/soc-optimization/soc-optimization-reference?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
440433
- name: Manage multitenant environments
441434
items:
442435
- name: Overview

defender-xdr/configure-email-notifications.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 07/08/2024
15+
ms.date: 01/17/2025
1616
---
1717

1818
# Configure alert notifications
@@ -43,9 +43,10 @@ If you're using role-based access control (RBAC), recipients will only receive n
4343
The email notification includes basic information about the alert and a link to the portal where you can do further investigation.
4444

4545
## Create rules for alert notifications
46+
4647
You can create rules that determine the devices and alert severities to send email notifications for and the notification recipients.
4748

48-
1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
4950

5051
2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Email notifications**.
5152

@@ -102,5 +103,5 @@ This section lists various issues that you may encounter when using email notifi
102103
- [Update data retention settings](/defender-endpoint/preferences-setup)
103104
- [Configure advanced features](/defender-endpoint/advanced-features)
104105
- [Configure vulnerability email notifications](/defender-endpoint/configure-vulnerability-email-notifications)
105-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
106106

107+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/faq-managed-response.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
- cx-ti
1717
- cx-dex
1818
search.appverid: met150
19-
ms.date: 01/16/2025
19+
ms.date: 01/17/2025
2020
---
2121

2222
# Understanding Managed response
@@ -30,7 +30,7 @@ The following section lists down questions you or your SOC team might have regar
3030
| Questions | Answers |
3131
|---------|---------|
3232
|**What is Managed response?** | Microsoft Defender Experts for XDR offers **Managed response** where our experts manage the entire remediation process for incidents that require them. This process includes investigating the incident to identify the root cause, determining the required response actions, and taking those actions on your behalf.|
33-
|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Coming soon)*<ul><li>Disable user<br><li>Enable user<br><li>Revoke refresh token<br><li>Soft delete emails</ul> |
33+
|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Available now)*<ul><li>Disable user<br><li>Enable user</ul><br>*For users (Coming soon)*<ul><li>Revoke refresh token<br><li>Soft delete emails</ul> |
3434
|**Can I customize the extent of Managed response?** | You can configure the extent to which our experts do Managed response actions on your behalf by excluding certain devices and users (individually or by groups) either during onboarding or later by modifying your service's settings. [Read more about excluding device groups](get-started-xdr.md#exclude-devices-and-users-from-remediation) |
3535
|**What support do Defender Experts offer for excluded assets?** | If our experts determine that you need to perform response actions on excluded devices or users, we notify you through various customizable methods and direct you to your Microsoft Defender XDR portal. From your portal, you can then view a detailed summary of our investigation process and the required response actions in the portal and perform these required actions directly. Similar capabilities are also available through Defender APIs, in case you prefer using a security information and event management (SIEM), IT service management (ITSM), or any other third-party tool. |
3636
|**How am I going to be informed about the response actions?** | Response actions that our experts have completed on your behalf and any pending ones that you need to perform on your excluded assets are displayed in the **Managed response** panel in your Defender portal's **Incidents** page. <br><br>In addition, you'll also receive an email containing a link to the incident and instructions to view the Managed response in the portal. Moreover, if you have integration with Microsoft Sentinel or APIs, you'll also be notified within those tools by looking for Defender Experts statuses. For more information, see [FAQs related to Microsoft Defender Experts for XDR incident notifications](faq-incident-notifications-xdr.md).|

defender-xdr/m365d-notifications-incidents.md

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,18 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 07/08/2024
19+
ms.date: 01/17/2025
20+
appliesto:
21+
- Microsoft Defender XDR
2022
---
2123

2224
# Get incident notifications by email
2325

2426
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2527

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3028
[!INCLUDE [Prerelease](../includes/prerelease.md)]
3129

32-
You can set up Microsoft Defender XDR to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
30+
You can set up email notifications for your staff to get notified about new incidents or updates to existing incidents. You can choose to get notifications based on:
3331

3432
- Alert severity
3533
- Alert sources
@@ -59,32 +57,28 @@ Likewise, if your organization is using role-based access control (RBAC), you ca
5957

