You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Office 365 Plan 1 and Plan 2](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet)
28
28
29
-
This article describes the Microsoft Defender for Office 365 experience in the Microsoft Defender portal at <https://security.microsoft.com>. Formerly, Defender for Office 365 customers used the Office 365 Security & Compliance Center at <https://protection.office.com>, but access to that portal was discontinued in 2022.
29
+
This article describes the Microsoft Defender for Office 365 experience in the Microsoft Defender portal at <https://security.microsoft.com>. Formerly, Defender for Office 365 customers used the Office 365 Security & Compliance Center at <https://protection.office.com>, but access to that portal ended in 2022.
30
30
31
31
The Defender portal combines security capabilities from existing Microsoft 365 security portals. This improved portal helps security teams protect their organization from threats more effectively and efficiently.
32
32
@@ -36,36 +36,32 @@ If you're looking for compliance-related items, see [Microsoft Purview complianc
36
36
37
37
## Capabilities
38
38
39
-
With the unified Defender XDR solution, you can stitch together the threat signals and determine the full scope and impact of the threat, and how it's currently impacting the organization.
39
+
With the unified Defender XDR solution, you can stitch together the threat signals and determine the full scope of the threat, and how it currently affects the organization.
40
40
41
-
:::image type="content" source="media/mdo-m36d-nav-collapsed.png" alt-text="A screenshot of the left navigation pane of the M365 Defender portal." lightbox="media/mdo-m36d-nav-collapsed.png":::
41
+
:::image type="content" source="media/mdo-m36d-nav-collapsed.png" alt-text="A screenshot of the left navigation pane of the Microsoft 365 Defender portal." lightbox="media/mdo-m36d-nav-collapsed.png":::
42
42
43
-
Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Most of the Defender for Office 365-specific features are available under the **Email & collaboration** node as described in the [Email & collaboration](#email--collaboration) section.
43
+
Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Most Defender for Office 365specific features are available under the **Email & collaboration** node as described in the [Email & collaboration](#email--collaboration) section.
44
44
45
45
:::image type="content" source="media/mdo-m365d-nav.png" alt-text="A screenshot that shows the Email & collaboration node expanded in the Defender portal." lightbox="media/mdo-m365d-nav.png":::
46
46
47
47
> [!TIP]
48
48
>
49
49
> - Defender for Office 365 includes all the functionality in Exchange Online Protection (EOP). For more information about EOP, see [Exchange Online Protection overview](/defender-office-365/eop-about).
50
50
>
51
-
> - What you see or don't see in the Defender portal depends on your subscription (for example, Defender for Office 365 Plan 2 that's included in Microsoft 365 E5 vs. an add-on or standalone Defender for Office 365 Plan 2 subscription).
51
+
> - What you see or don't see in the Defender portal depends on your subscription (for example, Microsoft 365 E5 vs. an add-on or standalone Defender for Office 365 Plan 2 subscription).
52
52
>
53
53
> For more information about the differences between Defender for Office 365 Plan 1 and Plan 2, see [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
54
54
55
55
### Home
56
56
57
57
The **Home** page of the Defender portal shows important summary information (cards) about the security status of your Microsoft 365 environment.
58
58
59
-
Use :::image type="icon" source="media/m365-cc-sc-guided-tour-icon.png" border="false"::: **Guided tour** to take a quick tour of:
60
-
61
-
- Email & collaboration
62
-
- Attack simulation training (Defender for Office 365 Plan 2 only)
63
-
64
-
Use :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **What's New** to go to the [Microsoft Defender XDR Blog](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/bg-p/MicrosoftThreatProtectionBlog).
65
-
66
-
Use :::image type="icon" source="media/m365-cc-sc-community-icon.png" border="false"::: **Community to go to the [Security, Compliance, and Identity community](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/ct-p/MicrosoftSecurityandCompliance).
67
-
68
-
Use :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add cards** to customize the information that's shown on the page.
