Skip to content

Commit

Permalink
Merge pull request #2477 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, 01/17/25, 10:30 AM PT
  • Loading branch information
Ruchika-mittal01 authored Jan 17, 2025
2 parents ee8597b + 39b2450 commit 4f87fc9
Show file tree
Hide file tree
Showing 10 changed files with 49 additions and 68 deletions.
3 changes: 3 additions & 0 deletions defender-endpoint/respond-machine-alerts.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,6 +114,9 @@ Or, use this alternate procedure:
4. Select **Package collection package available** to download the collection package.

![Image of download package](media/download-package.png)

> [!NOTE]
> The collection of the investigation package may fail if a device has a low battery level or is on a metered connection.
### Investigation package contents for Windows devices

Expand Down
13 changes: 3 additions & 10 deletions defender-xdr/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,9 @@
- name: Investigate data loss prevention alerts with Microsoft Sentinel
href: dlp-investigate-alerts-sentinel.md
- name: Investigate and respond to container threats
href: investigate-respond-container-threats.md
href: investigate-respond-container-threats.md
- name: Investigate insider risk threats
href: irm-investigate-alerts-defender.md
- name: Configure and manage automated investigation and response
items:
- name: Overview
Expand Down Expand Up @@ -428,15 +430,6 @@
href: integrate-microsoft-365-defender-secops-use-cases.md
- name: Step 6. SOC maintenance tasks
href: integrate-microsoft-365-defender-secops-tasks.md
- name: Optimize your security operations
items:
- name: SOC optimization overview
display name: SOC optimization
href: /azure/sentinel/soc-optimization/soc-optimization-access?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
- name: Use SOC optimizations programmatically
href: /azure/sentinel/soc-optimization/soc-optimization-api?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
- name: SOC optimization reference
href: /azure/sentinel/soc-optimization/soc-optimization-reference?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
- name: Manage multitenant environments
items:
- name: Overview
Expand Down
7 changes: 4 additions & 3 deletions defender-xdr/configure-email-notifications.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ ms.collection:
- tier2
ms.topic: conceptual
search.appverid: met150
ms.date: 07/08/2024
ms.date: 01/17/2025
---

# Configure alert notifications
Expand Down Expand Up @@ -43,9 +43,10 @@ If you're using role-based access control (RBAC), recipients will only receive n
The email notification includes basic information about the alert and a link to the portal where you can do further investigation.

## Create rules for alert notifications

You can create rules that determine the devices and alert severities to send email notifications for and the notification recipients.

1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.

2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Email notifications**.

Expand Down Expand Up @@ -102,5 +103,5 @@ This section lists various issues that you may encounter when using email notifi
- [Update data retention settings](/defender-endpoint/preferences-setup)
- [Configure advanced features](/defender-endpoint/advanced-features)
- [Configure vulnerability email notifications](/defender-endpoint/configure-vulnerability-email-notifications)
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
4 changes: 2 additions & 2 deletions defender-xdr/faq-managed-response.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ ms.custom:
- cx-ti
- cx-dex
search.appverid: met150
ms.date: 01/16/2025
ms.date: 01/17/2025
---

# Understanding Managed response
Expand All @@ -30,7 +30,7 @@ The following section lists down questions you or your SOC team might have regar
| Questions | Answers |
|---------|---------|
|**What is Managed response?** | Microsoft Defender Experts for XDR offers **Managed response** where our experts manage the entire remediation process for incidents that require them. This process includes investigating the incident to identify the root cause, determining the required response actions, and taking those actions on your behalf.|
|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Coming soon)*<ul><li>Disable user<br><li>Enable user<br><li>Revoke refresh token<br><li>Soft delete emails</ul> |
|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Available now)*<ul><li>Disable user<br><li>Enable user</ul><br>*For users (Coming soon)*<ul><li>Revoke refresh token<br><li>Soft delete emails</ul> |
|**Can I customize the extent of Managed response?** | You can configure the extent to which our experts do Managed response actions on your behalf by excluding certain devices and users (individually or by groups) either during onboarding or later by modifying your service's settings. [Read more about excluding device groups](get-started-xdr.md#exclude-devices-and-users-from-remediation) |
|**What support do Defender Experts offer for excluded assets?** | If our experts determine that you need to perform response actions on excluded devices or users, we notify you through various customizable methods and direct you to your Microsoft Defender XDR portal. From your portal, you can then view a detailed summary of our investigation process and the required response actions in the portal and perform these required actions directly. Similar capabilities are also available through Defender APIs, in case you prefer using a security information and event management (SIEM), IT service management (ITSM), or any other third-party tool. |
|**How am I going to be informed about the response actions?** | Response actions that our experts have completed on your behalf and any pending ones that you need to perform on your excluded assets are displayed in the **Managed response** panel in your Defender portal's **Incidents** page. <br><br>In addition, you'll also receive an email containing a link to the incident and instructions to view the Managed response in the portal. Moreover, if you have integration with Microsoft Sentinel or APIs, you'll also be notified within those tools by looking for Defender Experts statuses. For more information, see [FAQs related to Microsoft Defender Experts for XDR incident notifications](faq-incident-notifications-xdr.md).|
Expand Down
26 changes: 10 additions & 16 deletions defender-xdr/m365d-notifications-incidents.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,20 +16,18 @@ ms.topic: conceptual
search.appverid:
- MOE150
- MET150
ms.date: 07/08/2024
ms.date: 01/17/2025
appliesto:
- Microsoft Defender XDR
---

# Get incident notifications by email

[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]

**Applies to:**

- Microsoft Defender XDR

[!INCLUDE [Prerelease](../includes/prerelease.md)]

You can set up Microsoft Defender XDR to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
You can set up email notifications for your staff to get notified about new incidents or updates to existing incidents. You can choose to get notifications based on:

- Alert severity
- Alert sources
Expand Down Expand Up @@ -59,32 +57,28 @@ Likewise, if your organization is using role-based access control (RBAC), you ca

Follow these steps to create a new rule and customize email notification settings.

