You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: deniseb
6
6
ms.author: deniseb
7
7
manager: deniseb
8
8
ms.localizationpriority: medium
9
-
ms.date: 10/30/2024
9
+
ms.date: 11/18/2024
10
10
audience: ITPro
11
11
ms.collection:
12
12
- m365-security
@@ -41,7 +41,7 @@ For more information on Microsoft Defender for Endpoint on other operating syste
41
41
42
42
- In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device control's ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS earlier than 14.3.1.
43
43
44
-
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.0.1 or newer.
44
+
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.1 or newer.
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-collect-support-log.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: troubleshooting
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 11/07/2024
17
+
ms.date: 11/18/2024
18
18
---
19
19
20
20
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -37,7 +37,7 @@ This article provides instructions on how to run the tool via Live Response on W
37
37
- If you require additional logs related to Microsoft Defender Antivirus, then use `..\Tools\MDELiveAnalyzerAV.ps1`.
38
38
- If you require [Microsoft Endpoint Data Loss Prevention](/purview/endpoint-dlp-learn-about) related logs, then use `..\Tools\MDELiveAnalyzerDLP.ps1`.
39
39
- If you require network and [Windows Filter Platform](/windows-hardware/drivers/network/windows-filtering-platform-architecture-overview) related logs, then use `..\Tools\MDELiveAnalyzerNet.ps1`.
40
-
- If you require [Process Monitor](/sysinternals/downloads/procmon) logs, then use `..\Tools\MDELiveAnalyzerDLP.ps1`.
40
+
- If you require [Process Monitor](/sysinternals/downloads/procmon) logs, then use `..\Tools\MDELiveAnalyzerAppCompat.ps1`.
41
41
42
42
2. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you need to investigate.
Copy file name to clipboardExpand all lines: defender-office-365/how-policies-and-protections-are-combined.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,8 @@ There are two major factors that determine which policy is applied to a message:
68
68
69
69
<sup>\*</sup> Defender for Office 365 only.
70
70
71
-
The priority order matters if you have the same recipient intentionally or unintentionally included in multiple policies, because *only* the first policy of that type (anti-spam, anti-malware, anti-phishing, etc.) is applied to that recipient, regardless of how many other policies that the recipient is included in. There's never a merging or combining of the settings in multiple policies for the recipient. The recipient is unaffected by the settings of the remaining policies of that type.
71
+
> [!IMPORTANT]
72
+
> The priority order matters if you have the same recipient intentionally or unintentionally included in multiple policies, because *only* the first policy of that type (anti-spam, anti-malware, anti-phishing, etc.) is applied to that recipient, regardless of how many other policies that the recipient is included in. There's never a merging or combining of the settings in multiple policies for the recipient. The recipient is unaffected by the settings of the remaining policies of that type.
72
73
73
74
For example, the group named "Contoso Executives" is included in the following policies:
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-security-copilot.md
+24-15Lines changed: 24 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Microsoft Copilot for Security in advanced hunting
3
-
description: Learn how Microsoft Copilot for Security advanced hunting (NL2KQL) plugin can generate a KQL query for you.
2
+
title: Microsoft Security Copilot in advanced hunting
3
+
description: Learn how Microsoft Security Copilot advanced hunting (NL2KQL) plugin can generate a KQL query for you.
4
4
search.appverid: met150
5
5
ms.service: defender-xdr
6
6
ms.subservice: adv-hunting
@@ -27,22 +27,30 @@ appliesto:
27
27
- Microsoft Sentinel in the Microsoft Defender portal
28
28
---
29
29
30
-
# Microsoft Copilot for Security in advanced hunting
30
+
# Microsoft Security Copilot in advanced hunting
31
31
32
-
[Microsoft Copilot for Security in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
33
32
34
-
Threat hunters or security analysts who aren't yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Copilot for Security then generates a KQL query that corresponds to the request using the advanced hunting data schema.
33
+
**Applies to:**
34
+
35
+
- Microsoft Defender
36
+
- Microsoft Defender XDR
37
+
38
+
## Security Copilot in advanced hunting
39
+
40
+
[Microsoft Security Copilot in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
41
+
42
+
Threat hunters or security analysts who aren't yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Security Copilot then generates a KQL query that corresponds to the request using the advanced hunting data schema.
35
43
36
44
This feature reduces the time it takes to write a hunting query from scratch so that threat hunters and security analysts can focus on hunting and investigating threats.
37
45
38
-
Users with access to Copilot for Security have access to this capability in advanced hunting.
46
+
Users with access to Security Copilot have access to this capability in advanced hunting.
39
47
40
48
> [!NOTE]
41
-
> The advanced hunting capability is also available in the Copilot for Security standalone experience through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
49
+
> The advanced hunting capability is also available in the Security Copilot standalone experience through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Security Copilot](/security-copilot/manage-plugins#preinstalled-plugins).
42
50
43
51
## Try your first request
44
52
45
-
1. Open the **advanced hunting** page from the navigation bar in the Microsoft Defender portal. The Copilot for Security side pane for advanced hunting appears at the right hand side.
53
+
1. Open the **advanced hunting** page from the navigation bar in Microsoft Defender XDR. The Security Copilot side pane for advanced hunting appears at the right hand side.
46
54
47
55
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-pane.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-pane-big.png":::
48
56
@@ -51,11 +59,11 @@ Users with access to Copilot for Security have access to this capability in adva
51
59
52
60
53
61
54
-
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Copilot for Security for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
62
+
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Security Copilot for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
55
63
56
64
1. Copilot generates a KQL query from your text instruction or question. While Copilot is generating, you can cancel the query generation by selecting **Stop generating**.
57
65
58
-

