You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/capacity-planning.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ This article describes how to use the Microsoft Defender for Identity sizing too
11
11
12
12
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
13
13
14
-
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS servers, as the performance impact on AD FS / AD CS servers is extremely minimal to not existent.
14
+
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS / Entra Connect servers, as the performance impact on these servers is extremely minimal to not existent.
15
15
16
16
> [!TIP]
17
17
> By default, Defender for Identity supports up to 350 sensors. To install more sensors, contact Defender for Identity support.
@@ -47,17 +47,17 @@ Common results include:
47
47
48
48
|Result |Description |
49
49
|---------|---------|
50
-
|**Yes**| The sensor is supported on your server |
50
+
|**Yes**| The sensor is supported on your server.|
51
51
|**Yes, but additional resources required**| The sensor is supported on your server as long you add any specified missing resources. |
52
-
|**Maybe**| The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53
-
|**Maybe, but additional resources required**|The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets / Second** may be above 60K |
54
-
|**No**| The sensor isn't supported on your server. <br><br>The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55
-
|**Missing OS Data**| There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56
-
|**Missing Traffic Data**| There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57
-
|**Missing RAM data**| There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
52
+
|**Maybe**| The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53
+
|**Maybe, but additional resources required**|The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets/sec** may be above 60K.|
54
+
|**No**| The sensor isn't supported on your server. <br><br>The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55
+
|**Missing OS Data**| There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56
+
|**Missing Traffic Data**| There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57
+
|**Missing RAM data**| There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
58
58
|**Missing core data**| There was an issue reading the core data. Make sure the connection to your server is able to query WMI remotely. |
59
59
60
-
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/Second** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
60
+
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/sec** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
61
61
62
62
:::image type="content" source="../media/capacity-tool-maybe.png" alt-text="Screenshot of a capacity tool results showing Maybe values." lightbox="../media/capacity-tool-maybe.png":::
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-query-results.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,7 +173,24 @@ Select the three dots to the right of any column in the **Inspect record** panel
173
173
- Exclude the selected value from the query (`!=`)
174
174
- Get more advanced operators for adding the value to your query, such as `contains`, `starts with`, and `ends with`
175
175
176
-
:::image type="content" source="/defender/media/work-with-query-tweak-query.png" alt-text="The Action Type pane on the Inspect record page in the Microsoft Defender portal " lightbox="/defender/media/work-with-query-tweak-query.png":::
176
+
:::image type="content" source="/defender/media/work-with-query-tweak-query.png" alt-text="Screenshot of the Action Type pane on the Inspect record page in the Microsoft Defender portal." lightbox="/defender/media/work-with-query-tweak-query.png":::
177
+
178
+
179
+
180
+
## Add items to Favorites
181
+
You can add your frequently used schemas, functions, queries, and detection rules to the Favorites section of each tab in the advanced hunting page for quick access.
182
+
183
+
:::image type="content" source="media/faves-1.png" alt-text="Screenshot of the advanced hunting page with the Favorites section highlighted." lightbox="media/faves-1.png":::
184
+
185
+
For instance, to add `AlertInfo` to your **Favorites**, go to the **Schema** tab, and select the three dots to the right of the table and select **Add to favorites**.
186
+
187
+
:::image type="content" source="media/faves-2.png" alt-text="Screenshot of the Add to Favorites option in the advanced hunting page." lightbox="media/faves-2.png":::
188
+
189
+
A notification appears to inform you that the item was successfully added to Favorites.
190
+
191
+

192
+
193
+
You can do the same for your saved functions, queries, and custom detections in their respective Favorites sections right under each tab (**Functions**, **Queries**, and **Detection Rules**).
177
194
178
195
> [!NOTE]
179
196
> Some tables in this article might not be available at Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
Copy file name to clipboardExpand all lines: defender-xdr/defender-experts-scoped-coverage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ The devices and users you add to these groups are then considered as the set of
44
44
:::image type="content" source="media/defender_scoped_devices.png" alt-text="Screenshot of Defender Experts Scoped devices." lightbox="media/defender_scoped_devices.png":::
45
45
46
46
> [!NOTE]
47
-
> Defender Experts need **Security admin** permissions to create the device and user groups. [Learn more about granting permissions to our experts](get-started-xdr.md#grant-permissions-to-our-experts)
47
+
> Defender Experts need **Security admin** permissions to create the device and user groups. [Learn more about granting permissions to our experts](get-started-xdr.md#grant-permissions-to-our-experts).
48
48
49
49
> [!TIP]
50
50
> The device group should be in the highest order of priority for the devices under it, to be considered in scope. This is a known product limitation.
