Skip to content

Commit c024483

Browse files
authored
Merge pull request #2755 from MicrosoftDocs/main
Published main to live, Thursday 5:00 PM IST, 02/13
2 parents 3acb880 + 027ff24 commit c024483

File tree

5 files changed

+38
-60
lines changed

5 files changed

+38
-60
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -206,10 +205,15 @@
206205
"redirect_url": "/defender-xdr/troubleshoot",
207206
"redirect_document_id": false
208207
},
208+
{
209+
"source_path": "defender-xdr/portals.md",
210+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
211+
"redirect_document_id": false
212+
},
209213
{
210214
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
211215
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
212216
"redirect_document_id": false
213217
}
214218
]
215-
}
219+
}

defender-xdr/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@
2626
href: prerequisites.md
2727
- name: Data security and privacy
2828
href: data-privacy.md
29-
- name: Microsoft security portals
30-
href: portals.md
3129
- name: Pilot and deploy Microsoft Defender XDR
3230
items:
3331
- name: Overview

defender-xdr/deception-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The following table lists the requirements to enable the deception capability in
4747
> |Requirement|Details|
4848
> |-------------|----------|
4949
> |Subscription requirements|One of these subscriptions:</br> - Microsoft 365 E5</br> - Microsoft Security E5</br> - Microsoft Defender for Endpoint Plan 2|
50-
> |Deployment requirements|Requirements:</br> - Defender for Endpoint is the primary EDR solution</br> - [Automated investigation and response capabilities in Defender for Endpoint](/defender-endpoint/configure-automated-investigations-remediation) is configured</br> - Devices are [joined](/entra/identity/devices/concept-directory-join/) or [hybrid joined](/entra/identity/devices/concept-hybrid-join/) in Microsoft Entra</br> - PowerShell is enabled on the devices</br> - The deception feature covers clients operating on Windows 10 RS5 and later in preview|
50+
> |Deployment requirements|Requirements:</br> - Defender for Endpoint is the primary EDR solution</br> - [Automated investigation and response capabilities in Defender for Endpoint](/defender-endpoint/configure-automated-investigations-remediation) is configured</br> - Devices are [joined](/entra/identity/devices/concept-directory-join/) or [hybrid joined](/entra/identity/devices/concept-hybrid-join/) in Microsoft Entra</br> - PowerShell is enabled on the devices (in non-restricted/non-constrained mode)</br> - The deception feature covers clients operating on Windows 10 RS5 and later in preview|
5151
> |Permissions|You must have one of the following roles assigned in the [Microsoft Entra admin center](https://entra.microsoft.com) or in the [Microsoft 365 admin center](https://admin.microsoft.com) to configure deception capabilities:</br> - Global administrator</br> - Security administrator</br> - Manage portal system settings|
5252
5353
> [!NOTE]

defender-xdr/portals.md

Lines changed: 0 additions & 54 deletions
This file was deleted.

unified-secops-platform/overview-plan.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: batamig
55
ms.author: bagol
66
ms.service: unified-secops-platform
77
ms.topic: concept-article #Don't change.
8-
ms.date: 12/02/2024
8+
ms.date: 02/09/2025
99
ms.collection:
1010
- usx-security
1111

@@ -48,6 +48,7 @@ Other services supported in the Microsoft Defender portal as part of Microsoft's
4848
| [**Microsoft Defender for Cloud**](/azure/defender-for-cloud/) | Protects multi-cloud and hybrid environments with advanced threat detection and response. |
4949
| [**Microsoft Defender Threat Intelligence**](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti) | Streamlines threat intelligence workflows by aggregating and enriching critical data sources to correlate indicators of compromise (IOCs) with related articles, actor profiles, and vulnerabilities. |
5050
| [**Microsoft Entra ID Protection**](/entra/id-protection/overview-identity-protection) | Evaluates risk data from sign-in attempts to evaluate the risk of each sign-in to your environment. |
51+
| **[Microsoft Purview Insider Risk Management](/purview/insider-risk-management)** | Correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage and security violations. |
5152

5253
## Review service prerequisites
5354

@@ -71,6 +72,7 @@ Before you deploy Microsoft's unified security operations platform, review the p
7172
| Microsoft Defender for Cloud | [Start planning multicloud protection](/azure/defender-for-cloud/plan-multicloud-security-get-started) and other articles in the same section. |
7273
| Microsoft Defender Threat Intelligence | [Prerequisites for Defender Threat Intelligence](/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal#prerequisites) |
7374
| Microsoft Entra ID Protection | [Prerequisites for Microsoft Entra ID Protection](/entra/id-protection/how-to-deploy-identity-protection#prerequisites) |
75+
| Microsoft Purview Insider Risk Management | [Get started with insider risk management](/purview/insider-risk-management-configure?tabs=purview-portal) |
7476

