You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-mdav-using-gp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -231,7 +231,7 @@ Assign the policies to the OU where the test machines are located.
231
231
232
232
#### Enable Tamper Protection
233
233
234
-
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
234
+
In the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
235
235
236
236
For more information, see [How do I configure or manage tamper protection?](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -430,7 +430,7 @@ Defender for Endpoint on iOS enables bulk tagging the mobile devices during onbo
430
430
This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags.
431
431
432
432
> [!NOTE]
433
-
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the XDR portal.
433
+
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the Microsoft Defender portal.
Copy file name to clipboardExpand all lines: defender-endpoint/review-detected-threats.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ appliesto:
33
33
34
34
In the Microsoft Defender portal, you can view and manage threat detections using the following steps:
35
35
36
-
1. Visit [Microsoft XDR portal](https://security.microsoft.com/) and sign-in.
36
+
1. Visit the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com) and sign-in.
37
37
38
38
On the landing page, you see the **Devices with active malware** card with the following information:
39
39
@@ -68,7 +68,7 @@ You can manage threat detections for any devices that are [enrolled in Microsoft
68
68
69
69
## FAQs
70
70
71
-
#### In the Microsoft XDR portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
71
+
#### In the Microsoft Defender portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
72
72
73
73
To see when the malware was detected, you can take the following steps:
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-anomaly-detection-alerts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ For more information, see [App governance in Microsoft Defender for Cloud Apps](
25
25
26
26
### Finding App Governance Related Alerts
27
27
28
-
To locate alerts specifically related to App Governance, navigate to the XDR portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
28
+
To locate alerts specifically related to App Governance, navigate to the Microsoft Defender portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/applications-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Application inventory
3
3
ms.date: 03/20/2025
4
4
ms.topic: overview
5
5
ms.reviewer: anandd512
6
-
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6
+
description: The new Applications page located under Assets in the Microsoft Defender portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
7
7
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/attack-paths.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth perm
49
49
50
50
To view the full list of permissions, go to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Settings > Microsoft Defender XDR > Rules > Critical asset management.
51
51
52
-
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Defender XDR portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
52
+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Microsoft Defender portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
53
53
54
54
55
55
## Investigation user flow: View attack paths involving OAuth applications
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/ops-guide/ops-guide-ad-hoc.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ If you're experiencing issues with a cloud service, we recommend checking servic
23
23
24
24
## Run advanced hunting queries
25
25
26
-
**Where**: In the Microsoft Defender XDR Portal, select **Hunting > Advanced hunting** and query for Defender for Cloud Apps data.
26
+
**Where**: In the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com), select **Hunting > Advanced hunting** and query for Defender for Cloud Apps data.
27
27
28
28
**Persona**: SOC analysts
29
29
@@ -90,7 +90,7 @@ AccountDisplayName,GroupName
90
90
91
91
## Review file quarantines
92
92
93
-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Files**. Query for items where **Quarantined** = **True**.
93
+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Files**. Query for items where **Quarantined** = **True**.
94
94
95
95
**Persona**: Compliance administrators
96
96
@@ -102,7 +102,7 @@ For more information, see [Understand how quarantine works](../use-case-admin-qu
102
102
103
103
## Review app risk scores
104
104
105
-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud app catalog**.
105
+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud app catalog**.
106
106
107
107
**Persona**: Compliance administrators
108
108
@@ -114,7 +114,7 @@ For more information, see [Find your cloud app and calculate risk scores](../ris
114
114
115
115
## Delete cloud discovery data
116
116
117
-
**Where**: In the Microsoft Defender XDR Portal, select **Settings > Cloud apps > Cloud Discovery > Delete Data**.
117
+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Settings > Cloud apps > Cloud Discovery > Delete Data**.
118
118
119
119
**Persona**: Compliance administrators
120
120
@@ -129,7 +129,7 @@ For more information, see [Deleting cloud discovery data](../discovered-apps.md#
129
129
130
130
## Generate a cloud discovery executive report
131
131
132
-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard > Actions**
132
+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard > Actions**
133
133
134
134
**Persona**: Compliance administrators
135
135
@@ -139,7 +139,7 @@ For more information, see [Generate cloud discovery executive report](../discove
139
139
140
140
## Generate a cloud discovery snapshot report
141
141
142
-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard > Actions**
142
+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard > Actions**
143
143
144
144
**Persona**: Security and Compliance administrators
0 commit comments