You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-servicenow.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
3
3
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4
-
ms.date: 12/26/2023
4
+
ms.date: 12/11/2024
5
5
ms.topic: how-to
6
6
---
7
7
@@ -154,11 +154,11 @@ For more information, see the [ServiceNow product documentation](https://docs.se
154
154
1. Establish an internal procedure to ensure that the connection remains alive. A couple of days before the expected expiration of the refresh token lifespan.
155
155
Revoke to the old refresh token. We don't recommend keeping old keys for security reasons.
156
156
157
-
1. On the ServiceNow pane, search for System OAuth, and then select Manage Tokens.
157
+
1. On the ServiceNow pane, search for **System OAuth**, and then select **Manage Tokens**.
158
158
159
159
1. Select the old token from the list according to the OAuth name and expiration date.
160
160
161
-
1. Select Revoke Access > Revoke.
161
+
1. Select **Revoke Access > Revoke**.
162
162
163
163
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
164
164
@@ -210,7 +210,7 @@ To connect ServiceNow with Defender for Cloud Apps, you must have admin-level pe
210
210
211
211
1. Select **Connect**.
212
212
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
213
-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
213
+
After connecting ServiceNow, you'll receive events for one hour prior to connection.
214
214
215
215
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
Copy file name to clipboardExpand all lines: defender-endpoint/ios-install.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,9 +137,9 @@ Configure the supervised mode for Defender for Endpoint app through an App confi
137
137
138
138
Admins deploy any one of the given profiles.
139
139
140
-
1.**Zero touch (Silent) Control Filter** - This profile enables silent onboarding for users. Download the config profile from [ControlFilterZeroTouch](https://aka.ms/mdeiosprofilesupervisedzerotouch)
140
+
1.**Zero touch (Silent) Control Filter** - This profile enables silent onboarding for users. Download the config profile from [ControlFilterZeroTouch](https://download.microsoft.com/download/f/8/e/f8ed3484-b665-4c3c-9ae9-272c8a04159b/Microsoft_Defender_for_Endpoint_Control_Filter_Zerotouch.mobileconfig).
141
141
142
-
2.**Control Filter** - Download the config profile from [ControlFilter](https://aka.ms/mdeiosprofilesupervised).
142
+
2.**Control Filter** - Download the config profile from [ControlFilter](https://download.microsoft.com/download/f/8/e/f8ed3484-b665-4c3c-9ae9-272c8a04159b/Microsoft_Defender_for_Endpoint_Control_Filter_1.mobileconfig).
143
143
144
144
Once the profile has been downloaded, deploy the custom profile. Follow the steps below:
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-results.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,17 +30,17 @@ ms.date: 11/19/2024
30
30
31
31
## Explore results
32
32
33
-
Results of queries that were run appear in the **Results** tab. You can export the results to a CSV file by selecting **Export**.
34
33
35
34
:::image type="content" source="/defender/media/advanced-hunting-unified-results.png" alt-text="Screenshot of advanced hunting results with options to expand result rows in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-results.png":::
36
35
37
36
You can also explore the results in-line with the following features:
38
37
39
-
- Expand a result by selecting the dropdown arrow at the left of each result
40
-
- Where applicable, expand details for results that are in JSON or array format by selecting the dropdown arrow at the left of applicable result row for added readability
41
-
- Open the side pane to see a record's details (concurrent with expanded rows)
38
+
- Expand a result by selecting the dropdown arrow at the left of each result.
39
+
- Where applicable, expand details for results that are in JSON or array format by selecting the dropdown arrow at the left of applicable result row for added readability.
40
+
- Open the side pane to see a record's details (concurrent with expanded rows).
