Skip to content

Commit f8d0c64

Browse files
authored
Merge pull request #2158 from MicrosoftDocs/main
Published main to live, Wednesday 10:30 AM PST, 12/11
2 parents b49321d + a9e3ba8 commit f8d0c64

File tree

5 files changed

+70
-69
lines changed

5 files changed

+70
-69
lines changed

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/26/2023
4+
ms.date: 12/11/2024
55
ms.topic: how-to
66
---
77

@@ -154,11 +154,11 @@ For more information, see the [ServiceNow product documentation](https://docs.se
154154
1. Establish an internal procedure to ensure that the connection remains alive. A couple of days before the expected expiration of the refresh token lifespan.
155155
Revoke to the old refresh token. We don't recommend keeping old keys for security reasons.
156156

157-
1. On the ServiceNow pane, search for System OAuth, and then select Manage Tokens.
157+
1. On the ServiceNow pane, search for **System OAuth**, and then select **Manage Tokens**.
158158

159159
1. Select the old token from the list according to the OAuth name and expiration date.
160160

161-
1. Select Revoke Access > Revoke.
161+
1. Select **Revoke Access > Revoke**.
162162
163163
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
164164

@@ -210,7 +210,7 @@ To connect ServiceNow with Defender for Cloud Apps, you must have admin-level pe
210210

211211
1. Select **Connect**.
212212
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
213-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
213+
After connecting ServiceNow, you'll receive events for one hour prior to connection.
214214

215215
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
216216

defender-endpoint/ios-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,9 +137,9 @@ Configure the supervised mode for Defender for Endpoint app through an App confi
137137
138138
Admins deploy any one of the given profiles.
139139

140-
1. **Zero touch (Silent) Control Filter** - This profile enables silent onboarding for users. Download the config profile from [ControlFilterZeroTouch](https://aka.ms/mdeiosprofilesupervisedzerotouch)
140+
1. **Zero touch (Silent) Control Filter** - This profile enables silent onboarding for users. Download the config profile from [ControlFilterZeroTouch](https://download.microsoft.com/download/f/8/e/f8ed3484-b665-4c3c-9ae9-272c8a04159b/Microsoft_Defender_for_Endpoint_Control_Filter_Zerotouch.mobileconfig).
141141

142-
2. **Control Filter** - Download the config profile from [ControlFilter](https://aka.ms/mdeiosprofilesupervised).
142+
2. **Control Filter** - Download the config profile from [ControlFilter](https://download.microsoft.com/download/f/8/e/f8ed3484-b665-4c3c-9ae9-272c8a04159b/Microsoft_Defender_for_Endpoint_Control_Filter_1.mobileconfig).
143143

144144
Once the profile has been downloaded, deploy the custom profile. Follow the steps below:
145145

defender-xdr/advanced-hunting-defender-results.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -30,17 +30,17 @@ ms.date: 11/19/2024
3030

3131
## Explore results
3232

33-
Results of queries that were run appear in the **Results** tab. You can export the results to a CSV file by selecting **Export**.
3433

3534
:::image type="content" source="/defender/media/advanced-hunting-unified-results.png" alt-text="Screenshot of advanced hunting results with options to expand result rows in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-results.png":::
3635

3736
You can also explore the results in-line with the following features:
3837

39-
- Expand a result by selecting the dropdown arrow at the left of each result
40-
- Where applicable, expand details for results that are in JSON or array format by selecting the dropdown arrow at the left of applicable result row for added readability
41-
- Open the side pane to see a record's details (concurrent with expanded rows)
38+
- Expand a result by selecting the dropdown arrow at the left of each result.
39+
- Where applicable, expand details for results that are in JSON or array format by selecting the dropdown arrow at the left of applicable result row for added readability.
40+
- Open the side pane to see a record's details (concurrent with expanded rows).
4241

4342
You can also right-click on any result value in a row so that you can use it to:
43+
4444
- Add more filters to the existing query
4545
- Copy the value for use in further investigation
4646
- Update the query to extend a JSON field to a new column
@@ -64,18 +64,18 @@ You can use the link to incident feature to add advanced hunting query results t
6464
You can also select **Link to an existing incident** to add the selected records to an existing incident. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the incident you want.<br>
6565
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
6666
4. For either selection, provide the following details, then select **Next**:
67-
- **Alert title**a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
68-
- **Severity**choose the severity applicable to the group of alerts
69-
- **Category**choose the appropriate threat category for the alerts
70-
- **Description**give a helpful description of the grouped alerts
71-
- **Recommended actions**list the recommended remediation actions for the security analysts who are investigating the incident
67+
- **Alert title**A descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
68+
- **Severity**Choose the severity applicable to the group of alerts
69+
- **Category**Choose the appropriate threat category for the alerts
70+
- **Description**Give a helpful description of the grouped alerts
71+
- **Recommended actions**List the recommended remediation actions for the security analysts who are investigating the incident
7272
5. In the **Entities** section, select the entities that are involved in the suspicious events. Those entities are used to correlate other alerts to the linked incident and are visible from the incident page.
7373

