You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-cloud-apps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -250,7 +250,7 @@ Use these Defender for Cloud Apps tutorials to help you discover risk and protec
250
250
-[Protect your files with admin quarantine](/cloud-app-security/use-case-admin-quarantine)
251
251
-[Require step-up authentication upon risky action](/cloud-app-security/tutorial-step-up-authentication)
252
252
253
-
For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see this [video](https://www.microsoft.com/en-us/videoplayer/embed/RWFISa).
253
+
For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see this [video](https://learn-video.azurefd.net/vod/player?id=ffdedc73-6edf-45a9-8c90-566296e8d4ec).
@@ -213,4 +213,4 @@ Continue your end-to-end deployment of Microsoft Defender XDR with [Pilot and de
213
213
214
214
:::image type="content" source="./media/eval-defender-xdr/defender-xdr-pilot-deploy-flow-cloud-apps.svg" alt-text="A diagram that shows Microsoft Defender for Cloud Apps in the pilot and deploy Microsoft Defender XDR process." lightbox="./media/eval-defender-xdr/defender-xdr-pilot-deploy-flow-cloud-apps.svg" border="false":::
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-investigate-respond.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ Defender for Office 365 with Microsoft 365 E5 or Microsoft Defender for Office 3
96
96
97
97
For step by step instructions on how to gain insights with reporting, see [Gain insights through attack simulation training](/defender-office-365/attack-simulation-training-insights).
For more information, see [Simulations](/defender-office-365/attack-simulation-training-get-started#simulations).
102
102
@@ -209,7 +209,7 @@ To see the Automated Incident and Response feature in action, keep the notepad.e
209
209
> [!NOTE]
210
210
> Before we walk you through this simulation, watch the following video to see how incident management helps you piece the related alerts together as part of the investigation process, where you can find it in the portal, and how it can help you in your security operations:
Switching to the SOC analyst point of view, you can now start to investigate the attack in the Microsoft Defender portal.
215
215
@@ -318,7 +318,7 @@ Select the user name to open the user's profile page where further investigation
318
318
> [!NOTE]
319
319
> Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
Navigate back to the incident in the Microsoft Defender portal. The **Investigations** tab in the **Incident** page shows the automated investigations that were triggered by Microsoft Defender for Identity and Microsoft Defender for Endpoint. The screenshot below displays only the automated investigation triggered by Defender for Endpoint. By default, Defender for Endpoint automatically remediates the artifacts found in the queue, which requires remediation.
324
324
@@ -443,7 +443,7 @@ For more information, see [Automated investigation and response](m365d-autoir.md
If the [optional fileless PowerShell attack simulation](pilot-deploy-investigate-respond.md#simulate-an-attack-with-an-isolated-domain-controller-and-client-device-optional) were a real attack that had already reached the credential access stage, you can use advanced hunting at any point in the investigation to proactively search through events and records in the network using what you already know from the generated alerts and affected entities.
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](incident-queue.md#defender-boxed) highlights.
Breaches also happen through various devices like phones and tablets that connect to your organization's network. Incident responders can further investigate these devices within the portal. The following video talks about the top threats from mobile devices and how you can investigate these:
Meanwhile, Microsoft Defender XDR's [automated investigation and response](m365d-autoir.md) capabilities can automatically investigate and apply remediation actions to malicious and suspicious items. These capabilities scale investigation and resolution to threats, freeing incident responders to focus their efforts on high-impact attacks.
45
45
@@ -59,7 +59,7 @@ Playbooks use Power Automate to create custom robotic process automation flows t
59
59
60
60
Learn how Power Automate can help you automate your incident response through this video:
Copy file name to clipboardExpand all lines: defender-xdr/streaming-api.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ ms.date: 07/25/2023
32
32
33
33
Microsoft Defender XDR supports streaming events through [Advanced Hunting](advanced-hunting-overview.md) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/event-hubs/).
34
34
35
-
For more information on Microsoft Defender XDR streaming API, see the [video](https://www.microsoft.com/en-us/videoplayer/embed/RE4r4ga).
35
+
For more information on Microsoft Defender XDR streaming API, see the [video](https://learn-video.azurefd.net/vod/player?id=56edfb3f-b612-4e4c-acb9-4bbd141bd535).
36
36
37
37
## In this section
38
38
@@ -43,7 +43,7 @@ Topic | Description
43
43
[Supported event types](supported-event-types.md) | Learn which Advanced Hunting event types the Streaming API supports.
44
44
45
45
Watch this short video to learn how to set up the streaming API to ship event information directly to Azure Event hubs for consumption by visualization services, data processing engines, or Azure storage for long-term data retention.
0 commit comments