You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
34
-
35
30
> [!NOTE]
36
-
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
31
+
> The **Microsoft Graph security API** is a unified schema and interface that integrates with various Microsoft security solutions and Microsoft security partners. To get started, see [Use the Microsoft Graph security API](/graph/api/resources/security-api-overview).
37
32
38
33
The following resources provide more information about APIs available for other Microsoft security solutions, beyond the Microsoft Defender XDR API.
39
34
40
35
-[Microsoft Defender for Endpoint](/defender-endpoint/api/apis-intro)
41
36
-[Microsoft Defender for Office 365](/office/office-365-management-api/)
42
37
-[Microsoft Defender for Cloud Apps](/cloud-app-security/api-introduction)
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
31
+
> The **Microsoft Graph security API** is a unified schema and interface that integrates with various Microsoft security solutions and Microsoft security partners. To get started, see [Use the Microsoft Graph security API](/graph/api/resources/security-api-overview).
32
32
33
33
> [!IMPORTANT]
34
34
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview). For information about the new _update incident_ API using MS Graph security API, see [Update incident](/graph/api/security-incident-update).
Copy file name to clipboardExpand all lines: defender-xdr/autoad-results.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 06/19/2024
11
+
ms.date: 04/25/2025
12
12
manager: deniseb
13
13
audience: ITPro
14
14
ms.collection:
@@ -31,9 +31,9 @@ When an automatic attack disruption triggers in Microsoft Defender XDR, the deta
31
31
32
32
## Review the incident graph
33
33
34
-
Microsoft Defender XDR automatic attack disruption is builtin in the incident view. Review the incident graph to get the entire attack story and assess the attack disruption impact and status.
34
+
Microsoft Defender XDR automatic attack disruption is built-in in the incident view. Review the incident graph to get the entire attack story and assess the attack disruption impact and status.
35
35
36
-
Here are some examples of what it looks like:
36
+
The incident page includes the following information:
37
37
38
38
- Disrupted incidents include a tag for 'Attack Disruption' and the specific threat type identified (i.e., ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.
39
39
- A highlighted notification below the incident title indicating that the incident was disrupted.
@@ -96,6 +96,7 @@ IdentityDirectoryEvents
96
96
97
97
The above query was adapted from a [Microsoft Defender for Identity - Attack Disruption query](https://github.com/alexverboon/Hunting-Queries-Detection-Rules/blob/main/Defender%20For%20Identity/MDI-AttackDisruption.md#microsoft-365-defender).
98
98
99
-
## Next step
99
+
## Related content
100
100
101
-
-[Get email notifications for response actions](m365d-response-actions-notifications.md)
101
+
-[Exclude assets from automated response actions](automatic-attack-disruption-exclusions.md)
102
+
-[Get email notifications for response actions](m365d-response-actions-notifications.md)
Copy file name to clipboardExpand all lines: defender-xdr/configure-deception.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.topic: how-to
16
16
search.appverid:
17
17
- MOE150
18
18
- MET150
19
-
ms.date: 01/12/2024
19
+
ms.date: 04/25/2025
20
20
appliesto:
21
21
- Microsoft Defender XDR
22
22
#customer intent: As a security analyst, I want to learn how to configure the deception capability so that I can protect my organization from high-impact attacks that use human-operated lateral movement.
-[Microsoft Defender for Endpoint Plan 1](/defender-endpoint/microsoft-defender-endpoint)
25
-
-[Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
26
-
-[Microsoft Defender for Business](/defender-business/mdb-overview)
27
-
28
27
You can configure Microsoft Defender XDR to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity.
29
28
30
29
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up email notifications for specific users (not roles or groups).
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
## Pull Microsoft Defender XDR incidents and streaming event data using security information and events management (SIEM) tools
@@ -84,14 +83,16 @@ For more information on:
84
83
The new SmartConnector for Microsoft Defender XDR ingests incidents into ArcSight and maps these onto its Common Event
85
84
Framework (CEF).
86
85
87
-
For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender).
86
+
For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://www.microfocus.com/documentation/arcsight/arcsight-smartconnectors-8.4/microsoft-365-defender/index.html).
88
87
89
88
The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that's now retired.
90
89
91
90
### Elastic
92
91
93
92
Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.
93
+
94
94
The Elastic integration for Microsoft Defender XDR and Defender for Endpoint enables organizations to leverage incidents and alerts from Defender within Elastic Security to perform investigations and incident response. Elastic correlates this data with other data sources, including cloud, network, and endpoint sources using robust detection rules to find threats quickly.
95
+
95
96
For more information on the Elastic connector, see: [Microsoft M365 Defender | Elastic docs](https://docs.elastic.co/integrations/m365_defender)
96
97
97
98
## Ingesting streaming event data via Event Hubs
@@ -114,7 +115,7 @@ Use the new IBM QRadar Microsoft Defender XDR Device Support Module (DSM) that c
114
115
115
116
For more information on the Elastic streaming API integration, see [Microsoft M365 Defender | Elastic docs](https://docs.elastic.co/integrations/m365_defender).
116
117
117
-
## Related articles
118
+
## Related content
118
119
119
120
[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
0 commit comments