You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/live-response.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,11 +122,11 @@ The dashboard also gives you access to:
122
122
## Initiate a live response session on a device
123
123
124
124
> [!NOTE]
125
-
> Live response actions initiated from the Device page are not available in the machineactions API.
125
+
> Live response actions initiated from the Device page are not available in the MachineActions API.
126
126
127
-
1. Sign in to Microsoft Defender portal.
127
+
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com).
128
128
129
-
2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
129
+
2. Navigate to **Endpoints** > **Device inventory** and select a device to investigate. The devices page opens.
130
130
131
131
3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
132
132
@@ -235,17 +235,20 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
235
235
236
236
#### To upload a file in the library
237
237
238
-
1. Click **Upload file to library**.
238
+
> [!NOTE]
239
+
> There are restrictions on the characters that can be uploaded to the library. Use alphanumeric characters and some symbols (specifically, `-`, `_`, or `.`).
240
+
241
+
1. Select **Upload file to library**.
239
242
240
-
2.Click**Browse** and select the file.
243
+
2.Select**Browse** and select the file.
241
244
242
245
3. Provide a brief description.
243
246
244
247
4. Specify if you'd like to overwrite a file with the same name.
245
248
246
249
5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
247
250
248
-
6.Click**Confirm**.
251
+
6.Select**Confirm**.
249
252
250
253
7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
251
254
@@ -254,7 +257,7 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
254
257
Anytime during a session, you can cancel a command by pressing CTRL + C.
255
258
256
259
> [!WARNING]
257
-
> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
260
+
> Using this shortcut doesn't stop the command in the agent side. It only cancels the command in the Microsoft Defender portal. So, changing operations such as "remediate" may continue, even if the command is canceled.
Copy file name to clipboardExpand all lines: defender-xdr/configure-email-notifications.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 07/08/2024
15
+
ms.date: 01/17/2025
16
16
---
17
17
18
18
# Configure alert notifications
@@ -43,9 +43,10 @@ If you're using role-based access control (RBAC), recipients will only receive n
43
43
The email notification includes basic information about the alert and a link to the portal where you can do further investigation.
44
44
45
45
## Create rules for alert notifications
46
+
46
47
You can create rules that determine the devices and alert severities to send email notifications for and the notification recipients.
47
48
48
-
1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49
+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49
50
50
51
2. In the navigation pane, select **Settings**\>**Endpoints**\>**General**\>**Email notifications**.
51
52
@@ -102,5 +103,5 @@ This section lists various issues that you may encounter when using email notifi
102
103
-[Update data retention settings](/defender-endpoint/preferences-setup)
Copy file name to clipboardExpand all lines: defender-xdr/faq-managed-response.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.custom:
16
16
- cx-ti
17
17
- cx-dex
18
18
search.appverid: met150
19
-
ms.date: 01/16/2025
19
+
ms.date: 01/17/2025
20
20
---
21
21
22
22
# Understanding Managed response
@@ -30,7 +30,7 @@ The following section lists down questions you or your SOC team might have regar
30
30
| Questions | Answers |
31
31
|---------|---------|
32
32
|**What is Managed response?**| Microsoft Defender Experts for XDR offers **Managed response** where our experts manage the entire remediation process for incidents that require them. This process includes investigating the incident to identify the root cause, determining the required response actions, and taking those actions on your behalf.|
33
-
|**What actions are in scope for Managed response?**| All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices**(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Coming soon)*<ul><li>Disable user<br><li>Enable user<br><li>Revoke refresh token<br><li>Soft delete emails</ul> |
33
+
|**What actions are in scope for Managed response?**| All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices**(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Available now)*<ul><li>Disable user<br><li>Enable user</ul><br>*For users (Coming soon)*<ul><li>Revoke refresh token<br><li>Soft delete emails</ul> |
34
34
|**Can I customize the extent of Managed response?**| You can configure the extent to which our experts do Managed response actions on your behalf by excluding certain devices and users (individually or by groups) either during onboarding or later by modifying your service's settings. [Read more about excluding device groups](get-started-xdr.md#exclude-devices-and-users-from-remediation)|
35
35
|**What support do Defender Experts offer for excluded assets?**| If our experts determine that you need to perform response actions on excluded devices or users, we notify you through various customizable methods and direct you to your Microsoft Defender XDR portal. From your portal, you can then view a detailed summary of our investigation process and the required response actions in the portal and perform these required actions directly. Similar capabilities are also available through Defender APIs, in case you prefer using a security information and event management (SIEM), IT service management (ITSM), or any other third-party tool. |
36
36
|**How am I going to be informed about the response actions?**| Response actions that our experts have completed on your behalf and any pending ones that you need to perform on your excluded assets are displayed in the **Managed response** panel in your Defender portal's **Incidents** page. <br><br>In addition, you'll also receive an email containing a link to the incident and instructions to view the Managed response in the portal. Moreover, if you have integration with Microsoft Sentinel or APIs, you'll also be notified within those tools by looking for Defender Experts statuses. For more information, see [FAQs related to Microsoft Defender Experts for XDR incident notifications](faq-incident-notifications-xdr.md).|
Copy file name to clipboardExpand all lines: defender-xdr/incident-queue.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ This table lists the filter names that are available.
