Skip to content

Commit d243a86

Browse files
committed
dianne's comments
1 parent 468670b commit d243a86

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

unified-secops-platform/respond-threats-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Threat intelligence integrates across Defender portal services to enrich alerts
4343

4444
Continuous updates to threat intelligence feeds keep security teams ahead of emerging threats and improve the organization's overall resilience.
4545

46-
The following image shows an example of the incidents related to the **Human-operated ransomware** threat type in **Threat intelligence** area of the Defender portal.
46+
The following image shows an example of the incidents related to a **Human-operated ransomware** Threat analytics report in the **Threat intelligence** area of the Defender portal.
4747

4848
:::image type="content" source="media/respond-threats-overview/threat-analytics.png" alt-text="Screenshot of a list of related incidents to a specific threat." lightbox="media/respond-threats-overview/threat-analytics.png":::
4949

@@ -95,6 +95,17 @@ The following image shows a sample of the **Guided response** section of the Cop
9595

9696
For more information, see [Triage and investigate incidents with guided responses from Microsoft Copilot in Microsoft Defender](/defender-xdr/security-copilot-m365d-guided-response).
9797

98+
### Extend response with the help of Microsoft Defender experts
99+
100+
Microsoft Defender Experts for XDR is a managed threat detection and response service that extends the capabilities of Microsoft’s security stack, providing proactive threat hunting and expert-driven analysis. This helps SOC teams focus on the most critical threats while reducing the burden of manual investigation.
101+
102+
Ask Defender Experts in Microsoft Defender XDR further enhances SOC teams’ efficiency by providing direct access to Microsoft’s security analysts. When an incident requires deeper investigation or expert insight, SOC teams can submit inquiries through the Microsoft 365 Defender portal. This feature allows security teams to get clarifications on complex attack patterns, guidance on remediation steps, and insights into emerging threats—all without disrupting their workflow. By leveraging Microsoft’s expertise, organizations can improve their threat response strategies, making their SOC teams more proactive and resilient against evolving cyber threats.
103+
104+
For more information, see:
105+
106+
- [Microsoft Defender Experts for XDR](/defender-xdr/dex-xdr-overview)
107+
- [Collaborate with experts on demand](/defender-xdr/experts-on-demand)
108+
98109
## Microsoft Sentinel threat response features
99110

100111
Microsoft Sentinel provides cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) features for intelligent security analytics and threat intelligence across the enterprise. This section describes how Microsoft Sentinel features add to your threat detection and response capabilities.
@@ -113,7 +124,7 @@ For more information, see [Automate threat response in Microsoft Sentinel with a
113124

114125
### Automated playbooks
115126

116-
Microsoft Sentinel playbooks are built using Azure Logic Apps and are automated workflows for streamlining and enhancing threat response in SOC teams. Have your playbooks trigger automatically, in response to specific alerts or incidents through configured automation rules, or run them manually as needed. For example, upon detecting a compromised account and machine, a playbook can isolate the affected machine from the network and block the compromised account before the SOC team is even alerted to the incident.
127+
Microsoft Sentinel playbooks are built using Azure Logic Apps and are automated workflows for streamlining and enhancing threat response in SOC teams. Have your playbooks trigger automatically in response to specific activity through configured automation rules, or run them manually as needed. For example, upon detecting a compromised account and machine, a playbook can isolate the affected machine from the network and block the compromised account before the SOC team is even alerted to the incident.
117128

118129
Common use cases for Microsoft Sentinel playbooks include data enrichment, bi-directional synchronization with ticketing systems, orchestration of incident management through communication platforms like Microsoft Teams or Slack, and immediate threat response actions. Microsoft Sentinel provides many playbooks out-of-the-box in solutions available from the **Content hub**.
119130

0 commit comments

Comments
 (0)