You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/eval-defender-investigate-respond-additional.md
+9-27Lines changed: 9 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,10 +36,10 @@ Once you have performed an [incident response for a simulated attack](eval-defen
36
36
37
37
|Capability |Description |
38
38
|:-------|:-----|
39
-
|[Prioritize incidents](#prioritize-incidents)| Use filtering and sorting of the incidents queue to determine which incidents to address next. |
40
-
|[Manage incidents](#manage-incidents)| Modify incident properties to ensure correct assignment, add tags and comments, and to resolve an incident. |
41
-
|[Automated investigation and response](#examine-automated-investigation-and-response-with-the-action-center)|Automated investigation and response (AIR) capabilities that can help your security operations team address threats more efficiently and effectively. The Action center is a "single pane of glass" experience for incident and alert tasks such as approving pending remediation actions. |
42
-
|[Advanced hunting](#advanced-hunting)|A query-based threat-hunting tool that lets you proactively inspect events in your network and locate threat indicators and entities. You also use advanced hunting during the investigation and remediation of an incident. |
39
+
|[Prioritizing incidents](#prioritize-incidents)| Use filtering and sorting of the incidents queue to determine which incidents to address next. |
40
+
|[Managing incidents](#manage-incidents)| Modify incident properties to ensure correct assignment, add tags and comments, and to resolve an incident. |
41
+
|[Automated investigation and response](#examine-automated-investigation-and-response-with-the-action-center)|Use automated investigation and response (AIR) capabilities to help your security operations team address threats more efficiently and effectively. The Action center is a "single pane of glass" experience for incident and alert tasks such as approving pending remediation actions. |
42
+
|[Advanced hunting](#use-advanced-hunting)|Use queries to proactively inspect events in your network and locate threat indicators and entities. You also use advanced hunting during the investigation and remediation of an incident. |
43
43
44
44
45
45
## Prioritize incidents
@@ -56,7 +56,7 @@ To examine the list of incidents and prioritize their importance for assignment
56
56
57
57
- Use filtering to focus on a specific scenario or threat. Applying filters on the incident queue can help determine which incidents require immediate attention.
58
58
59
-
From the default incident queue, select **Filters** to see a **Filters** pane, from which you can specify a specific set of incidents. Here is an example.
59
+
From the default incident queue, select **Filters** to see a **Filters** pane, from which you can specify a specific set of incidents. Here's an example.
60
60
61
61
:::image type="content" source="../../media/incidents-queue/incidents-ss-incidents-filters.png" alt-text="Example of the filters pane for the incident queue.":::
62
62
@@ -83,9 +83,9 @@ Here are the ways you can manage your incidents:
83
83
84
84
Add tags that your security team uses to classify incidents, which can be later filtered.
85
85
86
-
- Assign the incident to yourself
86
+
- Assign the incident
87
87
88
-
Assign it to your user account name, which can be later filtered.
88
+
Assign it to a user account name, which can be later filtered.
89
89
90
90
- Resolve an incident
91
91
@@ -117,7 +117,7 @@ Approve (or reject) pending actions as soon as possible so that your automated i
117
117
118
118
For more information, see [Automated investigation and response](m365d-autoir.md) and [Action center](m365d-action-center.md).
119
119
120
-
## Advanced hunting
120
+
## Use advanced hunting
121
121
122
122
> [!NOTE]
123
123
> Before we walk you through the advanced hunting simulation, watch the following video to understand advanced hunting concepts, see where you can find it in the portal, and know how it can help you in your security operations.
@@ -187,7 +187,7 @@ There's a single internal mailbox and device required for this simulation. You'l
187
187
> [!NOTE]
188
188
> Advanced hunting displays query results as tabular data. You can also opt to view the data in other format types such as charts.
189
189
190
-
1. Look at the results and see if you can identify the email you opened. It may take up to two hours for the message to show up in advanced hunting. To narrow down the results, you can add the **where** condition to your query to only look for emails that have "yahoo.com" as their SenderMailFromDomain. Here is an example.
190
+
1. Look at the results and see if you can identify the email you opened. It may take up to two hours for the message to show up in advanced hunting. To narrow down the results, you can add the **where** condition to your query to only look for emails that have "yahoo.com" as their SenderMailFromDomain. Here's an example.
