Skip to content

Commit a628bca

Browse files
authored
Merge pull request #5611 from sbreingold-ms/wi-440490-v2-turn-xdr-portal-into-defender-portal
wi-440490-v2-turn xdr-portal-into-defender-portal
2 parents 2698b95 + c4902af commit a628bca

24 files changed

+51
-51
lines changed

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ Assign the policies to the OU where the test machines are located.
231231

232232
#### Enable Tamper Protection
233233

234-
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
234+
In the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
235235

236236
For more information, see [How do I configure or manage tamper protection?](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
237237

defender-endpoint/ios-configure-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -430,7 +430,7 @@ Defender for Endpoint on iOS enables bulk tagging the mobile devices during onbo
430430
This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags.
431431

432432
> [!NOTE]
433-
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the XDR portal.
433+
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the Microsoft Defender portal.
434434
435435
### Configure device tags using MDM
436436

defender-endpoint/review-detected-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ appliesto:
3333

3434
In the Microsoft Defender portal, you can view and manage threat detections using the following steps:
3535

36-
1. Visit [Microsoft XDR portal](https://security.microsoft.com/) and sign-in.
36+
1. Visit the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com) and sign-in.
3737

3838
On the landing page, you see the **Devices with active malware** card with the following information:
3939

@@ -68,7 +68,7 @@ You can manage threat detections for any devices that are [enrolled in Microsoft
6868

6969
## FAQs
7070

71-
#### In the Microsoft XDR portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
71+
#### In the Microsoft Defender portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
7272

7373
To see when the malware was detected, you can take the following steps:
7474

defender-for-cloud-apps/app-governance-anomaly-detection-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For more information, see [App governance in Microsoft Defender for Cloud Apps](
2525

2626
### Finding App Governance Related Alerts
2727

28-
To locate alerts specifically related to App Governance, navigate to the XDR portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
28+
To locate alerts specifically related to App Governance, navigate to the Microsoft Defender portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
2929

3030
### General Guidelines
3131

defender-for-cloud-apps/applications-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Application inventory
33
ms.date: 03/20/2025
44
ms.topic: overview
55
ms.reviewer: anandd512
6-
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
description: The new Applications page located under Assets in the Microsoft Defender portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
77
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
88
---
99
# Applications inventory

defender-for-cloud-apps/attack-paths.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth perm
4949

5050
To view the full list of permissions, go to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Settings > Microsoft Defender XDR > Rules > Critical asset management.
5151

52-
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Defender XDR portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
52+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Microsoft Defender portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
5353

5454

5555
## Investigation user flow: View attack paths involving OAuth applications

defender-for-cloud-apps/ops-guide/ops-guide-ad-hoc.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ If you're experiencing issues with a cloud service, we recommend checking servic
2323

2424
## Run advanced hunting queries
2525

26-
**Where**: In the Microsoft Defender XDR Portal, select **Hunting > Advanced hunting** and query for Defender for Cloud Apps data.
26+
**Where**: In the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com), select **Hunting > Advanced hunting** and query for Defender for Cloud Apps data.
2727

2828
**Persona**: SOC analysts
2929

@@ -90,7 +90,7 @@ AccountDisplayName,GroupName
9090

9191
## Review file quarantines
9292

93-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Files**. Query for items where **Quarantined** = **True**.
93+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Files**. Query for items where **Quarantined** = **True**.
9494

9595
**Persona**: Compliance administrators
9696

@@ -102,7 +102,7 @@ For more information, see [Understand how quarantine works](../use-case-admin-qu
102102

103103
## Review app risk scores
104104

105-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud app catalog**.
105+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud app catalog**.
106106

107107
**Persona**: Compliance administrators
108108

@@ -114,7 +114,7 @@ For more information, see [Find your cloud app and calculate risk scores](../ris
114114

115115
## Delete cloud discovery data
116116

117-
**Where**: In the Microsoft Defender XDR Portal, select **Settings > Cloud apps > Cloud Discovery > Delete Data**.
117+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Settings > Cloud apps > Cloud Discovery > Delete Data**.
118118

119119
**Persona**: Compliance administrators
120120

@@ -129,7 +129,7 @@ For more information, see [Deleting cloud discovery data](../discovered-apps.md#
129129

130130
## Generate a cloud discovery executive report
131131

132-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard > Actions**
132+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard > Actions**
133133

134134
**Persona**: Compliance administrators
135135

@@ -139,7 +139,7 @@ For more information, see [Generate cloud discovery executive report](../discove
139139

140140
## Generate a cloud discovery snapshot report
141141

142-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard > Actions**
142+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard > Actions**
143143

