You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/defender-xdr-portal.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Defender XDR consolidates threat signals and data across assets, so that you can
26
26
27
27
Defender XDR combines multiple Microsoft security services.
28
28
29
-
**Service** | **Details**
29
+
Service | Details
30
30
--- | ---
31
31
**[Protect against email threats with Defender for Office 365](/defender-office-365/mdo-sec-ops-guid)** | Helps protect email and Office 365 resources.
32
32
**[Protect devices with Defender for Endpoint](/defender-endpoint/mde-sec-ops-guide)** | Delivers preventative protection, post-breach detection, and automated investigation and response for devices.
@@ -71,7 +71,7 @@ Defender XDR provides threat hunting capabilities in the Defender portal.
71
71
72
72
-**Advanced hunting**: SOC teams can use [advanced hunting](/defender-xdr/advanced-hunting-overview) with the Kusto Query Language (KQL) in the portal to create custom queries and rules for threat hunting across the enterprise. Analysts can search for indicators of compromise, anomalies, and suspicious activities across Defender XDR data sources.
73
73
74
-
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
74
+
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
75
75
76
76
-**Custom detection rules**: In addition to advanced hunting, SOC teams can create [custom detection rules](/defender-xdr/custom-detections-overview) to proactively monitor and respond to events and system states. Rules can trigger alerts or automatic response actions.
77
77
@@ -82,6 +82,3 @@ Defender for XDR provides [automated investigation and response](/defender-xdr/m
82
82
As alerts create incidents, automated investigations produce a verdict that determines whether a threat was found. When suspicious and malicious threats are identified, remediation actions include sending a file to quarantine, stopping a process, blocking a URL, or isolating a device.
83
83
84
84
You can view a summary of automated investigations and responses in the Home page of the portal. Pending remediation actions are handled in the portal Action Center.
Copy file name to clipboardExpand all lines: unified-secops-platform/hunting-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ The foundation of hunting queries in the Defender portal rests on Kusto Query La
33
33
34
34
Maximize the full extent of your team's hunting prowess with the following hunting tools in the Defender portal:
35
35
36
-
|**Hunting tool**|**Description**|
36
+
| Hunting tool | Description |
37
37
|---|---|
38
38
|[**Advanced hunting**](/defender-xdr/advanced-hunting-microsoft-defender)| View and query data sources available within Microsoft's unified SecOps platform and share queries with your team. Use all your existing Microsoft Sentinel workspace content, including queries and functions. |
39
39
|[**Microsoft Sentinel hunting**](/azure/sentinel/hunting)| Hunt for security threats across data sources. Use specialized search and query tools like **hunts**, **bookmarks** and **livestream**. |
@@ -52,7 +52,7 @@ Maximize the full extent of your team's hunting prowess with the following hunti
52
52
53
53
The following table describes how you can make the most of the Defender portal's hunting tools across all stages of threat hunting:
54
54
55
-
|**Hunting stage**|**Hunting tools**|
55
+
| Hunting stage | Hunting tools |
56
56
| --- | --- |
57
57
|**Proactive** - Find the weak areas in your environment before threat actors do. Detect suspicious activity extra early. | - Regularly conduct end-to-end [hunts](/azure/sentinel/hunts) to proactively seek out undetected threats and malicious behaviors, validate hypotheses, and act on findings by creating new detections, incidents, or threat intelligence.<br><br> - Use the [MITRE ATT&CK map](/azure/sentinel/mitre-coverage#use-the-mitre-attck-framework-in-analytics-rules-and-incidents) to identify detection gaps, and then run predefined hunting queries for highlighted techniques.<br><br> - Insert new threat intelligence into proven queries to tune detections and confirm if a compromise is in process.<br><br> - Take proactive steps to build and test queries against data from new or updated sources.<br><br> - Use [advanced hunting](/defender-xdr/advanced-hunting-microsoft-defender) to find early-stage attacks or threats that don't have alerts. |
58
58
|**Reactive** - Use hunting tools during an active investigation. | - Use [livestream](/azure/sentinel/livestream) to run specific queries at consistent intervals to actively monitor events.<br><br> - Quickly pivot on incidents with the [**Go hunt**](/defender-xdr/advanced-hunting-go-hunt) button to search broadly for suspicious entities found during an investigation.<br><br> - Hunt through threat intelligence to perform [infrastructure chaining](/defender/threat-intelligence/infrastructure-chaining).<br><br> - Use [Security Copilot in advanced hunting](/defender-xdr/advanced-hunting-security-copilot) to generate queries at machine speed and scale. |
Copy file name to clipboardExpand all lines: unified-secops-platform/overview-defender-portal.md
+14-20Lines changed: 14 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The portal provides a single location to monitor, manage, and configure pre-brea
32
32
33
33
The Defender portal combines many Microsoft security services.
