Skip to content

Commit da7c9b0

Browse files
authored
Merge pull request #2004 from MicrosoftDocs/main
OOB publish main to live for PR 1869
2 parents fe33f5c + ad54462 commit da7c9b0

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+1018
-728
lines changed

defender-endpoint/microsoft-defender-core-service-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: deniseb
77
ms.service: defender-endpoint
88
ms.subservice: ngp
99
ms.topic: overview
10-
ms.date: 06/21/2024
10+
ms.date: 11/25/2024
1111
search.appverid: met150
1212
ms.localizationpriority: medium
1313
audience: ITPro
@@ -32,6 +32,8 @@ To enhance your endpoint security experience, Microsoft is releasing the Microso
3232
- Mid April 2024 to Enterprise customers running Windows clients.
3333
- Beginning of July 2024 to U.S. Government customers running Windows clients.
3434

35+
- Mid January 2025 to Enterprise customers running Windows Server.
36+
3537
3. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
3638

3739
4. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:

defender/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,4 +227,4 @@ additionalContent:
227227
- url: /azure/defender-for-cloud/defender-for-resource-manager-introduction
228228
text: Microsoft Defender for Resource Manager
229229
- url: /azure/defender-for-cloud/defender-for-databases-introduction
230-
text: Microsoft Defender for open-source relational databases
230+
text: Microsoft Defender for open-source relational databases

unified-secops-platform/TOC.yml

Lines changed: 72 additions & 159 deletions
Large diffs are not rendered by default.
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
- name: "Microsoft Defender"
2+
tocHref: /defender/
3+
topicHref: /defender/index
4+
items:
5+
- name: "Microsoft's unified SecOps platform"
6+
tocHref: /unified-secops-platform/
7+
topicHref: /unified-secops-platform/index
8+
- name: "Microsoft's unified SecOps platform"
9+
tocHref: /security/zero-trust/
10+
topicHref: /defender-xdr/unified-secops-platform/index
11+
- name: "Microsoft's unified SecOps platform"
12+
tocHref: /defender-for-identity/
13+
topicHref: /defender-xdr/unified-secops-platform/index
14+
15+
## Azure override
16+
- name: "Microsoft Defender"
17+
tocHref: /azure/
18+
topicHref: /defender/index
19+
items:
20+
- name: "Microsoft's unified SecOps platform"
21+
tocHref: /azure/sentinel/
22+
topicHref: /unified-secops-platform/index
23+

unified-secops-platform/breadcrumb/unified-secops-platform/toc.yml

Lines changed: 0 additions & 17 deletions
This file was deleted.
Lines changed: 49 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,79 +1,87 @@
11
---
22
title: Microsoft Defender XDR in the Defender portal
3-
description: Learn about Microsoft Defender XDR in the Defender portal
3+
description: Learn about the services and features available with Microsoft Defender XDR in the Microsoft Defender portal.
44
search.appverid: met150
55
ms.service: unified-secops-platform
66
ms.author: cwatson
77
author: cwatson-cat
88
ms.localizationpriority: medium
9-
ms.date: 10/08/2024
9+
ms.date: 11/18/2024
1010
audience: ITPro
1111
ms.collection:
1212
- M365-security-compliance
1313
- tier1
1414
- usx-security
15-
ms.topic: conceptual
15+
ms.topic: concept-article
16+
17+
# customer intent: As a security operations center leader, I want to learn about the services and features available with Defender XDR to help me determine whether it meets my organization's requirements.
1618
---
1719

