Skip to content

Commit d8520a1

Browse files
committed
upload guidebook - Yuval
1 parent 0f65893 commit d8520a1

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -617,6 +617,8 @@
617617
href: alert-classification-password-spray-attack.md
618618
- name: Incident response playbooks
619619
href: /security/operations/incident-response-playbooks
620+
- name: Customize incident responses
621+
href: security-upload-guide.md
620622
- name: Ransomware playbooks
621623
items:
622624
- name: Detecting human-operated ransomware attacks with Microsoft Defender XDR

defender-xdr/security-upload-guide.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ appliesto:
2020
- Microsoft Sentinel with Defender XDR in the Microsoft Defender portal
2121
---
2222

23-
# Customize Copilot for your organization
23+
# Customize incident responses for your organization
2424

2525
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2626

@@ -76,4 +76,3 @@ You have the opportunity to provide feedback on the effectiveness of the guided
7676
For examples of Microsoft's own incident response playbooks, see [Incident response playbooks](/security/operations/incident-response-playbooks).
7777

7878
When creating your organization's guidebooks, keep in mind that the guidebook can only read text. Avoid using images, graphs, or complex formatting that may hinder text extraction.
79-

0 commit comments

Comments
 (0)