Skip to content

Commit 8bf288d

Browse files
Merge branch 'main' into mdi-advanced-settings-note
2 parents 8c61075 + fa61390 commit 8bf288d

File tree

4 files changed

+23
-10
lines changed

4 files changed

+23
-10
lines changed

ATPDocs/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,14 @@ Improved detection logic to include scenarios where accounts were locked during
3636

3737
## July 2025
3838

39+
**Expanded coverage in ITDR deployment health widget**
40+
41+
The ITDR deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Entra Connect servers—making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
42+
43+
**Time limit added to Recommended test mode**
44+
45+
Recommended test mode now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already had Recommended test mode enabled, a 60-day expiration was automatically applied.
46+
3947
### Identity scoping is now available in Governance environments
4048

4149
Scoping is now supported in government (GOV) environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.

defender-xdr/advanced-hunting-limits.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -21,14 +21,14 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: how-to
24-
ms.date: 05/02/2025
24+
ms.date: 07/28/2025
2525
---
2626

2727
# Use the advanced hunting query resource report
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

31-
31+
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
3232

3333
## Understand advanced hunting quotas and usage parameters
3434

@@ -39,7 +39,7 @@ Refer to the following table to understand existing quotas and usage parameters.
3939
| Quota or parameter | Size | Refresh cycle | Description |
4040
|--|--|--|--|
4141
| Date range | 30 days for Defender XDR data unless streamed through Microsoft Sentinel | Every query | Each query can look up Defender XDR data from up to the past 30 days, or longer if streamed through Microsoft Sentinel |
42-
| Result set | 30,000 rows | Every query | Each query can return up to 30,000 records. |
42+
| Result set | 100,000 rows | Every query | Each query can return up to 100,000 records. |
4343
| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it doesn't complete within 10 minutes, the service displays an error.
4444
| CPU resources | Based on tenant size | Every 15 minutes | The portal displays a warning whenever a query runs and the tenant consumes over 10% of allocated resources. [Queries are blocked](advanced-hunting-errors.md) if the tenant reaches 100% until after the next 15-minute cycle. |
4545

defender-xdr/advanced-hunting-query-results.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: how-to
21-
ms.date: 10/18/2024
21+
ms.date: 07/28/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -52,6 +52,9 @@ By default, advanced hunting displays query results as tabular data. You can als
5252
| **Stacked area chart** | Plots numeric values for a series of unique items and stacks the filled sections below the plotted values |
5353
| **Time chart** | Plots values by count on a linear time scale |
5454

55+
>[!IMPORTANT]
56+
>Microsoft Defender portal displays up to 100,000 advanced hunting query results only. [Learn more about advanced hunting quotas and usage parameters](advanced-hunting-limits.md#understand-advanced-hunting-quotas-and-usage-parameters)
57+
5558
### Construct queries for effective charts
5659

5760
When rendering charts, advanced hunting automatically identifies columns of interest and the numeric values to aggregate. To get meaningful charts, construct your queries to return the specific values you want to see visualized. Here are some sample queries and the resulting charts.

defender-xdr/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ You can also get product updates and important notifications through the [messag
4040
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
4141
- You can now view the details pane even for analytics rules.
4242
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
43+
- (Preview) In advanced hunting, the number of [query results](advanced-hunting-query-results.md) displayed in the Microsoft Defender portal has been increased to 100,000.
44+
4345
## July 2025
4446
- (Preview) The [`GraphApiAuditEvents`](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
4547

0 commit comments

Comments
 (0)