Skip to content

Commit f5eb6fa

Browse files
committed
mc
2 parents 3d4dc21 + 2328321 commit f5eb6fa

16 files changed

+88
-90
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -171,6 +170,31 @@
171170
"redirect_url": "/defender-xdr/",
172171
"redirect_document_id": false
173172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
174198
{
175199
"source_path": "defender-xdr/tickets.md",
176200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -226,10 +250,15 @@
226250
"redirect_url": "/unified-secops-platform/mto-tenants",
227251
"redirect_document_id": false
228252
},
253+
{
254+
"source_path": "defender-xdr/portals.md",
255+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
256+
"redirect_document_id": false
257+
},
229258
{
230259
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
231260
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
232261
"redirect_document_id": false
233262
}
234263
]
235-
}
264+
}

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,8 @@ Use the following steps to prepare for deploying Defender for Identity:
5050
1. [Plan your Defender for Identity capacity](capacity-planning.md).
5151

5252
> [!TIP]
53-
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
54-
>
55-
> The link to the *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
53+
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54+
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5655
5756
## Deploy Defender for Identity
5857

@@ -71,12 +70,12 @@ The following procedures help you complete the deployment process:
7170

7271
- [**Enable and configure unified role-based access control (RBAC)**](../role-groups.md) for Defender for Identity.
7372

74-
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities
73+
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities.
7574

7675
- [**Configure remote calls to SAM**](remote-calls-sam.md) as needed. While this step is optional, we recommend that you configure remote calls to SAM-R for lateral movement path detection with Defender for Identity.
7776

7877
> [!TIP]
79-
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, please open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
78+
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
8079
>
8180
8281
> [!IMPORTANT]

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
1515
ms.service: defender-office-365
1616
search.appverid: met150
17-
ms.date: 02/04/2025
17+
ms.date: 02/12/2025
1818
appliesto:
1919
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -58,7 +58,7 @@ Admins configure user reported messages to go to a specified reporting mailbox,
5858

5959
If user reporting is turned off and a non-Microsoft add-in button is selected, the **Report** button isn't available in supported versions of Outlook.
6060

61-
- The built-in **Report** button in Outlook on the web, Outlook for Android, and the new Outlook for Windows supports reporting messages from shared mailboxes or other mailboxes by a delegate.
61+
- The built-in **Report** button in Outlook on the web, Outlook for Mac, Outlook for Android, and the new Outlook for Windows supports reporting messages from shared mailboxes or other mailboxes by a delegate.
6262
- Shared mailboxes require Send As or Send On Behalf permission for the user.
6363
- Other mailboxes require Send As or Send On Behalf permission _and_ Read and Manage permissions for the delegate.
6464

defender-xdr/TOC.yml

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@
2626
href: prerequisites.md
2727
- name: Data security and privacy
2828
href: data-privacy.md
29-
- name: Microsoft security portals
30-
href: portals.md
3129
- name: Pilot and deploy Microsoft Defender XDR
3230
items:
3331
- name: Overview
@@ -567,17 +565,9 @@
567565
- name: Responding to ransomware attacks
568566
href: playbook-responding-ransomware-m365-defender.md
569567
- name: Threat actor naming
570-
href: microsoft-threat-actor-naming.md
571-
- name: Malware names
572-
href: malware-naming.md
573-
- name: How Microsoft identifies malware and PUA
574-
href: criteria.md
575-
- name: Submit files for analysis
576-
href: submission-guide.md
568+
href: /unified-secops-platform/microsoft-threat-actor-naming
577569
- name: Understand threat intelligence concepts
578570
href: /defender-endpoint/threat-indicator-concepts
579-
- name: Microsoft virus initiative
580-
href: virus-initiative-criteria.md
581571
- name: Software developer FAQ
582572
href: developer-faq.yml
583573
- name: Microsoft Defender XDR docs

defender-xdr/deception-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The following table lists the requirements to enable the deception capability in
4747
> |Requirement|Details|
4848
> |-------------|----------|
4949
> |Subscription requirements|One of these subscriptions:</br> - Microsoft 365 E5</br> - Microsoft Security E5</br> - Microsoft Defender for Endpoint Plan 2|
50-
> |Deployment requirements|Requirements:</br> - Defender for Endpoint is the primary EDR solution</br> - [Automated investigation and response capabilities in Defender for Endpoint](/defender-endpoint/configure-automated-investigations-remediation) is configured</br> - Devices are [joined](/entra/identity/devices/concept-directory-join/) or [hybrid joined](/entra/identity/devices/concept-hybrid-join/) in Microsoft Entra</br> - PowerShell is enabled on the devices</br> - The deception feature covers clients operating on Windows 10 RS5 and later in preview|
50+
> |Deployment requirements|Requirements:</br> - Defender for Endpoint is the primary EDR solution</br> - [Automated investigation and response capabilities in Defender for Endpoint](/defender-endpoint/configure-automated-investigations-remediation) is configured</br> - Devices are [joined](/entra/identity/devices/concept-directory-join/) or [hybrid joined](/entra/identity/devices/concept-hybrid-join/) in Microsoft Entra</br> - PowerShell is enabled on the devices (in non-restricted/non-constrained mode)</br> - The deception feature covers clients operating on Windows 10 RS5 and later in preview|
5151
> |Permissions|You must have one of the following roles assigned in the [Microsoft Entra admin center](https://entra.microsoft.com) or in the [Microsoft 365 admin center](https://admin.microsoft.com) to configure deception capabilities:</br> - Global administrator</br> - Security administrator</br> - Manage portal system settings|
5252
5353
> [!NOTE]

defender-xdr/portals.md

Lines changed: 0 additions & 54 deletions
This file was deleted.

unified-secops-platform/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,12 +108,14 @@
108108
- name: Resources
109109
items:
110110
- name: Threat actor naming
111-
href: /defender-xdr/microsoft-threat-actor-naming?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
111+
href: microsoft-threat-actor-naming.md
112+
- name: Malware names
113+
href: malware-naming.md
112114
- name: Identification of malware and unwanted apps
113-
href: /defender-xdr/criteria?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
115+
href: criteria.md
114116
- name: Submit files for analysis
115-
href: /defender-xdr/submission-guide?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
117+
href: submission-guide.md
116118
- name: Microsoft virus initiative
117-
href: /defender-xdr/virus-initiative-criteria?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
119+
href: virus-initiative-criteria.md
118120
- name: Microsoft security portals
119121
href: /defender-xdr/portals?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json

defender-xdr/criteria.md renamed to unified-secops-platform/criteria.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft identifies malware and potentially unwanted applications
33
ms.reviewer: andanut, elahehsamani
44
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp

defender-xdr/malware-naming.md renamed to unified-secops-platform/malware-naming.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How Microsoft names malware
33
ms.reviewer:
44
description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
5-
ms.service: defender-xdr
5+
ms.service: unified-secops-platform
66
ms.localizationpriority: medium
77
ms.author: dansimp
88
author: dansimp
@@ -19,7 +19,7 @@ ms.date: 01/29/2024
1919

2020
We name the malware and unwanted software that we detect according to the Computer Antivirus Research Organization (CARO) malware naming scheme. The scheme uses the following format:
2121

22-
![How Microsoft determines names malware](/defender/media/security-intelligence-images/naming-malware.png)
22+
![How Microsoft determines names malware](media/malware-naming/naming-malware.png)
2323

2424
When our analysts research a particular threat, they determine what each of the components name is.
2525

File renamed without changes.

0 commit comments

Comments
 (0)