You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
## Pull Microsoft Defender XDR incidents and streaming event data using security information and events management (SIEM) tools
@@ -53,7 +50,7 @@ There are two primary models to ingest security information:
53
50
Microsoft Defender XDR currently supports the following SIEM solution integrations:
54
51
55
52
-[Ingesting incidents from the incidents REST API](#ingesting-incidents-from-the-incidents-rest-api)
56
-
-[Ingesting streaming event data via Event Hub](#ingesting-streaming-event-data-via-event-hubs)
53
+
-[Ingesting streaming event data via Event Hubs](#ingesting-streaming-event-data-via-event-hubs)
57
54
58
55
## Ingesting incidents from the incidents REST API
59
56
@@ -74,7 +71,7 @@ Using the new, fully supported Splunk Add-on for Microsoft Security that support
74
71
75
72
- Ingesting Defender for Endpoint alerts (from the Defender for Endpoint's Azure endpoint) and updating these alerts
76
73
77
-
- Support for updating Microsoft Defender XDR Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.
74
+
- Support for updating Microsoft Defender XDR Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has moved to the Microsoft 365 App for Splunk.
78
75
79
76
For more information on:
80
77
@@ -89,7 +86,7 @@ Framework (CEF).
89
86
90
87
For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender).
91
88
92
-
The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that has been deprecated.
89
+
The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that's now retired.
93
90
94
91
### Elastic
95
92
@@ -120,4 +117,5 @@ For more information on the Elastic streaming API integration, see [Microsoft M3
120
117
## Related articles
121
118
122
119
[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
Copy file name to clipboardExpand all lines: defender-xdr/custom-detections-overview.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
ms.topic: conceptual
18
-
ms.date: 02/16/2021
18
+
ms.date: 06/27/2024
19
19
---
20
20
21
21
# Custom detections overview
@@ -26,17 +26,20 @@ ms.date: 02/16/2021
26
26
**Applies to:**
27
27
- Microsoft Defender XDR
28
28
29
-
With custom detections, you can proactively monitor for and respond to various events and system states, including suspected breach activity and misconfigured endpoints. This is made possible by customizable detection rules that automatically trigger alerts as well as response actions.
29
+
With custom detections, you can proactively monitor for and respond to various events and system states, including suspected breach activity and misconfigured endpoints. This is made possible by customizable detection rules that automatically trigger alerts and response actions.
30
30
31
31
Custom detections work with [advanced hunting](advanced-hunting-overview.md), which provides a powerful, flexible query language that covers a broad set of event and system information from your network. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches.
32
32
33
33
Custom detections provide:
34
+
34
35
- Alerts for rule-based detections built from advanced hunting queries
35
36
- Automatic response actions
36
37
37
38
## See also
39
+
38
40
-[Create and manage custom detection rules](custom-detection-rules.md)
-[Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)
41
43
-[Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)
Copy file name to clipboardExpand all lines: defender-xdr/defender-threat-intelligence.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- highpri
15
15
- tier3
16
16
ms.topic: conceptual
17
-
ms.date: 03/28/2021
17
+
ms.date: 03/28/2024
18
18
---
19
19
20
20
# Microsoft Defender Threat Intelligence in Microsoft Defender XDR
@@ -38,4 +38,5 @@ Under **Threat Intelligence** is the existing node for the **Threat Analytics**
38
38
The experience between the existing Defender TI standalone portal differs slightly from the version in Microsoft Defender XDR. Though most of the functionality is available, at this time, the Defender TI experience in Microsoft Defender XDR doesn't include the ability to apply custom tags or project capabilities.
39
39
40
40
[Learn more about Microsoft Defender Threat Intelligence](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
Copy file name to clipboardExpand all lines: defender-xdr/deploy-supported-services.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Deploy services supported by Microsoft Defender XDR
3
-
description: Learn about the Microsoft security services that can be integrated by Microsoft Defender XDR, their licensing requirements, and deployment procedures
3
+
description: Learn about the Microsoft security services that integrate with Microsoft Defender XDR, their licensing requirements, and deployment procedures
[Microsoft Defender XDR](microsoft-365-defender.md) integrates various Microsoft security services to provide centralized detection, prevention, and investigation capabilities against sophisticated attacks. This article describes the supported services, their licensing requirements, the advantages and limitations associated with deploying one or more services, and links to how you can fully deploy them individually.
