Skip to content

Commit b8aa4ae

Browse files
author
Ken Lawson
committed
Removed redundant H2 headings in includes
1 parent 8cb8f94 commit b8aa4ae

File tree

6 files changed

+3
-8
lines changed

6 files changed

+3
-8
lines changed

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium/1-introduction.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium.introduction
3-
title: Introduction
3+
title: Introduction to threat investigation with Microsoft Purview Audit (Premium)
44
metadata:
5-
title: Introduction
6-
description: "Introduction."
5+
title: Introduction to threat investigation with Microsoft Purview Audit (Premium)
6+
description: "Introduction to threat investigation with Microsoft Purview Audit (Premium)."
77
ms.date: 3/22/2023
88
author: wwlpublish
99
ms.author: kelawson

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium/includes/1-introduction.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Introduction to threat investigation with Microsoft Purview Audit (Premium)
21

32
You're a Security Operations Analyst working at a company that is implementing Microsoft Purview and Microsoft 365 Defender solutions. You have already implemented Microsoft Purview Audit (Standard) and used it to search the Unified Audit Log (UAL). Now you need to understand how to setup and implement Microsoft Purview Audit (Premium). Your manager has asked you to create audit log retention policies and to conduct forensic investigations.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium/includes/2-explore-microsoft-purview-audit-premium.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Explore Microsoft Purview Audit (Premium)
21

32
In the Microsoft Purview Audit (Standard) module, you learned that the Unified Audit Log (UAL) provides organizations with the ability to log and search for audited activities. It also enables an organization to power its forensic, IT, compliance, and legal investigations.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium/includes/3-implement-microsoft-purview-audit-premium.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Implement Microsoft Purview Audit (Premium)
21

32
If an organization has a subscription and end-user licensing that supports Audit (Premium), it should perform the following steps to set up and use the Audit (Premium) capabilities.
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium/includes/4-manage-audit-log-retention-policies.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Manage audit log retention policies
21

32
Organizations can create and manage audit log retention policies in the Microsoft Purview compliance portal. Audit log retention policies are part of the Microsoft Purview Audit (Premium) solution. An audit log retention policy lets an organization specify how long it wants to retain audit logs. Audit logs can be retained for up to 10 years. Retention policies can be created based on the following criteria:
43

learn-pr/wwl-sci/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-premium/includes/5-investigate-compromised-email-accounts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Investigate compromised email accounts using Purview Audit (Premium)
21

32
A compromised user account is also referred to as an account takeover. It's a type of attack where an attacker gains access to a user account and operates as the user. These types of attacks sometimes cause more damage than the attacker may have intended.
43

0 commit comments

Comments
 (0)