18-
# Defender XDR in the Defender portal
20+
# Microsoft Defender XDR in the Defender portal
21+
22+
Microsoft Defender XDR in the Microsoft unified SecOps platform unifies and coordinates threat protection across a broad range of assets, including devices and endpoints, identities, email, Microsoft 365 services, and SaaS apps.
23+
24+
Defender XDR consolidates threat signals and data across assets, so that you can monitor and manage security threats from a single location in the [Microsoft Defender portal](https://security.microsoft.com).
25+
26+
27+
Defender XDR combines multiple Microsoft security services.
28+
29+
**Service** | **Details**
30+
--- | ---
31+
**[Protect against email threats with Defender for Office 365](/defender-office-365/mdo-sec-ops-guid)** | Helps protect email and Office 365 resources.
32+
**[Protect devices with Defender for Endpoint](/defender-endpoint/mde-sec-ops-guide)** | Delivers preventative protection, post-breach detection, and automated investigation and response for devices.
33+
**[Protect Active Directory with Defender for Identity](/defender-xdr/microsoft-365-security-center-mdi)** | Uses Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions.
34+
**[Protect SaaS cloud apps with Defender for Cloud Apps](/defender-xdr/microsoft-365-security-center-defender-cloud-app)** | Provides deep visibility, strong data controls, and enhanced threat protection for SaaS and PaaS cloud apps.
35+
**[Protect against a broad range of threats with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration)** | Microsoft Sentinel seamlessly integrates with Defender XDR to combine the capabilities of both products into a unified security platform for threat detection, investigation, hunting, and response.
36+
37+
38+
## Detecting threats
39+
40+
Defender XDR provides continuous threat monitoring. When threats are detected [security alerts](/defender-xdr/alerts-incidents-correlation) are created. Defender automatically aggregates related alerts and security signals into [security incidents](/defender-xdr/alerts-incidents-correlation#incident-creation-and-alert-correlation).
41+
42+
Incidents define a complete picture of an attack. Incidents help SOC teams to understand attacks and respond more quickly. Incidents gather together related alerts, information about attack scope and progress, and the entities and assets involved in an attack.
43+
44+
A [single incident queue](/defender-xdr/incident-queue) in the Defender portal provides full visibility into the latest alerts and incidents, and historical data. You can search and query the incident queue, and prioritize responses based on severity.
1945

20-
Microsoft's unified security platform combines services in the [Microsoft Defender portal](https://security.microsoft.com). In the Defender portal, you can monitor and manage pre-breach and post-breach security across your organization's on-premises and multicloud assets and workloads.
46+
:::image type="content" source="media/defender-xdr-portal/incidents-page.png" alt-text="Screenshot of the Incidents page in the Microsoft Defender portal" lightbox="media/defender-xdr-portal/incidents-page.png":::
2147

22-
Defender XDR in the Defender portal combines protection, detection, investigation, and response to threats across your entire organization and all its components, in a central place. Defender XDR combines a number of Microsoft's security services into a single location.
2348

49+
### Detecting lateral movement attacks
2450

25-
**[Defender for Office 365](/defender-office-365/mdo-about)** | Helps secure organizations with a set of prevention, detection, investigation and hunting features to protect email, and Office 365 resources.
26-
**[Defender for Endpoint](/defender-endpoint/)** | Delivers preventative protection, post-breach detection, automated investigation, and response for devices in the organization.
27-
**[Defender for Identity](/defender-for-identity/what-is)** | Provides a cloud-based security solution that uses on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
28-
**[Defender for Cloud Apps](/cloud-app-security/)** | Provides a comprehensive cross-SaaS and PaaS solution that brings deep visibility, strong data controls, and enhanced threat protection to your cloud apps.
51+
Defender for XDR includes [deception capability](/defender-xdr/deception-overview) to detect human-operated lateral movement, which is often used in common attacks such as ransomware and email compromise.
2952

30-
> [!NOTE]
31-
> When you open the portal, you see only the security services included in your subscriptions. For example, if you have Defender for Office 365 but not Defender for Endpoint, you see features and capabilities for Defender for Office 365, but not for device protection.
53+
Deception capability generates decoy assets. When attackers interact with these assets, deception capability raises high-confidence alerts that can be viewed on the Alerts page in the portal.
3254

55+
## Automatically disrupting threats
3356

34-
## Investigate incidents and alerts
57+
Defender XDR uses [automatic attack disruption](/defender-xdr/automatic-attack-disruption) for containing attacks in progress, limiting attack impact, and providing more time for security teams to respond.
3558

36-
Centralizing security information creates a single place to investigate security incidents across your entire organization and all its components including:
59+
Automatic disruption relies on high-fidelity signals that are produced by incident correlation across million of Defender product signals and continuous investigation insights from Microsoft's security research team, to ensure a high signal-to-noise ratio.
3760

