Skip to content

Commit

Permalink
Merge pull request #1806 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, 11/05, 11:00 AM IST
  • Loading branch information
aditisrivastava07 authored Nov 5, 2024
2 parents 699e1d2 + 4e6ec31 commit 90e19e2
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
4 changes: 2 additions & 2 deletions defender-office-365/mdo-sec-ops-guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ For a video about this information, see <https://youtu.be/eQanpq9N1Ps>.

### Monitor the Microsoft Defender XDR Incidents queue

The **Incidents** page in the Microsoft Defender portal at <https://security.microsoft.com/incidents-queue> (also known as the _Incidents queue_) allows you to manage and monitor events from the following sources in Defender for Office 365:
The **Incidents** page in the Microsoft Defender portal at <https://security.microsoft.com/incidents> (also known as the _Incidents_ queue) allows you to manage and monitor events from the following sources in Defender for Office 365:

- [Alerts](/purview/alert-policies#default-alert-policies).
- [Automated investigation and response (AIR)](air-about.md).
Expand All @@ -64,7 +64,7 @@ Incident queue management and the responsible personas are described in the foll

|Activity|Cadence|Description|Persona|
|---|---|---|---|
|Triage incidents in the Incidents queue at <https://security.microsoft.com/incidents-queue>.|Daily|Verify that all **Medium** and **High** severity incidents from Defender for Office 365 are triaged.|Security Operations Team|
|Triage incidents in the Incidents queue at <https://security.microsoft.com/incidents>.|Daily|Verify that all **Medium** and **High** severity incidents from Defender for Office 365 are triaged.|Security Operations Team|
|Investigate and take Response actions on incidents.|Daily|Investigate all incidents and actively take the recommended or manual response actions.|Security Operations Team|
|Resolve incidents.|Daily|If the incident has been remediated, resolve the incident. Resolving the incident resolves all linked and related active alerts.|Security Operations Team|
|Classify incidents.|Daily|Classify incidents as true or false. For true alerts, specify the threat type. This classification helps your security team see threat patterns and defend your organization from them.|Security Operations Team|
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ appliesto:

[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]

An [incident](/defender-xdr/incidents-overview) in Microsoft Defender XDR is a collection of correlated alerts and associated data that define the complete story of an attack. Defender for Office 365 [alerts](/purview/alert-policies#default-alert-policies), [automated investigation and response (AIR)](air-about.md#the-overall-flow-of-air), and the outcome of the investigations are natively integrated and correlated on the **Incidents** page in Microsoft Defender XDR at <https://security.microsoft.com/incidents>. We refer to this page as the _Incidents queue_.
An [incident](/defender-xdr/incidents-overview) in Microsoft Defender XDR is a collection of correlated alerts and associated data that define the complete story of an attack. Defender for Office 365 [alerts](/purview/alert-policies#default-alert-policies), [automated investigation and response (AIR)](air-about.md#the-overall-flow-of-air), and the outcome of the investigations are natively integrated and correlated on the **Incidents** page in Microsoft Defender XDR at <https://security.microsoft.com/incidents>. We refer to this page as the _Incidents_ queue.

Alerts are created when malicious or suspicious activity affects an entity (for example, email, users, or mailboxes). Alerts provide valuable insights about in-progress or completed attacks. However, an ongoing attack can affect multiple entities, which results in multiple alerts from different sources. Some built-in alerts automatically trigger AIR playbooks. These playbooks do a series of investigation steps to look for other impacted entities or suspicious activity.

Expand Down Expand Up @@ -106,7 +106,7 @@ Security teams can take wide variety of response actions on email using Defender

You can take these actions from the following locations:

- The **Evidence and response** tab from the details of the incident on the **Incidents** page** at <https://security.microsoft.com/incidents> (recommended).
- The **Evidence and response** tab from the details of the incident on the **Incidents** page at <https://security.microsoft.com/incidents> (recommended).
- **Threat Explorer** at <https://security.microsoft.com/threatexplorer>.
- The unified **Action center** at <https://security.microsoft.com/action-center/pending>.

Expand Down
2 changes: 1 addition & 1 deletion defender-office-365/safe-links-about.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ Safe Links protection by Safe Links policies is available in the following locat
> - Safe Links doesn't provide protection for URLs in Rich Text Format (RTF) email messages.
> - Safe Links supports only HTTP(S) and FTP formats.
> - Safe Links ignores S/MIME signed messages.
> - Safe Links no longer wraps URLs pointing to SharePoint Online sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
> - Safe Links no longer wraps URLs pointing to SharePoint or OneDrive sites, but the URLs are still processed by the Safe Links service. This change doesn't degrade protection. Instead, it improves the performance of loading SharePoint or OneDrive URLs.
> - Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
- **Microsoft Teams**: Safe Links protection for links in Teams conversations, group chats, or from channels.
Expand Down

0 comments on commit 90e19e2

Please sign in to comment.