1. Go to [Microsoft Defender XDR](https://security.microsoft.com) in the navigation pane, select **Settings > Microsoft Defender XDR > Incident email notifications**.
2. Select **Add item**.
1. Go to the [Microsoft Defender portal](https://security.microsoft.com). In the navigation pane, select **Settings > Microsoft Defender XDR**, then select **Email notifications** under General.
2. In the **Incidents** tab, select **Add incident notification rule**.
3. On the **Basics** page, type the rule name and a description, and then select **Next**.
4. On the **Notification settings** page, configure:
- **Alert severity** - Choose the alert severities that will trigger an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
- **Alert severity** - Choose the alert severities that triggers an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
- **Device group scope** - You can specify all device groups or select from the list of device groups in your tenant.
- **Send only one notification per incident** - Select if you want one notification per incident.
- **Include organization name in the email** - Select if you want your organization name to appear in the email notification.
- **Include tenant-specific portal link** - Select if you want to add a link with the tenant ID in the email notification for access to a specific Microsoft 365 tenant.

:::image type="content" source="/defender/media/get-incident-notifications/incidents-email-notification-settings.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="/defender/media/get-incident-notifications/incidents-email-notification-settings.png":::
:::image type="content" source="/defender/media/get-incident-notifications/incident-notif-settings-small.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="/defender/media/get-incident-notifications/incident-notif-settings.png":::

5. Select **Next**. On the **Recipients** page, add the email addresses that will receive the incident notifications. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
5. Select **Next**. On the **Recipients** page, add the email addresses where the incident notifications are to be sent. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
6. Select **Next**. On the **Review rule** page, review the settings of the rule, and then select **Create rule**. Recipients will start receiving incident notifications through email based on the settings.

To edit an existing rule, select it from the list of rules. On the pane with the rule name, select **Edit rule** and make your changes on the **Basics**, **Notification settings**, and **Recipients** pages.

To delete a rule, select it from the list of rules. On the pane with the rule name, select **Delete**.

Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md).
Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents](investigate-incidents.md).

## Next steps

- [Get email notifications on response actions](m365d-response-actions-notifications.md)
- [Get email notifications about new reports in Threat analytics](m365d-threat-analytics-notifications.md)

## See also

- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)
20 changes: 9 additions & 11 deletions defender-xdr/m365d-response-actions-notifications.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Get email notifications for response actions in Microsoft Defender XDR
title: Get email notifications for response actions
description: Set up email notifications to get notified of manual and automated response actions in Microsoft Defender XDR.
ms.service: defender-xdr
f1.keywords:
Expand All @@ -16,24 +16,22 @@ ms.topic: conceptual
search.appverid:
- MOE150
- MET150
ms.date: 07/08/2024
ms.date: 01/17/2025
appliesto:
- Microsoft Defender XDR
---

# Get email notifications for response actions in Microsoft Defender XDR
# Get email notifications for response actions

[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]

**Applies to:**

- Microsoft Defender XDR

[!INCLUDE [Prerelease](../includes/prerelease.md)]

You can set up Microsoft Defender XDR to notify you through email about manual or automated response actions.
You can set up email notifications in the Microsoft Defender portal to notify you about manual or automated response actions.

[Manual response actions](respond-first-incident-remediate.md#manual-remediation) are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.
Manual response actions are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.

[Automated response actions](respond-first-incident-remediate.md#automatic-remediation), on the other hand, are capabilities in Microsoft Defender XDR that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).
Automated response actions are capabilities in Microsoft Defender XDR that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).

> [!NOTE]
> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. Likewise, if your organization is using [role-based access control (RBAC)](manage-rbac.md), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
Expand All @@ -48,7 +46,7 @@ You can set up Microsoft Defender XDR to notify you through email about manual o
To create a rule for email notifications, perform the following steps:

1. In the navigation pane of Microsoft Defender XDR, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
1. In the navigation pane of the Microsoft Defender portal, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
:::image type="content" source="/defender/media/m35d-response-actions-notifications/fig1-response-notifications.png" alt-text="Actions tab in the Microsoft Defender XDR Settings page" lightbox="/defender/media/m35d-response-actions-notifications/fig1-response-notifications.png":::
2. Select **Add notification rule**. Add a rule name and description under Basics. Both Name and Description fields accept letters, numbers, and spaces only.
:::image type="content" source="/defender/media/m35d-response-actions-notifications/fig2-response-notifications.png" alt-text="Basics section of the add notification rule" lightbox="/defender/media/m35d-response-actions-notifications/fig2-response-notifications.png":::
Expand Down
Loading

0 comments on commit 4f87fc9

Please sign in to comment.