Skip to content

Commit 99c10ba

Browse files
authored
Merge pull request #2005 from MicrosoftDocs/gary-minor-fixes
Correct font weight of table headings, adjust indentation
2 parents ad54462 + 004c52f commit 99c10ba

File tree

8 files changed

+33
-44
lines changed

8 files changed

+33
-44
lines changed

unified-secops-platform/defender-xdr-portal.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Defender XDR consolidates threat signals and data across assets, so that you can
2626

2727
Defender XDR combines multiple Microsoft security services.
2828

29-
**Service** | **Details**
29+
Service | Details
3030
--- | ---
3131
**[Protect against email threats with Defender for Office 365](/defender-office-365/mdo-sec-ops-guid)** | Helps protect email and Office 365 resources.
3232
**[Protect devices with Defender for Endpoint](/defender-endpoint/mde-sec-ops-guide)** | Delivers preventative protection, post-breach detection, and automated investigation and response for devices.
@@ -71,7 +71,7 @@ Defender XDR provides threat hunting capabilities in the Defender portal.
7171

7272
- **Advanced hunting**: SOC teams can use [advanced hunting](/defender-xdr/advanced-hunting-overview) with the Kusto Query Language (KQL) in the portal to create custom queries and rules for threat hunting across the enterprise. Analysts can search for indicators of compromise, anomalies, and suspicious activities across Defender XDR data sources.
7373

74-
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
74+
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
7575

7676
- **Custom detection rules**: In addition to advanced hunting, SOC teams can create [custom detection rules](/defender-xdr/custom-detections-overview) to proactively monitor and respond to events and system states. Rules can trigger alerts or automatic response actions.
7777

@@ -82,6 +82,3 @@ Defender for XDR provides [automated investigation and response](/defender-xdr/m
8282
As alerts create incidents, automated investigations produce a verdict that determines whether a threat was found. When suspicious and malicious threats are identified, remediation actions include sending a file to quarantine, stopping a process, blocking a URL, or isolating a device.
8383

8484
You can view a summary of automated investigations and responses in the Home page of the portal. Pending remediation actions are handled in the portal Action Center.
85-
86-
87-

unified-secops-platform/gov-support.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,10 +46,10 @@ When using a US government cloud, you need to use the following URIs instead of
4646

4747
- **Login**:
4848

49-
- **GCC**: https://login.microsoftonline.com
50-
- **GCC High and DoD**: https://login.microsoftonline.us
49+
- **GCC**: https://login.microsoftonline.com
50+
- **GCC High and DoD**: https://login.microsoftonline.us
5151

5252
- **Microsoft Defender XDR API**:
5353

54-
- **GCC**: https://api-gcc.security.microsoft.us
55-
- **GCC High and DoD**: https://api-gov.security.microsoft.us
54+
- **GCC**: https://api-gcc.security.microsoft.us
55+
- **GCC High and DoD**: https://api-gov.security.microsoft.us

unified-secops-platform/hunting-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The foundation of hunting queries in the Defender portal rests on Kusto Query La
3333

3434
Maximize the full extent of your team's hunting prowess with the following hunting tools in the Defender portal:
3535

36-
| **Hunting tool** | **Description** |
36+
| Hunting tool | Description |
3737
|---|---|
3838
|[**Advanced hunting**](/defender-xdr/advanced-hunting-microsoft-defender) | View and query data sources available within Microsoft's unified SecOps platform and share queries with your team. Use all your existing Microsoft Sentinel workspace content, including queries and functions. |
3939
|[**Microsoft Sentinel hunting**](/azure/sentinel/hunting) | Hunt for security threats across data sources. Use specialized search and query tools like **hunts**, **bookmarks** and **livestream**. |
@@ -52,7 +52,7 @@ Maximize the full extent of your team's hunting prowess with the following hunti
5252

5353
The following table describes how you can make the most of the Defender portal's hunting tools across all stages of threat hunting:
5454