42
41
43
42
You can also right-click on any result value in a row so that you can use it to:
43
+
44
44
- Add more filters to the existing query
45
45
- Copy the value for use in further investigation
46
46
- Update the query to extend a JSON field to a new column
@@ -64,18 +64,18 @@ You can use the link to incident feature to add advanced hunting query results t
64
64
You can also select **Link to an existing incident** to add the selected records to an existing incident. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the incident you want.<br>
65
65
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
66
66
4. For either selection, provide the following details, then select **Next**:
67
-
- **Alert title** – a descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
68
-
- **Severity** – choose the severity applicable to the group of alerts
69
-
- **Category** – choose the appropriate threat category for the alerts
70
-
- **Description** – give a helpful description of the grouped alerts
71
-
- **Recommended actions** – list the recommended remediation actions for the security analysts who are investigating the incident
67
+
- **Alert title** – A descriptive title for the results that your incident responders can understand; this descriptive title becomes the alert title
68
+
- **Severity** – Choose the severity applicable to the group of alerts
69
+
- **Category** – Choose the appropriate threat category for the alerts
70
+
- **Description** – Give a helpful description of the grouped alerts
71
+
- **Recommended actions** – List the recommended remediation actions for the security analysts who are investigating the incident
72
72
5. In the **Entities** section, select the entities that are involved in the suspicious events. Those entities are used to correlate other alerts to the linked incident and are visible from the incident page.
73
73
74
74
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
75
75
76
76
There are two sections for which you can select entities:
77
77
78
-
a. **Impacted assets** – impacted assets that appear in the selected events should be added here. The following types of assets can be added:
78
+
a. **Impacted assets** – Impacted assets that appear in the selected events should be added here. The following types of assets can be added:
79
79
- Account
80
80
- Device
81
81
- Mailbox
@@ -84,7 +84,7 @@ You can use the link to incident feature to add advanced hunting query results t
84
84
- Amazon Web Services resource
85
85
- Google Cloud Platform resource
86
86
87
-
b. **Related evidence** – non-assets that appear in the selected events can be added in this section. The supported entity types are:
87
+
b. **Related evidence** – Non-assets that appear in the selected events can be added in this section. The supported entity types are:
88
88
- Process
89
89
- File
90
90
- Registry value
@@ -112,7 +112,7 @@ You can use the link to incident feature to add advanced hunting query results t
112
112
113
113
6. Select **Next**.
114
114
7. Review the details you've provided in the Summary section.
115
-
8.Select **Done**.
115
+
8.Select **Done**.
116
116
117
117
### View linked records in the incident
118
118
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
@@ -127,6 +127,7 @@ You can also select the event from the timeline view or from the query results v
127
127
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
128
128
129
129
### Filter for events added using advanced hunting
130
-
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
130
+
131
+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source.
131
132
132
133
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-link-to-incident.md
+15-14Lines changed: 15 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,29 +37,28 @@ You can use the link to incident feature to add advanced hunting query results t
37
37
38
38
1. In the advanced hunting query page, first enter your query in the query field provided then select **Run query** to get your results.
39
39
40
-
:::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1.png":::
40
+
:::image type="content" source="/defender/media/link-to-incident-1.png" alt-text="Screenshot of the advanced hunting page in the Microsoft Defender portal." lightbox="/defender/media/link-to-incident-1.png":::
41
41
42
42
2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
43
43
44
-
:::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/link-to-incident-1b.png":::
44
+
:::image type="content" source="/defender/media/link-to-incident-1b.png" alt-text="Screenshot of the link to incident feature in advanced hunting in the Microsoft Defender portal." lightbox="/defender/media/link-to-incident-1b.png":::
45
45
46
46
3. Find the **Alert details** section in the Link to incident pane, then select **Create new incident** to convert the events to alerts and group them to a new incident:
47
-
48
-
47
+
49
48
Or select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
50
49
51
-
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link4.png":::
50
+
:::image type="content" source="/defender/media/advanced-hunting-results-link4.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link4.png":::
52
51
53
52
4. For either selection, provide the following details, then select **Next**:
54
-
-**Alert title** - provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
53
+
-**Alert title** - Provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
55
54
-**Severity** - Choose the severity applicable to the group of alerts.
