Skip to content

Commit 55041c8

Browse files
authored
Merge pull request #2419 from meganbradley/meganbradley/docutune-autopr-20250111-054319-1409982-ignore-build
[BULK] - DocuTune remediation - Red Tiger deprecation (part 8)
2 parents 1664da2 + bd18ae2 commit 55041c8

7 files changed

+17
-17
lines changed

defender-xdr/pilot-deploy-defender-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ Use these Defender for Cloud Apps tutorials to help you discover risk and protec
250250
- [Protect your files with admin quarantine](/cloud-app-security/use-case-admin-quarantine)
251251
- [Require step-up authentication upon risky action](/cloud-app-security/tutorial-step-up-authentication)
252252

253-
For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see this [video](https://www.microsoft.com/en-us/videoplayer/embed/RWFISa).
253+
For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see this [video](https://learn-video.azurefd.net/vod/player?id=ffdedc73-6edf-45a9-8c90-566296e8d4ec).
254254

255255
## SIEM integration
256256

defender-xdr/pilot-deploy-defender-endpoint.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The [Plan deployment](/defender-endpoint/deployment-strategy) topic outlines the
131131

132132
Watch this video for a quick overview of the onboarding process and learn about the available tools and methods.
133133

134-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bGqr]
134+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2524ee5d-6a5f-482c-8f69-dc3792577c60]
135135
136136
### Onboarding tool options
137137

@@ -213,4 +213,4 @@ Continue your end-to-end deployment of Microsoft Defender XDR with [Pilot and de
213213

214214
:::image type="content" source="./media/eval-defender-xdr/defender-xdr-pilot-deploy-flow-cloud-apps.svg" alt-text="A diagram that shows Microsoft Defender for Cloud Apps in the pilot and deploy Microsoft Defender XDR process." lightbox="./media/eval-defender-xdr/defender-xdr-pilot-deploy-flow-cloud-apps.svg" border="false":::
215215

216-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
216+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/pilot-deploy-investigate-respond.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Defender for Office 365 with Microsoft 365 E5 or Microsoft Defender for Office 3
9696

9797
For step by step instructions on how to gain insights with reporting, see [Gain insights through attack simulation training](/defender-office-365/attack-simulation-training-insights).
9898

99-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMhvB]
99+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=37f13948-e44b-4d1a-ac3b-a13ce02dabec]
100100
101101
For more information, see [Simulations](/defender-office-365/attack-simulation-training-get-started#simulations).
102102

@@ -209,7 +209,7 @@ To see the Automated Incident and Response feature in action, keep the notepad.e
209209
> [!NOTE]
210210
> Before we walk you through this simulation, watch the following video to see how incident management helps you piece the related alerts together as part of the investigation process, where you can find it in the portal, and how it can help you in your security operations:
211211
212-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Bzwz?]
212+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=208a5393-24b6-4f17-8523-e78bdb5a34cc?]
213213
214214
Switching to the SOC analyst point of view, you can now start to investigate the attack in the Microsoft Defender portal.
215215

@@ -318,7 +318,7 @@ Select the user name to open the user's profile page where further investigation
318318
> [!NOTE]
319319
> Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
320320
321-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4BzwB]
321+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=340dee63-452a-4d4b-9ca3-562206a4bc23]
322322
323323
Navigate back to the incident in the Microsoft Defender portal. The **Investigations** tab in the **Incident** page shows the automated investigations that were triggered by Microsoft Defender for Identity and Microsoft Defender for Endpoint. The screenshot below displays only the automated investigation triggered by Defender for Endpoint. By default, Defender for Endpoint automatically remediates the artifacts found in the queue, which requires remediation.
324324

@@ -443,7 +443,7 @@ For more information, see [Automated investigation and response](m365d-autoir.md
443443
444444
<br>
445445

446-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Bp7O]
446+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=197cbd32-a06e-4efc-ade0-0c9875d7b105]
447447
448448

449449
If the [optional fileless PowerShell attack simulation](pilot-deploy-investigate-respond.md#simulate-an-attack-with-an-isolated-domain-controller-and-client-device-optional) were a real attack that had already reached the credential access stage, you can use advanced hunting at any point in the investigation to proactively search through events and records in the network using what you already know from the generated alerts and affected entities.

defender-xdr/respond-first-incident-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ You can contribute to [incident management](manage-incidents.md) efficiency by p
8686

