Skip to content

Commit c74bc96

Browse files
authored
Merge branch 'main' into docs-editor/whats-new-in-microsoft-defende-1747667436
2 parents 3c068cc + 54d9c04 commit c74bc96

8 files changed

+142
-55
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 03/03/2025
11+
ms.date: 05/19/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,6 +39,23 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## May 2025
43+
44+
- In government cloud environments, :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** replaces the **Message actions** drop down list on the **Email** tab (view) of the details area of the **All email**, **Malware**, or **Phish** views in [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):
45+
- SecOps personnel can now create tenant-level block entries on URLs and files via the [Tenant Allow/Block List](tenant-allow-block-list-about.md) directly from Threat Explorer.
46+
- For 100 or fewer messages selected in Threat Explorer, SecOps personnel can take multiple actions on the selected messages from the same page. For example:
47+
- Purge email messages or propose email remediation.
48+
- Submit messages to Microsoft.
49+
- Trigger investigations.
50+
- Crate block entries in the Tenant Allow/Block List.
51+
- Actions are contextually based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
52+
- For 101 or more messages selected, only email purge and propose remediation options are available.
53+
54+
> [!TIP]
55+
> A new panel allows SecOps personnel to look for indicators of compromise at the tenant level, and the block action is readily available.
56+
57+
For more information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation) and [Remediate Malicious Email: Manual and automated remediation](remediate-malicious-email-delivered-office-365.md#manual-and-automated-remediation).
58+
4259
## March 2025
4360

4461
- **User reported messages by third-party add-ins can be sent to Microsoft for analysis**: In [user reported settings](submissions-user-reported-messages-custom-mailbox.md), admins can select **Monitor reported messages in Outlook** \> **Use a non-Microsoft add-in button**. In the **Reported message destination** section, select **Microsoft and my reporting mailbox**, and then provide the email address of the internal Exchange Online mailbox where user-reported messages by the third-party add-in are routed to. Microsoft analyzea these reported messages and provides result on the **User reported** tab of **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.

defender-xdr/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -322,8 +322,10 @@
322322
items:
323323
- name: Custom detections overview
324324
href: custom-detections-overview.md
325-
- name: Create & manage detection rules
325+
- name: Create detection rules
326326
href: custom-detection-rules.md
327+
- name: Manage detection rules
328+
href: custom-detection-manage.md
327329
- name: Take action on query results
328330
href: advanced-hunting-take-action.md
329331
- name: Link query results to an incident

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ The **Analytics rule wizard** appears. Fill up the required details as described
123123

124124

125125
##### Custom detection rules
126-
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
126+
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create custom detection rules](custom-detection-rules.md) for more information.
127127

128128

129129
In both custom detection and analytics rule creation, you can only query data ingested as analytics logs (that is, not as basic logs or auxiliary logs. See [log management plans](/azure/sentinel/log-plans#log-management-plans) to check the different tiers) otherwise the rule creation won't proceed.
@@ -133,3 +133,12 @@ If your Defender XDR data is ingested into Microsoft Sentinel, you have the opti
133133

