Skip to content

Commit 5db7b83

Browse files
committed
updated TOC
1 parent eb4b775 commit 5db7b83

File tree

1 file changed

+38
-38
lines changed

1 file changed

+38
-38
lines changed

defender-xdr/TOC.yml

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -573,44 +573,44 @@
573573
href: /defender-endpoint/professional-services
574574
- name: Resources
575575
items:
576-
- name: Threat actor naming
577-
href: microsoft-threat-actor-naming.md
578-
- name: Malware names
579-
href: malware-naming.md
580-
- name: How Microsoft identifies malware and PUA
581-
href: criteria.md
582-
- name: Submit files for analysis
583-
href: submission-guide.md
584-
- name: Understand threat intelligence concepts
585-
href: /defender-endpoint/threat-indicator-concepts
586-
- name: Microsoft virus initiative
587-
href: virus-initiative-criteria.md
588-
- name: Software developer FAQ
589-
href: developer-faq.yml
590-
- name: Alert classification playbooks
591-
items:
592-
- name: Overview
593-
href: alert-classification-playbooks.md
594-
- name: Suspicious email forwarding activity
595-
href: alert-grading-playbook-email-forwarding.md
596-
- name: Suspicious inbox forwarding rules
597-
href: alert-grading-playbook-inbox-forwarding-rules.md
598-
- name: Suspicious inbox manipulation rules
599-
href: alert-grading-playbook-inbox-manipulation-rules.md
600-
- name: Suspicious password-spray-related IP address
601-
href: alert-classification-suspicious-ip-password-spray.md
602-
- name: Malicious Exchange connectors
603-
href: alert-classification-malicious-exchange-connectors.md
604-
- name: Password spray attacks
605-
href: alert-classification-password-spray-attack.md
606-
- name: Incident response playbooks
607-
href: /security/operations/incident-response-playbooks
608-
- name: Ransomware playbooks
609-
items:
610-
- name: Detecting human-operated ransomware attacks with Microsoft Defender XDR
611-
href: playbook-detecting-ransomware-m365-defender.md
612-
- name: Responding to ransomware attacks
613-
href: playbook-responding-ransomware-m365-defender.md
576+
- name: Alert classification playbooks
577+
items:
578+
- name: Overview
579+
href: alert-classification-playbooks.md
580+
- name: Suspicious email forwarding activity
581+
href: alert-grading-playbook-email-forwarding.md
582+
- name: Suspicious inbox forwarding rules
583+
href: alert-grading-playbook-inbox-forwarding-rules.md
584+
- name: Suspicious inbox manipulation rules
585+
href: alert-grading-playbook-inbox-manipulation-rules.md
586+
- name: Suspicious password-spray-related IP address
587+
href: alert-classification-suspicious-ip-password-spray.md
588+
- name: Malicious Exchange connectors
589+
href: alert-classification-malicious-exchange-connectors.md
590+
- name: Password spray attacks
591+
href: alert-classification-password-spray-attack.md
592+
- name: Incident response playbooks
593+
href: /security/operations/incident-response-playbooks
594+
- name: Ransomware playbooks
595+
items:
596+
- name: Detecting human-operated ransomware attacks with Microsoft Defender XDR
597+
href: playbook-detecting-ransomware-m365-defender.md
598+
- name: Responding to ransomware attacks
599+
href: playbook-responding-ransomware-m365-defender.md
600+
- name: Threat actor naming
601+
href: microsoft-threat-actor-naming.md
602+
- name: Malware names
603+
href: malware-naming.md
604+
- name: How Microsoft identifies malware and PUA
605+
href: criteria.md
606+
- name: Submit files for analysis
607+
href: submission-guide.md
608+
- name: Understand threat intelligence concepts
609+
href: /defender-endpoint/threat-indicator-concepts
610+
- name: Microsoft virus initiative
611+
href: virus-initiative-criteria.md
612+
- name: Software developer FAQ
613+
href: developer-faq.yml
614614
- name: Microsoft Defender XDR docs
615615
items:
616616
- name: Defender for Office 365

0 commit comments

Comments
 (0)