Skip to content

Commit dbbf34d

Browse files
Merge pull request #5423 from MicrosoftDocs/main
[AutoPublish] main to live - 10/30 13:31 PDT | 10/31 02:01 IST
2 parents f075480 + 4933646 commit dbbf34d

30 files changed

+22
-22
lines changed

defender-xdr/alert-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Alert policies let you categorize the alerts that are triggered by a policy, app
5656

5757
Here's a quick overview of how alert policies work and the alerts that are triggers when user or admin activity matches the conditions of an alert policy.
5858

59-
![Overview of how alert policies work.](media/M365ComplianceDefender-AlertPolicies-Overview.png)
59+
![Overview of how alert policies work.](media/alert-policies/M365ComplianceDefender-AlertPolicies-Overview.png)
6060

6161
1. An admin in your organization creates, configures, and turns on an alert policy by using the **Alert policies** page in the compliance portal or the Microsoft Defender portal. You can also create alert policies by using the [New-ProtectionAlert](/powershell/module/exchangepowershell/new-protectionalert) cmdlet in Security & Compliance PowerShell.
6262

@@ -77,7 +77,7 @@ An alert policy consists of a set of rules and conditions that define the user o
7777

7878
To view and create alert policies, in the [Microsoft Defender portal](https://security.microsoft.com), under **Email & collaboration** select **Policies & rules** \> **Alert policy**. Alternatively, you can go directly to <https://security.microsoft.com/alertpolicies>.
7979

80-
:::image type="content" source="/defender/media/alert-policies/policies-rules-page-small.png" alt-text="Highlighting Alert policy in the Policies and rules page":::
80+
:::image type="content" source="media/alert-policies/policies-rules-page-small.png" alt-text="Highlighting Alert policy in the Policies and rules page":::
8181

8282
> [!NOTE]
8383
> You have to be assigned the View-Only Manage Alerts role to view alert policies in the Microsoft Defender portal. You have to be assigned the Manage Alerts role to create and edit alert policies. For more information, see [Map Microsoft Defender XDR Unified role-based access control (RBAC) permissions](compare-rbac-roles.md).
@@ -95,7 +95,7 @@ You can also define user tags as a condition of an alert policy. This definition
9595

9696
- **When the alert is triggered**. You can configure a setting that defines how often an activity can occur before an alert is triggered. This allows you to set up a policy to generate an alert every time an activity matches the policy conditions, when a certain threshold is exceeded, or when the occurrence of the activity the alert is tracking becomes unusual for your organization.
9797

98-
![Configure how alerts are triggered, based on when the activity occurs, a threshold, or unusual activity for your organization.](media/howalertsaretriggered.png)
98+
![Configure how alerts are triggered, based on when the activity occurs, a threshold, or unusual activity for your organization.](media/alert-policies/howalertsaretriggered.png)
9999

100100
If you select the setting based on unusual activity, Microsoft establishes a baseline value that defines the normal frequency for the selected activity. It takes up to seven days to establish this baseline, during which alerts aren't generated. After the baseline is established, an alert is triggered when the frequency of the activity tracked by the alert policy greatly exceeds the baseline value. For auditing-related activities (such as file and folder activities), you can establish a baseline based on a single user or based on all users in your organization; for malware-related activities, you can establish a baseline based on a single malware family, a single recipient, or all messages in your organization.
101101

@@ -226,7 +226,7 @@ When an activity performed by users in your organization matches the settings of
226226

227227
To view alerts, in the [Microsoft Defender portal](https://security.microsoft.com), select **Incidents & alerts** \> **Alerts**. Alternatively, you can go directly to <https://security.microsoft.com/alerts>.
228228

229-
![In the Microsoft Defender portal, select Incidents & alerts and then select Alerts.](media/ViewAlertsDefenderPortal.png)
229+
![In the Microsoft Defender portal, select Incidents & alerts and then select Alerts.](media/alert-policies/ViewAlertsDefenderPortal.png)
230230

231231
You can use the following filters to view a subset of all the alerts on the **Alerts** page:
232232

@@ -262,7 +262,7 @@ When events that match the same alert policy occur within the aggregation interv
262262

263263
The following screenshot shows an alert with four aggregated events. The activity list contains information about the four email messages relevant to the alert.
264264

265-
![Example of alert aggregation.](media/AggregatedAlertExample.png)
265+
![Example of alert aggregation.](media/alert-policies/AggregatedAlertExample.png)
266266

