Skip to content

Commit 924c65c

Browse files
Merge pull request #5257 from MicrosoftDocs/main
[AutoPublish] main to live - 10/14 13:31 PDT | 10/15 02:01 IST
2 parents bc85aa6 + 1d1ca17 commit 924c65c

File tree

10 files changed

+99
-6
lines changed

10 files changed

+99
-6
lines changed

defender-endpoint/linux-preferences.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Configure security settings in Microsoft Defender for Endpoint on Linux
33
ms.reviewer: gopkr, ardeshmukh
44
description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
@@ -581,10 +581,8 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
581581
582582
### Exclusion setting preferences
583583

584-
**Exclusion setting preferences are currently in preview**.
585-
586584
> [!NOTE]
587-
> Global exclusions are currently in public preview, and are available in Defender for Endpoint beginning with version `101.23092.0012` or later in the Insiders Slow and Production rings.
585+
> Global exclusions are available in Defender for Endpoint beginning with version `101.24092.0001` or above.
588586
589587
The `exclusionSettings` section of the configuration profile is used to configure various exclusions for Microsoft Defender for Endpoint for Linux.
590588

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,8 @@
8686
href: incident-queue.md
8787
- name: Manage incidents
8888
href: manage-incidents.md
89+
- name: Use tasks to handle incident workflow
90+
href: split-incidents-into-tasks.md
8991
- name: Investigate and respond to incidents
9092
items:
9193
- name: Plan incident response

defender-xdr/incidents-overview.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: An introduction to incidents and alerts, and the differences betwee
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
7-
ms.author: yelevin
8-
author: yelevin
7+
ms.author: guywild
8+
author: guywi-ms
99
ms.localizationpriority: medium
1010
manager: raynew
1111
audience: ITPro
@@ -68,6 +68,7 @@ The Microsoft Defender portal includes tools and methods to automate or otherwis
6868
| Tool/Method | Description |
6969
| ----------- | ----------- |
7070
| **[Manage](manage-incidents.md) and [investigate](investigate-incidents.md) incidents** | Make sure that you prioritize your incidents according to severity and then work through them to investigate. Use advanced hunting to search for threats, and get ahead of emerging threats with threat analytics. |
71+
| **[Split incidents into tasks](split-incidents-into-tasks.md)** | Use tasks in the Microsoft Defender portal to investigate and resolve incidents collaboratively across your operations teams. Managing incidents with tasks helps to improve efficiency in incident response and ensure accountability for investigation outcomes. |
7172
| **[Automatically investigate and resolve alerts](/defender-xdr/m365d-autoir)** | If enabled to do so, Microsoft Defender XDR can automatically investigate and resolve alerts from Microsoft 365 and Entra ID sources through automation and artificial intelligence. |
7273
| **[Configure automatic attack disruption actions](automatic-attack-disruption.md)** | Use high-confidence signals collected from Microsoft Defender XDR and Microsoft Sentinel to automatically disrupt active attacks at machine speed, containing the threat and limiting the impact. |
7374
| **[Configure Microsoft Sentinel automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules)** | Use automation rules to automate triage, assignment, and management of incidents, regardless of their source. Help your team's efficiency even more by configuring your rules to apply tags to incidents based on their content, suppress noisy (false positive) incidents, and close resolved incidents that meet the appropriate criteria, specifying a reason and adding comments. |
397 KB
Loading
420 KB
Loading
31.7 KB
Loading
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: Streamline incident response using tasks in the Microsoft Defender portal (Preview)
3+
description: Create and manage tasks in the Microsoft Defender portal to investigate and resolve incidents collaboratively.
4+
search.appverid: met150
5+
ms.service: unified-secops-platform
6+
ms.author: guywild
7+
author: guywi-ms
8+
ms.date: 09/04/2025
9+
ms.collection:
10+
- M365-security-compliance
11+
- tier1
12+
- usx-security
13+
ms.topic: how-to
14+
15+
# customer intent: As a security operations analyst, I want to manage incidents using tasks in the Microsoft Defender portal so that I can improve collaboration, efficiency, and accountability in incident investigations.
16+
---
17+
18+
# Streamline incident response using tasks in the Microsoft Defender portal (Preview)
19+
20+
Use tasks in the Microsoft Defender portal to investigate and resolve incidents collaboratively across your operations teams. Breaking incidents into actionable tasks boosts operational efficiency and reinforces accountability throughout the process.
21+
22+
This article explains how tasks work and how to use tasks to manage incidents in the Microsoft Defender portal.
23+
24+
## How tasks work
25+
26+
Break down investigations into clear, actionable steps and assign them across your team.
27+
28+
Using tasks is particularly useful for:
29+
30+
- Onboarding junior analysts
31+
- Working with managed security service providers (MSSPs)
32+
- Tracking work in compliance-oriented organizations
33+
34+
The task panel presents tasks alongside [Security Copilot summaries, guided responses, and reports](./security-copilot-in-microsoft-365-defender.md) to provide a comprehensive view of progress and remaining actions required to close the incident.
35+
36+
Categorize, prioritize, assign, and track each task to ensure consistency, collaboration, and accountability. When you close a task, add Closing notes to document the outcome. These notes support thorough postmortems and help teams learn from each investigation.
37+
38+
## Permissions required
39+
40+
| Action | Permissions required |
41+
|---|---|
42+
| View tasks | **Read-only** permissions or **Security data basics (read)** under the **Security operations** permissions group in the Defender portal. |
43+
| Create tasks | **All read and manage permissions** permissions or **Response (manage)** under the **Security operations** permissions group in the Defender portal. |
44+
45+
For more information about unified RBAC in the Defender portal, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
46+
47+
48+
## View and manage tasks
49+
50+
To view and manage tasks:
51+
52+
1. From the Defender portal menu, select **Incidents & alerts** > **Incidents** to open the Incident queue.
53+
1. Select an incident from the queue.
54+
1. Select **Tasks** to open the **Tasks** side panel, which lists all of the tasks and Security Copilot insights associated with the incident.
55+
56+
:::image type="content" source="media/manage-incidents-using-tasks/task-pane-defender-portal.png" alt-text="Screenshot showing the Tasks side panel and incident details in Microsoft Defender portal." lightbox="media/manage-incidents-using-tasks/task-pane-defender-portal.png":::
57+
58+
1. To create a new task, select **Add task**.
59+
60+
:::image type="content" source="media/manage-incidents-using-tasks/add-task-page-defender-portal.png" alt-text="Screenshot showing the Add task pane in Microsoft Defender portal." lightbox="media/manage-incidents-using-tasks/add-task-page-defender-portal.png":::
61+
62+
Fill in the task details and select **Save**.
63+
64+
1. To update a task's status, select a status from the **Status** dropdown on task preview card.
65+
66+
:::image type="content" source="media/manage-incidents-using-tasks/update-task-status-defender-portal.png" alt-text="Screenshot showing the Update task status dropdown in Microsoft Defender portal." lightbox="media/manage-incidents-using-tasks/update-task-status-defender-portal.png":::
67+
68+
1. To edit or delete a task, select the ellipsis (**...**) > **Edit** or **Delete**.
69+
70+
## Automate and synchronize tasks created in Microsoft Sentinel using the Azure portal
71+
72+
When you onboard Microsoft Sentinel to the Defender portal, the Defender portal automatically synchronizes tasks you create in Sentinel using the Azure portal.
73+
74+
The Defender portal doesn't yet support automatic task creation, but you can continue to use [task automation rules](/azure/sentinel/create-tasks-automation-rule), [Logic App playbooks](/azure/sentinel/automation/create-tasks-playbook), or the [Incident Tasks REST API](/rest/api/securityinsights/incident-tasks) in Azure to create tasks, which are synchronized to the Defender portal.
75+
76+
## Related content
77+
78+
- [Incidents and alerts in the Microsoft Defender portal](./incidents-overview.md)
79+
- [Microsoft Copilot in Microsoft Defender](./security-copilot-in-microsoft-365-defender.md)
80+
- [Use tasks to manage incidents in Microsoft Sentinel in the Azure portal](/azure/sentinel/incident-tasks)

