You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-email-spoof-configure.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier1
16
16
description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.
17
17
ms.service: defender-office-365
18
-
ms.date: 07/08/2025
18
+
ms.date: 08/13/2025
19
19
appliesto:
20
20
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
21
21
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -82,6 +82,15 @@ This article describes how admins can manage entries for email senders in the Mi
82
82
83
83
## Domains and email addresses in the Tenant Allow/Block List
84
84
85
+
> [!NOTE]
86
+
> Entries for email addresses with special characters (for example, spaces, quotes, or symbols) must use UTF-8 hexadecimal URL encoding for the special characters. Otherwise, you might receive errors when you try to add the entries.
87
+
>
88
+
> For example, to block the email address `"bad+ attacker"@fourthcoffee.com`, use the value `%22bad%2B%20attacker%[email protected]`:
89
+
>
90
+
> -`%22` represents the double quotation marks (").
91
+
> -`%2B` represents the plus sign (+).
92
+
> -`%20` represents the space ( ).
93
+
85
94
### Create allow entries for domains and email addresses
86
95
87
96
Unnecessary allow entries expose your organization to malicious email that the system would otherwise filter, so there are limitations for creating allow entries directly in the Tenant Allow/Block List.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-query-results.md
+36-3Lines changed: 36 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,16 +37,49 @@ While you can construct your [advanced hunting](advanced-hunting-overview.md) qu
37
37
- Drill down to detailed entity information
38
38
- Tweak your queries directly from the results
39
39
40
-
41
40
## Automatic timeline rendering
42
41
43
42
By default, a timeline appears above the advanced hunting results that displays event counts over time. The timeline is automatically rendered based on the `Timestamp` column in the query results. It automatically updates when you apply filters and can help you quickly identify abnormal behavior and trends and focus on interesting results.
44
43
45
-
::::image type="content" source="/defender/media/advanced-hunting-query-results-timeline.png" alt-text="Screenshot of the timeline above the query results in advanced hunting." lightbox="/defender/media/advanced-hunting-query-results-timeline.png":::
44
+
:::image type="content" source="/defender/media/advanced-hunting-query-results-timeline.png" alt-text="Screenshot of the timeline above the query results in advanced hunting." lightbox="/defender/media/advanced-hunting-query-results-timeline.png":::
46
45
47
46
You can select whether or not the timeline is displayed by default in the **Page preferences** settings.
48
47
49
-
::::image type="content" source="/defender/media/advanced-hunting-page-preferences.png" alt-text="Screenshot of the Page preferences settings in advanced hunting." lightbox="/defender/media/advanced-hunting-page-preferences.png":::
48
+
:::image type="content" source="/defender/media/advanced-hunting-page-preferences.png" alt-text="Screenshot of the Page preferences settings in advanced hunting." lightbox="/defender/media/advanced-hunting-page-preferences.png":::
49
+
50
+
The timeline automatically adjusts its resolution based on the range of results. You can click any point on the timeline to filter both the results and the timeline to that specific time range. The timeline also updates its scale to match the selected time period, so when you filter by a specific range, it zooms in to show event distribution in high resolution.
51
+
52
+
The timeline only appears if there are more than 40 events in your results and there's `Timestamp` or `timeGenerated` column.
53
+
54
+
### [Unfiltered timeline](#tab/unfiltered)
55
+
56
+
The following screenshot shows the results of a query that returns 1,000 email events. The timeline is unfiltered, so it displays the full range of results with a timestamp for each day. Select a day or range of days to filter the results for that time period.
57
+
58
+
:::image type="content" source="/defender/media/advanced-hunting-unfiltered-results.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with all the results unfiltered." lightbox="/defender/media/advanced-hunting-unfiltered-results.png":::
59
+
60
+
### [Filtered timeline](#tab/filtered)
61
+
62
+
The following screenshot shows the zoomed in results of a query filtered to a specific date.
63
+
64
+
:::image type="content" source="/defender/media/advanced-hunting-filtered-results.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with the results filtered to a specific date." lightbox="/defender/media/advanced-hunting-filtered-results.png":::
65
+
66
+
---
67
+
68
+
You can group the results in the timeline by any column that has at least two but less than 50 unique values.
69
+
70
+
### [Ungrouped timeline](#tab/ungrouped)
71
+
72
+
The following screenshot shows the results of a query that returns 1,000 email events. The timeline is ungrouped, so it displays all the results in a single line.
73
+
74
+
:::image type="content" source="/defender/media/advanced-hunting-ungrouped.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with the results all together in one line." lightbox="/defender/media/advanced-hunting-ungrouped.png":::
75
+
76
+
### [Grouped timeline](#tab/grouped)
77
+
78
+
The following screenshot shows the results grouped by last email action with a separate line for each action.
79
+
80
+
:::image type="content" source="/defender/media/advanced-hunting-grouped.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with the results grouped by last email action." lightbox="/defender/media/advanced-hunting-grouped.png":::
Copy file name to clipboardExpand all lines: defender-xdr/phishing-triage-agent.md
+1-12Lines changed: 1 addition & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,17 +139,6 @@ To assign the appropriate permissions to the agent:
139
139
> [!TIP]
140
140
> Microsoft advises assigning a role to the agent's identity that includes only the minimum permissions necessary.
141
141
142
-
1. Assign the agent's identity contributor access to your Microsoft Security Copilot workspace.
143
-
144
-
1. Sign in to Security Copilot (https://securitycopilot.microsoft.com).
145
-
1. Select the home menu icon.
146
-
1. Make sure you're in your default workspace.
147
-
1. Select **Role assignment > Add members**.
148
-
1. Start typing the name of agent identity in the **Add members** dialog box.
149
-
1. Select the identity.
150
-
1. Select **Contributor**.
151
-
1. Select **Add**.
152
-
153
142
After assigning the agent its permissions, ensure the user group monitoring the agent has equal or higher permissions to oversee its activity and output. To do this, compare the permissions of the user group to the agent in the Permissions page in the Microsoft Defender portal.
154
143
155
144
#### Conditional access policies
@@ -427,4 +416,4 @@ The Phishing Triage Agent operates within a zero-trust environment. The system e
Copy file name to clipboardExpand all lines: unified-secops-platform/microsoft-sentinel-onboard.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,6 +161,8 @@ When you switch the primary workspace for Microsoft Sentinel, the Defender XDR c
161
161
162
162
If you decide to offboard a workspace from the Defender portal, disconnect the workspace from the settings for Microsoft Sentinel.
163
163
164
+
If your workspace has the [Microsoft Defender XDR connector](/azure/sentinel/connect-microsoft-365-defender) configured, offboarding the workspace from the Defender portal will also disconnect the Microsoft Defender XDR connector.
165
+
164
166
1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
165
167
1. In the Defender portal, under **System**, select **Settings** > **Microsoft Sentinel**.
166
168
1. On the **Workspaces** page, select the connected workspace and **Disconnect workspace**.
@@ -178,3 +180,4 @@ If you want to connect to a different workspace, from the **Workspaces** page, s
178
180
-[Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption)
179
181
-[Investigate incidents in Microsoft Defender portal](/defender-xdr/investigate-incidents)
180
182
-[Optimize your security operations](/azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal)
0 commit comments