Skip to content

Commit 5798d9d

Browse files
updating files
1 parent 238488f commit 5798d9d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

defender-xdr/unified-soc-platform/defender-xdr-portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Microsoft Defender portal overview
3-
description: Learn about the Microsoft Defender portal
2+
title: Microsoft Defender XDR in the Defender portal
3+
description: Learn about Microsoft Defender XDR in the Defender portal
44
search.appverid: met150
55
ms.service: defender-xdr
66
ms.author: cwatson
@@ -54,17 +54,17 @@ A primary example is **Incidents** under **Incidents & alerts**.
5454

5555
Selecting an incident name displays a page that demonstrates the value of centralizing security information as you get better insights into the full extend of a threat, from email, to identity, to endpoints.
5656

57-
:::image type="content" source="/defender/media/incidents-overview/incidents-ss-incident-summary.png" alt-text="Screenshot that shows the attack story page for an incident in the Microsoft Defender portal." lightbox="/defender/media/incidents-overview/incidents-ss-incident-summary.png":::
57+
:::image type="content" source="../../defender/media/incidents-overview/incidents-ss-incident-summary.png" alt-text="Screenshot that shows the attack story page for an incident in the Microsoft Defender portal." lightbox="../../defender/media/incidents-overview/incidents-ss-incident-summary.png":::
5858

5959
Take the time to review the incidents in your environment, drill down into each alert, and practice building an understanding of how to access the information and determine next steps in your analysis.
6060

61-
Learn more about [incidents in the Defender portal](incidents-overview.md), and [managing incidents and alerts](manage-incidents.md).
61+
Learn more about [incidents in the Defender portal](../incidents-overview.md), and [managing incidents and alerts](../manage-incidents.md).
6262

6363
## Hunt for threats
6464

6565
You can build custom detection rules and hunt for specific threats in your environment. **Hunting** uses a query-based threat hunting tool that lets you proactively inspect events in your organization to locate threat indicators and entities. These rules run automatically to check for, and then respond to, suspected breach activity, misconfigured machines, and other findings.
6666

67-
Learn about [proactive threat hunting](advanced-hunting-overview.md), and [hunting for threats across devices, emails, apps, and identities](./advanced-hunting-query-emails-devices.md).
67+
Learn about [proactive threat hunting](../advanced-hunting-overview.md), and [hunting for threats across devices, emails, apps, and identities](../advanced-hunting-query-emails-devices.md).
6868

6969

7070
## Respond to emerging threats
@@ -77,5 +77,5 @@ Threat analytics is the Microsoft threat intelligence solution from expert Micro
7777
- Common attack surfaces
7878
- Prevalent malware
7979

80-
Learn about [tracking and responding to emerging threats with threat analytics](threat-analytics.md).
80+
Learn about [tracking and responding to emerging threats with threat analytics](../threat-analytics.md).
8181

0 commit comments

Comments
 (0)