Skip to content

Commit 5211c22

Browse files
authored
Merge pull request #2084 from MicrosoftDocs/main
Published main to live, Tuesday 10:30 AM PST, 12/03
2 parents cc392db + 70d3838 commit 5211c22

File tree

9 files changed

+62
-35
lines changed

9 files changed

+62
-35
lines changed

ATPDocs/investigate-assets.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,9 @@ Find identity information in the following Microsoft Defender XDR areas:
4545

4646
For example, the following image shows the details on an identity details page:
4747

48-
:::image type="content" source="media/investigate-assets/identity-details.png" alt-text="Screenshot of an identity details page." lightbox="media/investigate-assets/identity-details.png":::
48+
![Screenshot of a specific user's page in the Microsoft Defender portal.](media/investigate-assets/image.png)
49+
50+
4951

5052
### Identity details
5153

@@ -60,6 +62,10 @@ When you investigate a specific identity, you'll see the following details on an
6062
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline) | The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br>Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
6163
|[Remediation actions](/microsoft-365/security/defender/investigate-users#remediation-actions) | Respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the Microsoft Defender XDR **Action center.|
6264

65+
> [!NOTE]
66+
> **Investigation Priority Score** has been deprecated on December 3, 2025. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
67+
68+
6369
For more information, see [Investigate users](/microsoft-365/security/defender/investigate-users) in the Microsoft Defender XDR documentation.
6470

6571
## Investigation steps for suspicious groups
150 KB
Loading

CloudAppSecurityDocs/app-governance-anomaly-detection-alerts.md

Lines changed: 25 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,31 @@ For more information, see [App governance in Microsoft Defender for Cloud Apps](
2020
> - [Access Microsoft Graph activity logs](/graph/microsoft-graph-activity-logs-overview)
2121
> - [Analyze activity logs using Log Analytics](/entra/identity/monitoring-health/howto-analyze-activity-logs-log-analytics)
2222
>
23+
## General investigation steps
24+
25+
### Finding App Governance Related Alerts
26+
27+
To locate alerts specifically related to App Governance, navigate to the XDR portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
28+
29+
### General Guidelines
30+
31+
Use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
32+
33+
- Review the app severity level and compare with the rest of the apps in your tenant. This review helps you identify which Apps in your tenant pose the greater risk.
34+
- If you identify a TP, review all the App activities to gain an understanding of the impact. For example, review the following App information:
35+
36+
- Scopes granted access
37+
- Unusual behavior
38+
- IP address and location
39+
40+
## Security alert classifications
41+
42+
Following proper investigation, all app governance alerts can be classified as one of the following activity types:
43+
44+
- **True positive (TP)**: An alert on a confirmed malicious activity.
45+
- **Benign true positive (B-TP)**: An alert on suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.
46+
- **False positive (FP)**: An alert on a non-malicious activity.
47+
2348
## MITRE ATT&CK
2449

2550
To make it easier to map the relationship between app governance alerts and the familiar MITRE ATT&CK Matrix, we've categorized the alerts by their corresponding MITRE ATT&CK tactic. This extra reference makes it easier to understand the suspected attacks technique potentially in use when app governance alert is triggered.
@@ -38,25 +63,6 @@ This guide provides information about investigating and remediating app governan
3863
- [Exfiltration](#exfiltration-alerts)
3964
- [Impact](#impact-alerts)
4065

41-
## Security alert classifications
42-
43-
Following proper investigation, all app governance alerts can be classified as one of the following activity types:
44-
45-
- **True positive (TP)**: An alert on a confirmed malicious activity.
46-
- **Benign true positive (B-TP)**: An alert on suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.
47-
- **False positive (FP)**: An alert on a nonmalicious activity.
48-
49-
## General investigation steps
50-
51-
Use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
52-
53-
- Review the app severity level and compare with the rest of the apps in your tenant. This review helps you identify which Apps in your tenant pose the greater risk.
54-
- If you identify a TP, review all the App activities to gain an understanding of the impact. For example, review the following App information:
55-
56-
- Scopes granted access
57-
- Unusual behavior
58-
- IP address and location
59-
6066
## Initial access alerts
6167

6268
This section describes alerts indicating that a malicious app may be attempting to maintain their foothold in your organization.

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,23 @@ For editable functions, more options are available when you select the vertical
4343
- **Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
4444
- **Delete** – deletes the function
4545

46+
### Use adx() operator for Azure Data Explorer queries (Preview)
47+
Use the `adx()` operator to query tables stored in Azure Data Explorer. Read [What is Azure Data Explorer?](/azure/data-explorer/data-explorer-overview) for more details.
48+
49+
This feature was previously only available in log analytics in Microsoft Sentinel. Users can now use the operator in advanced hunting in the unified Microsoft Defender portal without needing to manually open a Microsoft Sentinel window.
50+
51+
In the query editor, enter the query in the following format:
52+
```Kusto
53+
adx('<Cluster URI>/<Database Name>').<Table Name>
54+
```
55+
56+
For example, to get the first 10 rows of data from the `StormEvents` table stored in a certain URI:
57+
58+
:::image type="content" source="/defender-xdr/media/adx-sample.png" alt-text="Screenshot of adx operator in advanced hunting." lightbox="/defender-xdr/media/adx-sample.png":::
59+
60+
4661
### Use arg() operator for Azure Resource Graph queries
47-
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
62+
The `arg()` operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
4863

4964
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.
5065

defender-xdr/investigate-users.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ Wherever user entities appear in these views, select the entity to view the **Us
4343