7577
## Review data security and privacy practices
7678

@@ -94,6 +96,7 @@ Before you deploy Microsoft's unified security operations platform, make sure th
9496
| Microsoft Defender for Cloud | [Microsoft Defender for Cloud data security](/azure/defender-for-cloud/data-security) |
9597
| Microsoft Defender Threat Intelligence | [Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy) |
9698
| Microsoft Entra ID Protection | [Microsoft Entra data retention](/entra/identity/monitoring-health/reference-reports-data-retention) |
99+
| Microsoft Purview Insider Risk Management | [Microsoft Purview Insider Risk Management and Communication Compliance privacy guide](/purview/insider-risk-solution-privacy) <br><br> [Messaging Records Management (MRM) and Retention Policies in Microsoft 365](/microsoft-365/troubleshoot/retention/mrm-and-retention-policy) |
97100

98101
## Plan your Log Analytics workspace architecture
99102

@@ -148,6 +151,29 @@ Plan your Microsoft Sentinel budget, considering cost implications for each plan
148151
- [Log retention plans in Microsoft Sentinel](/azure/sentinel/log-plans)
149152
- [Plan costs and understand Microsoft Sentinel pricing and billing](/azure/sentinel/billing?tabs=simplified%2Ccommitment-tiers)
150153

154+
## Understand Microsoft security portals and admin centers
155+
156+
While the Microsoft Defender portal is the home for monitoring and managing security across your identities, data, devices, and apps, you need to access various portals for certain specialized tasks.
157+
158+
Microsoft security portals include:
159+
160+
| Portal name | Description | Link |
161+
|---|---|---|
162+
| **Microsoft Defender portal** | Monitor and respond to threat activity and strengthen security posture across your identities, email, data, endpoints, and apps with Microsoft Defender XDR](../defender-xdr/microsoft-365-defender.md) | [security.microsoft.com](https://security.microsoft.com/) <br/><br/>The Microsoft Defender portal is where you view and manage alerts, incidents, settings, and more. |
163+
| **Defender for Cloud portal** | Use [Microsoft Defender for Cloud](/azure/security-center/security-center-intro) to strengthen the security posture of your data centers and your hybrid workloads in the cloud | [portal.azure.com/#blade/Microsoft_Azure_Security](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/0) |
164+
| **Microsoft Security Intelligence portal** | Get security intelligence updates for Microsoft Defender for Endpoint, submit samples, and explore the threat encyclopedia | [microsoft.com/wdsi](https://microsoft.com/wdsi) |
165+
166+
The following table describes portals for other workloads that can impact your security. Visit these portals to manage identities, permissions, device settings, and data handling policies.
167+
168+
| Portal name | Description | Link |
169+
|---|---|---|
170+
| **Microsoft Entra admin center** | Access and administer the [Microsoft Entra](/entra) family to protect your business with decentralized identity, identity protection, governance, and more, in a multicloud environment| [entra.microsoft.com](https://entra.microsoft.com/) |
171+
| **Azure portal** | View and manage all your [Azure resources](/azure/azure-resource-manager/management/overview) | [portal.azure.com](https://portal.azure.com/) |
172+
| **Microsoft Purview portal** | Manage data handling policies and ensure [compliance with regulations](/compliance/regulatory/offering-home) | [purview.microsoft.com](https://purview.microsoft.com/) |
173+
| **Microsoft 365 admin center** | Configure Microsoft 365 services; manage roles, licenses, and track updates to your Microsoft 365 services | [admin.microsoft.com](https://go.microsoft.com/fwlink/p/?linkid=2166757) |
174+
| **Microsoft Intune admin center** | Use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to manage and secure devices. Can also combine Intune and Configuration Manager capabilities. | [intune.microsoft.com](https://intune.microsoft.com/) |
175+
| **Microsoft Intune portal** | Use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to deploy device policies and monitor devices for compliance | [intune.microsoft.com](https://intune.microsoft.com/#blade/Microsoft_Intune_DeviceSettings/DevicesMenu/overview) |
176+
151177
## Plan roles and permissions
152178

153179
Use Microsoft Entra role based access control (RBAC) to create and assign roles within your security operations team to grant appropriate access to services included in Microsoft's unified SecOps platform.
@@ -171,6 +197,7 @@ For the following services, use the different roles available, or create custom
171197
| **Other services supported in the Microsoft Defender portal** | |
172198
| Microsoft Security Exposure Management | [Permissions for Microsoft Security Exposure Management](/security-exposure-management/prerequisites) |
173199
| Microsoft Defender for Cloud | [User roles and permissions](/azure/defender-for-cloud/permissions) |
200+
| Microsoft Purview Insider Risk Management | [Enable permissions for insider risk management](/purview/insider-risk-management-configure?tabs=purview-portal#step-1-required-enable-permissions-for-insider-risk-management) |
174201

175202
## Plan Zero Trust activities
176203

@@ -196,9 +223,12 @@ For more information about implementing Zero Trust principles in Microsoft's uni
196223
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/zero-trust?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json)
197224
- [Microsoft Security Copilot](/security/zero-trust/copilots/zero-trust-microsoft-copilot-for-security)
198225
- [Microsoft Entra ID Protection](/entra/id-protection/how-to-deploy-identity-protection)
226+
- [Microsoft Purview](/purview/zero-trust-microsoft-purview)
199227

200228
For more information, see the [Zero Trust Guidance Center](/security/zero-trust/zero-trust-overview).
201229

230+
231+
202232
## Next step
203233

204234
[Deploy Microsoft's unified security operations platform](overview-deploy.md)

0 commit comments

Comments
 (0)