Skip to content

Commit 62ad3e4

Browse files
authored
Merge pull request #1774 from MicrosoftDocs/main
publish main to live, spooky 10/31/2024, 10:30 am
2 parents 4f86912 + fc188a9 commit 62ad3e4

File tree

10 files changed

+28
-16
lines changed

10 files changed

+28
-16
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@
1010
href: zero-trust-with-microsoft-defender-endpoint.md
1111
- name: Trial user guide - Microsoft Defender for Endpoint
1212
href: defender-endpoint-trial-user-guide.md
13+
- name: Pilot and deploy Defender for Endpoint
14+
href: /defender-xdr/pilot-deploy-defender-endpoint?toc=/defender-xdr/TOC.json&bc=/defender-xdr/breadcrumb/toc.json
1315
- name: Minimum requirements
1416
href: minimum-requirements.md
1517
- name: Supported Microsoft Defender for Endpoint capabilities by platform

defender-endpoint/breadcrumb/toc.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@
55
- name: 'Microsoft Defender for Endpoint'
66
tocHref: /defender-endpoint/
77
topicHref: /defender-endpoint/index
8+
items:
9+
- name: 'Microsoft Defender XDR'
10+
tocHref: /defender-xdr/
11+
topicHref: /defender-xdr/pilot-deploy-defender-office-365
812
- name: 'Microsoft Defender for Endpoint'
913
tocHref: /mem/intune/protect/
10-
topicHref: /mem/intune/protect/
14+
topicHref: /mem/intune/protect/

defender-office-365/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,9 @@
3636
href: trial-user-guide-defender-for-office-365.md
3737

3838
- name: Deploy
39-
items:
39+
items:
40+
- name: Pilot and deploy Defender for Office 365
41+
href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-xdr/TOC.json&bc=/defender-xdr/breadcrumb/toc.json
4042
- name: Get started with Microsoft Defender for Office 365
4143
href: mdo-deployment-guide.md
4244
- name: Step 1 - Configure email authentication

defender-office-365/breadcrumb/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,7 @@
55
- name: 'Microsoft Defender for Office 365'
66
tocHref: /defender-office-365/
77
topicHref: /defender-office-365/index
8+
items:
9+
- name: 'Microsoft Defender XDR'
10+
tocHref: /defender-xdr/
11+
topicHref: /defender-xdr/pilot-deploy-defender-endpoint

defender-xdr/advanced-hunting-aadsignineventsbeta-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ audience: ITPro
1414
ms.collection:
1515
- m365-security
1616
- tier3
17-
ms.custom:
17+
ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: reference

defender-xdr/advanced-hunting-aadspnsignineventsbeta-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ audience: ITPro
1414
ms.collection:
1515
- m365-security
1616
- tier3
17-
ms.custom:
17+
ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: reference

defender-xdr/advanced-hunting-errors.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
ms.topic: error-reference
20-
ms.date: 04/22/2024
20+
ms.date: 10/29/2024
2121
---
2222

2323
# Handle advanced hunting errors
@@ -36,8 +36,8 @@ Advanced hunting displays errors to notify for syntax mistakes and whenever quer
3636
| Syntax errors | The query contains unrecognized names, including references to nonexistent operators, columns, functions, or tables. | Ensure references to [Kusto operators and functions](/azure/data-explorer/kusto/query/) are correct. Check [the schema](advanced-hunting-schema-tables.md) for the correct advanced hunting columns, functions, and tables. Enclose variable strings in quotes so they are recognized. While writing your queries, use the autocomplete suggestions from IntelliSense. | `A recognition error occurred.` |
3737
| Semantic errors | While the query uses valid operator, column, function, or table names, there are errors in its structure and resulting logic. In some cases, advanced hunting identifies the specific operator that caused the error. | Check for errors in the structure of query. Refer to [Kusto documentation](/azure/data-explorer/kusto/query/) for guidance. While writing your queries, use the autocomplete suggestions from IntelliSense. | `'project' operator: Failed to resolve scalar expression named 'x'`|
3838
| Timeouts | A query can only run within a [limited period before timing out](advanced-hunting-limits.md). This error can happen more frequently when running complex queries. | [Optimize the query](advanced-hunting-best-practices.md) | `Query exceeded the timeout period.` |
39-
| CPU throttling | Queries in the same tenant have exceeded the [CPU resources](advanced-hunting-limits.md) that have been allocated based on tenant size. | The service checks CPU resource usage every 15 minutes and daily and displays warnings after usage exceeds 10% of the allocated quota. If you reach 100% utilization, the service blocks queries until after the next daily or 15-minute cycle. [Optimize your queries to avoid hitting CPU quotas](advanced-hunting-best-practices.md) | - `This query used X% of your organization's allocated resources for the current 15 minutes.`<br>- `You have exceeded processing resources allocated to this tenant. You can run queries again in <duration>.` |
40-
| Result size limit exceeded | The aggregate size of the result set for the query has exceeded the maximum size. This error can occur if the result set is so large that truncation at the 10,000-record limit can't reduce it to an acceptable size. Results that have multiple columns with sizable content are more likely to be impacted by this error. | [Optimize the query](advanced-hunting-best-practices.md) | `Result size limit exceeded. Use "summarize" to aggregate results, "project" to drop uninteresting columns, or "take" to truncate results.` |
39+
| CPU throttling | Queries in the same tenant have exceeded the [CPU resources](advanced-hunting-limits.md) that have been allocated based on tenant size. | The service checks CPU resource usage every 15 minutes and daily and displays warnings after usage exceeds 10% of the allocated quota. If you reach 100% utilization, the service blocks queries until after the next daily or 15-minute cycle. [Optimize your queries to avoid hitting CPU quotas](advanced-hunting-best-practices.md) | `You have exceeded processing resources allocated to this tenant. You can run queries again in <duration>.` |
40+
| Result size limit exceeded | The aggregate size of the result set for the query has exceeded the maximum size. This error can occur if the result set is so large that truncation at the 30,000-record limit can't reduce it to an acceptable size. Results that have multiple columns with sizable content are more likely to be impacted by this error. | [Optimize the query](advanced-hunting-best-practices.md) | `Result size limit exceeded. Use "summarize" to aggregate results, "project" to drop uninteresting columns, or "take" to truncate results.` |
4141
| Excessive resource consumption | The query has consumed excessive amounts of resources and has been stopped from completing. In some cases, advanced hunting identifies the specific operator that wasn't optimized. | [Optimize the query](advanced-hunting-best-practices.md) | -`Query stopped due to excessive resource consumption.`<br>-`Query stopped. Adjust use of the <operator name> operator to avoid excessive resource consumption.` |
4242
| Unknown errors | The query failed because of an unknown reason. | Try running the query again. Contact Microsoft through the portal if queries continue to return unknown errors. | `An unexpected error occurred during query execution. Please try again in a few minutes.`
4343