> Ask Defender Experts is included in your Defender Experts for Hunting subscription with [quarterly allocations](before-you-begin-defender-experts.md#eligibility-and-licensing). However, it's not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
36
+
> Ask Defender Experts is included in your Defender Experts for Hunting subscription with [quarterly allocations](before-you-begin-defender-experts.md#eligibility-and-licensing).
37
37
38
38
Select **Ask Defender Experts** directly inside the Microsoft 365 security portal to get swift and accurate responses to all your threat hunting questions. Experts can provide insight to better understand the complex threats your organization might face. Ask Defender Experts can help:
39
39
@@ -43,7 +43,7 @@ Select **Ask Defender Experts** directly inside the Microsoft 365 security porta
43
43
44
44
:::image type="content" source="media/ask-defender-expert-dialog.png" alt-text="Screenshot of the Ask Defender Experts dialog box." lightbox="media/ask-defender-expert-dialog.png":::
45
45
46
-
###Required permissions for using Ask Defender Experts
46
+
## Required permissions for using Ask Defender Experts
47
47
48
48
You need to select one of the following Microsoft Entra ID roles to view and submit inquiries to our Defender experts.
49
49
@@ -61,7 +61,7 @@ Microsoft Threat Experts customers using Ask Defender Experts capability will al
61
61
| Security data basics | Read |
62
62
| Alerts, Response | Read and submit |
63
63
64
-
###Where to submit inquiries to Ask Defender Experts
64
+
## Where to submit inquiries to Ask Defender Experts
65
65
66
66
The option to **Ask Defender Experts** is available in several places throughout the portal:
67
67
@@ -71,60 +71,76 @@ The option to **Ask Defender Experts** is available in several places throughout
71
71
72
72
-**Device inventory page flyout menu**:
73
73
74
-
:::image type="content" source="/defender/media/mte/defenderexperts/device-inventory-flyout-menu.png" alt-text="Screenshot of the Ask Defender Experts menu option in the Device inventory page flyout menu in the Microsoft Defender portal.." lightbox="/defender/media/mte/defenderexperts/device-inventory-flyout-menu.png":::
74
+
:::image type="content" source="/defender/media/mte/defenderexperts/device-inventory-flyout-menu.png" alt-text="Screenshot of the Ask Defender Experts menu option in the Device inventory page flyout menu in the Microsoft Defender portal." lightbox="/defender/media/mte/defenderexperts/device-inventory-flyout-menu.png":::
75
75
76
76
-**Alerts page flyout menu**:
77
77
78
-
:::image type="content" source="/defender/media/mte/defenderexperts/alerts-flyout-menu.png" alt-text="Screenshot of the Ask Defender Experts menu option in the Alerts page flyout menu in the Microsoft Defender portal.." lightbox="/defender/media/mte/defenderexperts/alerts-flyout-menu.png":::
78
+
:::image type="content" source="/defender/media/mte/defenderexperts/alerts-flyout-menu.png" alt-text="Screenshot of the Ask Defender Experts menu option in the Alerts page flyout menu in the Microsoft Defender portal." lightbox="/defender/media/mte/defenderexperts/alerts-flyout-menu.png":::
79
79
80
80
-**Incidents page actions menu**:
81
81
82
-
:::image type="content" source="/defender/media/mte/defenderexperts/incidents-page-actions-menu.png" alt-text="Screenshot of the Ask Defender Experts menu option in the Incidents page actions menu in the Microsoft Defender portal.." lightbox="/defender/media/mte/defenderexperts/incidents-page-actions-menu.png":::
82
+
:::image type="content" source="/defender/media/mte/defenderexperts/incidents-page-actions-menu.png" alt-text="Screenshot of the Ask Defender Experts menu option in the Incidents page actions menu in the Microsoft Defender portal." lightbox="/defender/media/mte/defenderexperts/incidents-page-actions-menu.png":::
83
83
84
-
###Where to view responses from Defender Experts
84
+
## Where to view responses from Defender Experts
85
85
86
-
####In portal
86
+
### In portal
87
87
88
-
You can view responses to inquiries submitted to Ask Defender Experts from up to six months ago by navigating to **Reports** > **Defender Experts messages**. You will also be able to ask follow-up questions or reply with more information to Defender Experts from this page.
88
+
You can view responses to inquiries submitted to Ask Defender Experts from up to six months ago by navigating to **Reports** > **Defender Experts messages**. You'll also be able to ask follow-up questions or reply with more information to Defender Experts from this page.
