Skip to content

Commit 7fa4cf8

Browse files
committed
What's new
1 parent c31ad31 commit 7fa4cf8

File tree

2 files changed

+3
-0
lines changed

2 files changed

+3
-0
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -290,6 +290,8 @@
290290
href: advanced-hunting-devicetvmsoftwarevulnerabilities-table.md
291291
- name: DeviceTvmSoftwareVulnerabilitiesKB
292292
href: advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md
293+
- name: DisruptionAndResponseEvents
294+
href: advanced-hunting-disruptionandresponseevents-table.md
293295
- name: EmailAttachmentInfo
294296
href: advanced-hunting-emailattachmentinfo-table.md
295297
- name: EmailEvents

defender-xdr/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ You can also get product updates and important notifications through the [messag
3434

3535
## June 2025
3636
- (GA) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you're already in Microsoft Defender.
37+
- (Preview) The [`DisruptionAndResponseEvents`](advanced-hunting-disruptionandresponseevents-table.md) table, now available in advanced hunting, contains information about [automatic attack disruption](automatic-attack-disruption.md) events in Microsoft Defender XDR. These events include both block and policy application events related to triggered attack disruption policies, and automatic actions that were taken across related workloads. Increase your visibility and awareness of active, complex attacks disrupted by attack disruption to understand the attacks' scope, context, impact, and actions taken.
3738

3839
## May 2025
3940
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:

0 commit comments

Comments
 (0)