You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -99,6 +100,9 @@ Create custom rules to control when alerts are suppressed, or resolved. You can
99
100
100
101
6. Click **Save**.
101
102
103
+
> [!NOTE]
104
+
> Alert suppression is not compatible for custom detections. Make sure to fine-tune your custom detections to avoid [false positives](/defender-endpoint/defender-endpoint-false-positives-negatives).
105
+
102
106
#### View the list of suppression rules
103
107
104
108
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Rules**\>**Alert suppression**.
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-linux.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,8 +44,8 @@ The XMDE Client Analyzer tool can be downloaded as a [binary](https://go.microso
44
44
45
45
Download and extract the XMDE Client Analyzer. You can use either the binary or Python version, as follows:
46
46
47
-
-[Binary version of the Client Analyzer](/defender-endpoint/run-analyzer-macos-linux)
48
-
-[Python version of the Client Analyzer](/defender-endpoint/run-analyzer-macos-linux)
47
+
-[Binary version of the Client Analyzer](run-analyzer-linux.md#run-the-binary-version-of-the-client-analyzer)
48
+
-[Python version of the Client Analyzer](run-analyzer-linux.md#run-the-python-based-client-analyzer)
49
49
50
50
Due to the limited commands available in live response, the steps detailed must be executed in a bash script. By splitting the installation and execution portion of these commands, it's possible to run the install script once, and run the execution script multiple times.
51
51
@@ -54,7 +54,7 @@ Due to the limited commands available in live response, the steps detailed must
54
54
55
55
#### Binary client analyzer install script
56
56
57
-
The following script performs the first six steps of the [Running the Binary version of the Client Analyzer](/defender-endpoint/run-analyzer-macos-linux). When complete, the XMDE Client Analyzer binary is available from the `/tmp/XMDEClientAnalyzerBinary/ClientAnalyzer` directory.
57
+
The following script performs the first six steps of the [Running the Binary version of the Client Analyzer](run-analyzer-linux.md#details). When complete, the XMDE Client Analyzer binary is available from the `/tmp/XMDEClientAnalyzerBinary/ClientAnalyzer` directory.
58
58
59
59
1. Create a bash file `InstallXMDEClientAnalyzer.sh` and paste the following content into it.
60
60
@@ -80,7 +80,7 @@ The following script performs the first six steps of the [Running the Binary ver
80
80
81
81
#### Python client analyzer install script
82
82
83
-
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](/defender-endpoint/run-analyzer-macos-linux). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
83
+
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](run-analyzer-linux.md#run-the-python-based-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
84
84
85
85
1. Create a bash file `InstallXMDEClientAnalyzer.sh` and paste the following content into it.
Copy file name to clipboardExpand all lines: defender-office-365/mdo-sec-ops-guide.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,6 +71,10 @@ Incident queue management and the responsible personas are described in the foll
71
71
72
72
### Manage false positive and false negative detections
73
73
74
+
> [!TIP]
75
+
> - For a quick overview on how to manage false positives, check out this short video: <https://youtu.be/yuduVj6wvsw>
76
+
> - For a quick overview on how to get started with false negative investigations, check out this short video: <https://youtu.be/sFMAI8MeDKQ>
77
+
74
78
In Defender for Office 365, you manage false positives (good mail marked as bad) and false negatives (bad mail allowed) in the following locations:
75
79
76
80
- The [Submissions page (admin submissions)](submissions-admin.md).
@@ -133,6 +137,9 @@ Campaign Views reveals malware and phishing attacks against your organization. F
133
137
134
138
## Ad-hoc activities
135
139
140
+
> [!TIP]
141
+
> For a quick overview on how to investigate email messages in Microsoft Defender for Office 365, check out this short video: <https://youtu.be/5hA7VfaMvqs>.
Copy file name to clipboardExpand all lines: exposure-management/microsoft-security-exposure-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Security Exposure Management is aimed at:
24
24
- Security and compliance admins responsible for maintaining and improving organizational security posture.
25
25
- Security operations (SecOps) and partner teams who need visibility into data and workloads across organizational silos to effectively detect, investigate, and mitigate security threats.
26
26
- Security architects responsible for solving systematic issues in overall security posture.
27
-
- Chief Security Information Officers (CISOs) and security decision makers who need insights into organizational attack surfaces and exposure in order to understand security risk within organizational risk frameworks.
27
+
- Chief Information Security Officers (CISOs) and security decision makers who need insights into organizational attack surfaces and exposure in order to understand security risk within organizational risk frameworks.
28
28
29
29
## What can I do with Security Exposure Management?
0 commit comments