Skip to content

Commit d0d9b73

Browse files
authored
Merge pull request #2838 from MicrosoftDocs/diannegali-xdrupdates
metadata updates
2 parents 3894943 + 54e3159 commit d0d9b73

10 files changed

+57
-65
lines changed

defender-xdr/autoad-results.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
1111
ms.date: 06/19/2024
12-
manager: dansimp
12+
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -19,15 +19,14 @@ ms.custom:
1919
- autoir
2020
- admindeeplinkDEFENDER
2121
ms.reviewer: evaldm, isco
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Details and results of an automatic attack disruption action
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
- Microsoft Defender XDR
30-
3130
When an automatic attack disruption triggers in Microsoft Defender XDR, the details about the risk and the containment status of compromised assets are available during and after the process. You can view the details on the incident page, which provides the full details of the attack and the up-to-date status of associated assets.
3231

3332
## Review the incident graph
@@ -58,16 +57,18 @@ You can use specific queries in [advanced hunting](advanced-hunting-overview.md)
5857
Contain actions triggered by attack disruption are found in the [DeviceEvents table](advanced-hunting-deviceevents-table.md) in advanced hunting. Use the following queries to hunt for these specific contain actions:
5958

6059
- Device contain actions:
61-
```Kusto
62-
DeviceEvents
63-
| where ActionType contains "ContainedDevice"
64-
```
60+
61+
```Kusto
62+
DeviceEvents
63+
| where ActionType contains "ContainedDevice"
64+
```
6565

6666
- User contain actions:
67-
```Kusto
68-
DeviceEvents
69-
| where ActionType contains "ContainedUser"
70-
```
67+
68+
```Kusto
69+
DeviceEvents
70+
| where ActionType contains "ContainedUser"
71+
```
7172

7273
### Hunt for disable user account actions
7374

defender-xdr/automatic-attack-disruption.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,28 +7,26 @@ f1.keywords:
77
ms.author: diannegali
88
author: diannegali
99
ms.localizationpriority: medium
10-
manager: dansimp
10+
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
1515
- usx-security
1616
- usx-security
17-
ms.topic: conceptual
17+
ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150
2121
ms.date: 09/11/2024
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Automatic attack disruption in Microsoft Defender XDR
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- Microsoft Defender XDR
31-
3230
Microsoft Defender XDR correlates millions of individual signals to identify active ransomware campaigns or other sophisticated attacks in the environment with high confidence. While an attack is in progress, Defender XDR disrupts the attack by automatically containing compromised assets that the attacker is using through automatic attack disruption.
3331

3432
Automatic attack disruption limits lateral movement early on and reduces the overall impact of an attack, from associated costs to loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online.
@@ -105,7 +103,7 @@ The Defender XDR user experience now includes additional visual cues to ensure v
105103

106104
- A tag titled *Attack Disruption* appears next to affected incidents
107105

108-
1. On the incident page:
106+
2. On the incident page:
109107

110108
- A tag titled *Attack Disruption*
111109
- A yellow banner at the top of the page that highlights the automatic action taken
@@ -121,7 +119,7 @@ For more information, see [view attack disruption details and results](autoad-re
121119

122120
## Next steps
123121

124-
- [Configuring automatic attack disruption in Microsoft Defender XDR](configure-attack-disruption.md)
122+
- [Configure automatic attack disruption](configure-attack-disruption.md)
125123
- [View details and results](autoad-results.md)
126124
- [Get email notifications for response actions](m365d-response-actions-notifications.md)
127125

defender-xdr/configure-deception.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure the deception capability in Microsoft Defender XDR
3-
description: Learn how to create, edit, and delete deception rules in Microsoft Defender XDR.
3+
description: Learn how to create, edit, and delete deception rules in the Microsoft Defender portal.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -12,21 +12,20 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15-
ms.topic: conceptual
15+
ms.topic: how-to
1616
search.appverid:
1717
- MOE150
1818
- MET150
1919
ms.date: 01/12/2024
20+
appliesto:
21+
- Microsoft Defender XDR
22+
#customer intent: As a security analyst, I want to learn how to configure the deception capability so that I can protect my organization from high-impact attacks that use human-operated lateral movement.
2023
---
2124