defender-xdr/advanced-hunting-limits.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
ms.topic: how-to
20-
ms.date: 09/10/2024
20+
ms.date: 10/29/2024
2121
---
2222

2323
# Use the advanced hunting query resource report
@@ -35,10 +35,10 @@ Refer to the following table to understand existing quotas and usage parameters.
3535

3636
| Quota or parameter | Size | Refresh cycle | Description |
3737
|--|--|--|--|
38-
| Data range | 30 days | Every query | Each query can look up data from up to the past 30 days. |
38+
| Date range | 30 days for Defender XDR data unless streamed through Microsoft Sentinel | Every query | Each query can look up Defender XDR data from up to the past 30 days, or longer if streamed through Microsoft Sentinel |
3939
| Result set | 30,000 rows | Every query | Each query can return up to 30,000 records. |
4040
| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it doesn't complete within 10 minutes, the service displays an error.
41-
| CPU resources | Based on tenant size | Every 15 minutes | The [portal displays an error](advanced-hunting-errors.md) whenever a query runs and the tenant consumes over 10% of allocated resources. Queries are blocked if the tenant reaches 100% until after the next 15-minute cycle. |
41+
| CPU resources | Based on tenant size | Every 15 minutes | The portal displays a warning whenever a query runs and the tenant consumes over 10% of allocated resources. [Queries are blocked](advanced-hunting-errors.md) if the tenant reaches 100% until after the next 15-minute cycle. |
4242

4343
> [!NOTE]
4444
> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)

defender-xdr/autoad-results.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@ Contain actions triggered by attack disruption are found in the [DeviceEvents ta
6060
- Device contain actions:
6161
```Kusto
6262
DeviceEvents
63-
| where ActionType contains "ContainDevice"
63+
| where ActionType contains "ContainedDevice"
6464
```
6565

6666
- User contain actions:
6767
```Kusto
6868
DeviceEvents
69-
| where ActionType contains "ContainUser"
69+
| where ActionType contains "ContainedUser"
7070
```
7171

7272
### Hunt for disable user account actions

defender-xdr/create-custom-rbac-roles.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 09/30/2024
15+
ms.date: 10/31/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -40,7 +40,7 @@ The following steps guide you on how to create custom roles in Microsoft Defende
4040
4141
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
4242

43-
2. In the navigation pane, select **Permissions**.
43+
2. In the navigation pane, go to **System > Permissions**.
4444

4545
3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
4646

@@ -69,7 +69,7 @@ The following steps guide you on how to create custom roles in Microsoft Defende
6969
7070
8. Once you have selected your permissions, select **Apply** and then **Next** to assign users and data sources.
7171

72-
9. Select **Add assignments** and Enter the Assignment name.
72+
9. Select **Add assignments** and add the Assignment name.
7373

7474
10. Under **data sources**, choose if the assigned users will have the selected permissions across all the available products, or only for specific data sources:
7575

@@ -78,7 +78,7 @@ The following steps guide you on how to create custom roles in Microsoft Defende
7878
If a user selects all read-only permissions for a single data source, for example, Microsoft Defender for Endpoint, they will not be able to read alerts for Microsoft Defender for Office 365 or Microsoft Defender for Identity.
7979

8080
> [!NOTE]
81-
> By selecting **Choose all data sources** all supported data sources within Microsoft Defender XDR Unified RBAC and any future data sources that are added are automatically assigned to this assignment.
81+
> By selecting **Include future data sources automatically** all supported data sources within Microsoft Defender XDR Unified RBAC and any future data sources that are added are automatically assigned to this assignment.
8282
8383
11. In **Assigned users and groups** choose the Microsoft Entra security groups or individual users to assign the role to, and select **Add**.
8484

0 commit comments

Comments
 (0)