191
191
192
192
```console
193
193
EmailEvents
@@ -289,24 +289,6 @@ Custom detections will run the query according to the frequency you set, and the
289
289
290
290

291
291
292
-
<!--
293
-
294
-
### Advanced hunting walk-through exercises
295
-
296
-
To learn more about advanced hunting, the following webcasts will walk you through the capabilities of advanced hunting within Microsoft 365 Defender to create cross-pillar queries, pivot to entities, and create custom detections and remediation actions.
297
-
298
-
> [!NOTE]
299
-
> Be prepared with your own GitHub account to run the hunting queries in your pilot test lab environment.
300
-
301
-
|Title|Description|Download MP4|Watch on YouTube|CSL file to use|
302
-
|---|---|---|---|---|
303
-
|Episode 1: KQL fundamentals|We'll cover the basics of advanced hunting capabilities in Microsoft 365 Defender. Learn about available advanced hunting data and basic KQL syntax and operators.|[MP4](https://aka.ms/MTP15JUL20_MP4)|[YouTube](https://youtu.be/0D9TkGjeJwM)|[Episode 1: CSL file in Git](https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%201%20-%20KQL%20Fundamentals.csl)|
304
-
|Episode 2: Joins|We'll continue learning about data in advanced hunting and how to join tables together. Learn about inner, outer, unique, and semi joins, and the nuances of the default Kusto innerunique join.|[MP4](https://aka.ms/MTP22JUL20_MP4)|[YouTube](https://youtu.be/LMrO6K5TWOU)|[Episode 2: CSL file in Git](https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%202%20-%20Joins.csl)|
305
-
|Episode 3: Summarizing, pivoting, and visualizing data|Now that we're able to filter, manipulate, and join data, it's time to start summarizing, quantifying, pivoting, and visualizing. In this episode, we'll cover the summarize operator and some of the calculations you can perform while diving into additional tables in the advanced hunting schema. We turn our datasets into charts that can help improve analysis.|[MP4](https://aka.ms/MTP29JUL20_MP4)|[YouTube](https://youtu.be/UKnk9U1NH6Y)|[Episode 3: CSL file in Git](https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%203%20-%20Summarizing%2C%20Pivoting%2C%20and%20Joining.csl)|
306
-
|Episode 4: Let's hunt! Applying KQL to incident tracking|Time to track some attacker activity! In this episode, we'll use our improved understanding of KQL and advanced hunting in Microsoft 365 Defender to track an attack. Learn some of the tips and tricks used in the field to track attacker activity, including the ABCs of cybersecurity and how to apply them to incident response.|[MP4](https://aka.ms/MTP5AUG20_MP4)|[YouTube](https://youtu.be/2EUxOc_LNd8)|[Episode 4: CSL file in Git](https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%204%20-%20Lets%20Hunt.csl)|
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Run an attack simulation in a Microsoft 365 Defender pilot environment
3
-
description: Run attack simulations for Microsoft 365 Defender to see how how alerts and incidents are presented, insights are gained, and threats are quickly remediated.
3
+
description: Run attack simulations for Microsoft 365 Defender to see how alerts and incidents are presented, insights are gained, and threats are quickly remediated.
4
4
search.product: eADQiWindows 10XVcnh
5
5
search.appverid: met150
6
6
ms.prod: m365-security
@@ -57,15 +57,15 @@ Defender for Office 365 with Microsoft 365 E5 or Microsoft Defender for Office 3
57
57
58
58
1. Create a simulation
59
59
60
-
For step by step instructions on how to create and send a new simulation, see [Simulate a phishing attack](/microsoft-365/security/office-365-security/attack-simulation-training).
60
+
For step by step instructions on how to create and launch a new simulation, see [Simulate a phishing attack](/microsoft-365/security/office-365-security/attack-simulation-training).
61
61
62
62
2. Create a payload
63
63
64
-
For step by step instructions on how to create a payload for use within a simulation, see [Create a custom payload for Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payloads).
64
+
For step by step instructions on how to create a payload for use within a simulation, see [Create a custom payload for attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payloads).
65
65
66
66
3. Gaining insights
67
67
68
-
For step by step instructions on how to gain insights with reporting, see [Gain insights through Attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-insights).
