Skip to content

Commit c6de41a

Browse files
authored
Merge pull request #1504 from MicrosoftDocs/main
Publish main to live -10:30 AM Oct 2
2 parents 9e7184c + a29b6da commit c6de41a

11 files changed

+32
-31
lines changed

defender-xdr/advanced-hunting-security-copilot.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier1
1717
- security-copilot
18+
- magic-ai-copilot
1819
ms.topic: conceptual
1920
ms.date: 04/01/2024
2021
---

defender-xdr/copilot-in-defender-device-summary.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,22 +12,22 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15+
- security-copilot
16+
- magic-ai-copilot
1517
ms.topic: conceptual
1618
search.appverid:
1719
- MOE150
1820
- MET150
1921
ms.date: 04/01/2024
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2025
---
2126

2227
# Summarize device information with Microsoft Copilot in Microsoft Defender
2328

2429
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2530

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
- Microsoft Defender unified security operations center (SOC) platform
30-
3131
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal helps security teams in speeding up device inspection through AI-powered investigation capabilities.
3232

3333
Security operations teams are tasked to sift through device data to find suspicious activities or entities to prevent malicious attacks. These teams need to summarize large amounts of data and simplify complex information to quickly assess, triage, and connect a device's status and activities to potentially malicious attacks.

defender-xdr/copilot-in-defender-file-analysis.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,22 +12,22 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15+
- security-copilot
16+
- magic-ai-copilot
1517
ms.topic: conceptual
1618
search.appverid:
1719
- MOE150
1820
- MET150
1921
ms.date: 04/01/2024
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2025
---
2126

2227
# File analysis with Microsoft Copilot in Microsoft Defender
2328

2429
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2530

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
- Microsoft Defender unified security operations center (SOC) platform
30-
3131
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal enables security teams to quickly identify malicious and suspicious files through AI-powered file analysis capabilities.
3232

3333
Security operations teams tracking and resolving attacks need tools and techniques to quickly analyze potentially malicious files. Sophisticated attacks often use files that mimic legitimate or system files to avoid detection. In addition, new-to-the-field security analysts might require time and gain significant experience to use available analysis tools and techniques.

defender-xdr/security-copilot-defender-identity-summary.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,15 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
- security-copilot
16+
- magic-ai-copilot
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
1920
- MET150
2021
ms.date: 09/23/2024
2122
appliesto:
2223
- Microsoft Defender XDR
23-
- Microsoft Sentinel in the unified security operations center (SOC) platform
24+
- Microsoft Sentinel in the Microsoft Defender portal
2425
---
2526

2627
# Summarize identity information with Microsoft Copilot in Microsoft Defender

defender-xdr/security-copilot-in-microsoft-365-defender.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
- security-copilot
16+
- magic-ai-copilot
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150

defender-xdr/security-copilot-m365d-create-incident-report.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,22 +13,21 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
- security-copilot
16+
- magic-ai-copilot
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
1920
- MET150
2021
ms.date: 04/01/2024
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2125
---
2226

2327
# Create an incident report with Microsoft Copilot in Microsoft Defender
2428

2529
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2630

27-
**Applies to:**
28-
29-
- Microsoft Defender XDR
30-
- Microsoft Defender unified security operations center (SOC) platform
31-
3231
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal assists security operations teams with writing incident reports efficiently. Utilizing Copilot for Security's AI-powered data processing, security teams can immediately create incident reports with a click of a button in the Microsoft Defender portal.
3332

3433
A comprehensive and clear incident report is an essential reference for security teams and security operations management. However, writing a comprehensive report with the important details present can be a time-consuming task for security operations teams. Collecting, organizing, and summarizing incident information from multiple sources requires focus and detailed analysis to create an information-rich report. With Copilot in Defender, security teams can now instantly create an extensive incident report within the portal.

defender-xdr/security-copilot-m365d-guided-response.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,22 +13,21 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
- security-copilot
16+
- magic-ai-copilot
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
1920
- MET150
2021
ms.date: 08/22/2024
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2125
---
2226

2327
# Triage and investigate incidents with guided responses from Microsoft Copilot in Microsoft Defender
2428

2529
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2630

27-
**Applies to:**
28-
29-
- Microsoft Defender XDR
30-
- Microsoft Defender unified security operations center (SOC) platform
31-
3231
[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal supports incident response teams in immediately resolving incidents with guided responses. Copilot in Defender uses AI and machine learning capabilities to contextualize an incident and learn from previous investigations to generate appropriate response actions.
3332

3433
Responding to incidents in the Microsoft Defender portal often requires familiarity with the portal's available actions to stop attacks. In addition, new incident responders might have different ideas of where and how to start responding to incidents. The guided response capability of Copilot in Defender allows incident response teams at all levels to confidently and quickly apply response actions to resolve incidents with ease.

defender-xdr/security-copilot-m365d-incident-summary.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,22 +13,21 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
- security-copilot
16+
- magic-ai-copilot
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
1920
- MET150
2021
ms.date: 04/01/2024
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2125
---
2226

2327
# Summarize an incident with Microsoft Copilot in Microsoft Defender
2428

2529
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2630

27-
**Applies to:**
28-
29-
- Microsoft Defender XDR
30-
- Microsoft Defender unified security operations center (SOC) platform
31-
3231
Microsoft Defender XDR applies the capabilities of [Copilot for Security](/security-copilot/microsoft-security-copilot) to summarize incidents, delivering impactful information and insights to simplify investigation tasks. Attack investigation is a crucial step for incident response teams to successfully defend an organization against further damage from a cyber threat. Investigations can often be time-consuming as it involves numerous steps. Incident response teams need to understand how the attack happened: sort through numerous alerts, identify which assets and entities are involved, and assess the scope and impact of an attack.
3332

3433
Incident responders can easily gain the right context to investigate and remediate incidents through Defender XDR's correlation capabilities and Copilot for Security's AI-powered data processing and contextualization. With an incident summary, responders can quickly get important information to help in their investigation.

defender-xdr/security-copilot-m365d-script-analysis.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,22 +13,21 @@ ms.collection:
1313
- m365-security
1414
- tier1
1515
- security-copilot
16+
- magic-ai-copilot
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
1920
- MET150
2021
ms.date: 04/01/2024
22+
appliesto:
23+
- Microsoft Defender XDR
24+
- Microsoft Sentinel in the Microsoft Defender portal
2125
---
2226

2327
# Script analysis with Microsoft Copilot in Microsoft Defender
2428

2529
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2630

27-
**Applies to:**
28-
29-
- Microsoft Defender XDR
30-
- Microsoft Defender unified security operations center (SOC) platform
31-
3231
Through AI-powered investigation capabilities from [Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal, security teams can speed up their analysis of malicious or suspicious scripts and command lines.
3332

3433
Most complex and sophisticated attacks like [ransomware](/security/ransomware) evade detection through numerous ways, including the use of scripts and PowerShell command lines. Moreover, these scripts are often obfuscated, which adds to the complexity of detection and analysis. Security operations teams need to quickly analyze scripts to understand capabilities and apply appropriate mitigation, immediately stopping attacks from progressing further within a network.

defender/threat-intelligence/security-copilot-and-defender-threat-intelligence.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ audience: ITPro
1111
ms.collection:
1212
- Tier1
1313
- security-copilot
14+
- magic-ai-copilot
1415
ms.topic: conceptual
1516
ms.date: 12/04/2023
1617
---

0 commit comments

Comments
 (0)