Skip to content

Commit b6330dc

Browse files
authored
Merge pull request #2473 from MicrosoftDocs/diannegali-xdrupdates
updated XDR pages
2 parents 2cf5c96 + 640f86f commit b6330dc

8 files changed

+44
-66
lines changed

defender-xdr/TOC.yml

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,9 @@
121121
- name: Investigate data loss prevention alerts with Microsoft Sentinel
122122
href: dlp-investigate-alerts-sentinel.md
123123
- name: Investigate and respond to container threats
124-
href: investigate-respond-container-threats.md
124+
href: investigate-respond-container-threats.md
125+
- name: Investigate insider risk threats
126+
href: irm-investigate-alerts-defender.md
125127
- name: Configure and manage automated investigation and response
126128
items:
127129
- name: Overview
@@ -428,15 +430,6 @@
428430
href: integrate-microsoft-365-defender-secops-use-cases.md
429431
- name: Step 6. SOC maintenance tasks
430432
href: integrate-microsoft-365-defender-secops-tasks.md
431-
- name: Optimize your security operations
432-
items:
433-
- name: SOC optimization overview
434-
display name: SOC optimization
435-
href: /azure/sentinel/soc-optimization/soc-optimization-access?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
436-
- name: Use SOC optimizations programmatically
437-
href: /azure/sentinel/soc-optimization/soc-optimization-api?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
438-
- name: SOC optimization reference
439-
href: /azure/sentinel/soc-optimization/soc-optimization-reference?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
440433
- name: Manage multitenant environments
441434
items:
442435
- name: Overview

defender-xdr/configure-email-notifications.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 07/08/2024
15+
ms.date: 01/17/2025
1616
---
1717

1818
# Configure alert notifications
@@ -43,9 +43,10 @@ If you're using role-based access control (RBAC), recipients will only receive n
4343
The email notification includes basic information about the alert and a link to the portal where you can do further investigation.
4444

4545
## Create rules for alert notifications
46+
4647
You can create rules that determine the devices and alert severities to send email notifications for and the notification recipients.
4748

48-
1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
4950

5051
2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Email notifications**.
5152

@@ -102,5 +103,5 @@ This section lists various issues that you may encounter when using email notifi
102103
- [Update data retention settings](/defender-endpoint/preferences-setup)
103104
- [Configure advanced features](/defender-endpoint/advanced-features)
104105
- [Configure vulnerability email notifications](/defender-endpoint/configure-vulnerability-email-notifications)
105-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
106106

107+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/m365d-notifications-incidents.md

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,18 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 07/08/2024
19+
ms.date: 01/17/2025
20+
appliesto:
21+
- Microsoft Defender XDR
2022
---
2123

2224
# Get incident notifications by email
2325

2426
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2527

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3028
[!INCLUDE [Prerelease](../includes/prerelease.md)]
3129

32-
You can set up Microsoft Defender XDR to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
30+
You can set up email notifications for your staff to get notified about new incidents or updates to existing incidents. You can choose to get notifications based on:
3331

3432
- Alert severity
3533
- Alert sources
@@ -59,32 +57,28 @@ Likewise, if your organization is using role-based access control (RBAC), you ca
5957

6058
Follow these steps to create a new rule and customize email notification settings.
6159

62-
1. Go to [Microsoft Defender XDR](https://security.microsoft.com) in the navigation pane, select **Settings > Microsoft Defender XDR > Incident email notifications**.
63-
2. Select **Add item**.
60+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com). In the navigation pane, select **Settings > Microsoft Defender XDR**, then select **Email notifications** under General.
61+
2. In the **Incidents** tab, select **Add incident notification rule**.
6462
3. On the **Basics** page, type the rule name and a description, and then select **Next**.
6563
4. On the **Notification settings** page, configure:
66-
- **Alert severity** - Choose the alert severities that will trigger an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
64+
- **Alert severity** - Choose the alert severities that triggers an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
6765
- **Device group scope** - You can specify all device groups or select from the list of device groups in your tenant.
6866
- **Send only one notification per incident** - Select if you want one notification per incident.
6967
- **Include organization name in the email** - Select if you want your organization name to appear in the email notification.
7068
- **Include tenant-specific portal link** - Select if you want to add a link with the tenant ID in the email notification for access to a specific Microsoft 365 tenant.
7169