66
+

59
67
60
68
61
69
1. Review the generated query. You can then choose to run the query by selecting **Add and run**.
@@ -66,7 +74,7 @@ Users with access to Copilot for Security have access to this capability in adva
66
74
67
75
If you need to make further tweaks, select **Add to editor**.
68
76
69
-

77
+

70
78
71
79
The generated query appears in the query editor as the last query, where you can edit it before running using the regular **Run query** above the query editor.
72
80
@@ -75,23 +83,24 @@ Users with access to Copilot for Security have access to this capability in adva
75
83
76
84
77
85
> [!TIP]
78
-
> Providing feedback is an important way to let the Copilot for Security team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
86
+
> Providing feedback is an important way to let the Security Copilot team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
79
87
80
88
81
-
In the [Microsoft Defender portal](advanced-hunting-microsoft-defender.md), you can prompt Copilot for Security to generate advanced hunting queries for both Defender XDR and Microsoft Sentinel tables. Not all Microsoft Sentinel tables are currently supported, but support for these tables can be expected in the future.
89
+
> [!NOTE]
90
+
> In the [unified Microsoft Defender portal](advanced-hunting-microsoft-defender.md), you can prompt Security Copilot to generate advanced hunting queries for both Defender XDR and Microsoft Sentinel tables. Not all Microsoft Sentinel tables are currently supported, but support for these tables can be expected in the future.
82
91
83
92
## Query sessions
84
93
85
94
You can start your first session anytime by asking a question in the Copilot side pane in advanced hunting. Your session contains the requests you made using your user account. Closing the side pane or refreshing the advanced hunting page doesn't discard the session. You can still access the generated queries should you need them.
86
95
87
96
Select the chat bubble icon (**New chat**) to discard the current session.
88
97
89
-

98
+

90
99
91
100
## Modify settings
92
101
93
102
Select the ellipses in the Copilot side pane to choose whether or not to automatically add and run the generated query in advanced hunting.
94
103
95
-