38-
- Hybrid identities
39-
- Endpoints
40-
- Cloud apps
41-
- Business apps
42-
- Email and docs
43-
- IoT
44-
- Network
45-
- Business applications
46-
- Operational technology (OT)
47-
- Infrastructure and cloud workloads
61+
Automatic disruption uses Defender XDR response actions when attacks are detected. Responses include containing or disabling assets.
4862

49-
A primary example is **Incidents** under **Incidents & alerts**.
63+
Attack disruptions are clearly marked in the Defender XDR incident queue, and on specific incident pages.
5064

51-
:::image type="content" source="/defender/media/incidents-queue/incidents-ss-incidents.png" alt-text="The Incidents page in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/incidents-ss-incidents.png":::
5265

53-
Selecting an incident name displays a page that demonstrates the value of centralizing security information as you get better insights into the full extend of a threat, from email, to identity, to endpoints.
66+
## Hunting for threats
5467

55-
<!-- commenting this out as the file path will move soon and I don't want to fight with this broken link anymore. File path is changing anyway. :::image type="content" source="../../media/incidents-overview/incidents-ss-incident-summary.png" alt-text="Screenshot that shows the attack story page for an incident in the Microsoft Defender portal." lightbox="../../media/incidents-overview/incidents-ss-incident-summary.png"::: -->
68+
Proactive hunting inspects and investigates security events and data to locate known and potential security threats.
5669

57-
Take the time to review the incidents in your environment, drill down into each alert, and practice building an understanding of how to access the information and determine next steps in your analysis.
70+
Defender XDR provides threat hunting capabilities in the Defender portal.
5871

59-
Learn more about [incidents in the Defender portal](/defender-xdr/incidents-overview), and [managing incidents and alerts](/defender-xdr/manage-incidents).
72+
- **Advanced hunting**: SOC teams can use [advanced hunting](/defender-xdr/advanced-hunting-overview) with the Kusto Query Language (KQL) in the portal to create custom queries and rules for threat hunting across the enterprise. Analysts can search for indicators of compromise, anomalies, and suspicious activities across Defender XDR data sources.
6073

61-
## Hunt for threats
74+
If you're not familiar with KQL, Defender XDR provides a guided mode to create queries visually, and predefined query templates.
6275

63-
You can build custom detection rules and hunt for specific threats in your environment. **Hunting** uses a query-based threat hunting tool that lets you proactively inspect events in your organization to locate threat indicators and entities. These rules run automatically to check for, and then respond to, suspected breach activity, misconfigured machines, and other findings.
76+
- **Custom detection rules**: In addition to advanced hunting, SOC teams can create [custom detection rules](/defender-xdr/custom-detections-overview) to proactively monitor and respond to events and system states. Rules can trigger alerts or automatic response actions.
6477

65-
Learn about [proactive threat hunting](/defender-xdr/advanced-hunting-overview), and [hunting for threats across devices, emails, apps, and identities](/defender-xdr/advanced-hunting-query-emails-devices).
78+
## Responding to threats
6679

80+
Defender for XDR provides [automated investigation and response](/defender-xdr/m365d-autoir) capabilities. Automation reduces the volume of alerts that must be handled manually by SOC teams.
6781

68-
## Respond to emerging threats
82+
As alerts create incidents, automated investigations produce a verdict that determines whether a threat was found. When suspicious and malicious threats are identified, remediation actions include sending a file to quarantine, stopping a process, blocking a URL, or isolating a device.
6983

70-
Threat analytics is the Microsoft threat intelligence solution from expert Microsoft security researchers.In the portal, track and respond to emerging threats with these threat analytics:
84+
You can view a summary of automated investigations and responses in the Home page of the portal. Pending remediation actions are handled in the portal Action Center.
7185

72-
- Active threat actors and their campaigns
73-
- Popular and new attack techniques
74-
- Critical vulnerabilities
75-
- Common attack surfaces
76-
- Prevalent malware
7786

78-
Learn about [tracking and responding to emerging threats with threat analytics](/defender-xdr/threat-analytics).
7987

0 commit comments

Comments
 (0)