123
123
|**Alert severity<br>Incident severity**| The severity of an alert or incident is indicative of the impact it can have on your assets. The higher the severity, the bigger the impact and typically requires the most immediate attention. Select **High**, **Medium**, **Low**, or **Informational**. |
124
124
|**Incident assignment**| Select the assigned user or users. |
125
125
|**Multiple service sources**| Specify whether the filter is for more than one service source. |
126
-
|**Service/detection sources**| Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
126
+
|**Service/detection sources**| Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<li>Microsoft Purview Insider Risk Management<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
127
127
|**Tags**| Select one or multiple tag names from the list. |
128
128
|**Multiple category**| Specify whether the filter is for more than one category. |
129
129
|**Categories**| Choose categories to focus on specific tactics, techniques, or attack components seen. |
@@ -137,6 +137,9 @@ This table lists the filter names that are available.
137
137
|**Alert policies**| Specify an alert policy title. |
138
138
|**Alert subscription IDs**| Specify an alert based on a subscription ID. |
139
139
140
+
> [!NOTE]
141
+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
142
+
140
143
The default filter is to show all alerts and incidents with a status of **New** and **In progress** and with a severity of **High**, **Medium**, or **Low**.
141
144
142
145
You can quickly remove a filter by selecting the **X** in the name of a filter in the **Filters** list.
Copy file name to clipboardExpand all lines: defender-xdr/investigate-alerts.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ ms.topic: conceptual
22
22
search.appverid:
23
23
- MOE150
24
24
- met150
25
-
ms.date: 07/18/2024
25
+
ms.date: 1/17/2025
26
26
---
27
27
28
28
# Investigate alerts in Microsoft Defender XDR
@@ -133,6 +133,10 @@ Microsoft Defender XDR alerts come from solutions like Microsoft Defender for En
133
133
| Microsoft Data Loss Prevention |`dl{GUID}`|
134
134
| Microsoft Defender for Cloud |`dc{GUID}`|
135
135
| Microsoft Sentinel |`sn{GUID}`|
136
+
| Microsoft Purview Insider Risk Management |`ir{GUID}`|
137
+
138
+
> [!NOTE]
139
+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
Copy file name to clipboardExpand all lines: defender-xdr/investigate-incidents.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
16
16
search.appverid:
17
17
- MOE150
18
18
- MET150
19
-
ms.date: 11/19/2024
19
+
ms.date: 01/17/2025
20
20
appliesto:
21
21
- Microsoft Defender XDR
22
22
- Microsoft Sentinel in the Microsoft Defender portal
@@ -142,6 +142,9 @@ Here's an example.
142
142
143
143
Learn how to use the alert queue and alert pages in [investigate alerts](investigate-alerts.md).
144
144
145
+
> [!NOTE]
146
+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
147
+
145
148
## Assets
146
149
147
150
Easily view and manage all your assets in one place with the new **Assets** tab. This unified view includes Devices, Users, Mailboxes and Apps.
0 commit comments