Skip to content

Commit e94b07d

Browse files
authored
Merge branch 'public' into patch-1
2 parents 36d4f7e + ee8597b commit e94b07d

14 files changed

+182
-12
lines changed

defender-endpoint/network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 12/18/2024
6+
ms.date: 01/16/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -56,7 +56,7 @@ The following table summarizes network protection areas of coverage.
5656
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
5757
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
5858
59-
Here are a few important points to keep in mind:
59+
### Known issues & limitations
6060

6161
- IP is supported for all three protocols (`TCP`, `HTTP`, and `HTTPS` (TLS)).
6262
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.

defender-endpoint/respond-machine-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -320,7 +320,7 @@ You'll be able to stop containing a device at any time.
320320

321321
## Contain user from the network
322322

323-
When an identity in your network might be compromised, you must prevent that identity from accessing the network and different endpoints. Defender for Endpoint can contain an identity, blocking it from access, and helping prevent attacks-- specifically, ransomware. When an identity is contained, any supported Microsoft Defender for Endpoint onboarded device will block incoming traffic in specific protocols related to attacks (network logons, RPC, SMB, RDP), terminate ongoing remote sessions and logoff existing RDP connections (termination the session itself including all its related processes), while enabling legitimate traffic. This action can significantly help to reduce the impact of an attack. When an identity is contained, security operations analysts have extra time to locate, identify and remediate the threat to the compromised identity.
323+
When an identity in your network might be compromised, you must prevent that identity from accessing the network and different endpoints. Defender for Endpoint can contain an identity, blocking it from access, and helping prevent attacks-- specifically, ransomware. When an identity is contained, any supported Microsoft Defender for Endpoint onboarded device will block incoming traffic in specific protocols related to attacks (network logons, RPC, SMB, RDP), terminate ongoing remote sessions and logoff existing RDP connections (terminating the session itself including all its related processes), while enabling legitimate traffic. This action can significantly help to reduce the impact of an attack. When an identity is contained, security operations analysts have extra time to locate, identify and remediate the threat to the compromised identity.
324324

325325
> [!NOTE]
326326
> Blocking incoming communication with a "contained" user is supported on onboarded Microsoft Defender for Endpoint Windows 10 and 11 devices (Sense version 8740 and higher), Windows Server 2019+ devices, and Windows Servers 2012R2 and 2016 with the modern agent.

defender-xdr/incident-queue.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ This table lists the filter names that are available.
123123
| **Alert severity<br>Incident severity** | The severity of an alert or incident is indicative of the impact it can have on your assets. The higher the severity, the bigger the impact and typically requires the most immediate attention. Select **High**, **Medium**, **Low**, or **Informational**. |
124124
| **Incident assignment** | Select the assigned user or users. |
125125
| **Multiple service sources** | Specify whether the filter is for more than one service source. |
126-
| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
126+
| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<li>Microsoft Purview Insider Risk Management<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
127127
| **Tags** | Select one or multiple tag names from the list. |
128128
| **Multiple category** | Specify whether the filter is for more than one category. |
129129
| **Categories** | Choose categories to focus on specific tactics, techniques, or attack components seen. |
@@ -137,6 +137,9 @@ This table lists the filter names that are available.
137137
| **Alert policies** | Specify an alert policy title. |
138138
| **Alert subscription IDs** | Specify an alert based on a subscription ID. |
139139

140+
> [!NOTE]
141+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
142+
140143
The default filter is to show all alerts and incidents with a status of **New** and **In progress** and with a severity of **High**, **Medium**, or **Low**.
141144

142145
You can quickly remove a filter by selecting the **X** in the name of a filter in the **Filters** list.

defender-xdr/investigate-alerts.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ ms.collection:
1717
ms.custom: admindeeplinkDEFENDER
1818
ms.topic: conceptual
1919
search.appverid:
20-
- MOE150
21-
- met150
22-
ms.date: 01/16/2025
20+
- MOE150
21+
- met150
22+
ms.date: 1/17/2025
2323
---
2424

2525
# Investigate alerts in Microsoft Defender XDR
@@ -129,6 +129,10 @@ Microsoft Defender XDR alerts come from solutions like Microsoft Defender for En
129129
| Microsoft Data Loss Prevention | `dl{GUID}` |
130130
| Microsoft Defender for Cloud | `dc{GUID}` |
131131
| Microsoft Sentinel | `sn{GUID}` |
132+
| Microsoft Purview Insider Risk Management | `ir{GUID}` |
133+
134+
> [!NOTE]
135+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
132136
133137
<a name='configure-aad-ip-alert-service'></a>
134138

defender-xdr/investigate-incidents.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 11/19/2024
19+
ms.date: 01/17/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
@@ -142,6 +142,9 @@ Here's an example.
142142

143143
Learn how to use the alert queue and alert pages in [investigate alerts](investigate-alerts.md).
144144

145+
> [!NOTE]
146+
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).
147+
145148
## Assets
146149

147150
Easily view and manage all your assets in one place with the new **Assets** tab. This unified view includes Devices, Users, Mailboxes and Apps.

0 commit comments

Comments
 (0)