|
573 | 573 | href: /defender-endpoint/professional-services
|
574 | 574 | - name: Resources
|
575 | 575 | items:
|
576 |
| - - name: Threat actor naming |
577 |
| - href: microsoft-threat-actor-naming.md |
578 |
| - - name: Malware names |
579 |
| - href: malware-naming.md |
580 |
| - - name: How Microsoft identifies malware and PUA |
581 |
| - href: criteria.md |
582 |
| - - name: Submit files for analysis |
583 |
| - href: submission-guide.md |
584 |
| - - name: Understand threat intelligence concepts |
585 |
| - href: /defender-endpoint/threat-indicator-concepts |
586 |
| - - name: Microsoft virus initiative |
587 |
| - href: virus-initiative-criteria.md |
588 |
| - - name: Software developer FAQ |
589 |
| - href: developer-faq.yml |
590 |
| - - name: Alert classification playbooks |
591 |
| - items: |
592 |
| - - name: Overview |
593 |
| - href: alert-classification-playbooks.md |
594 |
| - - name: Suspicious email forwarding activity |
595 |
| - href: alert-grading-playbook-email-forwarding.md |
596 |
| - - name: Suspicious inbox forwarding rules |
597 |
| - href: alert-grading-playbook-inbox-forwarding-rules.md |
598 |
| - - name: Suspicious inbox manipulation rules |
599 |
| - href: alert-grading-playbook-inbox-manipulation-rules.md |
600 |
| - - name: Suspicious password-spray-related IP address |
601 |
| - href: alert-classification-suspicious-ip-password-spray.md |
602 |
| - - name: Malicious Exchange connectors |
603 |
| - href: alert-classification-malicious-exchange-connectors.md |
604 |
| - - name: Password spray attacks |
605 |
| - href: alert-classification-password-spray-attack.md |
606 |
| - - name: Incident response playbooks |
607 |
| - href: /security/operations/incident-response-playbooks |
608 |
| - - name: Ransomware playbooks |
609 |
| - items: |
610 |
| - - name: Detecting human-operated ransomware attacks with Microsoft Defender XDR |
611 |
| - href: playbook-detecting-ransomware-m365-defender.md |
612 |
| - - name: Responding to ransomware attacks |
613 |
| - href: playbook-responding-ransomware-m365-defender.md |
| 576 | + - name: Alert classification playbooks |
| 577 | + items: |
| 578 | + - name: Overview |
| 579 | + href: alert-classification-playbooks.md |
| 580 | + - name: Suspicious email forwarding activity |
| 581 | + href: alert-grading-playbook-email-forwarding.md |
| 582 | + - name: Suspicious inbox forwarding rules |
| 583 | + href: alert-grading-playbook-inbox-forwarding-rules.md |
| 584 | + - name: Suspicious inbox manipulation rules |
| 585 | + href: alert-grading-playbook-inbox-manipulation-rules.md |
| 586 | + - name: Suspicious password-spray-related IP address |
| 587 | + href: alert-classification-suspicious-ip-password-spray.md |
| 588 | + - name: Malicious Exchange connectors |
| 589 | + href: alert-classification-malicious-exchange-connectors.md |
| 590 | + - name: Password spray attacks |
| 591 | + href: alert-classification-password-spray-attack.md |
| 592 | + - name: Incident response playbooks |
| 593 | + href: /security/operations/incident-response-playbooks |
| 594 | + - name: Ransomware playbooks |
| 595 | + items: |
| 596 | + - name: Detecting human-operated ransomware attacks with Microsoft Defender XDR |
| 597 | + href: playbook-detecting-ransomware-m365-defender.md |
| 598 | + - name: Responding to ransomware attacks |
| 599 | + href: playbook-responding-ransomware-m365-defender.md |
| 600 | + - name: Threat actor naming |
| 601 | + href: microsoft-threat-actor-naming.md |
| 602 | + - name: Malware names |
| 603 | + href: malware-naming.md |
| 604 | + - name: How Microsoft identifies malware and PUA |
| 605 | + href: criteria.md |
| 606 | + - name: Submit files for analysis |
| 607 | + href: submission-guide.md |
| 608 | + - name: Understand threat intelligence concepts |
| 609 | + href: /defender-endpoint/threat-indicator-concepts |
| 610 | + - name: Microsoft virus initiative |
| 611 | + href: virus-initiative-criteria.md |
| 612 | + - name: Software developer FAQ |
| 613 | + href: developer-faq.yml |
614 | 614 | - name: Microsoft Defender XDR docs
|
615 | 615 | items:
|
616 | 616 | - name: Defender for Office 365
|
|
0 commit comments