Skip to content

Commit d82fea1

Browse files
Merge pull request #972 from MicrosoftDocs/main
Publish main to live, 07/18, 3:30 PM IST
2 parents 8a1b6ba + 8bd94a8 commit d82fea1

File tree

2 files changed

+6
-9
lines changed

2 files changed

+6
-9
lines changed

defender-xdr/configure-attack-disruption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 05/31/2024
12+
ms.date: 07/18/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -39,7 +39,7 @@ Then, after you're all set up, you can view and manage containment actions in In
3939

4040
|Requirement|Details|
4141
|---|---|
42-
|Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5 or A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Windows 10 Enterprise E5 or A5</li><li>Windows 11 Enterprise E5 or A5</li><li>Enterprise Mobility + Security (EMS) E5 or A5</li><li>Office 365 E5 or A5</li><li>Microsoft Defender for Endpoint</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Defender for Office 365 (Plan 2)</li><li>Microsoft Defender for Business</li></ul> <p> See [Microsoft Defender XDR licensing requirements](./prerequisites.md#licensing-requirements).|
42+
|Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5 or A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Windows 10 Enterprise E5 or A5</li><li>Windows 11 Enterprise E5 or A5</li><li>Enterprise Mobility + Security (EMS) E5 or A5</li><li>Office 365 E5 or A5</li><li>Microsoft Defender for Endpoint (Plan 2)</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Defender for Office 365 (Plan 2)</li><li>Microsoft Defender for Business</li></ul> <p> See [Microsoft Defender XDR licensing requirements](./prerequisites.md#licensing-requirements).|
4343
|Deployment requirements|<ul><li>Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365, Defender for Identity, and Defender for Cloud Apps)</li><ul><li>The wider the deployment, the greater the protection coverage is. For example, if a Microsoft Defender for Cloud Apps signal is used in a certain detection, then this product is required to detect the relevant specific attack scenario.</li><li>Similarly, the relevant product should be deployed to execute an automated response action. For example, Microsoft Defender for Endpoint is required to automatically contain a device. </li></ul><li>Microsoft Defender for Endpoint's device discovery is set to 'standard discovery'</li></ul>|
4444
|Permissions|To configure automatic attack disruption capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).|
4545

defender-xdr/mto-advanced-hunting.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ ms.localizationpriority: medium
99
manager: dansimp
1010
audience: ITPro
1111
ms.collection:
12-
- m365-security
13-
- highpri
14-
- tier1
12+
- m365-security
13+
- highpri
14+
- tier1
1515
ms.topic: conceptual
16-
ms.date: 1/5/2024
16+
ms.date: 07/18/2024
1717
---
1818

1919
# Advanced hunting in multi-tenant management in Microsoft Defender XDR
@@ -38,9 +38,6 @@ This action opens a side pane from which you can specify the tenants to include
3838

3939
Select the tenants you want to include in your query. Select **Apply**, then **Run query**.
4040

41-
> [!NOTE]
42-
> Queries that use the `join` operator are currently not supported in multi-tenant management advanced hunting.
43-
4441
The query results contain the tenant ID:
4542

4643
:::image type="content" source="/defender/media/defender/mto-cross-tenants-query-tenant-id.png" alt-text="Screenshot of the Microsoft Defender XDR ross tenants advanced hunting query scope column" lightbox="/defender/media/defender/mto-cross-tenants-query-tenant-id.png":::

0 commit comments

Comments
 (0)