104
+

96
105
97
106
Deselecting the **Run generated query automatically** setting gives you the option of running the generated query automatically (**Add and run**) or adding the generated query to the query editor for further modification (**Add to editor**).
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal helps security teams in speeding up device inspection through AI-powered investigation capabilities.
31
+
[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal helps security teams in speeding up device inspection through AI-powered investigation capabilities.
32
32
33
33
## Know before you begin
34
34
35
-
If you're new to Copilot for Security, you should familiarize yourself with it by reading the following articles:
35
+
If you're new to Security Copilot, you should familiarize yourself with it by reading the following articles:
36
36
37
-
-[What is Copilot for Security?](/security-copilot/microsoft-security-copilot)
38
-
-[Copilot for Security experiences](/security-copilot/experiences-security-copilot)
39
-
-[Get started with Copilot for Security](/security-copilot/get-started-security-copilot)
40
-
-[Understand authentication in Copilot for Security](/security-copilot/authentication)
41
-
-[Prompting in Copilot for Security](/security-copilot/prompting-security-copilot)
37
+
-[What is Security Copilot?](/security-copilot/microsoft-security-copilot)
-[Get started with Security Copilot](/security-copilot/get-started-security-copilot)
40
+
-[Understand authentication in Security Copilot](/security-copilot/authentication)
41
+
-[Prompting in Security Copilot](/security-copilot/prompting-security-copilot)
42
42
43
43
Security operations teams are tasked to sift through device data to find suspicious activities or entities to prevent malicious attacks. These teams need to summarize large amounts of data and simplify complex information to quickly assess, triage, and connect a device's status and activities to potentially malicious attacks.
44
44
45
45
The device summary capability of Copilot in Defender enables security teams to get a device's security posture, vulnerable software information, and any unusual behaviors. Security analysts can use a device's summary to speed up their investigation of incidents and alerts.
46
46
47
-
## Copilot for Security integration in Microsoft Defender
47
+
## Security Copilot integration in Microsoft Defender
48
48
49
-
The device summary capability is available in the Microsoft Defender portal for customers who have provisioned access to Copilot for Security.
49
+
The device summary capability is available in the Microsoft Defender portal for customers who have provisioned access to Security Copilot.
50
50
51
-
This capability is also available in the Copilot for Security standalone portal through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
51
+
This capability is also available in the Security Copilot standalone portal through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Security Copilot](/security-copilot/manage-plugins#preinstalled-plugins).
52
52
53
53
## Key features
54
54
@@ -75,24 +75,24 @@ You can access the device summary capability through the following ways:
75
75
76
76
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets.png":::
77
77
78
-
Review the results of the device summary. You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the device summary card.
78
+
Review the results of the device summary. You can copy the results to clipboard, regenerate the results, or open the Security Copilot portal by selecting the More actions ellipsis (...) on top of the device summary card.
79
79
80
80
## Sample device summary prompt
81
81
82
-
In the Copilot for Security standalone portal, you can use the following prompt to generate a device summary:
82
+
In the Security Copilot standalone portal, you can use the following prompt to generate a device summary:
83
83
84
84
-*Summarize device information in Defender incident {incident number.*
85
85
86
86
> [!TIP]
87
-
> When investigating devices in the Copilot for Security portal, Microsoft recommends including the word ***Defender*** in your prompts to ensure that the device summary capability delivers the results.
87
+
> When investigating devices in the Security Copilot portal, Microsoft recommends including the word ***Defender*** in your prompts to ensure that the device summary capability delivers the results.
88
88
89
89
## Provide feedback
90
90
91
91
Your feedback helps improve the quality of the results generated by Copilot. You can provide feedback about the results by navigating to the bottom of the Copilot pane and selecting the feedback icon .
92
92
93
93
## See also
94
94
95
-
-[Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)
96
-
-[Privacy and data security in Copilot for Security](/copilot/security/privacy-data-security)
95
+
-[Learn about other Security Copilot embedded experiences](/security-copilot/experiences-security-copilot)
96
+
-[Privacy and data security in Security Copilot](/copilot/security/privacy-data-security)
0 commit comments