68
+
For step by step instructions on how to gain insights with reporting, see [Gain insights through attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-insights).
@@ -78,15 +78,15 @@ Here are the Defender for Endpoint simulations from Microsoft:
78
78
- Document drops backdoor
79
79
- Automated investigation (backdoor)
80
80
81
-
There are additional simulations from Attack IQ and SafeBreach. There are also a set of tutorials.
81
+
There are additional simulations from third-party sources. There are also a set of tutorials.
82
82
83
83
For each simulation or tutorial:
84
84
85
-
1. Download and read the corresponding walkthrough document provided with your selected simulation or scenario.
85
+
1. Download and read the corresponding walk-through document provided.
86
86
87
87
2. Download the simulation file. You can choose to download the file or script on the test device but it's not mandatory.
88
88
89
-
3. Run the simulation file or script on the test device as instructed in the walkthrough document.
89
+
3. Run the simulation file or script on the test device as instructed in the walk-through document.
90
90
91
91
For more information, see [Experience Microsoft Defender for Endpoint through simulated attack](/microsoft-365/security/defender-endpoint/attack-simulations).
92
92
@@ -317,11 +317,11 @@ After the investigation is complete and confirmed to be remediated, you resolve
317
317
318
318
From the **Incident** page, select **Manage incident**. Set the status to **Resolve incident** and select **True alert** for the classification and **Security testing** for the determination.
319
319
320
-

320
+

321
321
322
322
When the incident is resolved, it resolves all of the associated alerts in the Microsoft 365 Defender portal and the related portals.
323
323
324
-
This wraps up the attack simulation for incident analysis, automated investigation, and incident resolution.
324
+
This wraps up attack simulations for incident analysis, automated investigation, and incident resolution.
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/eval-defender-investigate-respond.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,11 +36,11 @@ Use the following steps.
36
36
37
37
The following table describes the steps in the illustration.
38
38
39
-
||Step |Description |
40
-
|---------|---------|---------|
41
-
|1|[Simulate attacks](eval-defender-investigate-respond-simulate-attack.md)| Simulate attacks on your evaluation environment and use the Microsoft 365 Defender portal to perform incident response. |
42
-
|2|[Try incident response capabilities ](eval-defender-investigate-respond-additional.md)| Try features and capabilities in Microsoft 365 Defender. |
43
-
||||
39
+
|Step |Description |
40
+
|---------|---------|
41
+
| 1. [Simulate attacks](eval-defender-investigate-respond-simulate-attack.md)| Simulate attacks on your evaluation environment and use the Microsoft 365 Defender portal to perform incident response. |
42
+
| 2. [Try incident response capabilities ](eval-defender-investigate-respond-additional.md)| Try additional incident response features and capabilities in Microsoft 365 Defender. |
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/first-incident-analyze.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ Analysts then initiate investigations based on the **Priority** criteria set by
60
60
61
61
Incident prioritization might vary depending on the organization. NIST recommends also considering the functional and informational impact of the incident, and recoverability.
62
62
63
-
The following is just one approach to triage:
63
+
The following is just one approach to triage to consider:
64
64
65
65
1. Go to the [incidents](incidents-overview.md) page to initiate triage. Here you can see a list of incidents affecting your organization. By default, they are arranged from the most recent to the oldest incident. From here, you can also see different columns for each incident showing their severity, category, number of active alerts, and impacted entities, among others. You can customize the set of columns and sort the incident queue by some of these columns by selecting the column name. You can also filter the incident queue according to your needs. For a full list of available filters, see [Prioritize incidents](incident-queue.md#available-filters).
66
66
@@ -90,19 +90,19 @@ The following is just one approach to triage:
90
90
91
91
## Analyze your first incident
92
92
93
-
Understanding the context surrounding alerts is equally important. Often an alert is not a single independent event. There is a chain of processes created, commands, and actions that might not have occurred at the same time. Therefore, an analyst must look for the first and last activities of the suspicious entity in device timelines to understand the context of the alerts.
93
+
Understanding the context surrounding alerts is equally important. Often an alert is not a single independent event. There is a chain of processes created, commands, and actions that might not have occurred at the same time. Therefore, you must look for the first and last activities of the suspicious entity in device timelines to understand the context of the alerts.
