Skip to content

Commit 7c908a7

Browse files
committed
rebranding for usx - defender
1 parent 70b20fa commit 7c908a7

22 files changed

+106
-99
lines changed

ATPDocs/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -904,7 +904,7 @@ We are expanding our sensitivity definition for on-premises accounts to include
904904

905905
Released June 14, 2020
906906

907-
- **Feature enhancement: Additional activity details available in the unified SecOps experience**
907+
- **Feature enhancement: Additional activity details available**
908908
We've extended the device information we send to Defender for Cloud Apps including device names, IP addresses, account UPNs and used port. For more information about our integration with Defender for Cloud Apps, see [Using Azure ATP with Defender for Cloud Apps](/defender-for-identity/deploy-defender-identity).
909909

910910
- Version includes improvements and bug fixes for internal sensor infrastructure.

defender-xdr/incidents-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ appliesto:
2727

2828
# Incidents and alerts in the Microsoft Defender portal
2929

30-
Microsoft's unified SecOps platform in the Microsoft Defender portal brings together a unified set of security services to reduce your exposure to security threats, improve your organizational security posture, detect security threats, and investigate and respond to breaches. These services collect and produce signals that are displayed in the portal. The two main kinds of signals are:
30+
The Microsoft Defender portal brings together a unified set of security services to reduce your exposure to security threats, improve your organizational security posture, detect security threats, and investigate and respond to breaches. These services collect and produce signals that are displayed in the portal. The two main kinds of signals are:
3131

3232
**Alerts**: Signals that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment.
3333

defender-xdr/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -69,15 +69,15 @@ landingContent:
6969
linkLists:
7070
- linkListType: overview
7171
links:
72-
- text: "What is Microsoft's unified SecOps platform?"
72+
- text: "What are unified security operations?"
7373
url: /unified-secops-platform/overview-unified-security
7474
- text: "Microsoft Defender portal overview"
7575
url: /unified-secops-platform/overview-defender-portal
7676
- linkListType: deploy
7777
links:
78-
- text: "Plan your unified SecOps deployment"
78+
- text: "Plan for unified security operations"
7979
url: /unified-secops-platform/overview-plan
80-
- text: "Deploy Microsoft's unified SecOps platform"
80+
- text: "Deploy for unified security operations"
8181
url: /unified-secops-platform/overview-deploy
8282

8383
# Card

defender-xdr/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ You can also get product updates and important notifications through the [messag
100100
- Microsoft Defender Experts for XDR now offers [scoped coverage](defender-experts-scoped-coverage.md) for customers who wish to define a specific set of devices and/or users, based on geography, subsidiary, or function, for which they'd like Defender Experts to provide support.
101101
- (Preview) The [Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident) feature in Microsoft Defender advanced hunting now allows linking of Microsoft Sentinel query results. In both the Microsoft Defender unified experience and in [Defender XDR advanced hunting](advanced-hunting-link-to-incident.md), you can now specify whether an entity is an impacted asset or related evidence.
102102
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries-preview), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you're already in Microsoft Defender.
103-
- New documentation library for Microsoft's unified security operations platform. Find centralized documentation about [Microsoft's unified SecOps platform in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). Microsoft's unified SecOps platform brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI into the Defender portal. Learn about the features and functionality available with Microsoft's unified SecOps platform, then start to plan your deployment.
103+
- New documentation library for Microsoft's unified security operations platform. Find centralized documentation about [unified security operations in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). The Microsoft Defender portal brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI. Learn about the features and functionality available in the Defender portal, and then start to plan your deployment.
104104
- (GA) In advanced hunting, you can now add your frequently used schema tables, functions, queries, and detection rules in the **[Favorites](advanced-hunting-query-results.md#add-items-to-favorites)** sections under each tab for quicker access.
105105

106106
## November 2024

exposure-management/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ The following predefined classification rules were added to the critical assets
9494

9595
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
9696

97-
### New documentation library for Microsoft's unified security operations platform
97+
### New documentation library for unified security operations in the Microsoft Defender portal
9898

