Skip to content

Commit 3563cb3

Browse files
Merge pull request #5729 from MicrosoftDocs/main
[AutoPublish] main to live - 11/24 01:35 PST | 11/24 15:05 IST
2 parents be30ef3 + 723908f commit 3563cb3

File tree

3 files changed

+18
-10
lines changed

3 files changed

+18
-10
lines changed

defender-endpoint/linux-installer-script.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,13 @@ ms.collection:
1515
ms.topic: install-set-up-deploy
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/11/2025
18+
ms.date: 11/24/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
2222

2323
---
24+
2425
# Use installer script based deployment to deploy Microsoft Defender for Endpoint on Linux
2526

2627

@@ -40,7 +41,7 @@ Before you get started, see [Prerequisites for Defender for Endpoint on Linux](m
4041

4142
1. Download the onboarding package from Microsoft Defender portal by following these steps:
4243

43-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
44+
1. In the [Microsoft Defender portal](https://security.microsoft.com), expand the **System** section and select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
4445

4546
2. In the first drop-down menu, select **Linux Server** as the operating system.
4647

defender-for-identity/deploy/download-sensor.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,11 @@ This article describes how to download the Microsoft Defender for Identity class
3333
3434
1. Copy the downloaded installation package to the dedicated server or domain controller where you're installing the Defender for Identity sensor.
3535

36+
> [!Note]
37+
> To download the installation package behind a firewall or proxy server, make sure you allow network traffic to the following FQDN through TCP/443.
38+
>
39+
> sensorpackage-prd.mdi.securitycenter.microsoft.com
40+
3641
## Next step
3742

3843
> [!div class="step-by-step"]

defender-xdr/threat-analytics.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.custom:
2020
- cx-ta
2121
- seo-marvel-apr2020
2222
search.appverid: met150
23-
ms.date: 11/03/2025
23+
ms.date: 11/24/2025
2424
---
2525

2626
# Threat analytics in Microsoft Defender
@@ -62,6 +62,8 @@ To access Threat analytics in the Defender portal, you need a license for at lea
6262

6363
>[!NOTE]
6464
> The Microsoft Defender for Endpoint P1 license is an exception to this prerequisite and doesn't grant Threat analytics access.
65+
>
66+
> Microsoft Sentinel SIEM customers have access to certain Threat analytics sections or tabs only. [Learn more](/azure/sentinel/threat-analytics-sentinel)
6567
6668
The following roles and permissions are also required to access Threat analytics:
6769
- **Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
@@ -137,7 +139,7 @@ The **Overview** section provides a preview of the detailed analyst report. It a
137139
Each report includes the following details about a threat, whenever applicable or available, providing you a quick glance of what the threat is and how it might impact your organization:
138140
- **Aliases**—lists the publicly disclosed names given by other security vendors to the threat
139141
- **Origin**—shows the country or region the threat originated from
140-
- **Related intelligence**—lists other threat analytics reports that relevant or are related to the threat
142+
- **Related intelligence**—lists other threat analytics reports that are relevant or related to the threat
141143
- **Targets**—lists the countries or regions and industries targeted by the threat
142144
- **MITRE attack techniques**—lists the threat’s observed tactics, techniques, and procedures (TTPs) according to the [MITRE ATT&CK framework](https://attack.mitre.org/)
143145

@@ -148,8 +150,8 @@ Each report includes charts designed to provide information about the organizati
148150
- **Related incidents**—provides an overview of the impact of the tracked threat to your organization with the following data:
149151
- Number of active alerts and the number of active incidents they're associated with
150152
- Severity of active incidents
151-
- **Alerts over time**—shows the number of related **Active** and **Resolved** alerts over time. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should be showing alerts resolved within a few days.
152-
- **Impacted assets**—shows the number of distinct assets that currently have at least one active alert associated with the tracked threat. Alerts are triggered for mailboxes that received threat emails. Review both org- and user-level policies for overrides that cause the delivery of threat emails.
153+
- **Alerts over time**—shows the number of related **Active** and **Resolved** alerts over time. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should show alerts resolved within a few days.
154+
- **Impacted assets**—shows the number of distinct assets that currently have at least one active alert associated with the tracked threat. Alerts are triggered for mailboxes that receive threat emails. Review both org- and user-level policies for overrides that cause the delivery of threat emails.
153155

154156
#### Review security resilience and posture
155157

@@ -221,7 +223,7 @@ Threat analytics leverages and integrates various Microsoft Defender and [Micros
221223

222224
### Set up the Threat Intelligence Briefing Agent (preview)
223225

224-
You can set up the Threat Intelligence Briefing Agent to get timely, relevant threat intelligence reports with detailed technical analysis based on the latest threat actor activity and both internal and external vulnerability exposure. The agent correlates Microsoft threat data and customer signals to add critical context to threat information in a matter of minutes, saving analyst teams hours or even days spent on intelligence gathering and correlation.
226+
Set up the Threat Intelligence Briefing Agent to get timely, relevant threat intelligence reports with detailed technical analysis based on the latest threat actor activity and both internal and external vulnerability exposure. The agent correlates Microsoft threat data and customer signals to add critical context to threat information in a matter of minutes, saving analyst teams hours or even days spent on intelligence gathering and correlation.
225227

226228
Once deployed, the Threat Intelligence Briefing Agent appears as a banner at the top of the Threat analytics page.
227229

@@ -231,19 +233,19 @@ Once deployed, the Threat Intelligence Briefing Agent appears as a banner at the
231233

232234
### Set up custom detections and link them to Threat analytics reports
233235

234-
You can set up [custom detection rules](custom-detection-rules.md#2-create-new-rule-and-provide-alert-details) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
236+
Set up [custom detection rules](custom-detection-rules.md#2-create-new-rule-and-provide-alert-details) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
235237

236238
:::image type="content" source="/defender/media/threat-analytics/ta-custom-detection.png" alt-text="Screenshot of custom detection setup page with Threat analytics option highlighted." lightbox="/defender/media/threat-analytics/ta-custom-detection.png":::
237239

238240
[Learn more about creating and managing custom detections rules](custom-detection-rules.md)
239241

240242
### Set up email notifications for report updates
241243

242-
You can set up email notifications that send you updates on Threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
244+
Set up email notifications that send you updates on Threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
243245

244246
## Other report details and limitations
245247

246-
When you look at the threat analytics data, remember the following factors:
248+
When you review the threat analytics data, consider the following factors:
247249

248250
- The checklist in the **Recommended actions** tab only displays recommendations tracked in [Microsoft Secure Score](microsoft-secure-score.md). Check the **Analyst report** tab for more recommended actions that aren't tracked in Secure Score.
249251
- The recommended actions don't guarantee complete resilience and only reflect the best possible actions needed to improve it.

0 commit comments

Comments
 (0)