55-
| **Hunting stage** | **Hunting tools** |
55+
| Hunting stage | Hunting tools |
5656
| --- | --- |
5757
| **Proactive** - Find the weak areas in your environment before threat actors do. Detect suspicious activity extra early. | - Regularly conduct end-to-end [hunts](/azure/sentinel/hunts) to proactively seek out undetected threats and malicious behaviors, validate hypotheses, and act on findings by creating new detections, incidents, or threat intelligence.<br><br> - Use the [MITRE ATT&CK map](/azure/sentinel/mitre-coverage#use-the-mitre-attck-framework-in-analytics-rules-and-incidents) to identify detection gaps, and then run predefined hunting queries for highlighted techniques.<br><br> - Insert new threat intelligence into proven queries to tune detections and confirm if a compromise is in process.<br><br> - Take proactive steps to build and test queries against data from new or updated sources.<br><br> - Use [advanced hunting](/defender-xdr/advanced-hunting-microsoft-defender) to find early-stage attacks or threats that don't have alerts. |
5858
| **Reactive** - Use hunting tools during an active investigation. | - Use [livestream](/azure/sentinel/livestream) to run specific queries at consistent intervals to actively monitor events.<br><br> - Quickly pivot on incidents with the [**Go hunt**](/defender-xdr/advanced-hunting-go-hunt) button to search broadly for suspicious entities found during an investigation.<br><br> - Hunt through threat intelligence to perform [infrastructure chaining](/defender/threat-intelligence/infrastructure-chaining).<br><br> - Use [Security Copilot in advanced hunting](/defender-xdr/advanced-hunting-security-copilot) to generate queries at machine speed and scale. |

unified-secops-platform/overview-defender-portal.md

Lines changed: 14 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The portal provides a single location to monitor, manage, and configure pre-brea
3232

3333
The Defender portal combines many Microsoft security services.
3434

35-
**Service** | **Details**
35+
Service | Details
3636
--- | ---
3737
**Microsoft Defender XDR**<br/><br/> Detect and respond to cybersecurity threats. | [Defender XDR includes a suite of services](/defender-xdr/microsoft-365-defender) that come together in the Defender portal to provide unified threat protection across the enterprise.<br/><br/> Defender XDR services collect, correlate, and analyze threat data and signals across endpoints and devices, identities, email, apps, and OT/IoT assets. In the portal you can review, investigate, and respond to security alerts and incidents, automatically disrupt attacks, and proactively hunt for threats.<br/><br/>[Learn more](defender-xdr-portal.md) about Defender XDR in the Defender portal.
3838
**Microsoft Sentinel**<br/><br/> Collect, analyze, and manage security data at scale using automation and orchestration.| Microsoft Sentinel fully integrates with Defender XDR in the Defender portal, providing additional threat protection capabilities such as attack disruption, unified entities and incidents, and SOC optimization.<br/><br/> For more information, see [Microsoft Sentinel in the Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal).
@@ -44,7 +44,7 @@ The Defender portal combines many Microsoft security services.
4444

4545
In the Defender portal **Permissions** page, use the following methods to configure user access:
4646

47-
**Methods** | **Details**
47+
Methods | Details
4848
--- | ---
4949
[Global Microsoft Entra roles](/defender-xdr/m365d-permissions) | Accounts with the following Global Microsoft Entra roles can access Microsoft Defender XDR functionality and data: <ul><li>Global administrator</li><li>Security administrator</li><li>Security Operator</li><li>Global Reader</li><li>Security Reader</li>
5050
[Custom roles](/defender-xdr/custom-roles) | Allow access to specific data, tasks, and features using custom roles. Custom roles control granular access, and can be used together with Microsoft Entra global roles.
@@ -65,7 +65,7 @@ On the **Home** page, your view is determined by the services included in your s
6565

6666
:::image type="content" source="./media/overview-defender-portal/home-page.png" alt-text="Screenshot of the Home page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/home-page.png":::
6767

68-
**Feature** | **Details**
68+
Feature | Details
6969
--- | ---
7070
**Home page** | The Home page provides a view of your environment's security state. Review active threats, resources at risk, and a summary of all-up security posture. Use the dashboard for an up-to-date snapshot, and drill down to details as needed.
7171
**Portal notifications** | Portal notifications keep you up-to-date with important information, including updates, events, complete or in-progress actions, and warnings and errors.<br/><br/> Notifications are sorted by their generated time in the notification panel, with the most recent displayed first. For more information, see [Configure alert notifications](/defender-xdr/configure-email-notifications?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/).
@@ -81,7 +81,7 @@ In **Exposure management**, review the overall state of your security posture, e
8181

8282
:::image type="content" source="./media/overview-defender-portal/exposure-management-page.png" alt-text="Screenshot of the Exposure Management page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/exposure-management-page.png":::
8383

84-
**Feature** | **Details**
84+
Feature | Details
8585
--- | ---
8686
**Exposure management overview** | This dashboard provides a quick view of devices and cloud resources, including internet-facing devices and critical assets. Learn how well your key security initiatives are doing and drill down into top metrics for high-value vulnerabilities. Get exposure levels for different types of resources, and track security progress over time.
8787
**Attack surfaces** | Visualize exposure data with the attack surface map.<br/>Explore resources and connections on the map, and drill down to focus on specific assets.<br/>In the **Attack path management** dashboard, review potential attack paths across your organization that attackers might exploit, together with choke points and critical assets in the path.
@@ -102,7 +102,7 @@ Manage and investigate security incidents in a single location and from a single
102102

