Skip to content

Commit 6e2ca74

Browse files
authored
Merge branch 'main' into maccruz-cdidentity
2 parents 82cd8fa + 983fd7d commit 6e2ca74

File tree

70 files changed

+47
-135
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+47
-135
lines changed

defender-business/get-defender-business.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Microsoft 365 Business Premium includes Defender for Business, Microsoft Defende
8484

8585
Microsoft has a list of solution providers who are authorized to sell offerings, including Microsoft 365 Business Premium and Microsoft Defender for Business. If you'd prefer to work with a Microsoft partner, you can follow these steps to find a solution provider in your area:
8686

87-
1. Go to the [Browse Partners](https://appsource.microsoft.com/marketplace/partner-dir).
87+
1. Go to the [Browse Partners](https:/appsource.microsoft.com/marketplace/partner-dir).
8888

8989
2. In the **Filters** pane, specify search criteria, such as:
9090

defender-business/mdb-streaming-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If your organization has a Security Operations Center (SOC), the ability to use
2828
- [Azure Event Hubs](#use-the-streaming-api-with-event-hubs), a modern big data streaming platform and event ingestion service that can seamlessly integrate with other Azure and Microsoft services, such as Stream Analytics, Power BI, and Event Grid, along with outside services like Apache Spark.
2929
- [Azure Storage](/azure/storage/common/storage-introduction), Microsoft's cloud storage solution for modern data storage scenarios, with highly available, massively scalable, durable, and secure storage for a variety of data objects in the cloud.
3030

31-
With the streaming API, you can use [advanced hunting](/defender/advanced-hunting-overview) and [attack detection](/defender-endpoint/overview-endpoint-detection-response) with Defender for Business and Microsoft 365 Business Premium. The streaming API enables SOCs to view more data about devices, understand better how an attack occurred, and take steps to improve device security.
31+
With the streaming API, you can use [advanced hunting](/defender-xdr/advanced-hunting-overview) and [attack detection](/defender-endpoint/overview-endpoint-detection-response) with Defender for Business and Microsoft 365 Business Premium. The streaming API enables SOCs to view more data about devices, understand better how an attack occurred, and take steps to improve device security.
3232

3333
## Use the streaming API with Microsoft Sentinel
3434

@@ -87,7 +87,7 @@ Here's what the schema of events in Azure Event Hubs looks like:
8787
}
8888
```
8989

90-
Each event hub message in Azure Event Hubs contains a list of records. Each record contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format in a property called "**properties**". For more information about the schema, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender/advanced-hunting-overview).
90+
Each event hub message in Azure Event Hubs contains a list of records. Each record contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format in a property called "**properties**". For more information about the schema, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
9191

9292
## Use the streaming API with Azure Storage
9393

@@ -122,7 +122,7 @@ A blob container is created for each event type. The schema of each row in a blo
122122
}
123123
```
124124

125-
Each blob contains multiple rows. Each row contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format properties. For more information about the schema of Microsoft Defender for Endpoint events, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender/advanced-hunting-overview).
125+
Each blob contains multiple rows. Each row contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format properties. For more information about the schema of Microsoft Defender for Endpoint events, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
126126

127127
## See also
128128

defender-endpoint/api/raw-data-export-event-hub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ ms.date: 10/24/2023
8181

8282
- Each record contains the event name, the time Microsoft Defender for Endpoint received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "**properties**".
8383

84-
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender/advanced-hunting-overview).
84+
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender-xdr/advanced-hunting-overview).
8585

8686
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](../machine-groups.md) for more information.
8787
> [!NOTE]
@@ -109,7 +109,7 @@ To get the data types for event properties do the following:
109109

110110
- [Stream Microsoft Defender XDR events | Microsoft Learn](/defender-xdr/streaming-api)
111111

112-
- [Overview of Advanced Hunting](/defender/advanced-hunting-overview)
112+
- [Overview of Advanced Hunting](/defender-xdr/advanced-hunting-overview)
113113
- [Microsoft Defender for Endpoint streaming API](raw-data-export.md)
114114
- [Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)
115115
- [Azure Event Hubs documentation](/azure/event-hubs/)

defender-endpoint/api/raw-data-export-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ ms.date: 12/18/2020
7777

7878
- Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you get events only from your tenant), and the event in JSON format in a property called "properties".
7979

80-
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender/advanced-hunting-overview).
80+
- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](/defender-xdr/advanced-hunting-overview).
8181

8282
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here, every event is decorated with this column as well. For more information, see [Device Groups](../machine-groups.md).
8383
> [!NOTE]
@@ -105,7 +105,7 @@ In order to get the data types for our events properties do the following:
105105

106106
- [Stream Microsoft Defender XDR events | Microsoft Learn](/defender-xdr/streaming-api)
107107