59
+
- Use :::image type="icon" source="media/m365-cc-sc-guided-tour-icon.png" border="false"::: **Guided tour** to take a quick tour of:
60
+
- Email & collaboration
61
+
- Attack simulation training (Defender for Office 365 Plan 2 only)
62
+
- Use :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **What's New** to go to the [Microsoft Defender XDR Blog](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/bg-p/MicrosoftThreatProtectionBlog).
63
+
- Use :::image type="icon" source="media/m365-cc-sc-community-icon.png" border="false"::: **Community to go to the [Security, Compliance, and Identity community](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/ct-p/MicrosoftSecurityandCompliance).
64
+
- Use :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add cards** to customize the information on the page.
69
65
70
66
### Investigation & response
71
67
@@ -85,13 +81,13 @@ Brings together incident and alert management across your email, devices, and id
85
81
86
82
#### Hunting
87
83
88
-
Proactively search for threats, malware, and malicious activity across your endpoints, Microsoft 365 mailboxes, and more by using [advanced hunting queries](advanced-hunting-overview.md). These powerful queries can be used to locate and review threat indicators and entities for both known and potential threats.
84
+
Proactively search for threats, malware, and malicious activity across your endpoints, Microsoft 365 mailboxes, and more by using [advanced hunting queries](advanced-hunting-overview.md). You can use these powerful queries to locate and review threat indicators and entities for known and potential threats.
89
85
90
-
[Custom detection rules](/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules)can be built from advanced hunting queries to help you proactively watch for events that might be indicative of breach activity and misconfigured devices.
86
+
You can build [custom detection rules](/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules) from advanced hunting queries to proactively monitor events that might indicate breach activity and misconfigured devices.
91
87
92
88
### Actions & submissions
93
89
94
-
**Action center** shows you the investigations created by automated investigation and response capabilities. This automated, self-healing in the Defender portal can help security teams by automatically responding to specific events.
90
+
**Action center** shows you the investigations created by automated investigation and response capabilities. This automated, self-healing capability in the Defender portal can help security teams by automatically responding to specific events.
95
91
96
92
For more information, see [Action center](m365d-action-center.md).
97
93
@@ -109,7 +105,7 @@ The following subsections describe the features that are available in the **Inve
109
105
110
106
Get threat intelligence from expert Microsoft security researchers. Threat Analytics helps security teams be more efficient when facing emerging threats. Threat Analytics includes:
111
107
112
-
- Email-related detections and mitigations from Microsoft Defender for Office 365. This is in addition to the endpoint data already available from Microsoft Defender for Endpoint.
108
+
- Email-related detections and mitigations from Microsoft Defender for Office 365.
113
109
- Incidents view related to the threats.
114
110
- Enhanced experience for quickly identifying and using actionable information in the reports.
115
111
@@ -126,7 +122,7 @@ The **Email & collaboration** node contains features that are specific to Defend
126
122
-**Review** at <https://security.microsoft.com/threatreview> contains the following features:
127
123
-[Action center](/defender-xdr/m365d-action-center): Defender for Office 365 Plan 2 only.
128
124
-**Quarantine** for [users](/defender-office-365/quarantine-end-user) and [admins](/defender-office-365/quarantine-admin-manage-messages-files).
129
-
-**Restricted entities** contains[restricted users](/defender-office-365/outbound-spam-restore-restricted-users) and [restricted connectors](/defender-office-365/connectors-detect-respond-to-compromise).
125
+
-**Restricted entities**: Contains[restricted users](/defender-office-365/outbound-spam-restore-restricted-users) and [restricted connectors](/defender-office-365/connectors-detect-respond-to-compromise).
130
126
-**Malware trends**
131
127
-[Campaigns](/defender-office-365/campaigns): Defender for Office 365 Plan 2 only.
132
128
-[Threat trackers](/defender-office-365/threat-trackers): Defender for Office 365 Plan 2 only.
