You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/alert-policies.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ Alert policies let you categorize the alerts that are triggered by a policy, app
56
56
57
57
Here's a quick overview of how alert policies work and the alerts that are triggers when user or admin activity matches the conditions of an alert policy.
58
58
59
-

59
+

60
60
61
61
1. An admin in your organization creates, configures, and turns on an alert policy by using the **Alert policies** page in the compliance portal or the Microsoft Defender portal. You can also create alert policies by using the [New-ProtectionAlert](/powershell/module/exchangepowershell/new-protectionalert) cmdlet in Security & Compliance PowerShell.
62
62
@@ -77,7 +77,7 @@ An alert policy consists of a set of rules and conditions that define the user o
77
77
78
78
To view and create alert policies, in the [Microsoft Defender portal](https://security.microsoft.com), under **Email & collaboration** select **Policies & rules**\>**Alert policy**. Alternatively, you can go directly to <https://security.microsoft.com/alertpolicies>.
79
79
80
-
:::image type="content" source="/defender/media/alert-policies/policies-rules-page-small.png" alt-text="Highlighting Alert policy in the Policies and rules page":::
80
+
:::image type="content" source="media/alert-policies/policies-rules-page-small.png" alt-text="Highlighting Alert policy in the Policies and rules page":::
81
81
82
82
> [!NOTE]
83
83
> You have to be assigned the View-Only Manage Alerts role to view alert policies in the Microsoft Defender portal. You have to be assigned the Manage Alerts role to create and edit alert policies. For more information, see [Map Microsoft Defender XDR Unified role-based access control (RBAC) permissions](compare-rbac-roles.md).
@@ -95,7 +95,7 @@ You can also define user tags as a condition of an alert policy. This definition
95
95
96
96
-**When the alert is triggered**. You can configure a setting that defines how often an activity can occur before an alert is triggered. This allows you to set up a policy to generate an alert every time an activity matches the policy conditions, when a certain threshold is exceeded, or when the occurrence of the activity the alert is tracking becomes unusual for your organization.
97
97
98
-

98
+

99
99
100
100
If you select the setting based on unusual activity, Microsoft establishes a baseline value that defines the normal frequency for the selected activity. It takes up to seven days to establish this baseline, during which alerts aren't generated. After the baseline is established, an alert is triggered when the frequency of the activity tracked by the alert policy greatly exceeds the baseline value. For auditing-related activities (such as file and folder activities), you can establish a baseline based on a single user or based on all users in your organization; for malware-related activities, you can establish a baseline based on a single malware family, a single recipient, or all messages in your organization.
101
101
@@ -226,7 +226,7 @@ When an activity performed by users in your organization matches the settings of
226
226
227
227
To view alerts, in the [Microsoft Defender portal](https://security.microsoft.com), select **Incidents & alerts**\>**Alerts**. Alternatively, you can go directly to <https://security.microsoft.com/alerts>.
228
228
229
-

229
+

230
230
231
231
You can use the following filters to view a subset of all the alerts on the **Alerts** page:
232
232
@@ -262,7 +262,7 @@ When events that match the same alert policy occur within the aggregation interv
262
262
263
263
The following screenshot shows an alert with four aggregated events. The activity list contains information about the four email messages relevant to the alert.
264
264
265
-

265
+

266
266
267
267
Keep the following things in mind about alert aggregation:
Copy file name to clipboardExpand all lines: defender-xdr/copilot-in-defender-device-summary.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,15 +65,15 @@ You can access the device summary capability through the following ways:
65
65
66
66
- From the main menu, open the Device inventory page by selecting **Devices** under Assets. Choose a device to investigate from the list. Upon opening the device page, Copilot automatically summarizes the device information of the chosen device and displays the summary in the Copilot pane.
67
67
68
-
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page.png":::
68
+
:::image type="content" source="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page.png":::
69
69
70
70
- From an incident page, you can choose a device on the incident graph and then (1) select **Device details**. On the device pane, (2) select **Summarize** to generate the device summary. The summary is displayed in the Copilot pane.
71
71
72
-
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png":::
72
+
:::image type="content" source="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="media/copilot-in-defender-device-summary/copilot-defender-device-summary-device-page-small.png":::
73
73
74
74
You can also access the device summary capability by choosing a device listed in the **Assets** tab of an incident. Select **Copilot** in the device pane to generate the device summary.
75
75
76
-
:::image type="content" source="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="/defender/media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets.png":::
76
+
:::image type="content" source="media/copilot-in-defender-device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="media/copilot-in-defender-device-summary/copilot-defender-device-summary-assets.png":::
77
77
78
78
Review the results of the device summary. You can copy the results to clipboard, regenerate the results, or open the Security Copilot portal by selecting the More actions ellipsis (...) on top of the device summary card.
Copy file name to clipboardExpand all lines: defender-xdr/m365d-threat-analytics-notifications.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,23 +41,23 @@ To set up email notifications for threat analytics reports, perform the followin
41
41
> [!NOTE]
42
42
> The name and description fields for a new notification rule only accept English letters and numbers. Punctuations like spaces, dashes, underscores, aren't supported.
43
43
44
-

44
+

45
45
46
46
4. Choose the reports you want to be notified about. You can choose to be updated about all newly published or updated reports or only those reports of a certain type or with a specific tag.
47
47
48
-

48
+

49
49
50
50
5. Add at least one recipient to receive the notification emails. You can also use this screen to send a test email to check the notification settings.
51
51
52
-

52
+

53
53
54
54
6. Review your new rule. Select **Edit** at the end of each subsection to change any of the settings. Once your review is complete, select **Create rule**.
55
55
56
-

56
+

57
57
58
58
7. Select **Done** to complete the process and close the flyout.
59
59
60
-

60
+

61
61
62
62
Your new rule now appears in the list of Threat analytics email notifications.
0 commit comments