108-
- [Overview of Advanced Hunting](/defender/advanced-hunting-overview)
108+
- [Overview of Advanced Hunting](/defender-xdr/advanced-hunting-overview)
109109
- [Microsoft Defender for Endpoint Streaming API](raw-data-export.md)
110110
- [Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)
111111
- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)

defender-endpoint/api/raw-data-export.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,22 +37,22 @@ ms.date: 12/18/2020
3737
3838
## Stream Advanced Hunting events to Event Hubs and/or Azure storage account
3939

40-
Microsoft Defender for Endpoint supports streaming events available through [Advanced Hunting](/defender/advanced-hunting-overview) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/storage/common/storage-account-overview).
40+
Microsoft Defender for Endpoint supports streaming events available through [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/storage/common/storage-account-overview).
4141

4242
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r4ga]
4343
4444
## In this section
4545

4646
Topic|Description
4747
:---|:---
48-
[Stream Microsoft Defender for Endpoint events to Azure Event Hubs](raw-data-export-event-hub.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender/advanced-hunting-overview) to Event Hubs.
49-
[Stream Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender/advanced-hunting-overview) to your Azure storage account.
48+
[Stream Microsoft Defender for Endpoint events to Azure Event Hubs](raw-data-export-event-hub.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to Event Hubs.
49+
[Stream Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](/defender-xdr/advanced-hunting-overview) to your Azure storage account.
5050

5151
## Related topics
5252

5353
- [Stream Microsoft Defender XDR events | Microsoft Learn](/defender-xdr/streaming-api)
5454

55-
- [Overview of Advanced Hunting](/defender/advanced-hunting-overview)
55+
- [Overview of Advanced Hunting](/defender-xdr/advanced-hunting-overview)
5656
- [Azure Event Hubs documentation](/azure/event-hubs/)
5757
- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)
5858
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/attack-surface-reduction-rules-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ The following image illustrates how the Advanced Hunting query page opens from t
221221

222222
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-flyout-hunting.png" alt-text="Shows the attack surface reduction rules report main detections tab flyout link opening Advanced Hunting" lightbox="media/attack-surface-reduction-rules-report-main-detections-flyout-hunting.png":::
223223
224-
For more information about Advanced hunting, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender/advanced-hunting-overview)
224+
For more information about Advanced hunting, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview)
225225

226226
### Attack surface reduction rules main Configuration tab
227227

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ You can use advanced hunting to view attack surface reduction events. To streaml
124124

125125
For example, suppose that an attack surface reduction event occurs on 10 devices during the 2:00 PM hour. Suppose that the first event occurred at 2:15, and the last at 2:45. With advanced hunting, you see one instance of that event (even though it actually occurred on 10 devices), and its timestamp will be 2:15 PM.
126126

127-
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender/advanced-hunting-overview).
127+
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
128128

129129
## Attack surface reduction features across Windows versions
130130

defender-endpoint/autoir-investigation-results.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The improved [Action center](auto-investigation-action-center.md) brings togethe
5555
- Select **Open investigation page** to view more details about the investigation.
5656
- Select **Approve** to initiate a pending action.
5757
- Select **Reject** to prevent a pending action from being taken.
58-
- Select **Go hunt** to go into [Advanced hunting](/defender/advanced-hunting-overview).
58+
- Select **Go hunt** to go into [Advanced hunting](/defender-xdr/advanced-hunting-overview).
5959

6060
### Open an investigation from an incident details page
6161

defender-endpoint/controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Controlled folder access helps protect your valuable data from malicious apps an
4646
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
4747

4848
> [!TIP]
49-
> Controlled folder access blocks don't generate alerts in the [Alerts queue](alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](investigate-machines.md), while using [advanced hunting](/defender/advanced-hunting-overview), or with [custom detection rules](/defender-xdr/custom-detection-rules).
49+
> Controlled folder access blocks don't generate alerts in the [Alerts queue](alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](investigate-machines.md), while using [advanced hunting](/defender-xdr/advanced-hunting-overview), or with [custom detection rules](/defender-xdr/custom-detection-rules).
5050
5151
## How does controlled folder access work?
5252

@@ -108,7 +108,7 @@ Controlled folder access requires enabling [Microsoft Defender Antivirus real-ti
108108

109109
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft Defender portal; see [Microsoft Defender for Endpoint in Microsoft Defender XDR](/defender-xdr/microsoft-365-security-center-mde).
110110

111-
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/defender/advanced-hunting-overview). If you're using [audit mode](overview-attack-surface-reduction.md), you can use [advanced hunting](/defender/advanced-hunting-overview) to see how controlled folder access settings would affect your environment if they were enabled.
111+
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/defender-xdr/advanced-hunting-overview). If you're using [audit mode](overview-attack-surface-reduction.md), you can use [advanced hunting](/defender-xdr/advanced-hunting-overview) to see how controlled folder access settings would affect your environment if they were enabled.
112112

113113
Example query:
114114

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ DeviceEvents
193193
| where ThreatName startswith_cs 'PUA:'
194194
```
195195

196-
To learn more about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender/advanced-hunting-overview).
196+
To learn more about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
197197

198198
## Exclude files from PUA protection
199199

0 commit comments

Comments
 (0)