99-
Find centralized documentation about [Microsoft's unified SecOps platform in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). Microsoft's unified SecOps platform brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI into the Defender portal. Learn about the features and functionality available with Microsoft's unified SecOps platform, then start to plan your deployment.
99+
Find centralized documentation about [unified security operations in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). The Defender portal brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI. Learn about the features and functionality available for unified security operations, and then start to plan your deployment.
100100

101101
## November 2024
102102

unified-secops-platform/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
- name: "Microsoft's unified SecOps platform"
1+
- name: "Unified security operations"
22
href: index.yml
33
expanded: true
44
items:
55
- name: Overview
66
items:
7-
- name: What is Microsoft's unified SecOps platform?
7+
- name: What are unified security operations??
88
href: overview-unified-security.md
99
- name: What's new
1010
href: whats-new.md
@@ -28,7 +28,7 @@
2828
href: /defender-xdr/microsoft-365-security-center-defender-cloud?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
2929
- name: Microsoft Defender for IoT
3030
href: /defender-for-iot/microsoft-defender-iot?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
31-
- name: Zero Trust with unified SecOps
31+
- name: Zero Trust with unified security operations
3232
href: zero-trust.md
3333
- name: Plan
3434
items:

unified-secops-platform/breadcrumb/toc.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
tocHref: /defender/
33
topicHref: /defender/index
44
items:
5-
- name: "Microsoft's unified SecOps platform"
5+
- name: "Unified security operations"
66
tocHref: /unified-secops-platform/
77
topicHref: /unified-secops-platform/index
8-
- name: "Microsoft's unified SecOps platform"
8+
- name: "Unified security operations"
99
tocHref: /security/zero-trust/
1010
topicHref: /unified-secops-platform/index
11-
- name: "Microsoft's unified SecOps platform"
11+
- name: "Unified security operations"
1212
tocHref: /defender-for-identity/
1313
topicHref: /unified-secops-platform/index
14-
- name: "Microsoft's unified SecOps platform"
14+
- name: "Unified security operations"
1515
tocHref: /defender-xdr/
1616
topicHref: /unified-secops-platform/index
1717

@@ -20,7 +20,7 @@
2020
tocHref: /azure/
2121
topicHref: /defender/index
2222
items:
23-
- name: "Microsoft's unified SecOps platform"
23+
- name: "Unified security operations"
2424
tocHref: /azure/sentinel/
2525
topicHref: /unified-secops-platform/index
2626

unified-secops-platform/defender-xdr-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft Defender XDR in the Defender portal
2+
title: Microsoft Defender XDR in the Microsoft Defender Portal
33
description: Learn about the services and features available with Microsoft Defender XDR in the Microsoft Defender portal.
44
search.appverid: met150
55
ms.service: unified-secops-platform
@@ -17,9 +17,9 @@ ms.topic: concept-article
1717
# customer intent: As a security operations center leader, I want to learn about the services and features available with Defender XDR to help me determine whether it meets my organization's requirements.
1818
---
1919

20-
# Microsoft Defender XDR in the Defender portal
20+
# Microsoft Defender XDR in the Microsoft Defender portal
2121

22-
Microsoft Defender XDR in the Microsoft unified SecOps platform unifies and coordinates threat protection across a broad range of assets, including devices and endpoints, identities, email, Microsoft 365 services, and SaaS apps.
22+
Microsoft Defender XDR unifies and coordinates threat protection across a broad range of assets, including devices and endpoints, identities, email, Microsoft 365 services, and SaaS apps.
2323

2424
Defender XDR consolidates threat signals and data across assets, so that you can monitor and manage security threats from a single location in the [Microsoft Defender portal](https://security.microsoft.com).
2525

unified-secops-platform/detect-threats-overview.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Threat detection features across the Microsoft unified security platform
2+
title: Threat detection in the Microsoft Defender portal
33
description: Learn about the features that help detect threats in the Microsoft unified security platform
44
search.appverid: met150
55
ms.service: unified-secops-platform
@@ -16,15 +16,11 @@ ms.topic: conceptual
1616
# customer intent: As a security operations center business decision maker, I want to learn about the tools available to detect threats in Microsoft's unified security platform to help me determine whether it meets my organization's requirements.
1717
---
1818

19-
# Threat detection in Microsoft's unified SecOps platform
19+
# Threat detection in the Microsoft Defender portal
2020

