Skip to content

Commit a32a4fa

Browse files
authored
Merge pull request #849 from MicrosoftDocs/freshness-deniseb
freshness deniseb
2 parents 65f62f9 + c7f4ca1 commit a32a4fa

7 files changed

+105
-100
lines changed

defender-xdr/configure-siem-defender.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15-
ms.date: 10/25/2021
15+
ms.date: 06/27/2024
1616
---
1717

1818
# Integrate your SIEM tools with Microsoft Defender XDR
@@ -23,9 +23,6 @@ ms.date: 10/25/2021
2323
- [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
2424
- [Microsoft Defender XDR](microsoft-365-defender.md)
2525

26-
> [!NOTE]
27-
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
28-
2926
<a name='pull-microsoft-365-defender-incidents-and-streaming-event-data-using-security-information-and-events-management-siem-tools'></a>
3027

3128
## Pull Microsoft Defender XDR incidents and streaming event data using security information and events management (SIEM) tools
@@ -53,7 +50,7 @@ There are two primary models to ingest security information:
5350
Microsoft Defender XDR currently supports the following SIEM solution integrations:
5451

5552
- [Ingesting incidents from the incidents REST API](#ingesting-incidents-from-the-incidents-rest-api)
56-
- [Ingesting streaming event data via Event Hub](#ingesting-streaming-event-data-via-event-hubs)
53+
- [Ingesting streaming event data via Event Hubs](#ingesting-streaming-event-data-via-event-hubs)
5754

5855
## Ingesting incidents from the incidents REST API
5956

@@ -74,7 +71,7 @@ Using the new, fully supported Splunk Add-on for Microsoft Security that support
7471

7572
- Ingesting Defender for Endpoint alerts (from the Defender for Endpoint's Azure endpoint) and updating these alerts
7673

77-
- Support for updating Microsoft Defender XDR Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.
74+
- Support for updating Microsoft Defender XDR Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has moved to the Microsoft 365 App for Splunk.
7875

7976
For more information on:
8077

@@ -89,7 +86,7 @@ Framework (CEF).
8986

9087
For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender).
9188

92-
The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that has been deprecated.
89+
The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that's now retired.
9390

9491
### Elastic
9592

@@ -120,4 +117,5 @@ For more information on the Elastic streaming API integration, see [Microsoft M3
120117
## Related articles
121118

122119
[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
120+
123121
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/criteria.md

Lines changed: 49 additions & 49 deletions
Large diffs are not rendered by default.

defender-xdr/custom-detections-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
ms.topic: conceptual
18-
ms.date: 02/16/2021
18+
ms.date: 06/27/2024
1919
---
2020

2121
# Custom detections overview
@@ -26,17 +26,20 @@ ms.date: 02/16/2021
2626
**Applies to:**
2727
- Microsoft Defender XDR
2828

29-
With custom detections, you can proactively monitor for and respond to various events and system states, including suspected breach activity and misconfigured endpoints. This is made possible by customizable detection rules that automatically trigger alerts as well as response actions.
29+
With custom detections, you can proactively monitor for and respond to various events and system states, including suspected breach activity and misconfigured endpoints. This is made possible by customizable detection rules that automatically trigger alerts and response actions.
3030

3131
Custom detections work with [advanced hunting](advanced-hunting-overview.md), which provides a powerful, flexible query language that covers a broad set of event and system information from your network. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches.
3232

3333
Custom detections provide:
34+
3435
- Alerts for rule-based detections built from advanced hunting queries
3536
- Automatic response actions
3637

3738
## See also
39+
3840
- [Create and manage custom detection rules](custom-detection-rules.md)
3941
- [Advanced hunting overview](advanced-hunting-overview.md)
4042
- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)
4143
- [Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)
44+
4245
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/defender-threat-intelligence.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- highpri
1515
- tier3
1616
ms.topic: conceptual
17-
ms.date: 03/28/2021
17+
ms.date: 03/28/2024
1818
---
1919

2020
# Microsoft Defender Threat Intelligence in Microsoft Defender XDR
@@ -38,4 +38,5 @@ Under **Threat Intelligence** is the existing node for the **Threat Analytics**
3838
The experience between the existing Defender TI standalone portal differs slightly from the version in Microsoft Defender XDR. Though most of the functionality is available, at this time, the Defender TI experience in Microsoft Defender XDR doesn't include the ability to apply custom tags or project capabilities.
3939

4040
[Learn more about Microsoft Defender Threat Intelligence](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
41+
4142
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/deploy-supported-services.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Deploy services supported by Microsoft Defender XDR
3-
description: Learn about the Microsoft security services that can be integrated by Microsoft Defender XDR, their licensing requirements, and deployment procedures
3+
description: Learn about the Microsoft security services that integrate with Microsoft Defender XDR, their licensing requirements, and deployment procedures
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 02/16/2021
21+
ms.date: 02/16/2024
2222
---
2323

