Skip to content

Commit bd48731

Browse files
committed
Merge branch 'main' into TC-chrisda
2 parents 32635f2 + a341c90 commit bd48731

23 files changed

+236
-82
lines changed

defender-endpoint/live-response.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,11 @@ The dashboard also gives you access to:
122122
## Initiate a live response session on a device
123123

124124
> [!NOTE]
125-
> Live response actions initiated from the Device page are not available in the machineactions API.
125+
> Live response actions initiated from the Device page are not available in the MachineActions API.
126126
127-
1. Sign in to Microsoft Defender portal.
127+
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com).
128128

129-
2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
129+
2. Navigate to **Endpoints** > **Device inventory** and select a device to investigate. The devices page opens.
130130

131131
3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
132132

@@ -235,17 +235,20 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
235235

236236
#### To upload a file in the library
237237

238-
1. Click **Upload file to library**.
238+
> [!NOTE]
239+
> There are restrictions on the characters that can be uploaded to the library. Use alphanumeric characters and some symbols (specifically, `-`, `_`, or `.`).
240+
241+
1. Select **Upload file to library**.
239242

240-
2. Click **Browse** and select the file.
243+
2. Select **Browse** and select the file.
241244

242245
3. Provide a brief description.
243246

244247
4. Specify if you'd like to overwrite a file with the same name.
245248

246249
5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
247250

248-
6. Click **Confirm**.
251+
6. Select **Confirm**.
249252

250253
7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
251254

@@ -254,7 +257,7 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
254257
Anytime during a session, you can cancel a command by pressing CTRL + C.
255258

256259
> [!WARNING]
257-
> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
260+
> Using this shortcut doesn't stop the command in the agent side. It only cancels the command in the Microsoft Defender portal. So, changing operations such as "remediate" may continue, even if the command is canceled.
258261
259262
## Run a script
260263

defender-endpoint/respond-machine-alerts.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,9 @@ Or, use this alternate procedure:
114114
4. Select **Package collection package available** to download the collection package.
115115

116116
![Image of download package](media/download-package.png)
117+
118+
> [!NOTE]
119+
> The collection of the investigation package may fail if a device has a low battery level or is on a metered connection.
117120
118121
### Investigation package contents for Windows devices
119122

defender-xdr/TOC.yml

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,9 @@
121121
- name: Investigate data loss prevention alerts with Microsoft Sentinel
122122
href: dlp-investigate-alerts-sentinel.md
123123
- name: Investigate and respond to container threats
124-
href: investigate-respond-container-threats.md
124+
href: investigate-respond-container-threats.md
125+
- name: Investigate insider risk threats
126+
href: irm-investigate-alerts-defender.md
125127
- name: Configure and manage automated investigation and response
126128
items:
127129
- name: Overview
@@ -428,15 +430,6 @@
428430
href: integrate-microsoft-365-defender-secops-use-cases.md
429431
- name: Step 6. SOC maintenance tasks
430432
href: integrate-microsoft-365-defender-secops-tasks.md
431-
- name: Optimize your security operations
432-
items:
433-
- name: SOC optimization overview
434-
display name: SOC optimization
435-
href: /azure/sentinel/soc-optimization/soc-optimization-access?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
436-
- name: Use SOC optimizations programmatically
437-
href: /azure/sentinel/soc-optimization/soc-optimization-api?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
438-
- name: SOC optimization reference
439-
href: /azure/sentinel/soc-optimization/soc-optimization-reference?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
440433
- name: Manage multitenant environments
441434
items:
442435
- name: Overview

defender-xdr/configure-email-notifications.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 07/08/2024
15+
ms.date: 01/17/2025
1616
---
1717

1818
# Configure alert notifications
@@ -43,9 +43,10 @@ If you're using role-based access control (RBAC), recipients will only receive n
4343
The email notification includes basic information about the alert and a link to the portal where you can do further investigation.
4444

4545
## Create rules for alert notifications
46+
4647
You can create rules that determine the devices and alert severities to send email notifications for and the notification recipients.
4748

48-
1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
4950

5051
2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Email notifications**.
5152

@@ -102,5 +103,5 @@ This section lists various issues that you may encounter when using email notifi
102103
- [Update data retention settings](/defender-endpoint/preferences-setup)
103104
- [Configure advanced features](/defender-endpoint/advanced-features)
104105
- [Configure vulnerability email notifications](/defender-endpoint/configure-vulnerability-email-notifications)
105-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
106106

107+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/faq-managed-response.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
- cx-ti
1717
- cx-dex
1818
search.appverid: met150
19-
ms.date: 01/16/2025
19+
ms.date: 01/17/2025
2020
---
2121