94
94
95
95
There are multiple ways to read and analyze data using Microsoft 365 Defender but the end goal for analysts is to respond to incidents as quickly as possible. While Microsoft 365 Defender can significantly reduce [Mean Time to Remediate (MTTR)](https://www.microsoft.com/security/blog/2020/05/04/lessons-learned-microsoft-soc-part-3c/) through the industry-leading [automated investigation and response](m365d-autoir.md) feature, there are always cases that require manual analysis.
96
96
97
97
Here's an example:
98
98
99
-
1. Once triage priority has been determined, an analyst begins an in-depth analysis by selecting the incident name. This page brings up the **Incident Summary** where data is displayed in tabs to assist with the analysis. Under the **Alerts** tab, the type of alerts are displayed. Analysts can click on each alert to drill down into the respective detection source.
99
+
1. Once triage priority has been determined, you can begin an in-depth analysis by selecting the incident name. This page brings up the **Incident Summary** where data is displayed in tabs to assist with the analysis. Under the **Alerts** tab, the type of alerts are displayed. Analysts can click on each alert to drill down into the respective detection source.
100
100
101
101
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-summary-tab.png" alt-text="Example of the Summary tab of an incident.":::
102
102
103
103
For a quick guide about which domain each detection source covers, review the [Detect](#detection-by-microsoft-365-defender) section of this article.
104
104
105
-
2. From the **Alerts** tab, an analyst can pivot to the detection source to conduct a more in-depth investigation and analysis. For example, selecting Malware Detection with Microsoft Defender for Cloud Apps as the detection source takes the analyst to its corresponding alert page.
105
+
2. From the **Alerts** tab, you can pivot to the detection source to conduct a more in-depth investigation and analysis. For example, selecting Malware Detection with Microsoft Defender for Cloud Apps as the detection source takes the analyst to its corresponding alert page.
106
106
107
107
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-select-alert.png" alt-text="Example of selecting an alert of an incident.":::
108
108
@@ -120,7 +120,7 @@ Here's an example:
120
120
121
121
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-mcas-alert.png" alt-text="Example of alerts details for Microsoft Defender for Cloud Apps .":::
122
122
123
-
6. By selecting other alerts, an analyst can get a complete picture of the attack.
123
+
6. By selecting other alerts, you can get a complete picture of the attack.
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/first-incident-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ ms.technology: m365d
32
32
33
33
An organization's incident response strategy determines its ability to deal with increasingly disruptive security incidents and cybercrime. While taking preventative measures is important, the ability to act quickly to contain, eradicate, and recover from detected incidents can minimize damage and business losses.
34
34
35
-
This incident response walkthrough shows how you, as part of a security operations team, can perform most of the key incident response steps within Microsoft 365 Defender. Here are the steps:
35
+
This incident response walkthrough shows how you, as part of a security operations (SecOps) team, can perform most of the key incident response steps within Microsoft 365 Defender. Here are the steps:
36
36
37
37
- Preparation of your security posture
38
38
- For each incident:
@@ -42,7 +42,7 @@ This incident response walkthrough shows how you, as part of a security operatio
42
42
43
43
A security incident is defined by National Institute of Standards and Technology (NIST) as "an occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system; or the information the system processes, stores, or transmits; or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies."
44
44
45
-
Incidents in Microsoft 365 Defender are the logical starting points for analysis and incident response. Analyzing and remediating incidents typically makes up most of a security operations team's tasks.
45
+
Incidents in Microsoft 365 Defender are the logical starting points for analysis and incident response. Analyzing and remediating incidents typically makes up most of a (SecOps) team's tasks and time.
Copy file name to clipboardExpand all lines: microsoft-365/security/defender/first-incident-post.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ By mapping alerts to this industry framework, you can:
42
42
- Identify skill gaps in attack method awareness.
43
43
- Create a Power Automate Playbook for faster remediation.
44
44
45
-
Post-incident review activity can also result in fine-tuning your security configuration and security team's processes, enhancing your organization’s response capabilities.
45
+
Post-incident review activity can also result in fine-tuning your security configuration and security team's processes to streamline your organization’s response capabilities.
0 commit comments