Skip to content

Commit ea498c1

Browse files
authored
Merge branch 'main' into wi-502580-batch-4a-defender-xdr-image-reorg
2 parents fb2707d + 91df472 commit ea498c1

File tree

48 files changed

+269
-184
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+269
-184
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,11 @@
159159
"source_path": "defender-endpoint/mde-linux-arm.md",
160160
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",
161161
"redirect_document_id": false
162-
}
162+
},
163+
{
164+
"source_path": "defender-endpoint/contact-support.md",
165+
"redirect_url": "/defender-xdr/contact-defender-support",
166+
"redirect_document_id": false
167+
},
163168
]
164169
}

defender-endpoint/contact-support.md

Lines changed: 0 additions & 91 deletions
This file was deleted.

defender-xdr/TOC.yml

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -349,11 +349,15 @@
349349
href: advanced-hunting-graph.md
350350
- name: Track and respond to emerging threats
351351
items:
352-
- name: Threat analytics overview
353-
href: threat-analytics.md
354-
- name: Understand the analyst report
355-
href: threat-analytics-analyst-reports.md
356-
- name: Defender Threat Intelligence in Microsoft Defender XDR
352+
- name: Threat analytics
353+
items:
354+
- name: Overview
355+
href: threat-analytics.md
356+
- name: Understand the analyst report
357+
href: threat-analytics-analyst-reports.md
358+
- name: Get access to indicators
359+
href: threat-analytics-indicators.md
360+
- name: Microsoft Defender Threat Intelligence in Defender XDR
357361
href: defender-threat-intelligence.md
358362
- name: Collaborate with Microsoft Defender Experts for Hunting
359363
items:
@@ -515,6 +519,8 @@
515519
href: m365d-threat-analytics-notifications.md
516520
- name: Configure alert notifications
517521
href: configure-email-notifications.md
522+
- name: Contact Microsoft Defender XDR support
523+
href: contact-defender-support.md
518524
- name: Manage devices through dynamic rules
519525
href: configure-asset-rules.md
520526
- name: Provide managed service provider (MSSP) access

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ adx('<Cluster URI>/<Database Name>').<Table Name>
5656

5757
For example, to get the first 10 rows of data from the `StormEvents` table stored in a certain URI:
5858

59-
:::image type="content" source="/defender-xdr/media/adx-sample.png" alt-text="Screenshot of adx operator in advanced hunting." lightbox="/defender-xdr/media/adx-sample.png":::
59+
:::image type="content" source="./media/advanced-hunting-defender-use-custom-rules/adx-sample.png" alt-text="Screenshot of adx operator in advanced hunting." lightbox="./media/advanced-hunting-defender-use-custom-rules/adx-sample.png":::
6060

6161
> [!NOTE]
6262
> The `adx()` operator isn't supported for custom detections.
@@ -76,7 +76,7 @@ In the query editor, enter *arg("").* followed by the Azure Resource Graph table
7676

7777
For example:
7878

79-
:::image type="content" source="/defender-xdr/media/arg-operator2.png" alt-text="Screenshot of arg operator in advanced hunting." lightbox="/defender-xdr/media/arg-operator2.png":::
79+
:::image type="content" source="./media/advanced-hunting-defender-use-custom-rules/arg-operator2.png" alt-text="Screenshot of arg operator in advanced hunting." lightbox="./media/advanced-hunting-defender-use-custom-rules/arg-operator2.png":::
8080

8181
You can also, for instance, filter a query that searches over Microsoft Sentinel data based on the results of an Azure Resource Graph query:
8282

@@ -97,7 +97,7 @@ To use a saved query from Microsoft Sentinel, go to the **Queries** tab and scro
9797
- **Open in query editor** – Loads the query in the query editor.
9898
- **View details** – Opens the query details side pane where you can inspect the query, run the query, or open the query in the editor.
9999