2225
# Configure the deception capability in Microsoft Defender XDR
2326

2427
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2528

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3029
> [!NOTE]
3130
> The built-in [deception](deception-overview.md) capability in Microsoft Defender XDR covers all Windows clients onboarded to Microsoft Defender for Endpoint. Learn how to onboard clients to Defender for Endpoint in [Onboard to Microsoft Defender for Endpoint](/defender-endpoint/onboarding).
3231

defender-xdr/deception-overview.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,27 +7,26 @@ f1.keywords:
77
ms.author: diannegali
88
author: diannegali
99
ms.localizationpriority: medium
10-
manager: dansimp
10+
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15-
ms.topic: conceptual
15+
ms.topic: concept-article
1616
search.appverid:
1717
- MOE150
1818
- MET150
1919
ms.date: 08/14/2024
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Endpoint
23+
#customer intent: As a security analyst, I want to understand how to manage the deception capability in Microsoft Defender XDR to detect human-operated attacks with lateral movement.
2024
---
2125

2226
# Manage the deception capability in Microsoft Defender XDR
2327

2428
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2529

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
- Microsoft Defender for Endpoint
30-
3130
> [!IMPORTANT]
3231
> Some information in this article relates to prereleased products/services that might be substantially modified before commercially release. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3332
@@ -63,9 +62,9 @@ Attackers interacting with the fake network assets set up by the deception capab
6362

6463
The built-in deception capability in the Microsoft Defender portal uses rules to make decoys and lures that match your environment. The feature applies machine learning to suggest decoys and lures that are tailored to your network. You can also use the deception feature to manually create the decoys and lures. These decoys and lures are then automatically deployed to your network and planted to devices you specify using PowerShell.
6564

66-
:::image type="content" source="/defender/media/deception/fig1-deception.png" alt-text="Screenshot of an attack with lateral movement and where deception intercepts the attack" lightbox="/defender/media/deception/fig1-deception.png":::
65+
Deception technology, through high confidence detections of human-operated lateral movement, alerts security teams when an attacker interacts with fake hosts or lures. Here's the process of how the deception capability works:
6766

68-
*Figure 1. Deception technology, through high confidence detections of human-operated lateral movement, alerts security teams when an attacker interacts with fake hosts or lures*
67+
:::image type="content" source="/defender/media/deception/fig1-deception.png" alt-text="Screenshot of an attack with lateral movement and where deception intercepts the attack" lightbox="/defender/media/deception/fig1-deception.png":::
6968

7069
**Decoys** are fake devices and accounts that appear to belong to your network. **Lures** are fake content planted on specific devices or accounts and are used to attract an attacker. The content can be a document, a configuration file, cached credentials, or any content that an attacker can likely read, steal, or interact with. Lures imitate important company information, settings, or credentials.
7170

@@ -94,9 +93,9 @@ The alert details contain:
9493
- The decoy device or user account where the alert originated
9594
- The type of attack like sign in attempts or lateral movement attempts
9695

97-
:::image type="content" source="/defender/media/deception/deception-alert-small.png" alt-text="Screenshot of a deception alert highlighting the tag and the attempt" lightbox="/defender/media/deception/deception-alert.png":::
96+
Here's an example of a deception-related alert:
9897

99-
*Figure 2. Details of a deception-related alert*
98+
:::image type="content" source="/defender/media/deception/deception-alert-small.png" alt-text="Screenshot of a deception alert highlighting the tag and the attempt" lightbox="/defender/media/deception/deception-alert.png":::
10099

101100
## Next step
102101

defender-xdr/m365d-action-center.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
1111
ms.date: 5/9/2024
12-
manager: dansimp
12+
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -19,13 +19,13 @@ ms.custom:
1919
- autoir
2020
- admindeeplinkDEFENDER
2121
ms.reviewer: evaldm, isco
22+
appliesto:
23+
- Microsoft Defender XDR
24+
#customer intent: As a SOC analyst, I want to understand how to view and approve automated investigation and remediation tasks in the Action center.
2225
---
2326

2427
# The Action center
2528

26-
**Applies to:**
27-
- Microsoft Defender XDR
28-
2929
The Action center provides a "single pane of glass" experience for incident and alert tasks such as:
3030

3131
- Approving pending remediation actions.

defender-xdr/m365d-autoir-actions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
1111
ms.date: 11/25/2024
12-
manager: dansimp
12+
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -19,13 +19,13 @@ ms.custom:
1919
- autoir
2020
- admindeeplinkDEFENDER
2121
ms.reviewer: evaldm, isco
22+
appliesto:
23+
- Microsoft Defender XDR
24+
#customer intent: As a SOC analyst, I want to understand how to view and manage remediation actions in the Action center
2225
---
2326

