Skip to content

Commit 56b0909

Browse files
authored
Merge pull request #1033 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents 37d3352 + 9d09731 commit 56b0909

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

defender-endpoint/mde-plugin-wsl.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 06/12/2024
18+
ms.date: 07/26/2024
1919
search.appverid: MET150
2020
---
2121

@@ -293,6 +293,8 @@ DeviceProcessEvents
293293
dnsProxy=false
294294
```
295295

296+
- If the connectivity issues persist, collect the networking logs using the method mentioned at [link](https://aka.ms/wsllogs), and include those logs with your support bundle.
297+
296298
5. If you run into any other challenges or issues, open Terminal, and run the following commands to generate a support bundle:
297299

298300
```powershell
@@ -346,4 +348,4 @@ DeviceProcessEvents
346348

347349
This should fix the problem by placing the right files in the expected directories.
348350

349-
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
351+
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::

defender-xdr/alert-grading-playbook-inbox-forwarding-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: conceptual
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 04/03/2024
20+
ms.date: 07/26/2024
2121
---
2222

2323
# Alert classification for suspicious inbox forwarding rules
@@ -29,7 +29,7 @@ ms.date: 04/03/2024
2929

3030
Threat actors can use compromised user accounts for several malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, sending phishing mails, among others. Malicious inbox rules are widely common during business email compromise (BEC) and phishing campaigns, and it important to monitor them consistently.
3131

32-
This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a true positive (TP) or a false positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
32+
This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a true positive (TP) or a false positive (FP). You can then take recommended actions for the TP alerts to remediate the attack.
3333

3434
For an overview of alert classification for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-classification-playbooks.md).
3535

0 commit comments

Comments
 (0)