You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/unified-soc-platform/defender-xdr-portal.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Microsoft Defender portal overview
3
-
description: Learn about the Microsoft Defender portal
2
+
title: Microsoft Defender XDR in the Defender portal
3
+
description: Learn about Microsoft Defender XDR in the Defender portal
4
4
search.appverid: met150
5
5
ms.service: defender-xdr
6
6
ms.author: cwatson
@@ -54,17 +54,17 @@ A primary example is **Incidents** under **Incidents & alerts**.
54
54
55
55
Selecting an incident name displays a page that demonstrates the value of centralizing security information as you get better insights into the full extend of a threat, from email, to identity, to endpoints.
56
56
57
-
:::image type="content" source="/defender/media/incidents-overview/incidents-ss-incident-summary.png" alt-text="Screenshot that shows the attack story page for an incident in the Microsoft Defender portal." lightbox="/defender/media/incidents-overview/incidents-ss-incident-summary.png":::
57
+
:::image type="content" source="../../defender/media/incidents-overview/incidents-ss-incident-summary.png" alt-text="Screenshot that shows the attack story page for an incident in the Microsoft Defender portal." lightbox="../../defender/media/incidents-overview/incidents-ss-incident-summary.png":::
58
58
59
59
Take the time to review the incidents in your environment, drill down into each alert, and practice building an understanding of how to access the information and determine next steps in your analysis.
60
60
61
-
Learn more about [incidents in the Defender portal](incidents-overview.md), and [managing incidents and alerts](manage-incidents.md).
61
+
Learn more about [incidents in the Defender portal](../incidents-overview.md), and [managing incidents and alerts](../manage-incidents.md).
62
62
63
63
## Hunt for threats
64
64
65
65
You can build custom detection rules and hunt for specific threats in your environment. **Hunting** uses a query-based threat hunting tool that lets you proactively inspect events in your organization to locate threat indicators and entities. These rules run automatically to check for, and then respond to, suspected breach activity, misconfigured machines, and other findings.
66
66
67
-
Learn about [proactive threat hunting](advanced-hunting-overview.md), and [hunting for threats across devices, emails, apps, and identities](./advanced-hunting-query-emails-devices.md).
67
+
Learn about [proactive threat hunting](../advanced-hunting-overview.md), and [hunting for threats across devices, emails, apps, and identities](../advanced-hunting-query-emails-devices.md).
68
68
69
69
70
70
## Respond to emerging threats
@@ -77,5 +77,5 @@ Threat analytics is the Microsoft threat intelligence solution from expert Micro
77
77
- Common attack surfaces
78
78
- Prevalent malware
79
79
80
-
Learn about [tracking and responding to emerging threats with threat analytics](threat-analytics.md).
80
+
Learn about [tracking and responding to emerging threats with threat analytics](../threat-analytics.md).
0 commit comments