72-
:::image type="content" source="/defender/media/get-incident-notifications/incidents-email-notification-settings.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="/defender/media/get-incident-notifications/incidents-email-notification-settings.png":::
70+
:::image type="content" source="/defender/media/get-incident-notifications/incident-notif-settings-small.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="/defender/media/get-incident-notifications/incident-notif-settings.png":::
7371

74-
5. Select **Next**. On the **Recipients** page, add the email addresses that will receive the incident notifications. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
72+
5. Select **Next**. On the **Recipients** page, add the email addresses where the incident notifications are to be sent. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
7573
6. Select **Next**. On the **Review rule** page, review the settings of the rule, and then select **Create rule**. Recipients will start receiving incident notifications through email based on the settings.
7674

7775
To edit an existing rule, select it from the list of rules. On the pane with the rule name, select **Edit rule** and make your changes on the **Basics**, **Notification settings**, and **Recipients** pages.
7876

7977
To delete a rule, select it from the list of rules. On the pane with the rule name, select **Delete**.
8078

81-
Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md).
79+
Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents](investigate-incidents.md).
8280

8381
## Next steps
8482

8583
- [Get email notifications on response actions](m365d-response-actions-notifications.md)
8684
- [Get email notifications about new reports in Threat analytics](m365d-threat-analytics-notifications.md)
87-
88-
## See also
89-
90-
- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)

defender-xdr/m365d-response-actions-notifications.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Get email notifications for response actions in Microsoft Defender XDR
2+
title: Get email notifications for response actions
33
description: Set up email notifications to get notified of manual and automated response actions in Microsoft Defender XDR.
44
ms.service: defender-xdr
55
f1.keywords:
@@ -16,24 +16,22 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 07/08/2024
19+
ms.date: 01/17/2025
20+
appliesto:
21+
- Microsoft Defender XDR
2022
---
2123

22-
# Get email notifications for response actions in Microsoft Defender XDR
24+
# Get email notifications for response actions
2325

2426
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2527

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3028
[!INCLUDE [Prerelease](../includes/prerelease.md)]
3129

32-
You can set up Microsoft Defender XDR to notify you through email about manual or automated response actions.
30+
You can set up email notifications in the Microsoft Defender portal to notify you about manual or automated response actions.
3331

34-
[Manual response actions](respond-first-incident-remediate.md#manual-remediation) are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.
32+
Manual response actions are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.
3533

36-
[Automated response actions](respond-first-incident-remediate.md#automatic-remediation), on the other hand, are capabilities in Microsoft Defender XDR that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).
34+
Automated response actions are capabilities in Microsoft Defender XDR that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).
3735

3836
> [!NOTE]
3937
> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. Likewise, if your organization is using [role-based access control (RBAC)](manage-rbac.md), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
@@ -48,7 +46,7 @@ You can set up Microsoft Defender XDR to notify you through email about manual o
4846
4947
To create a rule for email notifications, perform the following steps:
5048

51-
1. In the navigation pane of Microsoft Defender XDR, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
49+
1. In the navigation pane of the Microsoft Defender portal, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
5250
:::image type="content" source="/defender/media/m35d-response-actions-notifications/fig1-response-notifications.png" alt-text="Actions tab in the Microsoft Defender XDR Settings page" lightbox="/defender/media/m35d-response-actions-notifications/fig1-response-notifications.png":::
5351
2. Select **Add notification rule**. Add a rule name and description under Basics. Both Name and Description fields accept letters, numbers, and spaces only.
5452
:::image type="content" source="/defender/media/m35d-response-actions-notifications/fig2-response-notifications.png" alt-text="Basics section of the add notification rule" lightbox="/defender/media/m35d-response-actions-notifications/fig2-response-notifications.png":::

defender-xdr/m365d-threat-analytics-notifications.md

Lines changed: 18 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -17,57 +17,49 @@ ms.collection:
1717
ms.topic: conceptual
1818
ms.custom: seo-marvel-apr2020
1919
search.appverid: met150
20-
ms.date: 03/28/2024
20+
ms.date: 01/17/2025
21+
appliesto:
22+
- Microsoft Defender XDR
2123
---
2224

2325
# Get email notifications for Threat analytics updates
2426

2527
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2628

27-
**Applies to:**
28-
29-
- Microsoft Defender XDR
30-
31-
You can set up email notifications that sends you updates on [threat analytics](threat-analytics.md) reports.
29+
You can set up email notifications that send you updates on [threat analytics](threat-analytics.md) reports.
3230