100-
:::image type="content" source="/defender/media/advanced-hunting-unified-view-details.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-unified-view-details.png":::
100+
:::image type="content" source="./media/advanced-hunting-defender-use-custom-rules/advanced-hunting-unified-view-details.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal." lightbox="./media/advanced-hunting-defender-use-custom-rules/advanced-hunting-unified-view-details.png":::
101101

102102

103103
For editable queries, more options are available:
@@ -120,7 +120,7 @@ To help discover threats and anomalous behaviors in your environment, you can cr
120120

121121
For analytics rules that apply to data ingested through the connected Microsoft Sentinel workspace, select **Manage rules > Create analytics rule**.
122122

123-
:::image type="content" source="/defender/media/advanced-hunting-unified-rules.png" alt-text="Screenshot of the options to create custom analytics or detections in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-rules.png":::
123+
:::image type="content" source="./media/advanced-hunting-defender-use-custom-rules/advanced-hunting-unified-rules.png" alt-text="Screenshot of the options to create custom analytics or detections in the Microsoft Defender portal" lightbox="./media/advanced-hunting-defender-use-custom-rules/advanced-hunting-unified-rules.png":::
124124

125125
The **Analytics rule wizard** appears. Fill up the required details as described in [Analytics rule wizard—General tab](/azure/sentinel/detect-threats-custom#analytics-rule-wizardgeneral-tab).
126126

defender-xdr/advanced-hunting-limits.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,11 +61,11 @@ The report can be accessed in two ways:
6161

6262
- In the advanced hunting page, select **Query resources report**:
6363

64-
:::image type="content" source="/defender/media/ah-query-resources/view-query-resources report.png" alt-text="view the query resources report button in the AH portal" lightbox="/defender/media/ah-query-resources/view-query-resources report.png":::
64+
:::image type="content" source="./media/advanced-hunting-limits/view-query-resources report.png" alt-text="view the query resources report button in the AH portal" lightbox="./media/advanced-hunting-limits/view-query-resources report.png":::
6565

6666
- Within the **Reports** page, find the new report entry in the **General** section
6767

68-
:::image type="content" source="/defender/media/ah-query-resources/reports-general-query-resources.png" alt-text="view the query resources report in the Reports section" lightbox="/defender/media/ah-query-resources/reports-general-query-resources.png":::
68+
:::image type="content" source="./media/advanced-hunting-limits/reports-general-query-resources.png" alt-text="view the query resources report in the Reports section" lightbox="./media/advanced-hunting-limits/reports-general-query-resources.png":::
6969

7070
All users can access the reports; however, only the Microsoft Entra Global Administrator, Microsoft Entra Security Administrator, and Microsoft Entra Security Reader roles can see queries done by all users in all interfaces. Any other user can only see:
7171

@@ -93,7 +93,7 @@ The query resources report contains all queries that ran, including detailed res
9393
> [!TIP]
9494
> If the query state is **Failed**, you can hover the field to view the reason for the query failure.
9595
96-
:::image type="content" source="/defender/media/ah-query-resources/excessive-usage-sample.png" alt-text="view inefficient queries" lightbox="/defender/media/ah-query-resources/excessive-usage-sample.png":::
96+
:::image type="content" source="./media/advanced-hunting-limits/excessive-usage-sample.png" alt-text="view inefficient queries" lightbox="./media/advanced-hunting-limits/excessive-usage-sample.png":::
9797

9898
### Find resource-heavy queries
9999

@@ -112,7 +112,7 @@ The graph supports two views:
112112
- Average use per day – the average use of resources per day
113113
- Highest use per day – the highest actual use of resources per day
114114

115-
![Two view modes for query resources report](/defender/media/ah-query-resources/resource-usage-over-time.png)
115+
![Two view modes for query resources report](./media/advanced-hunting-limits/resource-usage-over-time.png)
116116