defender-xdr/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## September 2025
36+
37+
- (Preview) You can now use tasks in the Microsoft Defender portal to break down incident investigations into actionable steps and assign them across your operations teams. Tasks are displayed alongside Security Copilot insights, guided responses, and reports - giving your team a unified view of progress and next steps. When you onboard Microsoft Sentinel to the Defender portal, tasks you create in Microsoft Sentinel through the Azure portal are automatically synchronized to the Defender portal. For more information, see [Streamline incident response using tasks in the Microsoft Defender portal (Preview)](./split-incidents-into-tasks.md)
3638
- (Preview) You can investigate incidents using [Blast radius analysis](investigate-incidents.md#blast-radius-analysis), which is an advanced graph visualization built on the Microsoft Sentinel data lake and graph infrastructure. This feature generates an interactive graph showing possible propagation paths from the selected node to predefined critical targets scoped to the user’s permissions.
3739
- (Preview) In advanced hunting, you can now hunt using the [hunting graph](advanced-hunting-graph.md), which renders rendering predefined threat scenarios as interactive graphs.
3840

unified-secops-platform/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@
6969
href: plan-incident-response.md
7070
- name: Correlation and merging
7171
href: /defender-xdr/alerts-incidents-correlation?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json&tabs=defender-portal
72+
- name: Use tasks to handle incident workflow
73+
href: /defender-xdr/split-incidents-into-tasks?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
7274
- name: Investigate incidents in Security Copilot
7375
href: /azure/sentinel/sentinel-security-copilot?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
7476
- name: Investigate with Microsoft Copilot in Microsoft Defender

unified-secops-platform/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,14 @@ ms.topic: concept-article
2121

2222
This article lists recent features added for unified security operations in the Microsoft Defender portal.
2323

24+
25+
## September 2025
26+
27+
28+
### Manage Incident Workflows with Tasks in Microsoft Defender (Preview)
29+
30+
You can now use tasks in the Microsoft Defender portal to break down incident investigations into actionable steps and assign them across your operations teams. Tasks are displayed alongside Security Copilot insights, guided responses, and reports - giving your team a unified view of progress and next steps. When you onboard Microsoft Sentinel to the Defender portal, tasks you create in Microsoft Sentinel through the Azure portal are automatically synchronized to the Defender portal. For more information, see [Streamline incident response using tasks in the Microsoft Defender portal (Preview)](/defender-xdr/split-incidents-into-tasks?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json).
31+
2432
## August 2025
2533

2634

0 commit comments

Comments
 (0)