103103
:::image type="content" source="./media/overview-defender-portal/incidents-page.png" alt-text="Screenshot of the Incidents page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/incidents-page.png":::
104104

105-
**Feature** | **Details**
105+
Feature | Details
106106
--- | ---
107107
**Incidents** | On the **Incidents** dashboard, review a list of the latest incidents and prioritize those marked as high severity. Each incident groups correlated alerts and associated data that makes up an attack. Drill down in an incident to get a full attack story, including information about associated alerts, devices, users, investigations, and evidence.
108108
**Alerts** | In the **Alerts** dashboard, review alerts. Alerts are signals issued by portal services in response to threat detection activity.<br/><br/> The unified alerts queue displays new and in progress alerts from the last seven days, with the most recent alerts at the top. Filter on alerts to investigate as needed.
@@ -115,7 +115,7 @@ The **Hunting** area allows you to proactively inspect security events and data
115115

116116
:::image type="content" source="./media/overview-defender-portal/advanced-hunting-page.png" alt-text="Screenshot of the Advanted Hunting page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/advanced-hunting-page.png":::
117117

118-
**Feature** | **Details**
118+
Feature | Details
119119
--- | ---
120120
**Advanced hunting** | Explore and query up to 30 days of raw data. You can query using a guided query tool, use sample queries, or use [Kusto Query Language (KQL)](/kusto/query/?view=microsoft-sentinel&preserve-view=true) to build your own queries.
121121
**Custom detection rules** | Create custom detection rules to proactively monitor and respond to events and system states. Use custom detection rules to trigger security alerts or automatic response actions.
@@ -128,7 +128,7 @@ Threat protection activity results in actions to remediate threats. Actions can
128128

129129
:::image type="content" source="./media/overview-defender-portal/action-center-page.png" alt-text="Screenshot of the Action Center page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/action-center-page.png":::
130130

131-
**Feature** | **Details**
131+
Feature | Details
132132
--- | ---
133133
**Action center** | Review the list of actions that need attention. Approve or reject actions one at a time, or in bulk. You can review action history to track remediation.
134134
**Submissions** | Submit suspect spam, URLs, email issues and more to Microsoft.
@@ -152,7 +152,7 @@ In the **Threat intelligence** section of the portal, get direct visibility into
152152

153153
:::image type="content" source="./media/overview-defender-portal/threat-analytics-page.png" alt-text="Screenshot of the Threat Analytics page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/threat-analytics-page.png":::
154154

155-
**Feature** | **Details**
155+
Feature | Details
156156
--- | ---
157157
**Threat analytics** | Learn which threats are currently relevant in your organization.<br/><br/>Assess threat severity, drill down into specific threat reports, and identity actions to take. Different types of threat analytics reports are available.
158158
**Intel profiles** | Review curated threat intelligence content organized by threat actors, tools, and known vulnerabilities.
@@ -168,7 +168,7 @@ The **Assets** page provides a unified view of discovered and protected assets,
168168
:::image type="content" source="./media/overview-defender-portal/device-inventory-page.png" alt-text="Screenshot of the Device Inventory page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/device-inventory-page.png":::
169169

170170

171-
**Feature** | **Details**
171+
Feature | Details
172172
--- | ---
173173
**Devices** |On the **Device Inventory** page, get an overview of discovered devices in each tenant to which you have access. Review devices by type, and focus on high risk or critical devices.<br/><br/> Group devices logically by adding tags for context, and exclude devices you don't want to assess. Start an automated investigation for devices.
174174
**Identities** | Get a summary of your user and account inventory.
@@ -181,7 +181,7 @@ Access Microsoft Sentinel capabilities in the Defender portal.
181181

182182
:::image type="content" source="./media/overview-defender-portal/sentinel-search-page.png" alt-text="Screenshot of the Sentinel Search page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/sentinel-search-page.png":::
183183

184-
**Feature** | **Details**
184+
Feature | Details
185185
--- | ---
186186
**Search** | [Search](/azure/sentinel/investigate-large-datasets) across logs, and access past searches.
187187
**Threat management** | Visualize and monitor connected data with [workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal).<br/>[Investigate incidents](/azure/sentinel/investigate-incidents) and [classify alerts with entities](/azure/sentinel/customize-entity-activities?tabs=defender).<br/>Proactively [hunt for threats](/azure/sentinel/hunts) and [use notebooks](/azure/sentinel/hunting?tabs=azure-portal#notebooks-to-power-investigations) to power investigations.<br/> [Integrate threat intelligence](/azure/sentinel/threat-intelligence-integration) into threat detection, and [use the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage) in analytics and incidents.
@@ -196,7 +196,7 @@ In the **Identities** section of the Defender portal, monitor user and account h
196196

