You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-investigate-respond.md
+14-5Lines changed: 14 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,16 @@ Follow these steps:
68
68
69
69
<aname="step-1"></a>
70
70
71
-
## Step 1. Simulate attacks with the Microsoft Defender portal
71
+
## Step 1. Gather threat intelligence to identify adversaries and their infrastructure
72
+
73
+
Microsoft Defender Threat Intelligence (Defender TI) provides threat intelligence information such as specific indicators of compromise (IOCs) and research and analyses straight from Microsoft experts and other sources. You can read articles or search for threat actors, vulnerabilities, and other IOCs to gain insight on the types of threats that you might want to investigate.
74
+
75
+
- For a tutorial on how to perform indicator searches and gather threat and adversary intelligence using Defender TI, see: [Tutorial: Gathering threat intelligence and infrastructure chaining](/defender/threat-intelligence/gathering-threat-intelligence-and-infrastructure-chaining)
76
+
- For a tutorial on how to perform indicator searches to gather vulnerability intelligence using Defender TI, see: [Tutorial: Gathering vulnerability intelligence](/defender/threat-intelligence/gathering-vulnerability-intelligence)
77
+
78
+
For more information, see [What is Microsoft Defender Threat Intelligence (Defender TI)?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti)
79
+
80
+
## Step 2. Simulate attacks with the Microsoft Defender portal
72
81
73
82
The Microsoft Defender portal has built-in capabilities to create simulated attacks on your pilot environment:
74
83
@@ -354,7 +363,7 @@ This wraps up attack simulations for incident analysis, automated investigation,
354
363
355
364
<aname="step-2"></a>
356
365
357
-
## Step 2. Prioritize incidents
366
+
## Step 3. Prioritize incidents
358
367
359
368
You get to the incident queue from **Incidents & alerts > Incidents** on the quick launch of the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>. Here's an example.
360
369
@@ -376,7 +385,7 @@ For more information, see [Prioritize incidents](incident-queue.md).
376
385
377
386
<aname="step-3"></a>
378
387
379
-
## Step 3. Manage incidents
388
+
## Step 4. Manage incidents
380
389
381
390
You can manage incidents from the **Manage incident** pane for an incident. Here's an example.
382
391
@@ -417,7 +426,7 @@ For more information, see [Manage incidents](manage-incidents.md).
417
426
418
427
<aname="step-4"></a>
419
428
420
-
## Step 4. Examine automated investigation and response with the Action center
429
+
## Step 5. Examine automated investigation and response with the Action center
421
430
422
431
Depending on how automated investigation and response capabilities are configured for your organization, remediation actions are taken automatically or only upon approval by your security operations team. All actions, whether pending or completed, are listed in the [Action center](m365d-action-center.md), which lists pending and completed remediation actions for your devices, email & collaboration content, and identities in one location.
423
432
@@ -436,7 +445,7 @@ For more information, see [Automated investigation and response](m365d-autoir.md
436
445
437
446
<aname="step-5"></a>
438
447
439
-
## Step 5. Use advanced hunting
448
+
## Step 6. Use advanced hunting
440
449
441
450
> [!NOTE]
442
451
> Before we walk you through the advanced hunting simulation, watch the following video to understand advanced hunting concepts, see where you can find it in the portal, and know how it can help you in your security operations.
0 commit comments