Skip to content

Commit 774ab7a

Browse files
authored
Merge pull request #1927 from MicrosoftDocs/main
Published main to live, Monday 05:00 PM IST, 11/18
2 parents 30728ee + 1c06c38 commit 774ab7a

File tree

7 files changed

+60
-24
lines changed

7 files changed

+60
-24
lines changed

defender-xdr/activate-defender-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ You can activate your workloads in two ways from the Permissions and roles page:
5959
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
6060
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
6161

62-
:::image type="content" source="/defender/media/defender/urbac-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen":::
62+
:::image type="content" source="/defender/media/defender/defender-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen.":::
6363

6464
> [!NOTE]
6565
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.

defender-xdr/investigate-incidents.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Investigate incidents in Microsoft Defender XDR
3-
description: Investigate incidents related to devices, users, and mailboxes.
2+
title: Investigate incidents in the Microsoft Defender portal
3+
description: Investigate incidents on various assets from correlated signals of various Defender services and other Microsoft security products like Microsoft Sentinel.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -16,20 +16,19 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 12/04/2023
19+
ms.date: 11/13/2024
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
---
2124

22-
# Investigate incidents in Microsoft Defender XDR
25+
# Investigate incidents in the Microsoft Defender portal
2326

2427
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2528

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29+
The Microsoft Defender portal presents correlated alerts, assets, investigations, and evidence from across all your assets into an incident to give you a comprehensive look into the entire breadth of an attack.
2930

30-
Microsoft Defender XDR aggregates all related alerts, assets, investigations, and evidence from across your devices, users, and mailboxes into an incident to give you a comprehensive look into the entire breadth of an attack.
31-
32-
Within an incident, you analyze the alerts that affect your network, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
31+
Within an incident, you analyze the alerts, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
3332

3433
## Initial investigation
3534

@@ -84,7 +83,9 @@ From the graph, you can:
8483

8584
- Hunt for entity information of a device, file, IP address, or URL.
8685

87-
The *go hunt* option takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
86+
### Go hunt
87+
88+
The ***go hunt*** action takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
8889

8990
- See all available queries – the option returns all available queries for the entity type you're investigating.
9091
- All Activity – the query returns all activities associated with an entity, providing you with a comprehensive view of the incident's context.
@@ -96,7 +97,7 @@ The resulting logs or alerts can be linked to an incident by selecting a results
9697

9798
:::image type="content" source="/defender/media/investigate-incidents/fig2-gohunt-attackstory.png" alt-text="Highlighting the link to incident option in go hunt query results" lightbox="/defender/media/investigate-incidents/fig2-gohunt-attackstory.png":::
9899

99-
If the incident or related alerts were the result of an analytics rule you've set, you can also select **Run query** to see other related results.
100+
If the incident or related alerts were the result of an analytics rule you've set, you can also select ***Run query*** to see other related results.
100101

101102
## Summary
102103

defender-xdr/manage-incidents.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.topic: how-to
1919
search.appverid:
2020
- MOE150
2121
- MET150
22-
ms.date: 08/21/2024
22+
ms.date: 11/18/2024
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
@@ -291,12 +291,10 @@ When doing a postmortem of an incident, view the incident's **Activity log** to
291291

292292
You can also [add your own comments](#add-comments-to-an-incident) using the comment box available within the activity log. The comment box accepts text and formatting, links, and images.
293293

294-
### Export incident data to PDF
295-
296294
> [!IMPORTANT]
297295
> Some information in this article relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
298-
>
299-
> The export incident data feature is currently available to Microsoft Defender XDR and Microsoft unified security operations center (SOC) platform customers with the Microsoft Copilot for security license.
296+
297+
## Export incident data to PDF
300298

301299
You can export an incident's data to PDF through the **Export incident as PDF** function and save it into PDF format. This function allows security teams to review an incident's details offline at any given time.
302300

@@ -343,9 +341,7 @@ The report is cached for a couple of minutes. The system provides the previously
343341

344342
## Next steps
345343

346-
For new incidents, begin your [investigation](investigate-incidents.md).
347-
348-
For in-process incidents, continue your [investigation](investigate-incidents.md).
344+
For new and in-process incidents, continue your [incident investigation](investigate-incidents.md).
349345

350346
For resolved incidents, perform a [post-incident review](respond-first-incident-remediate.md).
351347

defender-xdr/whats-new.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-xdr
66
ms.author: diannegali
77
author: diannegali
88
ms.localizationpriority: medium
9-
ms.date: 10/17/2024
9+
ms.date: 11/18/2024
1010
manager: dansimp
1111
audience: ITPro
1212
ms.collection:
@@ -31,6 +31,8 @@ You can also get product updates and important notifications through the [messag
3131