34
34
35
-
**Service** | **Details**
35
+
Service | Details
36
36
--- | ---
37
37
**Microsoft Defender XDR**<br/><br/> Detect and respond to cybersecurity threats. | [Defender XDR includes a suite of services](/defender-xdr/microsoft-365-defender) that come together in the Defender portal to provide unified threat protection across the enterprise.<br/><br/> Defender XDR services collect, correlate, and analyze threat data and signals across endpoints and devices, identities, email, apps, and OT/IoT assets. In the portal you can review, investigate, and respond to security alerts and incidents, automatically disrupt attacks, and proactively hunt for threats.<br/><br/>[Learn more](defender-xdr-portal.md) about Defender XDR in the Defender portal.
38
38
**Microsoft Sentinel**<br/><br/> Collect, analyze, and manage security data at scale using automation and orchestration.| Microsoft Sentinel fully integrates with Defender XDR in the Defender portal, providing additional threat protection capabilities such as attack disruption, unified entities and incidents, and SOC optimization.<br/><br/> For more information, see [Microsoft Sentinel in the Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal).
@@ -44,7 +44,7 @@ The Defender portal combines many Microsoft security services.
44
44
45
45
In the Defender portal **Permissions** page, use the following methods to configure user access:
46
46
47
-
**Methods** | **Details**
47
+
Methods | Details
48
48
--- | ---
49
49
[Global Microsoft Entra roles](/defender-xdr/m365d-permissions) | Accounts with the following Global Microsoft Entra roles can access Microsoft Defender XDR functionality and data: <ul><li>Global administrator</li><li>Security administrator</li><li>Security Operator</li><li>Global Reader</li><li>Security Reader</li>
50
50
[Custom roles](/defender-xdr/custom-roles) | Allow access to specific data, tasks, and features using custom roles. Custom roles control granular access, and can be used together with Microsoft Entra global roles.
@@ -65,7 +65,7 @@ On the **Home** page, your view is determined by the services included in your s
65
65
66
66
:::image type="content" source="./media/overview-defender-portal/home-page.png" alt-text="Screenshot of the Home page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/home-page.png":::
67
67
68
-
**Feature** | **Details**
68
+
Feature | Details
69
69
--- | ---
70
70
**Home page** | The Home page provides a view of your environment's security state. Review active threats, resources at risk, and a summary of all-up security posture. Use the dashboard for an up-to-date snapshot, and drill down to details as needed.
71
71
**Portal notifications** | Portal notifications keep you up-to-date with important information, including updates, events, complete or in-progress actions, and warnings and errors.<br/><br/> Notifications are sorted by their generated time in the notification panel, with the most recent displayed first. For more information, see [Configure alert notifications](/defender-xdr/configure-email-notifications?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/).
@@ -81,7 +81,7 @@ In **Exposure management**, review the overall state of your security posture, e
81
81
82
82
:::image type="content" source="./media/overview-defender-portal/exposure-management-page.png" alt-text="Screenshot of the Exposure Management page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/exposure-management-page.png":::
83
83
84
-
**Feature** | **Details**
84
+
Feature | Details
85
85
--- | ---
86
86
**Exposure management overview** | This dashboard provides a quick view of devices and cloud resources, including internet-facing devices and critical assets. Learn how well your key security initiatives are doing and drill down into top metrics for high-value vulnerabilities. Get exposure levels for different types of resources, and track security progress over time.
87
87
**Attack surfaces** | Visualize exposure data with the attack surface map.<br/>Explore resources and connections on the map, and drill down to focus on specific assets.<br/>In the **Attack path management** dashboard, review potential attack paths across your organization that attackers might exploit, together with choke points and critical assets in the path.
@@ -102,7 +102,7 @@ Manage and investigate security incidents in a single location and from a single
102
102
103
103
:::image type="content" source="./media/overview-defender-portal/incidents-page.png" alt-text="Screenshot of the Incidents page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/incidents-page.png":::
104
104
105
-
**Feature** | **Details**
105
+
Feature | Details
106
106
--- | ---
107
107
**Incidents** | On the **Incidents** dashboard, review a list of the latest incidents and prioritize those marked as high severity. Each incident groups correlated alerts and associated data that makes up an attack. Drill down in an incident to get a full attack story, including information about associated alerts, devices, users, investigations, and evidence.