6058
Follow these steps to create a new rule and customize email notification settings.
6159

62-
1. Go to [Microsoft Defender XDR](https://security.microsoft.com) in the navigation pane, select **Settings > Microsoft Defender XDR > Incident email notifications**.
63-
2. Select **Add item**.
60+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com). In the navigation pane, select **Settings > Microsoft Defender XDR**, then select **Email notifications** under General.
61+
2. In the **Incidents** tab, select **Add incident notification rule**.
6462
3. On the **Basics** page, type the rule name and a description, and then select **Next**.
6563
4. On the **Notification settings** page, configure:
66-
- **Alert severity** - Choose the alert severities that will trigger an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
64+
- **Alert severity** - Choose the alert severities that triggers an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
6765
- **Device group scope** - You can specify all device groups or select from the list of device groups in your tenant.
6866
- **Send only one notification per incident** - Select if you want one notification per incident.
6967
- **Include organization name in the email** - Select if you want your organization name to appear in the email notification.
7068
- **Include tenant-specific portal link** - Select if you want to add a link with the tenant ID in the email notification for access to a specific Microsoft 365 tenant.
7169

72-
:::image type="content" source="/defender/media/get-incident-notifications/incidents-email-notification-settings.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="/defender/media/get-incident-notifications/incidents-email-notification-settings.png":::
70+
:::image type="content" source="/defender/media/get-incident-notifications/incident-notif-settings-small.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="/defender/media/get-incident-notifications/incident-notif-settings.png":::
7371

74-
5. Select **Next**. On the **Recipients** page, add the email addresses that will receive the incident notifications. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
72+
5. Select **Next**. On the **Recipients** page, add the email addresses where the incident notifications are to be sent. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
7573
6. Select **Next**. On the **Review rule** page, review the settings of the rule, and then select **Create rule**. Recipients will start receiving incident notifications through email based on the settings.
7674

7775
To edit an existing rule, select it from the list of rules. On the pane with the rule name, select **Edit rule** and make your changes on the **Basics**, **Notification settings**, and **Recipients** pages.
7876

7977
To delete a rule, select it from the list of rules. On the pane with the rule name, select **Delete**.
8078

81-
Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md).
79+
Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents](investigate-incidents.md).
8280

8381
## Next steps
8482

8583
- [Get email notifications on response actions](m365d-response-actions-notifications.md)
8684
- [Get email notifications about new reports in Threat analytics](m365d-threat-analytics-notifications.md)
87-
88-
## See also
89-
90-
- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)

defender-xdr/m365d-response-actions-notifications.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Get email notifications for response actions in Microsoft Defender XDR
2+
title: Get email notifications for response actions
33
description: Set up email notifications to get notified of manual and automated response actions in Microsoft Defender XDR.
44
ms.service: defender-xdr
55
f1.keywords:
@@ -16,24 +16,22 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 07/08/2024
19+
ms.date: 01/17/2025
20+
appliesto:
21+
- Microsoft Defender XDR
2022
---
2123

22-
# Get email notifications for response actions in Microsoft Defender XDR
24+
# Get email notifications for response actions
2325

2426
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2527

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3028
[!INCLUDE [Prerelease](../includes/prerelease.md)]
3129

32-
You can set up Microsoft Defender XDR to notify you through email about manual or automated response actions.
30+
You can set up email notifications in the Microsoft Defender portal to notify you about manual or automated response actions.
3331

34-
[Manual response actions](respond-first-incident-remediate.md#manual-remediation) are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.
32+
Manual response actions are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.
3533

36-
[Automated response actions](respond-first-incident-remediate.md#automatic-remediation), on the other hand, are capabilities in Microsoft Defender XDR that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).
34+
Automated response actions are capabilities in Microsoft Defender XDR that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).
3735

3836
> [!NOTE]
3937
> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. Likewise, if your organization is using [role-based access control (RBAC)](manage-rbac.md), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
@@ -48,7 +46,7 @@ You can set up Microsoft Defender XDR to notify you through email about manual o
4846
4947
To create a rule for email notifications, perform the following steps:
5048

51-
1. In the navigation pane of Microsoft Defender XDR, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
49+
1. In the navigation pane of the Microsoft Defender portal, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
5250
:::image type="content" source="/defender/media/m35d-response-actions-notifications/fig1-response-notifications.png" alt-text="Actions tab in the Microsoft Defender XDR Settings page" lightbox="/defender/media/m35d-response-actions-notifications/fig1-response-notifications.png":::
5351
2. Select **Add notification rule**. Add a rule name and description under Basics. Both Name and Description fields accept letters, numbers, and spaces only.
5452
:::image type="content" source="/defender/media/m35d-response-actions-notifications/fig2-response-notifications.png" alt-text="Basics section of the add notification rule" lightbox="/defender/media/m35d-response-actions-notifications/fig2-response-notifications.png":::

0 commit comments

Comments
 (0)