You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/activate-defender-rbac.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ You can activate your workloads in two ways from the Permissions and roles page:
59
59
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
60
60
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
61
61
62
-
:::image type="content" source="/defender/media/defender/urbac-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen":::
62
+
:::image type="content" source="/defender/media/defender/defender-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen.":::
63
63
64
64
> [!NOTE]
65
65
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
Copy file name to clipboardExpand all lines: defender-xdr/investigate-incidents.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Investigate incidents in Microsoft Defender XDR
3
-
description: Investigate incidents related to devices, users, and mailboxes.
2
+
title: Investigate incidents in the Microsoft Defender portal
3
+
description: Investigate incidents on various assets from correlated signals of various Defender services and other Microsoft security products like Microsoft Sentinel.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -16,20 +16,19 @@ ms.topic: conceptual
16
16
search.appverid:
17
17
- MOE150
18
18
- MET150
19
-
ms.date: 12/04/2023
19
+
ms.date: 11/13/2024
20
+
appliesto:
21
+
- Microsoft Defender XDR
22
+
- Microsoft Sentinel in the Microsoft Defender portal
20
23
---
21
24
22
-
# Investigate incidents in Microsoft Defender XDR
25
+
# Investigate incidents in the Microsoft Defender portal
The Microsoft Defender portal presents correlated alerts, assets, investigations, and evidence from across all your assets into an incident to give you a comprehensive look into the entire breadth of an attack.
29
30
30
-
Microsoft Defender XDR aggregates all related alerts, assets, investigations, and evidence from across your devices, users, and mailboxes into an incident to give you a comprehensive look into the entire breadth of an attack.
31
-
32
-
Within an incident, you analyze the alerts that affect your network, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
31
+
Within an incident, you analyze the alerts, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
33
32
34
33
## Initial investigation
35
34
@@ -84,7 +83,9 @@ From the graph, you can:
84
83
85
84
- Hunt for entity information of a device, file, IP address, or URL.
86
85
87
-
The *go hunt* option takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
86
+
### Go hunt
87
+
88
+
The ***go hunt*** action takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
88
89
89
90
- See all available queries – the option returns all available queries for the entity type you're investigating.
90
91
- All Activity – the query returns all activities associated with an entity, providing you with a comprehensive view of the incident's context.
@@ -96,7 +97,7 @@ The resulting logs or alerts can be linked to an incident by selecting a results
96
97
97
98
:::image type="content" source="/defender/media/investigate-incidents/fig2-gohunt-attackstory.png" alt-text="Highlighting the link to incident option in go hunt query results" lightbox="/defender/media/investigate-incidents/fig2-gohunt-attackstory.png":::
98
99
99
-
If the incident or related alerts were the result of an analytics rule you've set, you can also select **Run query** to see other related results.
100
+
If the incident or related alerts were the result of an analytics rule you've set, you can also select ***Run query*** to see other related results.
Copy file name to clipboardExpand all lines: defender-xdr/manage-incidents.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.topic: how-to
19
19
search.appverid:
20
20
- MOE150
21
21
- MET150
22
-
ms.date: 08/21/2024
22
+
ms.date: 11/18/2024
23
23
appliesto:
24
24
- Microsoft Defender XDR
25
25
- Microsoft Sentinel in the Microsoft Defender portal
@@ -291,12 +291,10 @@ When doing a postmortem of an incident, view the incident's **Activity log** to
291
291
292
292
You can also [add your own comments](#add-comments-to-an-incident) using the comment box available within the activity log. The comment box accepts text and formatting, links, and images.
293
293
294
-
### Export incident data to PDF
295
-
296
294
> [!IMPORTANT]
297
295
> Some information in this article relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
298
-
>
299
-
> The export incident data feature is currently available to Microsoft Defender XDR and Microsoft unified security operations center (SOC) platform customers with the Microsoft Copilot for security license.
296
+
297
+
## Export incident data to PDF
300
298
301
299
You can export an incident's data to PDF through the **Export incident as PDF** function and save it into PDF format. This function allows security teams to review an incident's details offline at any given time.
302
300
@@ -343,9 +341,7 @@ The report is cached for a couple of minutes. The system provides the previously
343
341
344
342
## Next steps
345
343
346
-
For new incidents, begin your [investigation](investigate-incidents.md).
347
-
348
-
For in-process incidents, continue your [investigation](investigate-incidents.md).
344
+
For new and in-process incidents, continue your [incident investigation](investigate-incidents.md).
349
345
350
346
For resolved incidents, perform a [post-incident review](respond-first-incident-remediate.md).
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-xdr
6
6
ms.author: diannegali
7
7
author: diannegali
8
8
ms.localizationpriority: medium
9
-
ms.date: 10/17/2024
9
+
ms.date: 11/18/2024
10
10
manager: dansimp
11
11
audience: ITPro
12
12
ms.collection:
@@ -31,6 +31,8 @@ You can also get product updates and important notifications through the [messag
31
31
32
32
## November 2024
33
33
34
+
- (Preview) Microsoft Defender XDR customers can now export incident data to PDF. Use the exported data to easily capture and share incident data to other stakeholders. For details, see **[Export incident data to PDF](manage-incidents.md#export-incident-data-to-pdf)**.
