Skip to content

Commit dc71966

Browse files
committed
uploaded dashboard images
1 parent 15847bd commit dc71966

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

docs/integrations/microsoft-azure/azure-security-microsoft-defender-for-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1010

1111
The Azure Security – Microsoft Defender for Identity app enhances endpoint protection by centralising alert data from various devices, enabling faster detection, investigation, and response to cyber threats. It uses advanced analytics and threat intelligence to identify malicious behaviour and high-risk activity. With detailed dashboards and visualisations, it helps security teams track recurring incidents, assess vulnerabilities, and reduce response time, offering a comprehensive view of your organisation’s endpoint security posture.
1212

13-
::note
14-
This app includes [built-in monitors](#azure-security---microsoft-defender-for-identity-alerts). For details on creating custom monitors, refer to [Create monitors for Azure Security - Microsoft Defender for Identity app](#create-monitors-for-azure-security---microsoft-defender-for-identity-app)
13+
:::info
14+
This app includes [built-in monitors](#azure-security---microsoft-defender-for-identity-alerts). For details on creating custom monitors, refer to [Create monitors for Azure Security - Microsoft Defender for Identity app](#create-monitors-for-azure-security---microsoft-defender-for-identity-app).
1515
:::
1616

1717
## Log types
@@ -209,7 +209,7 @@ The **Azure Security - Microsoft Defender for Identity - Overview** dashboard pr
209209
Security teams can easily identify dominant alert categories, monitor the most recent alerts for immediate action, and track analyst assignments to ensure accountability. The dashboard also highlights top users associated with alerts, helping detect insider threats or compromised accounts that may require deeper investigation.
210210

211211
Geo-location mapping adds another layer of insight by showing the origin of alerts, supporting region-specific risk assessments. By combining historical trends with real-time visibility, the dashboard enables security teams to focus on high-impact threats and improve response times.
212-
<br/><img src='' alt="Azure Security - Microsoft Defender for Identity - Overview" />
212+
<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure-Security-Microsoft-Defender-for-Identity/Azure-Security-Microsoft-Defender-for-Identity-Overview.png' alt="Azure Security - Microsoft Defender for Identity - Overview" />
213213

214214
### Security
215215

@@ -220,7 +220,7 @@ Geo-location insights spotlight alerts originating from high-risk regions, suppo
220220
Additionally, it ranks the most frequently attacked devices and highlights countries linked to malicious or suspicious IP activity, offering clear insight into the most vulnerable assets and regions. This intelligence allows for more focused defences and faster, more effective threat mitigation.
221221

222222
By integrating trend analysis, threat origin mapping, and user risk profiling, the Security dashboard empowers analysts to detect emerging patterns, respond proactively, and strengthen the organisation’s resilience against sophisticated endpoint threats.
223-
<br/><img src='' alt="Azure Security - Microsoft Defender for Identity - Security" />
223+
<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure-Security-Microsoft-Defender-for-Identity/Azure-Security-Microsoft-Defender-for-Identity-Security.png' alt="Azure Security - Microsoft Defender for Identity - Security" />
224224

225225
## Create monitors for Azure Security - Microsoft Defender for Identity app
226226

@@ -236,13 +236,13 @@ import CreateMonitors from '../../reuse/apps/create-monitors.md';
236236
| `High Severity Alerts` | This alert is triggered when a high-severity threat is detected, allowing you to promptly monitor and respond to potentially harmful events that may compromise endpoint security. It ensures critical incidents are prioritised for swift investigation and mitigation. | Critical | Count > 0|
237237
| `Embargoed Device` | This alert is triggered when a single device generates multiple alerts, indicating potentially malicious behaviour. It helps you identify high-risk devices, monitor suspicious activity more effectively, and take swift action to prevent further compromise. | Critical | Count > 5 |
238238

239-
## Upgrade/Downgrade the Azure Security - Microsoft Defender for Office 365 app (Optional)
239+
## Upgrade/Downgrade the Azure Security - Microsoft Defender for Identity app (Optional)
240240

241241
import AppUpdate from '../../reuse/apps/app-update.md';
242242

243243
<AppUpdate/>
244244

245-
## Uninstalling the Azure Security - Microsoft Defender for Office 365 app (Optional)
245+
## Uninstalling the Azure Security - Microsoft Defender for Identity app (Optional)
246246

247247
import AppUninstall from '../../reuse/apps/app-uninstall.md';
248248

sidebars.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2240,7 +2240,7 @@ integrations: [
22402240
'integrations/microsoft-azure/kubernetes',
22412241
'integrations/microsoft-azure/azure-security-advisor',
22422242
'integrations/microsoft-azure/azure-security-defender-for-cloud',
2243-
'integrations/microsoft-azure/Azure Security - Microsoft Defender for Identity',
2243+
'integrations/microsoft-azure/azure-security-microsoft-defender-for-identity',
22442244
'integrations/microsoft-azure/azure-security-microsoft-defender-for-office-365',
22452245
'integrations/microsoft-azure/microsoft-defender-for-cloud-apps',
22462246
'integrations/microsoft-azure/microsoft-defender-for-endpoint',

0 commit comments

Comments
 (0)