You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/machines-view-overview.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -136,6 +136,7 @@ The available device properties to use as filters vary based on the device inven
136
136
|**Device subtype**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The subtype value assigned to the device. Enter a value or select an available value (for example, **Video conference**).|
137
137
|**Device type**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The type value assigned to the device. Enter a value or select an available value (for example, **Audio and Video**).|
138
138
|**Device value**|All|The assigned value of the device. The available values are **High** and **Low**.|
139
+
|**Discovery sources**|All|The source reporting on the device.|
139
140
|**Exclusion state**|All|The available values are **Not excluded** and **Excluded**. For more information, see [Exclude devices](exclude-devices.md).|
140
141
|**Exposure level**|All|The exposure level of the device based on pending security recommendations. The available values are: <ul><li>**High**</li><li>**Medium**</li><li>**Low**: Devices are less vulnerable to exploitation.</li><li>**No data available**: Possible causes for this value include: <ul><li>The device is inactive (stopped reporting for more than 30 days).</li><li>The OS on the device isn't supported. For more information, see [minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md).</li><li>The agent software on the device is stale (unlikely).</li></ul></li></ul>|
141
142
|**First seen**|All tabs except **Network devices**|How long ago the device was first seen on the network or when it was first reported by the Microsoft Defender for Endpoint sensor. The available values are **Last 7 days** or **Over 7 days ago**.|
@@ -178,6 +179,7 @@ You can sort the entries by clicking on an available column header. Select :::im
178
179
-**OS version**<sup\*</sup>
179
180
-**Sensor health state**<sup\*</sup>
180
181
-**Onboarding status**<sup\*</sup>
182
+
-**Discovery sources**
181
183
-**First seen**
182
184
-**Last device update**<sup\*</sup>
183
185
-**Tags**<sup\*</sup>
@@ -204,6 +206,7 @@ You can sort the entries by clicking on an available column header. Select :::im
204
206
-**Criticality level**<sup\*</sup>
205
207
-**Sensor health state**<sup\*</sup>
206
208
-**Onboarding status**<sup\*</sup>
209
+
-**Discovery sources**
207
210
-**Last device update**<sup\*</sup>
208
211
-**First seen**
209
212
-**Tags**<sup\*</sup>
@@ -219,6 +222,7 @@ You can sort the entries by clicking on an available column header. Select :::im
219
222
-**Vendor**<sup>\*</sup>
220
223
-**Model**<sup>\*</sup>
221
224
-**Name**<sup>\*</sup>
225
+
-**Discovery sources**
222
226
-**Domain**
223
227
-**Device type**
224
228
-**Device subtype**
@@ -241,6 +245,7 @@ You can sort the entries by clicking on an available column header. Select :::im
241
245
-**Model**<sup>\*</sup>
242
246
-**Risk level**<sup>\*</sup>
243
247
-**Exposure level**<sup>\*</sup>
248
+
-**Discovery sources**
244
249
-**OS distribution**<sup>\*</sup>
245
250
-**OS version**<sup>\*</sup>
246
251
-**First seen**
@@ -253,6 +258,7 @@ You can sort the entries by clicking on an available column header. Select :::im
For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new [custom roles](create-custom-rbac-roles.md) or [imported roles](import-rbac-roles.md), you must activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads.
34
36
@@ -54,20 +56,19 @@ You can activate your workloads in two ways from the Permissions and roles page:
54
56
:::image type="content" source="/defender/media/defender/m365-defender-rbac-activate-workloads1.png" alt-text="Screenshot of the activate workloads page" lightbox="/defender/media/defender/m365-defender-rbac-activate-workloads1.png":::
55
57
56
58
1.**Activate workloads**
57
-
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
58
-
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
59
59
60
-
:::image type="content" source="/defender/media/defender/defender-rbac-select-workload.png" alt-text="Screenshot of the choose workloads to activate screen":::
60
+
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
61
+
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
62
+
63
+
:::image type="content" source="/defender/media/defender/defender-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen.":::
61
64
62
65
> [!NOTE]
63
66
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
64
-
>
65
67
> Microsoft Defender for Cloud is active by default with Microsoft Defender XDR Unified RBAC.