56
55
-**Category** - Choose the appropriate threat category for the alerts.
57
56
-**Description** - Give a helpful description for the grouped alerts.
58
57
-**Recommended actions** - Provide remediation actions.
59
58
60
59
5. In the **Entities** section, you can find which entities are used to correlate other alerts to the linked incident. They also appear in the incident page. You can review the preselected entities categorized as follows:
61
60
62
-
a. **Impacted assets** – assets impacted by the selected events, can be:
61
+
a. **Impacted assets** – Assets impacted by the selected events, can be:
63
62
- Account
64
63
- Device
65
64
- Mailbox
@@ -68,7 +67,7 @@ You can use the link to incident feature to add advanced hunting query results t
68
67
- Amazon Web Services resource
69
68
- Google Cloud Platform resource
70
69
71
-
b. **Related evidence** – non-assets that appear in the selected events. The supported entity types are:
70
+
b. **Related evidence** – Non-assets that appear in the selected events. The supported entity types are:
72
71
- Process
73
72
- File
74
73
- Registry value
@@ -83,11 +82,11 @@ You can use the link to incident feature to add advanced hunting query results t
83
82
6. After an entity type is selected, select an identifier type that exists in the selected records so that it can be used to identify this entity. Each entity type has a list of supported identifiers, as can be seen in the relevant drop down. Read the description displayed when hovering on each identifier to better understand it.
84
83
7. After selecting the identifier, select a column from the query results that contain the selected identifier. You can select **Explore query and results** to open the advanced hunting context panel. This allows you to explore your query and results to make sure you chose the right column for the selected identifier.
85
84
<br>
86
-
:::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
85
+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-identifier.png" alt-text="Screenshot of the link to incident wizard entities branch in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-defender-results-identifier.png":::
87
86
<br>
88
87
In our example, we used a query to find events related to a possible email exfiltration incident, therefore the recipient's mailbox and recipient's account are the impacted entities, and the sender's IP as well as email message are related evidence.
89
88
90
-
:::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::
89
+
:::image type="content" source="/defender/media/advanced-hunting-defender-results-link-entities.png" alt-text="Screenshot of the link to incident wizard full entities branch in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-defender-results-link-entities.png":::
91
90
92
91
A different alert is created for each record with a unique combination of impacted entities. In our example, if there are three different recipient mailboxes and recipient object ID combinations, for instance, then three alerts are created and linked to the chosen incident.
93
92
@@ -96,18 +95,20 @@ You can use the link to incident feature to add advanced hunting query results t
96
95
8. Select **Done**.
97
96
98
97
### View linked records in the incident
98
+
99
99
You can select the generated link from the summary step of the wizard or select the incident name from the incident queue, to view the incident to which the events are linked.
100
100
101
-
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link7.png":::
101
+
:::image type="content" source="/defender/media/advanced-hunting-results-link7.png" alt-text="Screenshot of the summary step in the link to incident wizard in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link7.png":::
102
102
103
103
In our example, the three alerts, representing the three selected events, were linked successfully to a new incident.
104
104
In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and the query results view.
105
105
106
106
You can also select the event from the timeline view or from the query results view to open the **Inspect record** pane.
107
107
108
-
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link8.png":::
108
+
:::image type="content" source="/defender/media/advanced-hunting-results-link8.png" alt-text="Screenshot of the incident page in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link8.png":::
109
109
110
110
### Filter for events added using advanced hunting
111
-
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source
112
111
113
-
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-results-link9.png":::
112
+
You can view which alerts were generated from advanced hunting by filtering incidents and alerts by **Manual** detection source.
113
+
114
+
:::image type="content" source="/defender/media/advanced-hunting-results-link9.png" alt-text="Screenshot of the filter dropdown in advanced hunting in the Microsoft Defender portal." lightbox="/defender/media/advanced-hunting-results-link9.png":::
0 commit comments