Skip to content

Commit 74cf2b5

Browse files
authored
Merge branch 'release-preview-sentinel-graph' into poliveria-whats-new-09262025
2 parents cedc370 + a4b6a0c commit 74cf2b5

File tree

4 files changed

+10
-6
lines changed

4 files changed

+10
-6
lines changed

defender-office-365/reports-email-security.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -560,6 +560,7 @@ In the **View data by Email \> Spam** and **Chart breakdown by Detection Technol
560560
- **Fingerprint matching**: The message closely resembles a previous detected malicious message.
561561
- **General filter**
562562
- **IP reputation**: The message was from a source that was previously identified as sending spam in other Microsoft 365 organizations.
563+
- **Mail bombing**: Messages detected as part of a mail bombing attack where attackers flood targeted email addresses with an overwhelming volume of messages.
563564
- **Mixed analysis detection**: Multiple filters contributed to the verdict for the message.
564565
- **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.
565566

defender-xdr/advanced-hunting-graph.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,10 @@ search.appverid: met150
2525
ms.date: 09/30/2025
2626

2727
---
28-
# Hunt for threats using the hunting graph
28+
# Hunt for threats using the hunting graph (Preview)
29+
30+
> [!IMPORTANT]
31+
> Some information relates to prereleased product that may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
2932
3033
The **hunting graph** provides visualization capabilities in [advanced hunting](advanced-hunting-overview.md) by rendering threat scenarios as interactive graphs. This feature allows security operations center (SOC) analysts, threat hunters, and security researchers conduct threat hunting and incident response easily and more intuitively, improving their efficiency and ability to assess possible security issues.
3134

1.18 KB
Loading

defender-xdr/understand-graph-icons.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ ms.date: 09/30/2025
2727
---
2828
# Understanding graphs and visualizations in Microsoft Defender
2929

30-
Microsoft Defender use interactive graphs to visualize attack paths, [blast radius](investigate-incidents.md), and relationships between entities in your environment. These visualizations provide a bird’s eye view of a possible threat or attack, letting you and your security operations (SOC) team to investigate and [hunt](advanced-hunting-graph.md) them quickly.
30+
Microsoft Defender use interactive graphs to visualize attack paths, [blast radius](investigate-incidents.md#view-blast-radius-graphs), and relationships between entities in your environment. These visualizations provide a bird’s eye view of a possible threat or attack, letting you and your security operations (SOC) team to investigate and [hunt](advanced-hunting-graph.md) them quickly.
3131

3232
The graphs generated in the Defender portal are composed of [nodes](#nodes) and [edges](#edges). This article enumerates and defines the commonly used icons for graph these elements.
3333

@@ -59,9 +59,9 @@ Entities and might also appear as **grouped nodes**, which have numerical indica
5959

6060
A node might also have any of the following indicators around it:
6161

62-
- **Critical asset** ![Critical asset icon.](/defender-xdr/media/ah-hunting-graph/critical-asset-icon.png) - Indicates that an entity is classified as business-critical or valuable, as identified in the [critical asset management](/security-exposure-management/critical-asset-management) in Microsoft Security Exposure Management. The nodes representing critical assets also have a golden halo surrounding them.
63-
- **Vulnerability** [icon] - Indicates that at least one vulnerability was detected on the entity.
64-
- **Explore connected assets** ![Explore connected asset icon.](/defender-xdr/media/ah-hunting-graph/explore-icon.png) - Indicates that the node can expand the hunting graph further beyond the initial results. Expanding the graph lets you explore other relationships the selected entity has with the other ones.
62+
- **Critical asset** - Indicates that an entity is classified as business-critical or valuable, as identified in the [critical asset management](/security-exposure-management/critical-asset-management) in Microsoft Security Exposure Management. This indicator appears as a golden crown ![Critical asset icon.](/defender-xdr/media/ah-hunting-graph/critical-asset-icon.png). The nodes representing critical assets also have a golden halo surrounding them.
63+
- **Vulnerability** - Indicates that at least one vulnerability was detected on the entity. This indicator appears as a red bug ![Vulnerability icon.](/defender-xdr/media/ah-hunting-graph/vulnerability-icon.png).
64+
- **Explore connected assets** - Indicates that the node can expand the hunting graph further beyond the initial results. Expanding the graph lets you explore other relationships the selected entity has with the other ones. This indicator appears as a blue plus sign ![Explore connected asset icon.](/defender-xdr/media/ah-hunting-graph/explore-icon.png).
6565
- **Discovery source** - Indicates the entity's data source. This indicator appears as the icon of the Defender product protecting the entity in blue (for example, ![Defender for Endpoint icon.](/defender-xdr/media/ah-hunting-graph/discovery-source-endpoint.png) for Microsoft Defender for Endpoint, or ![Defender for Cloud icon.](/defender-xdr/media/ah-hunting-graph/discovery-source-cloud.png) for Microsoft Defender for Cloud).
6666

6767
>[!TIP]
@@ -75,7 +75,7 @@ An **edge** indicates the relationship or connection properties between two nod
7575
|---|---|
7676
|![Contain edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-01.png) | Contains |
7777
|![Route edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-02.png) | Routes traffic to |
78-
|![Permission edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-03.png) | Has permission to |
78+
|![Permission edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-03.png) | Has permission to / Has role on |
7979
|![Authenticate edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-04.png) | Can authenticate as / Can authenticate to |
8080
| ![Push edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-05.png)| Pushes |
8181
|![Maintain edge icon.](/defender-xdr/media/ah-hunting-graph/edge-icon-06.png) | Maintains |

0 commit comments

Comments
 (0)