108
108
**Alerts** | In the **Alerts** dashboard, review alerts. Alerts are signals issued by portal services in response to threat detection activity.<br/><br/> The unified alerts queue displays new and in progress alerts from the last seven days, with the most recent alerts at the top. Filter on alerts to investigate as needed.
@@ -115,7 +115,7 @@ The **Hunting** area allows you to proactively inspect security events and data
115
115
116
116
:::image type="content" source="./media/overview-defender-portal/advanced-hunting-page.png" alt-text="Screenshot of the Advanted Hunting page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/advanced-hunting-page.png":::
117
117
118
-
**Feature** | **Details**
118
+
Feature | Details
119
119
--- | ---
120
120
**Advanced hunting** | Explore and query up to 30 days of raw data. You can query using a guided query tool, use sample queries, or use [Kusto Query Language (KQL)](/kusto/query/?view=microsoft-sentinel&preserve-view=true) to build your own queries.
121
121
**Custom detection rules** | Create custom detection rules to proactively monitor and respond to events and system states. Use custom detection rules to trigger security alerts or automatic response actions.
@@ -128,7 +128,7 @@ Threat protection activity results in actions to remediate threats. Actions can
128
128
129
129
:::image type="content" source="./media/overview-defender-portal/action-center-page.png" alt-text="Screenshot of the Action Center page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/action-center-page.png":::
130
130
131
-
**Feature** | **Details**
131
+
Feature | Details
132
132
--- | ---
133
133
**Action center** | Review the list of actions that need attention. Approve or reject actions one at a time, or in bulk. You can review action history to track remediation.
134
134
**Submissions** | Submit suspect spam, URLs, email issues and more to Microsoft.
@@ -152,7 +152,7 @@ In the **Threat intelligence** section of the portal, get direct visibility into
152
152
153
153
:::image type="content" source="./media/overview-defender-portal/threat-analytics-page.png" alt-text="Screenshot of the Threat Analytics page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/threat-analytics-page.png":::
154
154
155
-
**Feature** | **Details**
155
+
Feature | Details
156
156
--- | ---
157
157
**Threat analytics** | Learn which threats are currently relevant in your organization.<br/><br/>Assess threat severity, drill down into specific threat reports, and identity actions to take. Different types of threat analytics reports are available.
158
158
**Intel profiles** | Review curated threat intelligence content organized by threat actors, tools, and known vulnerabilities.
@@ -168,7 +168,7 @@ The **Assets** page provides a unified view of discovered and protected assets,
168
168
:::image type="content" source="./media/overview-defender-portal/device-inventory-page.png" alt-text="Screenshot of the Device Inventory page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/device-inventory-page.png":::
169
169
170
170
171
-
**Feature** | **Details**
171
+
Feature | Details
172
172
--- | ---
173
173
**Devices** |On the **Device Inventory** page, get an overview of discovered devices in each tenant to which you have access. Review devices by type, and focus on high risk or critical devices.<br/><br/> Group devices logically by adding tags for context, and exclude devices you don't want to assess. Start an automated investigation for devices.
174
174
**Identities** | Get a summary of your user and account inventory.
@@ -181,7 +181,7 @@ Access Microsoft Sentinel capabilities in the Defender portal.
181
181
182
182
:::image type="content" source="./media/overview-defender-portal/sentinel-search-page.png" alt-text="Screenshot of the Sentinel Search page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/sentinel-search-page.png":::
183
183
184
-
**Feature** | **Details**
184
+
Feature | Details
185
185
--- | ---
186
186
**Search** | [Search](/azure/sentinel/investigate-large-datasets) across logs, and access past searches.
187
187
**Threat management** | Visualize and monitor connected data with [workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal).<br/>[Investigate incidents](/azure/sentinel/investigate-incidents) and [classify alerts with entities](/azure/sentinel/customize-entity-activities?tabs=defender).<br/>Proactively [hunt for threats](/azure/sentinel/hunts) and [use notebooks](/azure/sentinel/hunting?tabs=azure-portal#notebooks-to-power-investigations) to power investigations.<br/> [Integrate threat intelligence](/azure/sentinel/threat-intelligence-integration) into threat detection, and [use the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage) in analytics and incidents.
