You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-get-started.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,7 @@ ms.collection:
19
19
- tier1
20
20
- essentials-get-started
21
21
ms.custom: intro-get-started
22
+
#customer intent: As a Defender for Business admin, I need quick guidance to navigate the Microsoft Defender portal and find first steps so I can get started securing devices and email.
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
In Microsoft Defender for Endpoint, admins can use the unified submissions feature to submit files and file hashes (SHAs) to Microsoft for review. The unified submissions experience is a one-stop shop for submitting emails, URLs, email attachments, and files in one, easy-to-use submission experience. Admins can use the Microsoft Defender portal or the Microsoft Defender for Endpoint Alert page to submit suspicious files.
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Defender for Endpoint with.
29
26
30
27
## Enable advanced features
@@ -168,9 +165,9 @@ For more information about role assignments, see [Create and manage roles](user-
168
165
169
166
Enabling this feature allows you to run unsigned scripts in a live response session.
170
167
171
-
## Deception
168
+
## Automatic attack disruption
172
169
173
-
Deception enables your security team to manage and deploy lures and decoys to catch attackers in your environment. After you turn this on, go to Rules > Deception rules to run deception campaigns. See [Manage the deception capability in Microsoft Defender XDR](/defender-xdr/deception-overview).
170
+
Automatic attack disruption disrupts attacks by automatically containing compromised assets that the attacker is using. It limits lateral movement early on, thereby reducing the overall impact of an attack, both on the associated costs and on loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online. For more information, see [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption).
174
171
175
172
## Share endpoint alerts with Microsoft Compliance Center
Aggregated reporting addresses constraints on event reporting in Microsoft Defender for Endpoint. Aggregated reporting extends signal reporting intervals to significantly reduce the size of reported events while preserving essential event properties.
25
24
@@ -33,13 +32,16 @@ When aggregated reporting is turned on, you can query for a summary of all suppo
33
32
34
33
The following requirements must be met before turning on aggregated reporting:
35
34
36
-
- Defender for Endpoint Plan 2 license
37
35
- Permissions to enable advanced features
38
36
39
-
Aggregated reporting supports the following:
40
37
41
-
- Client version: Windows version 24H and later
42
-
- Operating systems: Windows 11 (22H2, Enterprise), Windows 10 (20H2, 21H1, 21H2), Windows Server 2019 and later, Windows Server version 20H2 or Azure Stack HCI OS, version 23H2 and later
38
+
### Supported operating systems:
39
+
40
+
- Windows 10 (20H2, 21H1, 21H2)
41
+
- Windows 11 (22H2, Enterprise)
42
+
- Windows Server 2019 and later
43
+
- Windows Server version 20H2 or Azure Stack HCI OS, version 23H2 and later
44
+
- Client version: Windows version 24H and later
43
45
44
46
## Turn on aggregated reporting
45
47
@@ -77,9 +79,9 @@ To query new data with aggregated reports:
77
79
3. When necessary, create new custom rules to incorporate new action types.
78
80
4. Go to the **Advanced Hunting** page and query the new data.
79
81
80
-
Here is an example of advanced hunting query results with aggregated reports.
82
+
Here is an example of advanced hunting query results with aggregated reports.
81
83
82
-
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png":::
84
+
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png":::
0 commit comments