117117
This means that, for instance, if on a specific day you ran two queries, one used 50% of your resources and one used 100%, the average daily use value would show 75%, while the top daily use would show 100%.
118118

defender-xdr/advanced-hunting-microsoft-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ You can use advanced hunting KQL (Kusto Query Language) queries to hunt through
6666
When you open the advanced hunting page for the first time after connecting a workspace, you can find many of that workspace's tables organized by solution after the Microsoft Defender XDR tables under the **Schema** tab.
6767

6868

69-
:::image type="content" source="/defender/media/advanced-hunting-unified-sentinel-data.png" alt-text="Screenshot of advanced hunting schema tab in the Microsoft Defender portal highlighting location of Sentinel tables" lightbox="/defender/media/advanced-hunting-unified-sentinel-data.png":::
69+
:::image type="content" source="./media/advanced-hunting-microsoft-defender/advanced-hunting-unified-sentinel-data.png" alt-text="Screenshot of advanced hunting schema tab in the Microsoft Defender portal highlighting location of Sentinel tables" lightbox="./media/advanced-hunting-microsoft-defender/advanced-hunting-unified-sentinel-data.png":::
7070

7171

7272
Likewise, you can find the functions from Microsoft Sentinel in the **Functions** tab, and your shared and sample queries from Microsoft Sentinel can be found in the **Queries** tab inside folders marked **Sentinel**.
@@ -81,7 +81,7 @@ In the unified portal, in addition to viewing the schema column names and descri
8181
- **Data retention period** – how long the data is set to be kept
8282
- **Tags** – available for Sentinel data tables
8383

84-
:::image type="content" source="/defender/media/advanced-hunting-unified-view-schema.png" alt-text="Screenshot of the schema information pane in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-view-schema.png":::
84+
:::image type="content" source="./media/advanced-hunting-microsoft-defender/advanced-hunting-unified-view-schema.png" alt-text="Screenshot of the schema information pane in the Microsoft Defender portal" lightbox="./media/advanced-hunting-microsoft-defender/advanced-hunting-unified-view-schema.png":::
8585

8686
## Known issues
8787

defender-xdr/advanced-hunting-modes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ ms.date: 03/28/2025
3232

3333

3434

35-
You can find the **advanced hunting** page by going to the left navigation bar in the Microsoft Defender portal and selecting **Hunting** > **Advanced hunting**. If the navigation bar is collapsed, select the hunting icon ![hunting icon](/defender/media/guided-hunting/hunting-icon.png).
35+
You can find the **advanced hunting** page by going to the left navigation bar in the Microsoft Defender portal and selecting **Hunting** > **Advanced hunting**. If the navigation bar is collapsed, select the hunting icon ![hunting icon](./media/advanced-hunting-modes/hunting-icon.png).
3636

3737
In the **advanced hunting** page, two modes are supported:
3838

@@ -54,13 +54,13 @@ When you open the advanced hunting page for the first time after guided hunting
5454

5555
To take the tour, select **Take tour** when this banner appears:
5656

57-
[![banner inviting user to take the tour](/defender/media/guided-hunting/1-guided-hunting-banner-tb.png)](/defender/media/guided-hunting/1-guided-hunting-banner.png#lightbox)
57+
[![banner inviting user to take the tour](./media/advanced-hunting-modes/1-guided-hunting-banner-tb.png)](./media/advanced-hunting-modes/1-guided-hunting-banner.png#lightbox)
5858

5959
Follow the blue teaching bubbles that appear throughout the page and select **Next** to move from one step to the next.
6060

6161
You can take the tour again at any time by going to **Help resources** > **Learn more** and selecting **Take the tour**.
6262

63-
![Screenshot of help resources](/defender/media/guided-hunting/help-resources.png)
63+
![Screenshot of help resources](./media/advanced-hunting-modes/help-resources.png)
6464

6565
You can then start building your query to hunt for threats. The following articles can help you get the most out of hunting in guided mode:
6666

0 commit comments

Comments
 (0)