You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/get-defender-business.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ Microsoft 365 Business Premium includes Defender for Business, Microsoft Defende
84
84
85
85
Microsoft has a list of solution providers who are authorized to sell offerings, including Microsoft 365 Business Premium and Microsoft Defender for Business. If you'd prefer to work with a Microsoft partner, you can follow these steps to find a solution provider in your area:
86
86
87
-
1. Go to the [Browse Partners](https://appsource.microsoft.com/marketplace/partner-dir).
87
+
1. Go to the [Browse Partners](https:/appsource.microsoft.com/marketplace/partner-dir).
88
88
89
89
2. In the **Filters** pane, specify search criteria, such as:
Copy file name to clipboardExpand all lines: defender-business/mdb-streaming-api.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ If your organization has a Security Operations Center (SOC), the ability to use
28
28
-[Azure Event Hubs](#use-the-streaming-api-with-event-hubs), a modern big data streaming platform and event ingestion service that can seamlessly integrate with other Azure and Microsoft services, such as Stream Analytics, Power BI, and Event Grid, along with outside services like Apache Spark.
29
29
-[Azure Storage](/azure/storage/common/storage-introduction), Microsoft's cloud storage solution for modern data storage scenarios, with highly available, massively scalable, durable, and secure storage for a variety of data objects in the cloud.
30
30
31
-
With the streaming API, you can use [advanced hunting](/defender/advanced-hunting-overview) and [attack detection](/defender-endpoint/overview-endpoint-detection-response) with Defender for Business and Microsoft 365 Business Premium. The streaming API enables SOCs to view more data about devices, understand better how an attack occurred, and take steps to improve device security.
31
+
With the streaming API, you can use [advanced hunting](/defender-xdr/advanced-hunting-overview) and [attack detection](/defender-endpoint/overview-endpoint-detection-response) with Defender for Business and Microsoft 365 Business Premium. The streaming API enables SOCs to view more data about devices, understand better how an attack occurred, and take steps to improve device security.
32
32
33
33
## Use the streaming API with Microsoft Sentinel
34
34
@@ -87,7 +87,7 @@ Here's what the schema of events in Azure Event Hubs looks like:
87
87
}
88
88
```
89
89
90
-
Each event hub message in Azure Event Hubs contains a list of records. Each record contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format in a property called "**properties**". For more information about the schema, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender/advanced-hunting-overview).
90
+
Each event hub message in Azure Event Hubs contains a list of records. Each record contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format in a property called "**properties**". For more information about the schema, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
91
91
92
92
## Use the streaming API with Azure Storage
93
93
@@ -122,7 +122,7 @@ A blob container is created for each event type. The schema of each row in a blo
122
122
}
123
123
```
124
124
125
-
Each blob contains multiple rows. Each row contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format properties. For more information about the schema of Microsoft Defender for Endpoint events, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender/advanced-hunting-overview).
125
+
Each blob contains multiple rows. Each row contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format properties. For more information about the schema of Microsoft Defender for Endpoint events, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
Copy file name to clipboardExpand all lines: defender-endpoint/api/raw-data-export-event-hub.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ ms.date: 10/24/2023
81
81
82
82
- Each record contains the event name, the time Microsoft Defender for Endpoint received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "**properties**".
83
83
84
-
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender/advanced-hunting-overview).
84
+
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender-xdr/advanced-hunting-overview).
85
85
86
86
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](../machine-groups.md) for more information.
87
87
> [!NOTE]
@@ -109,7 +109,7 @@ To get the data types for event properties do the following:
109
109
110
110
-[Stream Microsoft Defender XDR events | Microsoft Learn](/defender-xdr/streaming-api)
111
111
112
-
-[Overview of Advanced Hunting](/defender/advanced-hunting-overview)
112
+
-[Overview of Advanced Hunting](/defender-xdr/advanced-hunting-overview)
113
113
-[Microsoft Defender for Endpoint streaming API](raw-data-export.md)
114
114
-[Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)
Copy file name to clipboardExpand all lines: defender-endpoint/api/raw-data-export-storage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ ms.date: 12/18/2020
77
77
78
78
- Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you get events only from your tenant), and the event in JSON format in a property called "properties".
79
79
80
-
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender/advanced-hunting-overview).