3232
## November 2024
3333

34+
- (Preview) Microsoft Defender XDR customers can now export incident data to PDF. Use the exported data to easily capture and share incident data to other stakeholders. For details, see **[Export incident data to PDF](manage-incidents.md#export-incident-data-to-pdf)**.
35+
- (GA) The **last update time** column in the [incident queue](incident-queue.md#incident-queue) is now generally available.
3436
- (Preview) Cloud-native investigation and response actions are now available for container-related alerts in the Microsoft Defender portal. Security operations center (SOC) analysts can now investigate and respond to container-related alerts in near real-time with cloud-native response actions and investigation logs to hunt for related activities. For more information, see [Investigate and respond to container threats in the Microsoft Defender portal](investigate-respond-container-threats.md).
3537
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
3638
- (Preview) The [CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md) table is now available for preview in advanced hunting. It contains information about process events in multicloud hosted environments. You can use it to discover threats that can be observed through process details, like malicious processes or command-line signatures.
132 KB
Loading

exposure-management/TOC.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,9 @@
6666
href: exposure-insights-overview.md
6767
- name: Review security initiatives
6868
href: initiatives.md
69-
- name: Investigate security metrics
7069
- name: Security initiatives catalog
7170
href: initiatives-list.md
72-
- name: Investigate initiative metrics
71+
- name: Investigate security initiative metrics
7372
href: security-metrics.md
7473
- name: Review security recommendations
7574
href: security-recommendations.md

exposure-management/microsoft-security-exposure-management.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,44 @@ Currently, Security Exposure Management consolidates security posture informatio
7777
In addition to Microsoft services, Security Exposure Management allows you to connect to external data sources to further enrich and extend your security posture management.
7878
For more information on data connectors, see [Data connectors overview](overview-data-connectors.md).
7979

80+
## How do I buy Microsoft Security Exposure Management?
81+
82+
Exposure Management is available in the Microsoft Defender portal at [https://security.microsoft.com](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity.microsoft.com%2F&data=05|02|[email protected]|535bfb9f198d4313d96108dd05e1a9d4|72f988bf86f141af91ab2d7cd011db47|1|0|638673189066169502|Unknown|TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D|0|||&sdata=vOA7%2FeI4WU4tRMWSPiHTs4jrZX8%2B%2FN70wheiTBFPSDk%3D&reserved=0)
83+
84+
Access to the exposure management blade and features in the Microsoft Defender portal is available with any of these licenses:
85+
86+
- Microsoft 365 E5 o*r A5*
87+
- Microsoft 365 E3
88+
- Microsoft 365 E3 with the Microsoft Enterprise Mobility + Security E5 add-on
89+
- Microsoft 365 A3 with the Microsoft 365 A5 security add-on
90+
- Microsoft Enterprise Mobility + Security E5 or A5
91+
- Microsoft Defender for Endpoint (Plan 1 and 2)
92+
- Microsoft Defender for Identity
93+
- Microsoft Defender for Cloud Apps
94+
- Microsoft Defender for Office 365 (Plans 1 and 2)
95+
- Microsoft Defender Vulnerability Management
96+
97+
Integration of data from the above tools and other Microsoft Security tools like Microsoft Defender for Cloud, Microsoft Defender Cloud Security Posture Management and Microsoft Defender External Attack Surface Management is available with those licenses.
98+
99+
Integration of non-Microsoft security tools will be a consumption-based cost based on number of assets in the connected security tool. The external connectors are in public preview with plan to be generally available (GA) end of Q1 2025. Pricing will be announced before billing of external connectors starts at GA.
100+
101+
### Data freshness, retention, and related functionality
102+
103+
We currently ingest and process supported data from first-party Microsoft products, making it available within the enterprise exposure graph and applicable Microsoft Security Exposure Management experiences built on top of graph data within 72 hours of its production at the source product.
104+
105+
Microsoft product data is retained for no less than 14 days in the enterprise exposure graph and/or Microsoft Security Exposure Management. Only the latest data snapshot received from Microsoft products is retained; we do not store historical data.
106+
107+
Some enterprise exposure graph and/or Microsoft Security Exposure Management experiences data is available for querying via Advanced Hunting and is subject to [Advanced Hunting service limitations](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fdefender-xdr%2Fadvanced-hunting-limits&data=05|02|[email protected]|2eeaacf0c0f2494a51a308dd06ea1a99|72f988bf86f141af91ab2d7cd011db47|1|0|638674324732464247|Unknown|TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D|0|||&sdata=cPz7p6NX%2BvUWkVwR4Wx0%2F5pJ0wbP6h8ZXsFSa4JrLxA%3D&reserved=0).
108+
109+
We reserve the right to modify some or all of these parameters in the future, including:
110+
111+
- Data ingestion frequency and freshness: We may increase the current 72-hour latency (decrease the frequency of data ingestion) for some or all Microsoft data sources.
112+
- Data retention period: We may decrease the current 14-day data retention period.
113+
- Service features and functionality: We may alter, limit, or discontinue specific features, capabilities, or functionalities of the service built on top of the enterprise exposure graph and/or Microsoft Security Exposure Management data.
114+
- Data query limits: We may impose limitations on the number, frequency, or type of data queries that can be performed against enterprise exposure graph or Microsoft Security Exposure Management data.
115+
116+
We will make reasonable efforts to provide advance notice of any significant changes to the service. However, you acknowledge and agree that you are solely responsible for monitoring any such notifications.
117+
80118
## Next steps
81119

82120
Review [prerequisites](prerequisites.md) to get started with Security Exposure Management.

0 commit comments

Comments
 (0)