8787
Learn how to classify incidents and alerts through this video:
8888

89-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4LHJq]
89+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=e2ff3e56-0f6e-4f9a-996e-25dabd77ebe7]
9090
9191
> [!TIP]
9292
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.

defender-xdr/respond-first-incident-analyze.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The following videos discuss how to investigate phishing and BEC attacks in Micr
9090
- **Video**: [Investigating BEC and AiTM phishing in Microsoft Defender XDR](https://youtu.be/h9YEr9XwALU)
9191
- **Video**: Defending against spearphishing and phishing using Defender for Office 365
9292

93-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5bzVE]
93+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=9a0111a4-0f85-4e72-8ba5-2ba8793d02a5]
9494
9595
Investigate an identity compromise and know what you can do to contain an attack through this video:
9696

@@ -118,7 +118,7 @@ Discover how you can protect your cloud apps in real time with this video of the
118118

119119
- **Video**: Protecting cloud apps and related files through Defender for Cloud Apps
120120

121-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5d0tz]
121+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=e42eaceb-9b72-4836-a5dc-487f21fc8118]
122122
123123
### Breach analysis
124124

@@ -138,13 +138,13 @@ Attackers often use vulnerabilities to gain access to an organization. Some rans
138138
- **Tutorial**: [Assess your organization's risk through the Exposure score](/defender-vulnerability-management/tvm-exposure-score)
139139
- **Video**: Threat and vulnerability management via Defender Vulnerability Management
140140

141-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4XTiJ]
141+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=f61aabec-2b0d-48d0-b053-e65f7a188a69]
142142
143143
Breaches also happen through various devices like phones and tablets that connect to your organization's network. Incident responders can further investigate these devices within the portal. The following video talks about the top threats from mobile devices and how you can investigate these:
144144

145145
- Mobile threat defense in Microsoft Defender XDR
146146

147-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW10icV]
147+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=94fd2a87-fa6b-448f-8dfd-362e945dabbb]
148148
149149
## Resources for threat intelligence and hunting
150150

@@ -154,7 +154,7 @@ Microsoft Defender XDR's built-in threat intelligence capabilities and hunting a
154154

155155
Use the intelligence in Threat analytics to deep dive into new threats with the following video:
156156

157-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
157+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=1a28b04c-d413-462f-85b0-9478f01c89c2]
158158
159159
Proactively hunt for threats within the organization using the portal's built-in [advanced hunting](advanced-hunting-overview.md) capability.
160160

defender-xdr/respond-first-incident-remediate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Microsoft Defender XDR leverages its threat intelligence and the signals within
3939

4040
Learn how automatic attack disruption helps in incident response:
4141

42-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW10OoF]
42+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=4f299e61-5655-4e32-8713-cd9c72ba620e]
4343
4444
Meanwhile, Microsoft Defender XDR's [automated investigation and response](m365d-autoir.md) capabilities can automatically investigate and apply remediation actions to malicious and suspicious items. These capabilities scale investigation and resolution to threats, freeing incident responders to focus their efforts on high-impact attacks.
4545

@@ -59,7 +59,7 @@ Playbooks use Power Automate to create custom robotic process automation flows t
5959

6060
Learn how Power Automate can help you automate your incident response through this video:
6161

62-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWFIRn]
62+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=01afebcb-850c-4a6f-abb4-692188ac6de7]
6363
6464
## Manual remediation
6565

defender-xdr/streaming-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ ms.date: 07/25/2023
3232

3333
Microsoft Defender XDR supports streaming events through [Advanced Hunting](advanced-hunting-overview.md) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/event-hubs/).
3434

35-
For more information on Microsoft Defender XDR streaming API, see the [video](https://www.microsoft.com/en-us/videoplayer/embed/RE4r4ga).
35+
For more information on Microsoft Defender XDR streaming API, see the [video](https://learn-video.azurefd.net/vod/player?id=56edfb3f-b612-4e4c-acb9-4bbd141bd535).
3636

3737
## In this section
3838

@@ -43,7 +43,7 @@ Topic | Description
4343
[Supported event types](supported-event-types.md) | Learn which Advanced Hunting event types the Streaming API supports.
4444

4545
Watch this short video to learn how to set up the streaming API to ship event information directly to Azure Event hubs for consumption by visualization services, data processing engines, or Azure storage for long-term data retention.
46-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4r4ga]
46+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=56edfb3f-b612-4e4c-acb9-4bbd141bd535]
4747
4848
## Related topics
4949

0 commit comments

Comments
 (0)