7474
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
7575

7676
There are two sections for which you can select entities:
7777

78-
a. **Impacted assets** – impacted assets that appear in the selected events should be added here. The following types of assets can be added:
78+
a. **Impacted assets** – Impacted assets that appear in the selected events should be added here. The following types of assets can be added:
7979
- Account
8080
- Device
8181
- Mailbox
@@ -84,7 +84,7 @@ You can use the link to incident feature to add advanced hunting query results t
8484
- Amazon Web Services resource
8585
- Google Cloud Platform resource
8686

87-
b. **Related evidence** – non-assets that appear in the selected events can be added in this section. The supported entity types are:
87+
b. **Related evidence** – Non-assets that appear in the selected events can be added in this section. The supported entity types are:
8888
- Process
8989
- File
9090
- Registry value
@@ -112,7 +112,7 @@ You can use the link to incident feature to add advanced hunting query results t
112112

113113
6. Select **Next**.
114114
7. Review the details you've provided in the Summary section.
115-
8. Select **Done**.
115+
8. Select **Done**.
116116

117117
### View linked records in the incident
118118
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
@@ -127,6 +127,7 @@ You can also select the event from the timeline view or from the query results v
127127
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
128128

129129
### Filter for events added using advanced hunting
130-
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
130+
131+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source.
131132

132133
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::

defender-xdr/advanced-hunting-link-to-incident.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -37,29 +37,28 @@ You can use the link to incident feature to add advanced hunting query results t
3737

3838
1. In the advanced hunting query page, first enter your query in the query field provided then select **Run query** to get your results.
3939

40-
:::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1.png":::
40+
:::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal." lightbox="/defender/media/link-to-incident-1.png":::
4141

4242
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
4343

44-
:::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1b.png":::
44+
:::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal." lightbox="/defender/media/link-to-incident-1b.png":::
4545

4646
3. Find the **Alert details** section in the Link to incident pane, then select **Create new incident** to convert the events to alerts and group them to a new incident:
47-
48-
47+
4948
Or select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
5049

51-
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
50+
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link4.png":::
5251

5352
4. For either selection, provide the following details, then select **Next**:
54-
- **Alert title** - provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
53+
- **Alert title** - Provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
5554
- **Severity** - Choose the severity applicable to the group of alerts.
5655
- **Category** - Choose the appropriate threat category for the alerts.
5756
- **Description** - Give a helpful description for the grouped alerts.
5857
- **Recommended actions** - Provide remediation actions.
5958

6059
5. In the **Entities** section, you can find which entities are used to correlate other alerts to the linked incident. They also appear in the incident page. You can review the preselected entities categorized as follows:
6160

62-
a. **Impacted assets**assets impacted by the selected events, can be:
61+
a. **Impacted assets**Assets impacted by the selected events, can be:
6362
- Account
6463
- Device
6564
- Mailbox
@@ -68,7 +67,7 @@ You can use the link to incident feature to add advanced hunting query results t
6867
- Amazon Web Services resource
6968
- Google Cloud Platform resource
7069

71-
b. **Related evidence**non-assets that appear in the selected events. The supported entity types are:
70+
b. **Related evidence**Non-assets that appear in the selected events. The supported entity types are:
7271
- Process
7372
- File
7473
- Registry value
@@ -83,11 +82,11 @@ You can use the link to incident feature to add advanced hunting query results t
8382
6. After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
8483
7. After selecting the identifier, select a column from the query results that contain the selected identifier. You can select **Explore query and results** to open the advanced hunting context panel. This allows you to explore your query and results to make sure you chose the right column for the selected identifier.
8584
<br>
86-
:::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
85+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
8786
<br>
8887
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
8988

90-
:::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::
89+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::
9190

9291
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
9392

@@ -96,18 +95,20 @@ You can use the link to incident feature to add advanced hunting query results t
9695
8. Select **Done**.
9796

9897
### View linked records in the incident
98+
9999
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
100100

101-
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
101+
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link7.png":::
102102

103103
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
104104
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
105105

106106
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
107107

108-
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
108+
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link8.png":::
109109

110110
### Filter for events added using advanced hunting
111-
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
112111

113-
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
112+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source.
113+
114+
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link9.png":::

0 commit comments

Comments
 (0)