267267
Keep the following things in mind about alert aggregation:
268268

defender-xdr/copilot-in-defender-device-summary.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,15 +65,15 @@ You can access the device summary capability through the following ways:
6565

6666
- From the main menu, open the Device inventory page by selecting **Devices** under Assets. Choose a device to investigate from the list. Upon opening the device page, Copilot automatically summarizes the device information of the chosen device and displays the summary in the Copilot pane.
6767

68-
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page.png":::
68+
:::image type="content" source="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page.png":::
6969

7070
- From an incident page, you can choose a device on the incident graph and then (1) select **Device details**. On the device pane, (2) select **Summarize** to generate the device summary. The summary is displayed in the Copilot pane.
7171

72-
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png":::
72+
:::image type="content" source="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page-small.png":::
7373

7474
You can also access the device summary capability by choosing a device listed in the **Assets** tab of an incident. Select **Copilot** in the device pane to generate the device summary.
7575

76-
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets.png":::
76+
:::image type="content" source="media/copilot-in-defender-device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="media/copilot-in-defender-device-summary/copilot-defender-device-summary-assets.png":::
7777

7878
Review the results of the device summary. You can copy the results to clipboard, regenerate the results, or open the Security Copilot portal by selecting the More actions ellipsis (...) on top of the device summary card.
7979

defender-xdr/m365d-enable-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Your feedback helps us get better at protecting your environment from advanced a
117117

118118
In the Microsoft Defender portal, select the feedback icon on the top right and provide your feedback.
119119

120-
![Screenshot of the portal menu, highlighting the feedback icon](/defender/media/portal-feedback.png)
120+
![Screenshot of the portal menu, highlighting the feedback icon](media/m365d-enable-faq/portal-feedback.png)
121121

122122
Rate your experience and provide details on what you liked or where improvements can be made. You can also choose to be contacted about the feedback.
123123

defender-xdr/m365d-threat-analytics-notifications.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,23 +41,23 @@ To set up email notifications for threat analytics reports, perform the followin
4141
> [!NOTE]
4242
> The name and description fields for a new notification rule only accept English letters and numbers. Punctuations like spaces, dashes, underscores, aren't supported.
4343
44-
![Screenshot of the naming screen, with all fields filled out and the "Turn rule on" checkbox checked](/defender/media/threat-analytics/ta_create_notification_2.png)
44+
![Screenshot of the naming screen, with all fields filled out and the "Turn rule on" checkbox checked](media/m365d-threat-analytics-notifications/ta_create_notification_2.png)
4545

4646
4. Choose the reports you want to be notified about. You can choose to be updated about all newly published or updated reports or only those reports of a certain type or with a specific tag.
4747

48-
![Screenshot of the notification screen, with Ransomware tags selected and a drop down menu for types open](/defender/media/threat-analytics/ta_create_notification_3.png)
48+
![Screenshot of the notification screen, with Ransomware tags selected and a drop down menu for types open](media/m365d-threat-analytics-notifications/ta_create_notification_3.png)
4949

5050
5. Add at least one recipient to receive the notification emails. You can also use this screen to send a test email to check the notification settings.
5151

52-
![Screenshot of the recipients screen. There are 3 recipients listed, and a test email has been sent, as indicated by a green checkmark](/defender/media/threat-analytics/ta_create_notification_4.png)
52+
![Screenshot of the recipients screen. There are 3 recipients listed, and a test email has been sent, as indicated by a green checkmark](media/m365d-threat-analytics-notifications/ta_create_notification_4.png)
5353

5454
6. Review your new rule. Select **Edit** at the end of each subsection to change any of the settings. Once your review is complete, select **Create rule**.
5555

56-
![Screenshot of the review screen. An edit button is highlighted in red](/defender/media/threat-analytics/ta_create_notification_5.png)
56+
![Screenshot of the review screen. An edit button is highlighted in red](media/m365d-threat-analytics-notifications/ta_create_notification_5.png)
5757

5858
7. Select **Done** to complete the process and close the flyout.
5959

60-
![Screenshot of the rule created screen. A successfully created rule will display green checkmarks along the sidebar, and a big green check in the main area of the screen](/defender/media/threat-analytics/ta_create_notification_6.png)
60+
![Screenshot of the rule created screen. A successfully created rule will display green checkmarks along the sidebar, and a big green check in the main area of the screen](media/m365d-threat-analytics-notifications/ta_create_notification_6.png)
6161

6262
Your new rule now appears in the list of Threat analytics email notifications.
6363

0 commit comments

Comments
 (0)