89
89
90
90
:::image type="content" source="media/inportal-managed-response.png" alt-text="Screenshot of in-portal managed response." lightbox="media/inportal-managed-response.png":::
91
91
92
-
####Email
92
+
### Email
93
93
94
-
If you included contact email addresses when submitting your inquiry, they will receive an email notification when a response from Defender Experts is posted.
94
+
If you included contact email addresses when submitting your inquiry, they'll receive an email notification when a response from Defender Experts is posted.
95
95
96
96
:::image type="content" source="media/email-based-managed-response.png" alt-text="Screenshot of email based managed response." lightbox="media/email-based-managed-response.png":::
97
97
98
-
> [!NOTE]
99
-
> Defender Experts will not be able to assist you with inquiries regarding bugs or issues in your product experience in the Microsoft Defender XDR portal. You can reach out to Microsoft Support via the [Services Hub](https://serviceshub.microsoft.com/home) regarding such inquiries.
100
-
101
-
### Sample questions you can ask from Defender Experts
98
+
## Sample questions you can ask from Defender Experts
102
99
103
-
####Alert information
100
+
### Alert information
104
101
105
102
- We saw a new type of alert for a living-off-the-land binary. We can provide the alert ID. Can you tell us more about this alert and if it's related to any incident and how we can investigate it further?
106
103
- We've observed two similar attacks, which both try to execute malicious PowerShell scripts but generate different alerts. One is "Suspicious PowerShell command line" and the other is "A malicious file was detected based on indication provided by Office 365." What is the difference?
107
104
- We received an odd alert today about an abnormal number of failed logins from a high profile user's device. We can't find any further evidence for these attempts. How can Microsoft Defender XDR see these attempts? What type of logins are being monitored?
108
105
- Can you give more context or insight about the alert and any related incidents, "Suspicious behavior by a system utility was observed"?
109
106
- I observed an alert titled "Creation of forwarding/redirect rule". I believe the activity is benign. Can you tell me why I received an alert?
110
107
111
-
####Possible device compromise
108
+
### Possible device compromise
112
109
113
110
- Can you help explain why we see a message or alert for "Unknown process observed" on many devices in our organization? We appreciate any input to clarify whether this message or alert is related to malicious activity or incidents.
114
111
- Can you help validate a possible compromise on the following system, dating from last week? It's behaving similarly as a previous malware detection on the same system six months ago.
115
112
116
-
####Threat intelligence details
113
+
### Threat intelligence details
117
114
118
115
- We detected a phishing email that delivered a malicious Word document to a user. The document caused a series of suspicious events, which triggered multiple alerts for a particular malware family. Do you have any information on this malware? If yes, can you send us a link?
119
116
- We recently saw a blog post about a threat that is targeting our industry. Can you help us understand what protection Microsoft Defender XDR provides against this threat actor?
120
117
- We recently observed a phishing campaign conducted against our organization. Can you tell us if this was targeted specifically to our company or vertical?
121
118
122
-
####Microsoft Defender Experts for Hunting alert communications
119
+
### Microsoft Defender Experts for Hunting alert communications
123
120
124
121
- Can your incident response team help us address the Defender Experts Notification that we got?
125
122
- We received this Defender Experts Notification from Microsoft Defender Experts for Hunting. We don't have our own incident response team. What can we do now, and how can we contain the incident?
126
123
- We received a Defender Experts Notification from Microsoft Defender Experts for Hunting. What data can you provide to us that we can pass on to our incident response team?
127
124
125
+
## Services that aren't in scope for Defender Experts
126
+
127
+
Ask Defender Experts is focused on products that are only included in Microsoft Defender XDR, i.e., Microsoft Defender for Endpoint, Microsoft Defender for Office, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity.
128
+
129
+
The service doesn't cover the following scenarios:
130
+
131
+
- Inquiries related to custom detections in the above products can't be handled in Ask Defender Experts because our experts typically don't have access to such telemetry or visibility into how these custom policies were set up. Examples of such policies include:
- Defender Experts won't be able to handle inquiries on non-Defender XDR products such as Microsoft Defender for Cloud, Microsoft Defender for IoT, Microsoft Sentinel, Microsoft Purview, Microsoft Priva, and other third-party cybersecurity products.
139
+
140
+
- Defender Experts won't be able to assist you with inquiries regarding bugs in your product experience in the Defender XDR portal, such as, missing data on the alert or incident page or a recommended action not completing when you action it. You can reach out to Microsoft Support via the [Services Hub](https://serviceshub.microsoft.com/home) regarding such issues.
141
+
142
+
- Ask Defender Experts isn't a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
143
+
128
144
### Next step
129
145
130
146
-[Understand the Defender Experts for Hunting report in Microsoft Defender XDR](defender-experts-report.md)
0 commit comments