66
-
>
67
-
> Defender XDR Unified RBAC is automatically active for Secure Score access. Once a custom role with one of the permissions is created, it has an immediate impact on assigned users. There is no need to activate it.
68
+
> Defender XDR Unified RBAC is automatically active for Exposure Management access. Once a custom role with one of the Exposure Management permissions is created, it has an immediate impact on assigned users. There is no need to activate it.
68
69
>
69
70
> To activate Exchange Online permissions in Microsoft Defender XDR Unified RBAC, Defender for Office 365 permissions must be active.
70
-
71
+
71
72
2.**Workload settings**
72
73
- Select **Workload settings**.
73
74
- This brings you to the Microsoft Defender XDR **Permission and roles** page.
@@ -74,7 +75,7 @@ Permissions for managing the organization's security posture and performing vuln
74
75
|Remediation handling|Manage|Create remediation tickets, submit new requests, and manage remediation activities in Defender Vulnerability Management.|
75
76
|Application handling|Manage|Manage vulnerable applications and software, including blocking and unblocking them in Defender Vulnerability Management.|
76
77
|Security baseline assessment|Manage|Create and manage profiles so you can assess if your devices comply to security industry baselines.|
77
-
|Exposure Management|Read / Manage|View or manage Secure Score recommendations from all products included in Secure Score.|
78
+
|Exposure Management|Read / Manage|View or manage Exposure Management insights, including Microsoft Secure Score recommendations from all products that are covered by Secure Score.|
In Microsoft Defender XDR Unified role-based access control (RBAC), you can edit and delete custom roles or roles that were imported from Defender for Endpoint, Defender for Identity, or Defender for Office 365.
Copy file name to clipboardExpand all lines: defender-xdr/investigate-incidents.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Investigate incidents in Microsoft Defender XDR
3
-
description: Investigate incidents related to devices, users, and mailboxes.
2
+
title: Investigate incidents in the Microsoft Defender portal
3
+
description: Investigate incidents on various assets from correlated signals of various Defender services and other Microsoft security products like Microsoft Sentinel.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -16,20 +16,19 @@ ms.topic: conceptual
16
16
search.appverid:
17
17
- MOE150
18
18
- MET150
19
-
ms.date: 12/04/2023
19
+
ms.date: 11/13/2024
20
+
appliesto:
21
+
- Microsoft Defender XDR
22
+
- Microsoft Sentinel in the Microsoft Defender portal
20
23
---
21
24
22
-
# Investigate incidents in Microsoft Defender XDR
25
+
# Investigate incidents in the Microsoft Defender portal
The Microsoft Defender portal presents correlated alerts, assets, investigations, and evidence from across all your assets into an incident to give you a comprehensive look into the entire breadth of an attack.
29
30
30
-
Microsoft Defender XDR aggregates all related alerts, assets, investigations, and evidence from across your devices, users, and mailboxes into an incident to give you a comprehensive look into the entire breadth of an attack.
31
-
32
-
Within an incident, you analyze the alerts that affect your network, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
31
+
Within an incident, you analyze the alerts, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
33
32
34
33
## Initial investigation
35
34
@@ -84,7 +83,9 @@ From the graph, you can:
84
83
85
84
- Hunt for entity information of a device, file, IP address, or URL.
86
85
87
-
The *go hunt* option takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
86
+
### Go hunt
87
+
88
+
The ***go hunt*** action takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
88
89
89
90
- See all available queries – the option returns all available queries for the entity type you're investigating.
90
91
- All Activity – the query returns all activities associated with an entity, providing you with a comprehensive view of the incident's context.
@@ -96,7 +97,7 @@ The resulting logs or alerts can be linked to an incident by selecting a results
96
97
97
98
:::image type="content" source="/defender/media/investigate-incidents/fig2-gohunt-attackstory.png" alt-text="Highlighting the link to incident option in go hunt query results" lightbox="/defender/media/investigate-incidents/fig2-gohunt-attackstory.png":::
98
99
99
-
If the incident or related alerts were the result of an analytics rule you've set, you can also select **Run query** to see other related results.
100
+
If the incident or related alerts were the result of an analytics rule you've set, you can also select ***Run query*** to see other related results.
0 commit comments