2222
# Understanding Managed response
@@ -30,7 +30,7 @@ The following section lists down questions you or your SOC team might have regar
3030
| Questions | Answers |
3131
|---------|---------|
3232
|**What is Managed response?** | Microsoft Defender Experts for XDR offers **Managed response** where our experts manage the entire remediation process for incidents that require them. This process includes investigating the incident to identify the root cause, determining the required response actions, and taking those actions on your behalf.|
33-
|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Coming soon)*<ul><li>Disable user<br><li>Enable user<br><li>Revoke refresh token<br><li>Soft delete emails</ul> |
33+
|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Available now)*<ul><li>Disable user<br><li>Enable user</ul><br>*For users (Coming soon)*<ul><li>Revoke refresh token<br><li>Soft delete emails</ul> |
3434
|**Can I customize the extent of Managed response?** | You can configure the extent to which our experts do Managed response actions on your behalf by excluding certain devices and users (individually or by groups) either during onboarding or later by modifying your service's settings. [Read more about excluding device groups](get-started-xdr.md#exclude-devices-and-users-from-remediation) |
3535
|**What support do Defender Experts offer for excluded assets?** | If our experts determine that you need to perform response actions on excluded devices or users, we notify you through various customizable methods and direct you to your Microsoft Defender XDR portal. From your portal, you can then view a detailed summary of our investigation process and the required response actions in the portal and perform these required actions directly. Similar capabilities are also available through Defender APIs, in case you prefer using a security information and event management (SIEM), IT service management (ITSM), or any other third-party tool. |
3636
|**How am I going to be informed about the response actions?** | Response actions that our experts have completed on your behalf and any pending ones that you need to perform on your excluded assets are displayed in the **Managed response** panel in your Defender portal's **Incidents** page. <br><br>In addition, you'll also receive an email containing a link to the incident and instructions to view the Managed response in the portal. Moreover, if you have integration with Microsoft Sentinel or APIs, you'll also be notified within those tools by looking for Defender Experts statuses. For more information, see [FAQs related to Microsoft Defender Experts for XDR incident notifications](faq-incident-notifications-xdr.md).|

defender-xdr/incident-queue.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ This table lists the filter names that are available.
123123
| **Alert severity<br>Incident severity** | The severity of an alert or incident is indicative of the impact it can have on your assets. The higher the severity, the bigger the impact and typically requires the most immediate attention. Select **High**, **Medium**, **Low**, or **Informational**. |
124124
| **Incident assignment** | Select the assigned user or users. |
125125
| **Multiple service sources** | Specify whether the filter is for more than one service source. |
126-
| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
126+
| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<li>Microsoft Purview Insider Risk Management<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
127127
| **Tags** | Select one or multiple tag names from the list. |
128128
| **Multiple category** | Specify whether the filter is for more than one category. |
129129
| **Categories** | Choose categories to focus on specific tactics, techniques, or attack components seen. |
@@ -137,6 +137,9 @@ This table lists the filter names that are available.
137137
| **Alert policies** | Specify an alert policy title. |
138138
| **Alert subscription IDs** | Specify an alert based on a subscription ID. |
139139

140+
> [!NOTE]
141+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
142+
140143
The default filter is to show all alerts and incidents with a status of **New** and **In progress** and with a severity of **High**, **Medium**, or **Low**.
141144

142145
You can quickly remove a filter by selecting the **X** in the name of a filter in the **Filters** list.

defender-xdr/investigate-alerts.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.topic: conceptual
2222
search.appverid:
2323
- MOE150
2424
- met150
25-
ms.date: 07/18/2024
25+
ms.date: 1/17/2025
2626
---
2727

2828
# Investigate alerts in Microsoft Defender XDR
@@ -133,6 +133,10 @@ Microsoft Defender XDR alerts come from solutions like Microsoft Defender for En
133133
| Microsoft Data Loss Prevention | `dl{GUID}` |
134134
| Microsoft Defender for Cloud | `dc{GUID}` |
135135
| Microsoft Sentinel | `sn{GUID}` |
136+
| Microsoft Purview Insider Risk Management | `ir{GUID}` |
137+
138+
> [!NOTE]
139+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
136140
137141
<a name='configure-aad-ip-alert-service'></a>
138142

defender-xdr/investigate-incidents.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 11/19/2024
19+
ms.date: 01/17/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
@@ -142,6 +142,9 @@ Here's an example.
142142

143143
Learn how to use the alert queue and alert pages in [investigate alerts](investigate-alerts.md).
144144

145+
> [!NOTE]
146+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
147+
145148
## Assets
146149

147150
Easily view and manage all your assets in one place with the new **Assets** tab. This unified view includes Devices, Users, Mailboxes and Apps.

0 commit comments

Comments
 (0)