@@ -196,7 +196,7 @@ In the **Identities** section of the Defender portal, monitor user and account h
196
196
197
197
:::image type="content" source="./media/overview-defender-portal/identity-dashboard.png" alt-text="Screenshot of the Identity Dashboard page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/identity-dashboard.png":::
198
198
199
-
**Feature** | **Details**
199
+
Feature | Details
200
200
--- | ---
201
201
**ITDR dashboard** | On the [Identity threat detection and response (ITDR) dashboard](/defender-for-identity/dashboard), get insights and real-time data about the security state of users and accounts.<br/><br/> The dashboard includes information about Defender for Identity deployment, information about highly privileged identities, and information about identity-related incidents.<br/><br/> If there's a problem with a Defender for Identity workspace, it's raised on the [Health issues page](/defender-for-identity/health-alerts).
202
202
**Health issues** | Any Defender for Identity global or sensor-based health issues are displayed on this page.
@@ -210,7 +210,7 @@ In the **Endpoints** section of the portal, monitor and manage asset vulnerabili
210
210
211
211
:::image type="content" source="./media/overview-defender-portal/vulnerability-management-dashboard.png" alt-text="Screenshot of the Microsoft Defender Vulnerability Management dashboard in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/vulnerability-management-dashboard.png":::
212
212
213
-
**Feature** | **Details**
213
+
Feature | Details
214
214
--- | ---
215
215
**Vulnerability management** | Review vulnerability state in the dashboard. Get recommendations based on vulnerability assessment of devices, and remediate as needed.<br/> Review your organizational [software inventory](/defender-vulnerability-management/tvm-software-inventory), including vulnerable components, certificates, and hardware.<br/>Review [CVEs and security advisories](/defender-vulnerability-management/tvm-weaknesses-security-advisories).<br/> Review the [event timeline](/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline) to determine the impact of vulnerabilities.<br/> Use [security baseline assessment](/defender-vulnerability-management/tvm-security-baselines) to assess devices against security benchmarks.
216
216
**Connected applications** | Get information about the [Microsoft Entra applications connected to Defender for Endpoint](/defender-endpoint/connected-applications).
@@ -226,7 +226,7 @@ In the **Email & collaboration** section, monitor, investigate, and manage secur
226
226
227
227
:::image type="content" source="./media/overview-defender-portal/email-investigations.png" alt-text="Screenshot of the Email Investigations page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/email-investigations.png":::
228
228
229
-
**Feature** | **Details**
229
+
Feature | Details
230
230
--- | ---
231
231
**Investigations** | Run and review automated investigations.
232
232
**Explorer** | Hunt, investigate, and explore threats to emails and documents. Drill down into specific types of threats, including malware, phishing, and campaigns.
@@ -243,7 +243,7 @@ In the **Cloud apps** section, review security to minimize risk and exposure to
243
243
244
244
:::image type="content" source="./media/overview-defender-portal/cloud-apps-sample-report.png" alt-text="Screenshot of a Cloud Apps sample report in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/cloud-apps-sample-report.png":::
245
245
246
-
**Feature** | **Details**
246
+
Feature | Details
247
247
--- | ---
248
248
**Cloud discovery** | Get an overview of cloud app security with [discovery reports](/defender-cloud-apps/set-up-cloud-discovery). Review a sample report, and create new reports.
249
249
**Cloud app catalog** | Get an overview of well-known cloud apps and their associated risk. You can sanction and unsanction apps as needed.
@@ -273,9 +273,3 @@ In the **Reports** page, review security reports across all areas, assets, and w
273
273
In the **Trials** page, review trial solutions, designed to help you make decisions about upgrades and purchases.
274
274
275
275
:::image type="content" source="./media/overview-defender-portal/trials-page.png" alt-text="Screenshot of the page Microsoft Security Trials page in the Microsoft Defender portal" lightbox="./media/overview-defender-portal/trials-page.png":::
Copy file name to clipboardExpand all lines: unified-secops-platform/overview-deploy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Microsoft Security Exposure Management and Microsoft Threat Intelligence are ava
24
24
25
25
- Before you deploy Microsoft's unified security operations platform, make sure that you have a plan in place, including a workspace design and an understanding of Microsoft Sentinel costs and billing.
26
26
27
-
For more information, see [Unified security operations platform planning overview](overview-plan.md).
27
+
For more information, see [Unified security operations platform planning overview](overview-plan.md).
0 commit comments