2424
# Deploy supported services
@@ -31,7 +31,7 @@ ms.date: 02/16/2021
3131

3232
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
3333

34-
[Microsoft Defender XDR](microsoft-365-defender.md) integrates various Microsoft security services to provide centralized detection, prevention, and investigation capabilities against sophisticated attacks. This article describes the supported services, their licensing requirements, the advantages and limitations associated with deploying one or more services, and links to how you can fully deploy them individually.
34+
[Microsoft Defender XDR](microsoft-365-defender.md) integrates various Microsoft security services to provide centralized detection, prevention, and investigation capabilities against sophisticated attacks. This article describes the supported services, their licensing requirements, the advantages, and limitations associated with deploying one or more services, and links to how you can fully deploy them individually.
3535

3636
## Supported services
3737

@@ -42,7 +42,7 @@ A Microsoft 365 E5, E5 Security, A5, or A5 Security license or a valid combinati
4242
| Microsoft Defender for Endpoint | Endpoint protection suite built around powerful behavioral sensors, cloud analytics, and threat intelligence |
4343
|Microsoft Defender for Office 365 | Advanced protection for your apps and data in Office 365, including email and other collaboration tools |
4444
| Microsoft Defender for Identity | Defend against advanced threats, compromised identities, and malicious insiders using correlated Active Directory signals |
45-
| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and third-party cloud services |
45+
| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and non-Microsoft cloud services |
4646

4747
## Deployed services and functionality
4848

@@ -58,16 +58,16 @@ To get the complete benefits of Microsoft Defender XDR, we recommend deploying a
5858

5959
### Limited deployment scenarios
6060

61-
Each supported service that you deploy provides an extremely rich set of raw signals as well as correlated information. While limited deployment doesn't cause Microsoft Defender XDR functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that can be managed by the services you've deployed.
61+
Each supported service that you deploy provides an extremely rich set of raw signals and correlated information. While limited deployment doesn't cause Microsoft Defender XDR functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that are managed by the services you've deployed.
6262

6363
The table below lists how each supported service provides additional data, opportunities to obtain additional insight by correlating the data, and better remediation and response capabilities.
6464

6565
| Service | Data (signals & correlated info) | Remediation & response scope |
6666
| ------ | ------ | ------ |
67-
| Microsoft Defender for Endpoint |<ul><li>Endpoint states and raw events</li><li>Endpoint detections and alerts, including antivirus, EDR, attack surface reduction</li><li>Info on files and other entities observed on endpoints</li></ul> | Endpoints |
68-
|Microsoft Defender for Office 365 |<ul><li>Mail and mailbox states and raw events</li><li>Email, attachment, and link detections</li></ul> | <ul><li>Mailboxes</li><li>Microsoft 365 accounts</li></ul> |
69-
| Microsoft Defender for Identity |<ul><li>Active Directory signals, including authentication events</li><li>Identity-related behavioral detections</li></ul> | Identities |
70-
| Microsoft Defender for Cloud Apps |<ul><li>Detection of unsanctioned cloud apps and services (shadow IT)</li><li>Exposure of data to cloud apps</li><li>Threat activity associated with cloud apps</li></ul> | Cloud apps |
67+
| Microsoft Defender for Endpoint |- Endpoint states and raw events<br/>- Endpoint detections and alerts, including antivirus, EDR, attack surface reduction<br/>- Info on files and other entities observed on endpoints | Endpoints |
68+
|Microsoft Defender for Office 365 |- Mail and mailbox states and raw events<br/>- Email, attachment, and link detections | - Mailboxes<br/>- Microsoft 365 accounts |
69+
| Microsoft Defender for Identity |- Active Directory signals, including authentication events<br/>- Identity-related behavioral detections | Identities |
70+
| Microsoft Defender for Cloud Apps |- Detection of unsanctioned cloud apps and services (shadow IT)<br/>- Exposure of data to cloud apps<br/>- Threat activity associated with cloud apps | Cloud apps |
7171

7272
## Deploy the services
7373

@@ -82,7 +82,7 @@ Deploying each service typically requires provisioning to your tenant and some i
8282

8383
Once you've deployed the supported services, [turn on Microsoft Defender XDR](m365d-enable.md).
8484

85-
## Related topics
85+
## Related articles
8686

8787
- [Microsoft Defender XDR overview](microsoft-365-defender.md)
8888
- [Turn on Microsoft Defender XDR](m365d-enable.md)
@@ -91,4 +91,5 @@ Once you've deployed the supported services, [turn on Microsoft Defender XDR](m3
9191
- [Microsoft Defender for Office 365 overview](/defender-office-365/mdo-about)
9292
- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)
9393
- [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp)
94+
9495
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)