3331
## Set up email notifications for report updates
3432

3533
To set up email notifications for threat analytics reports, perform the following steps:
3634

37-
1. Select **Settings** in the Microsoft Defender XDR sidebar. Select **Microsoft Defender XDR** from the list of settings.
38-
39-
![Screenshot with "Settings" and "Microsoft Defender XDR" both highlighted in red](/defender/media/threat-analytics/ta_create_notification_0.png)
40-
41-
2. Choose **Email notifications** > **Threat analytics**, and select the button, **+ Create a notification rule**. A flyout will appear.
35+
1. In the navigation pane of the Microsoft Defender portal, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**.
4236

43-
![Screenshot with "+ Create a notification rule" highlighted in red](/defender/media/threat-analytics/ta_create_notification_1.png)
37+
2. In the **Threat analytics** tab, select **+ Create a notification rule**. A flyout appears.
4438

4539
3. Follow the steps listed in the flyout. First, give your new rule a name. The description field is optional, but a name is required. You can toggle the rule on or off using the checkbox under the description field.
4640

47-
> [!NOTE]
48-
> The name and description fields for a new notification rule only accept English letters and numbers. They don't accept spaces, dashes, underscores, or any other punctuation.
49-
50-
![Screenshot of the naming screen, with all fields filled out and the "Turn rule on" checkbox checked](/defender/media/threat-analytics/ta_create_notification_2.png)
41+
> [!NOTE]
42+
> The name and description fields for a new notification rule only accept English letters and numbers. Punctuations like spaces, dashes, underscores, aren't supported.
5143
52-
4. Choose which kind of reports you want to be notified about. You can choose between being updated about all newly published or updated reports, or only those reports which have a certain tag or type.
44+
![Screenshot of the naming screen, with all fields filled out and the "Turn rule on" checkbox checked](/defender/media/threat-analytics/ta_create_notification_2.png)
5345

54-
![Screenshot of the notification screen, with Ransomware tags selected and a drop down menu for types open](/defender/media/threat-analytics/ta_create_notification_3.png)
46+
4. Choose the reports you want to be notified about. You can choose to be updated about all newly published or updated reports or only those reports of a certain type or with a specific tag.
5547

56-
5. Add at least one recipient to receive the notification emails. You can also use this screen to check how the notifications will be received, by sending a test email.
48+
![Screenshot of the notification screen, with Ransomware tags selected and a drop down menu for types open](/defender/media/threat-analytics/ta_create_notification_3.png)
5749

58-
![Screenshot of the recipients screen. There are 3 recipients listed, and a test email has been sent, as indicated by a green checkmark](/defender/media/threat-analytics/ta_create_notification_4.png)
50+
5. Add at least one recipient to receive the notification emails. You can also use this screen to send a test email to check the notification settings.
5951

60-
6. Review your new rule. If there is anything you would like to change, select the **Edit** button at the end of each subsection. Once your review is complete, select the **Create rule** button.
52+
![Screenshot of the recipients screen. There are 3 recipients listed, and a test email has been sent, as indicated by a green checkmark](/defender/media/threat-analytics/ta_create_notification_4.png)
6153

62-
![Screenshot of the review screen. An edit button is highlighted in red](/defender/media/threat-analytics/ta_create_notification_5.png)
54+
6. Review your new rule. Select **Edit** at the end of each subsection to change any of the settings. Once your review is complete, select **Create rule**.
6355

64-
7. Congratulations! Your new rule has been successfully created. Select the **Done** button to complete the process and close the flyout.
56+
![Screenshot of the review screen. An edit button is highlighted in red](/defender/media/threat-analytics/ta_create_notification_5.png)
6557

66-
![Screenshot of the rule created screen. A successfully created rule will display green checkmarks along the sidebar, and a big green check in the main area of the screen](/defender/media/threat-analytics/ta_create_notification_6.png)
58+
7. Select **Done** to complete the process and close the flyout.
6759

68-
8. Your new rule will now appear in the list of Threat analytics email notifications.
60+
![Screenshot of the rule created screen. A successfully created rule will display green checkmarks along the sidebar, and a big green check in the main area of the screen](/defender/media/threat-analytics/ta_create_notification_6.png)
6961

70-
![Screenshot of the list of email notification rules within the Settings screen](/defender/media/threat-analytics/ta_create_notification_7.png)
62+
Your new rule now appears in the list of Threat analytics email notifications.
7163

7264
## Next steps
7365

53.7 KB
Loading
110 KB
Loading
-76.3 KB
Binary file not shown.

0 commit comments

Comments
 (0)