Skip to content

Commit a463531

Browse files
authored
Merge branch 'main' into docs-editor/alert-policies-1742941871
2 parents 9422367 + 58fb618 commit a463531

File tree

4 files changed

+19
-4
lines changed

4 files changed

+19
-4
lines changed

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
1818
ms.service: defender-office-365
1919
search.appverid: met150
20-
ms.date: 01/10/2025
20+
ms.date: 03/25/2025
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -105,6 +105,7 @@ It's important to understand how user allows and blocks, tenant allows and block
105105
- After the filtering stack determines a verdict, only then are tenant policies and their configured actions evaluated.
106106
- If the same email address or domain exists in a user's Safe Senders list and Blocked Senders list, the Safe Senders list takes precedence.
107107
- If the same entity (email address, domain, spoofed sending infrastructure, file, or URL) exists in an allow entry and a block entry in the Tenant Allow/Block List, the block entry takes precedence.
108+
- If you use a file type in the [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies), allowing the same file in the Tenant Allow/Block list or Exchange mail flow rules (also known as transport rules) doesn't override the verdict.
108109

109110
### User allows and blocks
110111

defender-xdr/threat-analytics.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.custom:
2020
- cx-ta
2121
- seo-marvel-apr2020
2222
search.appverid: met150
23-
ms.date: 02/25/2025
23+
ms.date: 03/26/2025
2424
---
2525

2626
# Threat analytics in Microsoft Defender XDR
@@ -59,7 +59,12 @@ With more sophisticated adversaries and new threats emerging frequently and prev
5959
Each report provides an analysis of a tracked threat and extensive guidance on how to defend against that threat. It also incorporates data from your network, indicating whether the threat is active and if you have applicable protections in place.
6060

6161
## Required roles and permissions
62-
The following roles and permissions are required to access Threat analytics in the Defender portal:
62+
To access Threat analytics in the Defender portal, you need to have a license for at least one Microsoft Defender XDR product. For more information, see [Microsoft Defender XDR prerequisites](prerequisites.md).
63+
64+
>[!NOTE]
65+
> The Microsoft Defender for Endpoint P1 license is an exception to this prerequisite and will not grant Threat analytics access.
66+
67+
The following roles and permissions are also required to access Threat analytics:
6368
- **Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
6469
- **Vulnerability management (read)** and **Exposure Management (read)**—to see related exposure data and recommended actions
6570

@@ -193,9 +198,17 @@ In the **Recommended actions** tab, review the list of specific actionable recom
193198

194199
:::image type="content" source="/defender/media/threat-analytics/ta_mitigations_mtp.png" alt-text="The Recommended actions section of a threat analytics report showing vulnerability details" lightbox="/defender/media/threat-analytics/ta_mitigations_mtp.png":::
195200

201+
## Set up custom detections and link them to Threat analytics reports
202+
203+
You can set up [custom detection rules](custom-detections-overview.md) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
204+
205+
:::image type="content" source="/defender/media/threat-analytics/ta-custom-detection.png" alt-text="Screenshot of custom detection setup page with Threat analytics option highlighted." lightbox="/defender/media/threat-analytics/ta-custom-detection.png":::
206+
207+
[Learn more about creating and managing custom detections rules](custom-detection-rules.md)
208+
196209
## Set up email notifications for report updates
197210

198-
You can set up email notifications that will send you updates on threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
211+
You can set up email notifications that will send you updates on Threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
199212

200213
## Other report details and limitations
201214

defender-xdr/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ You can also get product updates and important notifications through the [messag
3535
## March 2025
3636

3737
- The Microsoft 365 alert policies can now only be managed in the Microsoft Defender portal. For more information, see [Alert policies in Microsoft 365](alert-policies.md).
38+
- You can now link Threat analytics reports when setting up custom detections. [Learn more](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports)
3839

3940
## February 2025
4041

143 KB
Loading

0 commit comments

Comments
 (0)