4444
When you investigate a specific user entity, you see the following tabs on its entity page:
4545

46-
- [Overview](#overview), including entity details, incidents and alerts visual view, investigation priority, and scored timeline
46+
- [Overview](#overview), including entity details, incidents and alerts visual view, user account control flags and so on.
47+
4748
- [Incidents and alerts](#incidents-and-alerts) tab
4849
- [Observed in organization](#observed-in-organization) tab
4950
- [Timeline](#timeline) tab
@@ -58,26 +59,21 @@ The user page shows the Microsoft Entra organization as well as groups, helping
5859

5960
The **Entity details** panel on the left side of the page provides information about the user, such as the Microsoft Entra identity risk level, the insider risk severity level (Preview), the number of devices the user is signed in to, when the user was first and last seen, the user's accounts, groups that the user belongs to, contact information, and more. You see other details depending on the integration features you enabled.
6061

62+
> [!NOTE]
63+
> **Investigation Priority Score** has been deprecated on December 3, 2025. As a result, both the Investigation Priority Score breakdown and the Scored activities cards have been removed from the UI.
64+
6165
> [!NOTE]
6266
> (Preview) Microsoft Defender XDR users with access to [Microsoft Purview Insider Risk Management](/purview/insider-risk-management-solution-overview) can now see a user's insider risk severity and gain insights on a user's suspicious activities in the user page. Select the **insider risk severity** under Entity details to see the risk insights about the user.
6367
### Visual view of incidents and alerts
6468

6569
This card includes all incidents and alerts associated with the user entity, grouped by severity.
6670

67-
### Investigation priority
68-
69-
This card includes the user entity's calculated investigation priority score breakdown, and a two-week trend for that score, including the percentile of the score in relation to the tenant.
70-
7171
### Active directory account controls
7272

7373
This card surfaces Microsoft Defender for Identity security settings that may need your attention. You can see important flags about the user's account settings, such as if the user can press enter to bypass the password, and if the user has a password that never expires, etc.
7474

7575
For more information, see [User Account Control flags](/windows/win32/adschema/a-useraccountcontrol).
7676

77-
### Scored activities
78-
79-
This card includes all activities and alerts contributing to the entity's investigation priority score over the last seven days.
80-
8177
### Organization tree
8278

8379
This section shows the user entity's place in the organizational hierarchy as reported by Microsoft Defender for Identity.
@@ -90,7 +86,7 @@ Microsoft Defender for Identity pulls tags out of Active Directory to give you a
9086
|-----|-------------|
9187
| **New** | Indicates that the entity was created less than 30 days ago. |
9288
| **Deleted** | Indicates that the entity was permanently deleted from Active Directory. |
93-
| **Disabled** | Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object is not currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
89+
| **Disabled** | Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object is not currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
9490
| **Enabled** | Indicates that the entity is currently enabled in Active Directory, indicating that the entity is currently in use, and can be used to sign in or perform actions in the domain. |
9591
| **Expired** | Indicates that the entity is expired in Active Directory. When a user account is expired, the user is no longer able to log in to the domain or access any network resources. The expired account is essentially treated as if it were disabled, but with an explicit expiration date set. <br><br>Any services or applications that the user was authorized to access may also be affected, depending on how they are configured. |
9692
| **Honeytoken** | Indicates that the entity is manually tagged as a honeytoken. |
@@ -104,7 +100,7 @@ For more information, see [Defender for Identity entity tags in Microsoft Defend
104100
> [!NOTE]
105101
> The organization tree section and the account tags are available when a Microsoft Defender for Identity license is available.
106102
107-
:::image type="content" source="/defender/media/investigate-users/user-incident-overview.png" alt-text="Screenshot of a specific user's page in the Microsoft Defender portal" lightbox="/defender/media/investigate-users/user-incident-overview.png":::
103+
![Screenshot of a specific user's page in the Microsoft Defender portal.](media/investigate-users/image.png)
108104

109105
## Incidents and alerts
110106

@@ -247,10 +243,11 @@ From the Overview page, you can do these additional actions:
247243

248244
- Enable, disable, or suspend the user in Microsoft Entra ID
249245
- Direct user to do certain actions such as require the user to sign in again or force password reset
250-
- Reset investigation priority score for the user
251246
- View Microsoft Entra account settings, related governance, the user's owned files, or the user's shared files
252247

253-
:::image type="content" source="/defender/media/investigate-users/user-incident-actions.png" alt-text="Screenshot of the actions for remediation for a user in the Microsoft Defender portal" lightbox="/defender/media/investigate-users/user-incident-actions.png":::
248+
![Screenshot of the actions for remediation for a user in the Microsoft Defender portal.](media/investigate-users/picture1111.png)
249+
250+
254251

255252
For more information, see [Remediation actions in Microsoft Defender for Identity](/defender-for-identity/remediation-actions).
256253

defender-xdr/media/adx-sample.png

269 KB
Loading
161 KB
Loading
905 KB
Loading

defender-xdr/whats-new.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ For more information on what's new with other Microsoft Defender security produc
2929

3030
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3131

32+
## December 2024
33+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries-preview), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
34+
3235
## November 2024
3336

3437
- (Preview) **Attack paths** in the incident graph are now available in the Microsoft Defender portal. The attack story now includes potential attack paths that show the paths that attackers can potentially take after compromising a device. This feature helps you prioritize your response efforts. For more information, see [attack paths in the attack story](investigate-incidents.md#attack-paths).
@@ -42,7 +45,7 @@ You can also get product updates and important notifications through the [messag
4245
## October 2024
4346

4447
- [Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
45-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
48+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the `arg()` operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
4649

4750
## September 2024
4851

0 commit comments

Comments
 (0)