134134
> [!NOTE]
135135
> If a Defender XDR table is not set up to stream to log analytics in Microsoft Sentinel but is recognized as a standard table in Microsoft Sentinel, an analytics rule can be created successfully but the rule won't run correctly since no data is actually available in Microsoft Sentinel. For these cases, use the custom detection rule wizard instead.
136+
137+
## Manage custom analytics and detection rules
138+
139+
You can view all your user-defined rules—both custom detection rules and analytics rules—in the **Detection rules** page. Read [Manage custom detections](custom-detection-manage.md) for more details.
140+
141+
142+
143+
For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
144+
Lines changed: 97 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
---
2+
title: Manage custom detection rules in Microsoft Defender XDR
3+
description: Learn how to manage custom detections rules based on advanced hunting queries.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: maccruz
10+
author: schmurky
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- m365initiative-m365-defender
17+
- tier2
18+
ms.custom:
19+
- cx-ti
20+
- cx-ah
21+
appliesto:
22+
- Microsoft Defender XDR
23+
- Microsoft Sentinel in the Microsoft Defender portal
24+
ms.topic: how-to
25+
ms.date: 05/07/2025
26+
---
27+
28+
# Manage existing custom detection rules
29+
30+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
31+
32+
You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
33+
34+
> [!TIP]
35+
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
36+
37+
For users who have onboarded a Microsoft Sentinel workspace to the unified Microsoft Defender portal, the custom detection rules list includes [analytics rules](advanced-hunting-defender-use-custom-rules.md#analytics-rules). The following sections also apply to analytics rules unless otherwise indicated.
38+
39+
### View existing rules
40+
41+
To view your existing custom detection rules and analytics rules, navigate to **Hunting** > **Custom detection rules**.
42+
43+
:::image type="content" source="/defender/media/unified-custom-det-list-tb.png" alt-text="Screenshot of the Custom detection rules page in the Microsoft Defender portal." lightbox="/defender/media/unified-custom-det-list.png":::
44+
45+
You can filter for any column by going to **Add filter**, selecting the columns you want to filter for, and selecting **Add**. For each of the chosen columns, select the corresponding pill beside **Filters:**, select the columns, then **Apply**.
46+
47+
To search for specific rules, go to the search box in the upper right of the page and enter the name or rule ID of the rule you are looking for.
48+
49+
For multiworkspace organizations that onboarded multiple workspaces to Microsoft Defender, you can filter for workspaces using the columns **Workspace ID** or **Workspace name**.
50+
51+
The page lists all the rules with the following run information:
52+
53+
- **Last run** - When a rule was last run to check for query matches and generate alerts
54+
- **Last run status** - Whether a rule ran successfully (for custom detection rules only)
55+
- **Next run** - The next scheduled run
56+
- **Status** - Whether a rule has been turned on or off
57+
58+
### View rule details, modify rule, and run rule
59+
60+
To view comprehensive information about a custom detection rule or an analytics rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
61+
62+
:::image type="content" source="/defender/media/custom-detect-rules-view.png" alt-text="Screenshot of the Custom detection rule details page in the Microsoft Defender portal." lightbox="/defender/media/custom-detect-rules-view.png":::
63+
64+
You can also take the following actions on the rule from this page:
65+
66+
- **Open detection rule page** - opens the detection rule page to view triggered alerts and review actions (for custom detection rules only)
67+
- **Run** - runs the rule immediately; this also resets the interval for the next run (for custom detection rules only)
68+
- **Edit** - allows you to modify the rule without changing the query
69+
- **Modify query** - allows you to edit the query in advanced hunting
70+
- **Turn on** / **Turn off** - allows you to enable the rule or stop it from running
71+
- **Delete** - allows you to turn off the rule and remove it
72+
73+
#### View and manage triggered alerts
74+
75+
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
76+
77+
- Manage the alert by setting its status and classification (true or false alert)
78+
- Link the alert to an incident
79+
- Run the query that triggered the alert on advanced hunting
80+
81+
#### Review actions
82+
83+
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
84+
85+
> [!TIP]
86+
> To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
87+
88+
89+
## See also
90+
91+
- [Custom detections overview](custom-detections-overview.md)
92+
- [Advanced hunting overview](advanced-hunting-overview.md)
93+
- [Learn the advanced hunting query language](advanced-hunting-query-language.md)
94+
- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)
95+
- [Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)
96+
97+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/custom-detection-rules.md

Lines changed: 8 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create and manage custom detection rules in Microsoft Defender XDR
3-
description: Learn how to create and manage custom detections rules based on advanced hunting queries.
2+
title: Create custom detection rules in Microsoft Defender XDR
3+
description: Learn how to create custom detections rules based on advanced hunting queries.
44
search.appverid: met150
55
ms.service: defender-xdr
66
ms.subservice: adv-hunting
@@ -22,10 +22,10 @@ appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
2424
ms.topic: how-to
25-
ms.date: 05/02/2025
25+
ms.date: 05/07/2025
2626
---
2727

28-
# Create and manage custom detections rules
28+
# Create custom detection rules
2929

3030
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3131

@@ -135,6 +135,7 @@ With the query in the query editor, select **Create detection rule** and specify
135135
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
136136
- **Recommended actions** - Additional actions that responders might take in response to an alert.
137137