2427
# View and manage actions in the Action center
2528

26-
**Applies to:**
27-
- Microsoft Defender XDR
28-
2929
Threat protection features in Microsoft Defender XDR can result in certain remediation actions. Here are some examples:
3030

3131
- [Automated investigations](m365d-autoir.md) can result in remediation actions that are taken automatically or await your approval.

defender-xdr/m365d-autoir-report-false-positives-negatives.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,15 +19,14 @@ ms.custom:
1919
- admindeeplinkDEFENDER
2020
ms.reviewer: evaldm, isco
2121
ms.date: 07/14/2023
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Address false positives or false negatives in Microsoft Defender XDR
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
- Microsoft Defender XDR
30-
3130
False positives or negatives can occasionally occur with any threat protection solution. If [automated investigation and response capabilities](m365d-autoir.md) in Microsoft Defender XDR missed or wrongly detected something, there are steps your security operations team can take:
3231

3332
- [Report a false positive/negative to Microsoft](#report-a-false-positivenegative-to-microsoft-for-analysis)

defender-xdr/m365d-autoir-results.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,20 +14,19 @@ audience: ITPro
1414
ms.collection:
1515
- m365-security
1616
- tier2
17-
ms.topic: conceptual
17+
ms.topic: concept-article
1818
ms.custom:
1919
- autoir
2020
- admindeeplinkDEFENDER
2121
ms.reviewer: evaldm, isco
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Details and results of an automated investigation
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
- Microsoft Defender XDR
30-
3130
With Microsoft Defender XDR, when an [automated investigation](m365d-autoir.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the [necessary permissions](m365d-action-center.md#required-permissions-for-action-center-tasks), you can view those details in an investigation details view that provides you with up-to-date status and the ability to approve any pending actions.
3231

3332
## (NEW) Unified investigation page

defender-xdr/m365d-autoir.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,18 @@ audience: ITPro
1414
ms.collection:
1515
- m365-security
1616
- tier2
17-
ms.topic: conceptual
17+
ms.topic: overview
1818
ms.custom: autoir
1919
ms.reviewer: evaldm, isco
20+
appliesto:
21+
- Microsoft Defender XDR
22+
#customer intent: As a SOC analyst, I want to understand the automated investigation and response capabilities in Microsoft Defender XDR
2023
---
2124

2225
# Automated investigation and response in Microsoft Defender XDR
2326

2427
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2528

26-
**Applies to:**
27-
- Microsoft Defender XDR
28-
2929
If your organization is using [Microsoft Defender XDR](microsoft-365-defender.md), your security operations team receives an alert within the Microsoft Defender portal whenever a malicious or suspicious activity or artifact is detected. Given the seemingly never-ending flow of threats that can come in, security teams often face the challenge of addressing the high volume of alerts. Fortunately, Microsoft Defender XDR includes automated investigation and response (AIR) capabilities that can help your security operations team address threats more efficiently and effectively.
3030

3131
This article provides an overview of AIR and includes links to next steps and additional resources.
@@ -97,7 +97,6 @@ The new Automated investigation & response card is available in the Microsoft De
9797

9898
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **Approve in Action Center** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
9999

100-
101100
## Next steps
102101

103102
- [See the prerequisites for automated investigation and response](m365d-configure-auto-investigation-response.md#prerequisites-for-automated-investigation-and-response-in-microsoft-365-defender)

defender-xdr/m365d-remediation-actions.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,28 +5,26 @@ search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
77
- NOCSH
8-
ms.author: dansimp
9-
author: dansimp
8+
ms.author: diannegali
9+
author: diannegali
1010
ms.localizationpriority: medium
11-
manager: dansimp
11+
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
1515
- tier3
16-
ms.topic: conceptual
16+
ms.topic: concept-article
1717
ms.custom: autoir
1818
ms.reviewer: evaldm, isco
1919
ms.date: 08/06/2024
20+
appliesto:
21+
- Microsoft Defender XDR
2022
---
2123

2224
# Get notified about remediation actions
2325

2426
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2527

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3028
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
3129

3230
> [!IMPORTANT]

0 commit comments

Comments
 (0)