Skip to content

Commit 929c18a

Browse files
Merge pull request #2007 from MicrosoftDocs/main
OOB publish main to live for breadcrumbs in PR 2006
2 parents da7c9b0 + 1790468 commit 929c18a

File tree

10 files changed

+40
-48
lines changed

10 files changed

+40
-48
lines changed

defender-xdr/m365d-autoir-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 08/11/2023
11+
ms.date: 11/25/2024
1212
manager: dansimp
1313
audience: ITPro
1414
ms.collection:
@@ -67,7 +67,7 @@ If you've determined that a device or a file is not a threat, you can undo remed
6767

6868
| Action source | Supported Actions |
6969
|:---|:---|
70-
| - Automated investigation <br/>- Microsoft Defender Antivirus <br/>- Manual response actions | - Isolate device <br/>- Restrict code execution <br/>- Quarantine a file <br/>- Remove a registry key <br/>- Stop a service <br/>- Disable a driver <br/>- Remove a scheduled task |
70+
| - Automated investigation <br/>- Microsoft Defender Antivirus <br/>- Manual response actions | - Isolate device <br/>- Contain device <br/>- Contain user <br/>- Restrict code execution <br/>- Quarantine a file <br/>- Remove a registry key <br/>- Stop a service <br/>- Disable a driver <br/>- Remove a scheduled task |
7171

7272
### Undo one remediation action
7373

unified-secops-platform/breadcrumb/toc.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,13 @@
77
topicHref: /unified-secops-platform/index
88
- name: "Microsoft's unified SecOps platform"
99
tocHref: /security/zero-trust/
10-
topicHref: /defender-xdr/unified-secops-platform/index
10+
topicHref: /unified-secops-platform/index
1111
- name: "Microsoft's unified SecOps platform"
1212
tocHref: /defender-for-identity/
13-
topicHref: /defender-xdr/unified-secops-platform/index
13+
topicHref: /unified-secops-platform/index
14+
- name: "Microsoft's unified SecOps platform"
15+
tocHref: /defender-xdr/
16+
topicHref: /unified-secops-platform/index
1417

1518
## Azure override
1619
- name: "Microsoft Defender"

unified-secops-platform/defender-xdr-portal.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Defender XDR consolidates threat signals and data across assets, so that you can
2626

2727
Defender XDR combines multiple Microsoft security services.
2828

29-
**Service** | **Details**
29+
Service | Details
3030
--- | ---
3131
**[Protect against email threats with Defender for Office 365](/defender-office-365/mdo-sec-ops-guid)** | Helps protect email and Office 365 resources.
3232
**[Protect devices with Defender for Endpoint](/defender-endpoint/mde-sec-ops-guide)** | Delivers preventative protection, post-breach detection, and automated investigation and response for devices.
@@ -71,7 +71,7 @@ Defender XDR provides threat hunting capabilities in the Defender portal.
7171

7272
- **Advanced hunting**: SOC teams can use [advanced hunting](/defender-xdr/advanced-hunting-overview) with the Kusto Query Language (KQL) in the portal to create custom queries and rules for threat hunting across the enterprise. Analysts can search for indicators of compromise, anomalies, and suspicious activities across Defender XDR data sources.
7373

74-
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
74+
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
7575

7676
- **Custom detection rules**: In addition to advanced hunting, SOC teams can create [custom detection rules](/defender-xdr/custom-detections-overview) to proactively monitor and respond to events and system states. Rules can trigger alerts or automatic response actions.
7777

@@ -82,6 +82,3 @@ Defender for XDR provides [automated investigation and response](/defender-xdr/m
8282
As alerts create incidents, automated investigations produce a verdict that determines whether a threat was found. When suspicious and malicious threats are identified, remediation actions include sending a file to quarantine, stopping a process, blocking a URL, or isolating a device.
8383

8484
You can view a summary of automated investigations and responses in the Home page of the portal. Pending remediation actions are handled in the portal Action Center.
85-
86-
87-

unified-secops-platform/gov-support.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,10 +46,10 @@ When using a US government cloud, you need to use the following URIs instead of
4646

4747
- **Login**:
4848

49-
- **GCC**: https://login.microsoftonline.com
50-
- **GCC High and DoD**: https://login.microsoftonline.us
49+
- **GCC**: https://login.microsoftonline.com
50+
- **GCC High and DoD**: https://login.microsoftonline.us
5151

5252
- **Microsoft Defender XDR API**:
5353

54-
- **GCC**: https://api-gcc.security.microsoft.us
55-
- **GCC High and DoD**: https://api-gov.security.microsoft.us
54+
- **GCC**: https://api-gcc.security.microsoft.us
55+
- **GCC High and DoD**: https://api-gov.security.microsoft.us

unified-secops-platform/hunting-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The foundation of hunting queries in the Defender portal rests on Kusto Query La
3333

3434
Maximize the full extent of your team's hunting prowess with the following hunting tools in the Defender portal:
3535

36-
| **Hunting tool** | **Description** |
36+
| Hunting tool | Description |
3737
|---|---|
3838
|[**Advanced hunting**](/defender-xdr/advanced-hunting-microsoft-defender) | View and query data sources available within Microsoft's unified SecOps platform and share queries with your team. Use all your existing Microsoft Sentinel workspace content, including queries and functions. |
3939
|[**Microsoft Sentinel hunting**](/azure/sentinel/hunting) | Hunt for security threats across data sources. Use specialized search and query tools like **hunts**, **bookmarks** and **livestream**. |
@@ -52,7 +52,7 @@ Maximize the full extent of your team's hunting prowess with the following hunti
5252

5353
The following table describes how you can make the most of the Defender portal's hunting tools across all stages of threat hunting:
5454

55-
| **Hunting stage** | **Hunting tools** |
55+
| Hunting stage | Hunting tools |
5656
| --- | --- |
5757
| **Proactive** - Find the weak areas in your environment before threat actors do. Detect suspicious activity extra early. | - Regularly conduct end-to-end [hunts](/azure/sentinel/hunts) to proactively seek out undetected threats and malicious behaviors, validate hypotheses, and act on findings by creating new detections, incidents, or threat intelligence.<br><br> - Use the [MITRE ATT&CK map](/azure/sentinel/mitre-coverage#use-the-mitre-attck-framework-in-analytics-rules-and-incidents) to identify detection gaps, and then run predefined hunting queries for highlighted techniques.<br><br> - Insert new threat intelligence into proven queries to tune detections and confirm if a compromise is in process.<br><br> - Take proactive steps to build and test queries against data from new or updated sources.<br><br> - Use [advanced hunting](/defender-xdr/advanced-hunting-microsoft-defender) to find early-stage attacks or threats that don't have alerts. |
5858
| **Reactive** - Use hunting tools during an active investigation. | - Use [livestream](/azure/sentinel/livestream) to run specific queries at consistent intervals to actively monitor events.<br><br> - Quickly pivot on incidents with the [**Go hunt**](/defender-xdr/advanced-hunting-go-hunt) button to search broadly for suspicious entities found during an investigation.<br><br> - Hunt through threat intelligence to perform [infrastructure chaining](/defender/threat-intelligence/infrastructure-chaining).<br><br> - Use [Security Copilot in advanced hunting](/defender-xdr/advanced-hunting-security-copilot) to generate queries at machine speed and scale. |

0 commit comments

Comments
 (0)