@@ -139,26 +135,30 @@ The **Email & collaboration** node contains features that are specific to Defend
-**Anti-spam**: Includes [inbound anti-spam](/defender-office-365/anti-spam-protection-about#anti-spam-policies), [outbound anti-spam](/defender-office-365/outbound-spam-policies-configure), and [connection filtering](/defender-office-365/connection-filter-policies-configure).
-**Email authentication settings**: Settings for [trusted ARC sealers](/defender-office-365/email-authentication-arc-configure) and [DKIM](/defender-office-365/email-authentication-dkim-configure).
:::image type="content" source="media/mdo-m365d-nav.png" alt-text="A screenshot that shows the left navigation pane of the M365 Defender portal focused on Email & collaboration." lightbox="media/mdo-m365d-nav.png":::
151
+
:::image type="content" source="media/mdo-m365d-nav.png" alt-text="A screenshot that shows the left navigation pane of the Defender portal focused on Email & collaboration." lightbox="media/mdo-m365d-nav.png":::
156
152
157
153
> [!TIP]
158
154
> For more information about the differences between Defender for Office 365 Plan 1 and Plan 2, see [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
159
155
>
160
156
> Although it isn't directly accessible from the left navigation pane in the Defender portal, the **Email entity page** in Defender for Office 365 *unifies* and *centralizes* email information to empower admins and security operations (SecOps) teams to quickly understand and act on email threats. For more information, see [The Email entity page](/defender-office-365/mdo-email-entity-page).
161
157
158
+
### SOC optimization
159
+
160
+
For more information, see [SOC optimization reference of recommendations](/en-us/azure/sentinel/soc-optimization/soc-optimization-reference).
161
+
162
162
### Reports
163
163
164
164
Defender for Office 365 reports are available on the **Reports** page at <https://security.microsoft.com/securityreports>\>**Email & collaboration** section \>**Email & collaboration reports**.
@@ -168,13 +168,45 @@ For more information, see the following articles:
-[Defender for Office 365 reports](/defender-office-365/reports-defender-for-office-365)
170
170
171
-
### Access and Reports
171
+
### Learning hub
172
+
173
+
Redirects to <https://learn.microsoft.com/training/defender/>.
174
+
175
+
### Trials
176
+
177
+
Start trials of eligible Defender security products and Microsoft Purview compliance products.
178
+
179
+
Organizations with Defender for Office 365 Plan 1 can start a trial of Defender for Office 365 Plan 2. For more information, see [Trial user guide: Microsoft Defender for Office 365](/defender-office-365/trial-user-guide-defender-for-office-365).
180
+
181
+
### System
182
+
183
+
The following subsections describe the features that are available in the **System** node in the Defender portal.
184
+
185
+
:::image type="content" source="media/m365d-system-nav.png" alt-text="A screenshot showing the expanded System node in the Defender portal." lightbox="media/m365d-system-nav.png":::
186
+
187
+
#### Audit
188
+
189
+
[Audit log search](/en-us/purview/audit-search) and [audit log retention policies](/purview/audit-log-retention-policies).
190
+
191
+
#### Permissions
192
+
193
+
-[Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md)
194
+
-**Microsoft Entra ID**. You can view information about the roles that are shown, but you can't manage role membership here. The details flyout of each role contains a link to the **Users** page in Microsoft Entra where you can add users to roles.
-**Service health**: View the health status of the Microsoft 365 services that are included in your company's subscription.
200
+
-**Message center**: The [Microsoft 365 Message center](/microsoft-365/admin/manage/message-center) in the Microsoft 365 admin center.
172
201
173
-
View reports, change your settings, and modify user roles.
202
+
#### Settings
174
203
175
-
:::image type="content" source="media/m365d-settings-nav.png" alt-text="A screenshot that shows the left navigation pane of the M365 Defender portal highlighting Access and Reports capabilities." lightbox="media/m365d-settings-nav.png":::
176
-
204
+
**Email & collaboration** contains the following Defender for Office 365 features:
0 commit comments