144144
**Persona**: Security and Compliance administrators
145145

defender-for-cloud-apps/ops-guide/ops-guide-daily.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ For more information, see:
8383

8484
## Review threat detection data
8585

86-
**Where**: In the Microsoft Defender XDR Portal, select:
86+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
8787

8888
- **Incidents & alerts**
8989
- **Cloud apps > Policies > Policy management > Threat Detection**
@@ -107,7 +107,7 @@ Make sure to create the threat protection policies needed by your organization,
107107

108108
## Review application governance
109109

110-
**Where**: In the Microsoft Defender XDR Portal, select:
110+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
111111

112112
- **Incidents & alerts**
113113
- **Incidents & alerts / App governance**
@@ -126,7 +126,7 @@ For more information, see:
126126

127127
### Check app governance overview page
128128

129-
**Where**: In the Microsoft Defender XDR Portal, select:
129+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
130130

131131
- **Incidents & alerts**
132132
- **Cloud apps > App governance > Overview**
@@ -152,7 +152,7 @@ For more information, see:
152152

153153
### Review OAuth app data
154154

155-
**Where**: In the Microsoft Defender XDR Portal, select:
155+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
156156

157157
- **Incidents & alerts**
158158
- **Cloud apps > App governance > Microsoft 365**
@@ -169,7 +169,7 @@ For more information, see:
169169

170170
### Create and manage app governance policies
171171

172-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > App governance > Policies**
172+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > App governance > Policies**
173173

174174
**Persona**: Security administrators
175175

@@ -182,7 +182,7 @@ For more information, see:
182182

183183
## Review Conditional Access app control
184184

185-
**Where**: In the Microsoft Defender XDR Portal, select:
185+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
186186

187187
- **Incidents & alerts**
188188
- **Cloud apps > Policies > Policy Management > Conditional Access**
@@ -212,7 +212,7 @@ For more information, see [Review alerts and incidents](#review-alerts-and-incid
212212

213213
## Review shadow IT - cloud discovery
214214

215-
**Where**: In the Microsoft Defender XDR Portal, select:
215+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
216216

217217
- **Incidents & alerts**
218218
- **Cloud apps > Cloud discovery / Cloud app catalog**
@@ -245,7 +245,7 @@ For more information, see [Discovered app filters and queries in Microsoft Defen
245245

246246
## Review the cloud discovery dashboard
247247

248-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard**.
248+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard**.
249249

250250
**Persona**: Security and Compliance administrators, SOC analysts
251251

@@ -277,7 +277,7 @@ For more information, see:
277277

278278
## Review information protection
279279

280-
**Where**: In the Microsoft Defender XDR Portal, select:
280+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select:
281281

282282
- **Incidents & alerts**
283283
- **Cloud apps > Files**

defender-for-cloud-apps/ops-guide/ops-guide-monthly.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Monthly activities can be performed more frequently or as needed, depending on y
1313

1414
## Review policy assessments
1515

16-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Policies > Policy management**
16+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Policies > Policy management**
1717

1818
**Persona**: Security and Compliance administrators
1919

@@ -33,7 +33,7 @@ For more information, see [Control cloud apps with policies](../control-cloud-ap
3333

3434
## Review activity logs
3535

36-
**Where**: In the Microsoft Defender XDR Portal, under **Cloud apps**, select **Activity log**.
36+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), under **Cloud apps**, select **Activity log**.
3737

3838
**Persona**: Security and Compliance administrators
3939

defender-for-cloud-apps/ops-guide/ops-guide-weekly.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article lists weekly operational activities that we recommend you perform w
1111

1212
## Review SaaS security posture management
1313

14-
**Where**: In the Microsoft Defender XDR Portal, select **Secure Score**.
14+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Secure Score**.
1515

1616
**Persona**: Security and Compliance administrators, SOC analysts
1717

@@ -23,7 +23,7 @@ To view Secure Score recommendations per product, in Microsoft Defender XDR, sel
2323

2424
## Check app connectors, log collectors, and SIEM agent health
2525

26-
**Where**: In the Microsoft Defender XDR Portal, select **Settings > Cloud apps**.
26+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Settings > Cloud apps**.
2727

2828
**Persona**: Security and Compliance administrators, SOC analysts
2929

@@ -59,7 +59,7 @@ For more information, see [Track new and changed features in the Microsoft 365 M
5959

6060
## Review the governance log
6161

62-
**Where**: In the Microsoft Defender XDR Portal, under **Cloud apps**, select **Governance log**.
62+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), under **Cloud apps**, select **Governance log**.
6363

6464
**Persona**: Security and Compliance administrators
6565

0 commit comments

Comments
 (0)