138+
138139
#### Rule frequency
139140

140141
When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback period based on the frequency you choose:
@@ -170,7 +171,7 @@ Once you click **Save**, the selected rules' frequency gets updated to Continuou
170171
You can run a query continuously as long as:
171172

172173
- The query references one table only.
173-
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174+
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174175
- The query doesn't use joins, unions, or the `externaldata` operator.
175176
- The query doesn't include any comments line/information.
176177

@@ -270,61 +271,16 @@ Only data from devices in the scope will be queried. Also, actions are taken onl
270271
After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
271272

272273
> [!IMPORTANT]
273-
> Custom detections should be regularly reviewed for efficiency and effectiveness. For guidance on how to optimize your queries, follow the **[Advanced hunting query best practices](advanced-hunting-best-practices.md)**. To make sure you're creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in **[Manage existing custom detection rules](#manage-existing-custom-detection-rules)**.
274+
> Custom detections should be regularly reviewed for efficiency and effectiveness. For guidance on how to optimize your queries, follow the **[Advanced hunting query best practices](advanced-hunting-best-practices.md)**. To make sure you're creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in **[Manage existing custom detection rules](custom-detection-manage.md)**.
274275
>
275276
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
276277
277-
## Manage existing custom detection rules
278-
279-
You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
280-
281-
> [!TIP]
282-
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
283-
284-
### View existing rules
285-
286-
To view all existing custom detection rules, navigate to **Hunting** > **Custom detection rules**. The page lists all the rules with the following run information:
287-
288-
- **Last run** - When a rule was last run to check for query matches and generate alerts
289-
- **Last run status** - Whether a rule ran successfully
290-
- **Next run** - The next scheduled run
291-
- **Status** - Whether a rule has been turned on or off
292-
293-
### View rule details, modify rule, and run rule
294-
295-
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
296-
297-
:::image type="content" source="/defender/media/custom-detect-rules-view.png" alt-text="Screenshot of the Custom detection rule details page in the Microsoft Defender portal." lightbox="/defender/media/custom-detect-rules-view.png":::
298278

299-
You can also take the following actions on the rule from this page:
300-
301-
- **Run** - Run the rule immediately. This also resets the interval for the next run.
302-
- **Edit** - Modify the rule without changing the query.
303-
- **Modify query** - Edit the query in advanced hunting.
304-
- **Turn on** / **Turn off** - Enable the rule or stop it from running.
305-
- **Delete** - Turn off the rule and remove it.
306-
307-
### View and manage triggered alerts
308-
309-
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
310-
311-
- Manage the alert by setting its status and classification (true or false alert)
312-
- Link the alert to an incident
313-
- Run the query that triggered the alert on advanced hunting
314-
315-
### Review actions
316-
317-
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
318-
319-
> [!TIP]
320-
> To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
321-
322-
> [!NOTE]
323-
> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
324279

325280
## See also
326281

327282
- [Custom detections overview](custom-detections-overview.md)
283+
- [Manage custom detections](custom-detection-manage.md)
328284
- [Advanced hunting overview](advanced-hunting-overview.md)
329285
- [Learn the advanced hunting query language](advanced-hunting-query-language.md)
330286
- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)

defender-xdr/whats-new.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,12 @@ You can also get product updates and important notifications through the [messag
3434

3535

3636
## May 2025
37+
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
38+
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
39+
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
40+
- You can now view the details pane even for analytics rules.
41+
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
42+
3743

3844
- (Preview) You can now highlight your security operations achievements and the impact of Microsoft Defender using the **unified security summary**. The unified security summary is available in the Microsoft Defender portal and streamlines the process for SOC teams to generate security reports, saving time usually spent on collecting data from various sources and creating reports. For more information, see [Visualize security impact with the unified security summary](security-summary-report.md).
3945
- Defender portal users who have onboarded Microsoft Sentinel and have enabled the [User and Entity Behavior Analytics (UEBA)](/azure/sentinel/ueba-reference) can now take advantage of the new unified [`IdentityInfo` table](advanced-hunting-identityinfo-table.md) in advanced hunting. This latest version now includes the largest possible set of fields common to both Defender and Azure portals.
70.9 KB
Loading
130 KB
Loading

0 commit comments

Comments
 (0)