35
+
- (GA) The **last update time** column in the [incident queue](incident-queue.md#incident-queue) is now generally available.
34
36
- (Preview) Cloud-native investigation and response actions are now available for container-related alerts in the Microsoft Defender portal. Security operations center (SOC) analysts can now investigate and respond to container-related alerts in near real-time with cloud-native response actions and investigation logs to hunt for related activities. For more information, see [Investigate and respond to container threats in the Microsoft Defender portal](investigate-respond-container-threats.md).
35
37
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
36
38
- (Preview) The [CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md) table is now available for preview in advanced hunting. It contains information about process events in multicloud hosted environments. You can use it to discover threats that can be observed through process details, like malicious processes or command-line signatures.
In addition to Microsoft services, Security Exposure Management allows you to connect to external data sources to further enrich and extend your security posture management.
78
78
For more information on data connectors, see [Data connectors overview](overview-data-connectors.md).
79
79
80
+
## How do I buy Microsoft Security Exposure Management?
81
+
82
+
Exposure Management is available in the Microsoft Defender portal at [https://security.microsoft.com](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity.microsoft.com%2F&data=05|02|[email protected]|535bfb9f198d4313d96108dd05e1a9d4|72f988bf86f141af91ab2d7cd011db47|1|0|638673189066169502|Unknown|TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D|0|||&sdata=vOA7%2FeI4WU4tRMWSPiHTs4jrZX8%2B%2FN70wheiTBFPSDk%3D&reserved=0)
83
+
84
+
Access to the exposure management blade and features in the Microsoft Defender portal is available with any of these licenses:
85
+
86
+
- Microsoft 365 E5 o*r A5*
87
+
- Microsoft 365 E3
88
+
- Microsoft 365 E3 with the Microsoft Enterprise Mobility + Security E5 add-on
89
+
- Microsoft 365 A3 with the Microsoft 365 A5 security add-on
90
+
- Microsoft Enterprise Mobility + Security E5 or A5
91
+
- Microsoft Defender for Endpoint (Plan 1 and 2)
92
+
- Microsoft Defender for Identity
93
+
- Microsoft Defender for Cloud Apps
94
+
- Microsoft Defender for Office 365 (Plans 1 and 2)
95
+
- Microsoft Defender Vulnerability Management
96
+
97
+
Integration of data from the above tools and other Microsoft Security tools like Microsoft Defender for Cloud, Microsoft Defender Cloud Security Posture Management and Microsoft Defender External Attack Surface Management is available with those licenses.
98
+
99
+
Integration of non-Microsoft security tools will be a consumption-based cost based on number of assets in the connected security tool. The external connectors are in public preview with plan to be generally available (GA) end of Q1 2025. Pricing will be announced before billing of external connectors starts at GA.
100
+
101
+
### Data freshness, retention, and related functionality
102
+
103
+
We currently ingest and process supported data from first-party Microsoft products, making it available within the enterprise exposure graph and applicable Microsoft Security Exposure Management experiences built on top of graph data within 72 hours of its production at the source product.
104
+
105
+
Microsoft product data is retained for no less than 14 days in the enterprise exposure graph and/or Microsoft Security Exposure Management. Only the latest data snapshot received from Microsoft products is retained; we do not store historical data.
106
+
107
+
Some enterprise exposure graph and/or Microsoft Security Exposure Management experiences data is available for querying via Advanced Hunting and is subject to [Advanced Hunting service limitations](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fdefender-xdr%2Fadvanced-hunting-limits&data=05|02|[email protected]|2eeaacf0c0f2494a51a308dd06ea1a99|72f988bf86f141af91ab2d7cd011db47|1|0|638674324732464247|Unknown|TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D|0|||&sdata=cPz7p6NX%2BvUWkVwR4Wx0%2F5pJ0wbP6h8ZXsFSa4JrLxA%3D&reserved=0).
108
+
109
+
We reserve the right to modify some or all of these parameters in the future, including:
110
+
111
+
- Data ingestion frequency and freshness: We may increase the current 72-hour latency (decrease the frequency of data ingestion) for some or all Microsoft data sources.
112
+
- Data retention period: We may decrease the current 14-day data retention period.
113
+
- Service features and functionality: We may alter, limit, or discontinue specific features, capabilities, or functionalities of the service built on top of the enterprise exposure graph and/or Microsoft Security Exposure Management data.
114
+
- Data query limits: We may impose limitations on the number, frequency, or type of data queries that can be performed against enterprise exposure graph or Microsoft Security Exposure Management data.
115
+
116
+
We will make reasonable efforts to provide advance notice of any significant changes to the service. However, you acknowledge and agree that you are solely responsible for monitoring any such notifications.
117
+
80
118
## Next steps
81
119
82
120
Review [prerequisites](prerequisites.md) to get started with Security Exposure Management.
0 commit comments