34
+
[Microsoft Defender XDR](microsoft-365-defender.md) integrates various Microsoft security services to provide centralized detection, prevention, and investigation capabilities against sophisticated attacks. This article describes the supported services, their licensing requirements, the advantages, and limitations associated with deploying one or more services, and links to how you can fully deploy them individually.
35
35
36
36
## Supported services
37
37
@@ -42,7 +42,7 @@ A Microsoft 365 E5, E5 Security, A5, or A5 Security license or a valid combinati
42
42
| Microsoft Defender for Endpoint | Endpoint protection suite built around powerful behavioral sensors, cloud analytics, and threat intelligence |
43
43
|Microsoft Defender for Office 365 | Advanced protection for your apps and data in Office 365, including email and other collaboration tools |
44
44
| Microsoft Defender for Identity | Defend against advanced threats, compromised identities, and malicious insiders using correlated Active Directory signals |
45
-
| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and third-party cloud services |
45
+
| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and non-Microsoft cloud services |
46
46
47
47
## Deployed services and functionality
48
48
@@ -58,16 +58,16 @@ To get the complete benefits of Microsoft Defender XDR, we recommend deploying a
58
58
59
59
### Limited deployment scenarios
60
60
61
-
Each supported service that you deploy provides an extremely rich set of raw signals as well as correlated information. While limited deployment doesn't cause Microsoft Defender XDR functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that can be managed by the services you've deployed.
61
+
Each supported service that you deploy provides an extremely rich set of raw signals and correlated information. While limited deployment doesn't cause Microsoft Defender XDR functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that are managed by the services you've deployed.
62
62
63
63
The table below lists how each supported service provides additional data, opportunities to obtain additional insight by correlating the data, and better remediation and response capabilities.
64
64
65
65
| Service | Data (signals & correlated info) | Remediation & response scope |
66
66
| ------ | ------ | ------ |
67
-
| Microsoft Defender for Endpoint |<ul><li>Endpoint states and raw events</li><li>Endpoint detections and alerts, including antivirus, EDR, attack surface reduction</li><li>Info on files and other entities observed on endpoints</li></ul>| Endpoints |
68
-
|Microsoft Defender for Office 365 |<ul><li>Mail and mailbox states and raw events</li><li>Email, attachment, and link detections</li></ul>|<ul><li>Mailboxes</li><li>Microsoft 365 accounts</li></ul>|
69
-
| Microsoft Defender for Identity |<ul><li>Active Directory signals, including authentication events</li><li>Identity-related behavioral detections</li></ul>| Identities |
70
-
| Microsoft Defender for Cloud Apps |<ul><li>Detection of unsanctioned cloud apps and services (shadow IT)</li><li>Exposure of data to cloud apps</li><li>Threat activity associated with cloud apps</li></ul>| Cloud apps |
67
+
| Microsoft Defender for Endpoint |- Endpoint states and raw events<br/>- Endpoint detections and alerts, including antivirus, EDR, attack surface reduction<br/>- Info on files and other entities observed on endpoints | Endpoints |
68
+
|Microsoft Defender for Office 365 |- Mail and mailbox states and raw events<br/>- Email, attachment, and link detections |- Mailboxes<br/>- Microsoft 365 accounts |
69
+
| Microsoft Defender for Identity |- Active Directory signals, including authentication events<br/>- Identity-related behavioral detections | Identities |
70
+
| Microsoft Defender for Cloud Apps |- Detection of unsanctioned cloud apps and services (shadow IT)<br/>- Exposure of data to cloud apps<br/>- Threat activity associated with cloud apps | Cloud apps |
71
71
72
72
## Deploy the services
73
73
@@ -82,7 +82,7 @@ Deploying each service typically requires provisioning to your tenant and some i
82
82
83
83
Once you've deployed the supported services, [turn on Microsoft Defender XDR](m365d-enable.md).
0 commit comments