197197
:::image type="content" source="./media/overview-defender-portal/identity-dashboard.png" alt-text="Screenshot of the Identity Dashboard page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/identity-dashboard.png":::
198198

199-
**Feature** | **Details**
199+
Feature | Details
200200
--- | ---
201201
**ITDR dashboard** | On the [Identity threat detection and response (ITDR) dashboard](/defender-for-identity/dashboard), get insights and real-time data about the security state of users and accounts.<br/><br/> The dashboard includes information about Defender for Identity deployment, information about highly privileged identities, and information about identity-related incidents.<br/><br/> If there's a problem with a Defender for Identity workspace, it's raised on the [Health issues page](/defender-for-identity/health-alerts).
202202
**Health issues** | Any Defender for Identity global or sensor-based health issues are displayed on this page.
@@ -210,7 +210,7 @@ In the **Endpoints** section of the portal, monitor and manage asset vulnerabili
210210

211211
:::image type="content" source="./media/overview-defender-portal/vulnerability-management-dashboard.png" alt-text="Screenshot of the Microsoft Defender Vulnerability Management dashboard in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/vulnerability-management-dashboard.png":::
212212

213-
**Feature** | **Details**
213+
Feature | Details
214214
--- | ---
215215
**Vulnerability management** | Review vulnerability state in the dashboard. Get recommendations based on vulnerability assessment of devices, and remediate as needed.<br/> Review your organizational [software inventory](/defender-vulnerability-management/tvm-software-inventory), including vulnerable components, certificates, and hardware.<br/>Review [CVEs and security advisories](/defender-vulnerability-management/tvm-weaknesses-security-advisories).<br/> Review the [event timeline](/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline) to determine the impact of vulnerabilities.<br/> Use [security baseline assessment](/defender-vulnerability-management/tvm-security-baselines) to assess devices against security benchmarks.
216216
**Connected applications** | Get information about the [Microsoft Entra applications connected to Defender for Endpoint](/defender-endpoint/connected-applications).
@@ -226,7 +226,7 @@ In the **Email & collaboration** section, monitor, investigate, and manage secur
226226

227227
:::image type="content" source="./media/overview-defender-portal/email-investigations.png" alt-text="Screenshot of the Email Investigations page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/email-investigations.png":::
228228

229-
**Feature** | **Details**
229+
Feature | Details
230230
--- | ---
231231
**Investigations** | Run and review automated investigations.
232232
**Explorer** | Hunt, investigate, and explore threats to emails and documents. Drill down into specific types of threats, including malware, phishing, and campaigns.
@@ -243,7 +243,7 @@ In the **Cloud apps** section, review security to minimize risk and exposure to
243243

244244
:::image type="content" source="./media/overview-defender-portal/cloud-apps-sample-report.png" alt-text="Screenshot of a Cloud Apps sample report in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/cloud-apps-sample-report.png":::
245245

246-
**Feature** | **Details**
246+
Feature | Details
247247
--- | ---
248248
**Cloud discovery** | Get an overview of cloud app security with [discovery reports](/defender-cloud-apps/set-up-cloud-discovery). Review a sample report, and create new reports.
249249
**Cloud app catalog** | Get an overview of well-known cloud apps and their associated risk. You can sanction and unsanction apps as needed.
@@ -273,9 +273,3 @@ In the **Reports** page, review security reports across all areas, assets, and w
273273
In the **Trials** page, review trial solutions, designed to help you make decisions about upgrades and purchases.
274274

275275
:::image type="content" source="./media/overview-defender-portal/trials-page.png" alt-text="Screenshot of the page Microsoft Security Trials page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/trials-page.png":::
276-
277-
278-
279-
280-
281-

unified-secops-platform/overview-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Microsoft Security Exposure Management and Microsoft Threat Intelligence are ava
2424

2525
- Before you deploy Microsoft's unified security operations platform, make sure that you have a plan in place, including a workspace design and an understanding of Microsoft Sentinel costs and billing.
2626

27-
For more information, see [Unified security operations platform planning overview](overview-plan.md).
27+
For more information, see [Unified security operations platform planning overview](overview-plan.md).
2828

2929
## Deploy Microsoft Defender XDR services
3030

0 commit comments

Comments
 (0)