Skip to content

Commit 617fc9d

Browse files
committed
added MDTI section
1 parent 73523bd commit 617fc9d

File tree

1 file changed

+14
-5
lines changed

1 file changed

+14
-5
lines changed

defender-xdr/pilot-deploy-investigate-respond.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,16 @@ Follow these steps:
6868

6969
<a name="step-1"></a>
7070

71-
## Step 1. Simulate attacks with the Microsoft Defender portal
71+
## Step 1. Gather threat intelligence to identify adversaries and their infrastructure
72+
73+
Microsoft Defender Threat Intelligence (Defender TI) provides threat intelligence information such as specific indicators of compromise (IOCs) and research and analyses straight from Microsoft experts and other sources. You can read articles or search for threat actors, vulnerabilities, and other IOCs to gain insight on the types of threats that you might want to investigate.
74+
75+
- For a tutorial on how to perform indicator searches and gather threat and adversary intelligence using Defender TI, see: [Tutorial: Gathering threat intelligence and infrastructure chaining](/defender/threat-intelligence/gathering-threat-intelligence-and-infrastructure-chaining)
76+
- For a tutorial on how to perform indicator searches to gather vulnerability intelligence using Defender TI, see: [Tutorial: Gathering vulnerability intelligence](/defender/threat-intelligence/gathering-vulnerability-intelligence)
77+
78+
For more information, see [What is Microsoft Defender Threat Intelligence (Defender TI)?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti)
79+
80+
## Step 2. Simulate attacks with the Microsoft Defender portal
7281

7382
The Microsoft Defender portal has built-in capabilities to create simulated attacks on your pilot environment:
7483

@@ -354,7 +363,7 @@ This wraps up attack simulations for incident analysis, automated investigation,
354363

355364
<a name="step-2"></a>
356365

357-
## Step 2. Prioritize incidents
366+
## Step 3. Prioritize incidents
358367

359368
You get to the incident queue from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. Here's an example.
360369

@@ -376,7 +385,7 @@ For more information, see [Prioritize incidents](incident-queue.md).
376385

377386
<a name="step-3"></a>
378387

379-
## Step 3. Manage incidents
388+
## Step 4. Manage incidents
380389

381390
You can manage incidents from the **Manage incident** pane for an incident. Here's an example.
382391

@@ -417,7 +426,7 @@ For more information, see [Manage incidents](manage-incidents.md).
417426

418427
<a name="step-4"></a>
419428

420-
## Step 4. Examine automated investigation and response with the Action center
429+
## Step 5. Examine automated investigation and response with the Action center
421430

422431
Depending on how automated investigation and response capabilities are configured for your organization, remediation actions are taken automatically or only upon approval by your security operations team. All actions, whether pending or completed, are listed in the [Action center](m365d-action-center.md), which lists pending and completed remediation actions for your devices, email & collaboration content, and identities in one location.
423432

@@ -436,7 +445,7 @@ For more information, see [Automated investigation and response](m365d-autoir.md
436445

437446
<a name="step-5"></a>
438447

439-
## Step 5. Use advanced hunting
448+
## Step 6. Use advanced hunting
440449

441450
> [!NOTE]
442451
> Before we walk you through the advanced hunting simulation, watch the following video to understand advanced hunting concepts, see where you can find it in the portal, and know how it can help you in your security operations.

0 commit comments

Comments
 (0)