21-
Cybersecurity threats abound in the current technology landscape. A lot of noise is created by the constant specter of breach and an abundance of signals available to security operation centers. Microsoft's unified SecOps platform separates actionable threats from the noise. Each service in Microsoft's unified SecOps platform adds its own finely tuned detections to match the complexion of the solution it provides and puts it all together into a single dashboard.
21+
Cybersecurity threats abound in the current technology landscape. A lot of noise is created by the constant specter of breach and an abundance of signals available to security operation centers. The Defender portal separates actionable threats from the noise, where each service adds its own finely tuned detections to match the complexion of the solution it provides and puts it all together into a single dashboard. The Microsoft Defender portal pulls detections together in the form of alerts and incidents from Microsoft Defender XDR, Microsoft Sentinel, and Microsoft Defender for Cloud.
2222

23-
Microsoft's unified SecOps platform in the Microsoft Defender portal pulls detections together in the form of alerts and incidents from Microsoft Defender XDR, Microsoft Sentinel, and Microsoft Defender for Cloud.
24-
25-
## Threat detection in the Microsoft Defender portal
26-
27-
Security teams need focus and clarity to eliminate false positives. The Microsoft Defender portal correlates and merges alerts and incidents from all supported Microsoft security and compliance solutions, and unifies threat detection from external solutions through Microsoft Sentinel and Microsoft Defender for Cloud. The correlation and merging of these signals brings rich context and prioritization. For example, an Adversary-in-The-Middle (AiTM) phishing attack might have pieces of the threat puzzle scattered across multiple sources. The Defender portal puts those pieces together into an attack story while providing attack disrupt and guided response to remediate the threat.
23+
Security teams also need focus and clarity to eliminate false positives. The Microsoft Defender portal correlates and merges alerts and incidents from all supported Microsoft security and compliance solutions, and unifies threat detection from external solutions through Microsoft Sentinel and Microsoft Defender for Cloud. The correlation and merging of these signals brings rich context and prioritization. For example, an Adversary-in-The-Middle (AiTM) phishing attack might have pieces of the threat puzzle scattered across multiple sources. The Defender portal puts those pieces together into an attack story while providing attack disrupt and guided response to remediate the threat.
2824

2925
The following image shows the incidents dashboard correlating signals from multiple services, including the individual detection sources for a complete AiTM attack story.
3026

unified-secops-platform/gov-support.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Microsoft Unified Security Operations Support for US Government Customers
3-
description: Learn about support for Microsoft's unified SecOps platform for US Government clouds.
2+
title: Microsoft Defender Portal Service Support for US Government Customers
3+
description: Learn about support in the Microsoft Defender portal for US Government clouds.
44
author: batamig
55
ms.author: bagol
66
ms.service: unified-secops-platform
@@ -10,11 +10,11 @@ ms.collection:
1010
- usx-security
1111

1212

13-
#customer intent: As a US government cloud customer, I want to understand the support available for me in Microsoft's unified security operations platform.
13+
#customer intent: As a US government cloud customer, I want to understand the support available for me in the Microsoft Defender portal.
1414

1515
---
1616

17-
# Microsoft's unified security operations support for US Government customers
17+
# Microsoft Defender portal service support for US Government customers
1818

1919
This article provides information about Microsoft's unified security operations (SecOps) support for US Government customers.
2020

@@ -26,7 +26,7 @@ This article provides information about Microsoft's unified security operations
2626

2727
- Features still in preview are available only in the commercial cloud.
2828

29-
While [automatic attack disruption](/defender-xdr/automatic-attack-disruption) with Microsoft Defender XDR is generally available, [SAP support for attack disruption](/defender-xdr/automatic-attack-disruption) with Microsoft's unified SecOps platform is available only in the commercial cloud.
29+
While [automatic attack disruption](/defender-xdr/automatic-attack-disruption) with Microsoft Defender XDR is generally available, [SAP support for attack disruption](/defender-xdr/automatic-attack-disruption) with Microsoft Sentinel and Microsoft Defender XDR is available only in the commercial cloud.
3030

3131
For more information, see:
3232

0 commit comments

Comments
 (0)