Skip to content

Commit a600501

Browse files
committed
new timeline feature
2 parents b59063b + f3fbec9 commit a600501

9 files changed

+55
-16
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "microsoft-365/security/defender/advanced-hunting-IdentityEvents-table.md",
5+
"redirect_url": "/defender-xdr/advanced-hunting-identityevents-table",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud-apps.md",
510
"redirect_url": "/defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps",

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 07/08/2025
18+
ms.date: 08/13/2025
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -82,6 +82,15 @@ This article describes how admins can manage entries for email senders in the Mi
8282
8383
## Domains and email addresses in the Tenant Allow/Block List
8484

85+
> [!NOTE]
86+
> Entries for email addresses with special characters (for example, spaces, quotes, or symbols) must use UTF-8 hexadecimal URL encoding for the special characters. Otherwise, you might receive errors when you try to add the entries.
87+
>
88+
> For example, to block the email address `"bad+ attacker"@fourthcoffee.com`, use the value `%22bad%2B%20attacker%[email protected]`:
89+
>
90+
> - `%22` represents the double quotation marks (").
91+
> - `%2B` represents the plus sign (+).
92+
> - `%20` represents the space ( ).
93+
8594
### Create allow entries for domains and email addresses
8695

8796
Unnecessary allow entries expose your organization to malicious email that the system would otherwise filter, so there are limitations for creating allow entries directly in the Tenant Allow/Block List.

defender-xdr/advanced-hunting-query-results.md

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,16 +37,49 @@ While you can construct your [advanced hunting](advanced-hunting-overview.md) qu
3737
- Drill down to detailed entity information
3838
- Tweak your queries directly from the results
3939

40-
4140
## Automatic timeline rendering
4241

4342
By default, a timeline appears above the advanced hunting results that displays event counts over time. The timeline is automatically rendered based on the `Timestamp` column in the query results. It automatically updates when you apply filters and can help you quickly identify abnormal behavior and trends and focus on interesting results.
4443

45-
::::image type="content" source="/defender/media/advanced-hunting-query-results-timeline.png" alt-text="Screenshot of the timeline above the query results in advanced hunting." lightbox="/defender/media/advanced-hunting-query-results-timeline.png":::
44+
:::image type="content" source="/defender/media/advanced-hunting-query-results-timeline.png" alt-text="Screenshot of the timeline above the query results in advanced hunting." lightbox="/defender/media/advanced-hunting-query-results-timeline.png":::
4645

4746
You can select whether or not the timeline is displayed by default in the **Page preferences** settings.
4847

49-
::::image type="content" source="/defender/media/advanced-hunting-page-preferences.png" alt-text="Screenshot of the Page preferences settings in advanced hunting." lightbox="/defender/media/advanced-hunting-page-preferences.png":::
48+
:::image type="content" source="/defender/media/advanced-hunting-page-preferences.png" alt-text="Screenshot of the Page preferences settings in advanced hunting." lightbox="/defender/media/advanced-hunting-page-preferences.png":::
49+
50+
The timeline automatically adjusts its resolution based on the range of results. You can click any point on the timeline to filter both the results and the timeline to that specific time range. The timeline also updates its scale to match the selected time period, so when you filter by a specific range, it zooms in to show event distribution in high resolution.
51+
52+
The timeline only appears if there are more than 40 events in your results and there's `Timestamp` or `timeGenerated` column.
53+
54+
### [Unfiltered timeline](#tab/unfiltered)
55+
56+
The following screenshot shows the results of a query that returns 1,000 email events. The timeline is unfiltered, so it displays the full range of results with a timestamp for each day. Select a day or range of days to filter the results for that time period.
57+
58+
:::image type="content" source="/defender/media/advanced-hunting-unfiltered-results.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with all the results unfiltered." lightbox="/defender/media/advanced-hunting-unfiltered-results.png":::
59+
60+
### [Filtered timeline](#tab/filtered)
61+
62+
The following screenshot shows the zoomed in results of a query filtered to a specific date.
63+
64+
:::image type="content" source="/defender/media/advanced-hunting-filtered-results.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with the results filtered to a specific date." lightbox="/defender/media/advanced-hunting-filtered-results.png":::
65+
66+
---
67+
68+
You can group the results in the timeline by any column that has at least two but less than 50 unique values.
69+
70+
### [Ungrouped timeline](#tab/ungrouped)
71+
72+
The following screenshot shows the results of a query that returns 1,000 email events. The timeline is ungrouped, so it displays all the results in a single line.
73+
74+
:::image type="content" source="/defender/media/advanced-hunting-ungrouped.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with the results all together in one line." lightbox="/defender/media/advanced-hunting-ungrouped.png":::
75+
76+
### [Grouped timeline](#tab/grouped)
77+
78+
The following screenshot shows the results grouped by last email action with a separate line for each action.
79+
80+
:::image type="content" source="/defender/media/advanced-hunting-grouped.png" alt-text="Screenshot of an advanced hunting query of 1,000 email events with the results grouped by last email action." lightbox="/defender/media/advanced-hunting-grouped.png":::
81+
82+
---
5083

5184
## View query results as a table or chart
5285

defender-xdr/phishing-triage-agent.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -139,17 +139,6 @@ To assign the appropriate permissions to the agent:
139139
> [!TIP]
140140
> Microsoft advises assigning a role to the agent's identity that includes only the minimum permissions necessary.
141141
142-
1. Assign the agent's identity contributor access to your Microsoft Security Copilot workspace.
143-
144-
1. Sign in to Security Copilot (https://securitycopilot.microsoft.com).
145-
1. Select the home menu icon.
146-
1. Make sure you're in your default workspace.
147-
1. Select **Role assignment > Add members**.
148-
1. Start typing the name of agent identity in the **Add members** dialog box.
149-
1. Select the identity.
150-
1. Select **Contributor**.
151-
1. Select **Add**.
152-
153142
After assigning the agent its permissions, ensure the user group monitoring the agent has equal or higher permissions to oversee its activity and output. To do this, compare the permissions of the user group to the agent in the Permissions page in the Microsoft Defender portal.
154143

155144
#### Conditional access policies
@@ -427,4 +416,4 @@ The Phishing Triage Agent operates within a zero-trust environment. The system e
427416
## Related content
428417

429418
- [Microsoft Security Copilot agents](/copilot/security/agents-overview)
430-
- [Responsible AI FAQs for Security Copilot Agent](/copilot/security/rai-faqs-security-copilot-agents)
419+
- [Responsible AI FAQs for Security Copilot Agent](/copilot/security/rai-faqs-security-copilot-agents)
66 KB
Loading
29.7 KB
Loading
293 KB
Loading
241 KB
Loading

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,8 @@ When you switch the primary workspace for Microsoft Sentinel, the Defender XDR c
161161

162162
If you decide to offboard a workspace from the Defender portal, disconnect the workspace from the settings for Microsoft Sentinel.
163163

164+
If your workspace has the [Microsoft Defender XDR connector](/azure/sentinel/connect-microsoft-365-defender) configured, offboarding the workspace from the Defender portal will also disconnect the Microsoft Defender XDR connector.
165+
164166
1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
165167
1. In the Defender portal, under **System**, select **Settings** > **Microsoft Sentinel**.
166168
1. On the **Workspaces** page, select the connected workspace and **Disconnect workspace**.
@@ -178,3 +180,4 @@ If you want to connect to a different workspace, from the **Workspaces** page, s
178180
- [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption)
179181
- [Investigate incidents in Microsoft Defender portal](/defender-xdr/investigate-incidents)
180182
- [Optimize your security operations](/azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal)
183+

0 commit comments

Comments
 (0)