Skip to content

Commit ba6f702

Browse files
authored
Merge branch 'main' into mde-content-freshness
2 parents c2cee12 + 4437e8a commit ba6f702

19 files changed

+393
-9
lines changed

defender-business/mdb-partners.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 03/05/2025
12+
ms.date: 03/25/2025
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -43,6 +43,9 @@ Use the links in the following table to access the guide and summary checklist:
4343
|[Practical guide to security using Microsoft 365 Business (Basic, Standard, and Premium)](https://aka.ms/smbsecurityguide)|This Word document summarizes Microsoft's recommendations for enabling employees at small and medium-sized businesses to securely work from anywhere- whether from home, in the office or on the go, using the features included in Microsoft 365 Business Premium.|
4444
|[Checklist for security with Microsoft 365 Business Premium](https://aka.ms/smbsecuritychecklist)|This checklist includes all the planning and configuration steps covered in the guide, from getting started to configuring security and compliance capabilities, and provides general recommendations for each step.|
4545

46+
> [!TIP]
47+
> The information is also available in the following videos: <https://aka.ms/M365GettingStarted>.
48+
4649
## Integrate Microsoft endpoint security with your RMM tools and PSA software
4750

4851
If you're a Microsoft Managed Service Provider (MSP), you can integrate Microsoft endpoint security with your remote monitoring and management (RMM) tools and your professional service automation (PSA) software so that you can:

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
1818
ms.service: defender-office-365
1919
search.appverid: met150
20-
ms.date: 01/10/2025
20+
ms.date: 03/25/2025
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -105,6 +105,7 @@ It's important to understand how user allows and blocks, tenant allows and block
105105
- After the filtering stack determines a verdict, only then are tenant policies and their configured actions evaluated.
106106
- If the same email address or domain exists in a user's Safe Senders list and Blocked Senders list, the Safe Senders list takes precedence.
107107
- If the same entity (email address, domain, spoofed sending infrastructure, file, or URL) exists in an allow entry and a block entry in the Tenant Allow/Block List, the block entry takes precedence.
108+
- If you use a file type in the [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies), allowing the same file in the Tenant Allow/Block list or Exchange mail flow rules (also known as transport rules) doesn't override the verdict.
108109

109110
### User allows and blocks
110111

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -460,6 +460,8 @@
460460
items:
461461
- name: Microsoft Defender XDR FAQs
462462
href: m365d-enable-faq.md
463+
- name: Alert policies
464+
href: alert-policies.md
463465
- name: Audit activities and events
464466
href: microsoft-xdr-auditing.md
465467
- name: Configure email notifications

defender-xdr/alert-policies.md

Lines changed: 347 additions & 0 deletions
Large diffs are not rendered by default.

defender-xdr/investigate-alerts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- met150
21-
ms.date: 1/27/2025
21+
ms.date: 3/25/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
---
@@ -58,6 +58,7 @@ You can filter alerts according to these criteria:
5858
- Product name
5959
- Entities (the impacted assets)
6060
- Automated investigation state
61+
- Workspace
6162
- Data stream (workload or location)
6263

6364
> [!NOTE]

defender-xdr/investigate-incidents.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 01/17/2025
19+
ms.date: 03/11/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
@@ -119,6 +119,17 @@ Selecting an attack path from the list displays the attack path graph, which sho
119119
> To view the details of an attack path, you must have read access permissions in the Microsoft Defender portal and the license for [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management). </br></br>
120120
> To view attack path details with Microsoft Sentinel in the unified security operations platform, a *Sentinel Reader* role is required. To create new attack paths, the *Security Administrator* role is required.
121121
122+
### Incident details
123+
124+
You can view an incident's details on the right pane of an incident page. The incident details include incident assignment, ID, classification, categories, and first and last activity date and time. It also includes a description of the incident, impacted assets, active alerts, and where applicable, the related threats, recommendations, and disruption summary and impact. Here's an example of the incident details where the incident description is highlighted.
125+
126+
:::image type="content" source="/defender/media/investigate-incidents/incident-desc-small.png" alt-text="An example of incident details where the description is highlighted." lightbox="/defender/media/investigate-incidents/incident-desc.png":::
127+
128+
The incident description provides a brief overview of the incident. In some cases, the first alert in the incident is used as the incident description. In this case, the description is only shown in the portal and not stored in the activity log, advanced hunting tables, or the Microsoft Sentinel in Azure portal.
129+
130+
> [!TIP]
131+
> Microsoft Sentinel customers can also view and overwrite the same incident description in the Azure portal by setting the incident description through API or automation.
132+
122133
## Alerts
123134

124135
On the **Alerts** tab, you can view the alert queue for alerts related to the incident and other information about them like the following:
96.8 KB
Loading
22.1 KB
Loading
43.6 KB
Loading
34.3 KB
Loading

0 commit comments

Comments
 (0)