80
+
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender-xdr/advanced-hunting-overview).
81
81
82
82
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here, every event is decorated with this column as well. For more information, see [Device Groups](../machine-groups.md).
83
83
> [!NOTE]
@@ -105,7 +105,7 @@ In order to get the data types for our events properties do the following:
105
105
106
106
-[Stream Microsoft Defender XDR events | Microsoft Learn](/defender-xdr/streaming-api)
107
107
108
-
-[Overview of Advanced Hunting](/defender/advanced-hunting-overview)
108
+
-[Overview of Advanced Hunting](/defender-xdr/advanced-hunting-overview)
109
109
-[Microsoft Defender for Endpoint Streaming API](raw-data-export.md)
110
110
-[Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)
Microsoft Defender for Endpoint supports streaming events available through [Advanced Hunting](/defender/advanced-hunting-overview) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/storage/common/storage-account-overview).
40
+
Microsoft Defender for Endpoint supports streaming events available through [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/storage/common/storage-account-overview).
[Stream Microsoft Defender for Endpoint events to Azure Event Hubs](raw-data-export-event-hub.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender/advanced-hunting-overview) to Event Hubs.
49
-
[Stream Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender/advanced-hunting-overview) to your Azure storage account.
48
+
[Stream Microsoft Defender for Endpoint events to Azure Event Hubs](raw-data-export-event-hub.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to Event Hubs.
49
+
[Stream Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to your Azure storage account.
50
50
51
51
## Related topics
52
52
53
53
-[Stream Microsoft Defender XDR events | Microsoft Learn](/defender-xdr/streaming-api)
54
54
55
-
-[Overview of Advanced Hunting](/defender/advanced-hunting-overview)
55
+
-[Overview of Advanced Hunting](/defender-xdr/advanced-hunting-overview)
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-report.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -221,7 +221,7 @@ The following image illustrates how the Advanced Hunting query page opens from t
221
221
222
222
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-flyout-hunting.png" alt-text="Shows the attack surface reduction rules report main detections tab flyout link opening Advanced Hunting" lightbox="media/attack-surface-reduction-rules-report-main-detections-flyout-hunting.png":::
223
223
224
-
For more information about Advanced hunting, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender/advanced-hunting-overview)
224
+
For more information about Advanced hunting, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview)
225
225
226
226
### Attack surface reduction rules main Configuration tab
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ You can use advanced hunting to view attack surface reduction events. To streaml
124
124
125
125
For example, suppose that an attack surface reduction event occurs on 10 devices during the 2:00 PM hour. Suppose that the first event occurred at 2:15, and the last at 2:45. With advanced hunting, you see one instance of that event (even though it actually occurred on 10 devices), and its timestamp will be 2:15 PM.
126
126
127
-
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender/advanced-hunting-overview).
127
+
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
128
128
129
129
## Attack surface reduction features across Windows versions
Copy file name to clipboardExpand all lines: defender-endpoint/controlled-folders.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ Controlled folder access helps protect your valuable data from malicious apps an
46
46
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
47
47
48
48
> [!TIP]
49
-
> Controlled folder access blocks don't generate alerts in the [Alerts queue](alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](investigate-machines.md), while using [advanced hunting](/defender/advanced-hunting-overview), or with [custom detection rules](/defender-xdr/custom-detection-rules).
49
+
> Controlled folder access blocks don't generate alerts in the [Alerts queue](alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](investigate-machines.md), while using [advanced hunting](/defender-xdr/advanced-hunting-overview), or with [custom detection rules](/defender-xdr/custom-detection-rules).
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft Defender portal; see [Microsoft Defender for Endpoint in Microsoft Defender XDR](/defender-xdr/microsoft-365-security-center-mde).
110
110
111
-
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/defender/advanced-hunting-overview). If you're using [audit mode](overview-attack-surface-reduction.md), you can use [advanced hunting](/defender/advanced-hunting-overview) to see how controlled folder access settings would affect your environment if they were enabled.
111
+
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/defender-xdr/advanced-hunting-overview). If you're using [audit mode](overview-attack-surface-reduction.md), you can use [advanced hunting](/defender-xdr/advanced-hunting-overview) to see how controlled folder access settings would affect your environment if they were enabled.
0 commit comments