Skip to content

Commit afe0fe4

Browse files
Merge pull request #5659 from MicrosoftDocs/main
[AutoPublish] main to live - 11/18 10:37 PST | 11/19 00:07 IST
2 parents 1e0ee3e + 250511a commit afe0fe4

8 files changed

+33
-7
lines changed
-10.1 KB
Binary file not shown.

defender-endpoint/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1072,7 +1072,11 @@
10721072
- name: Contain devices from the network
10731073
href: respond-machine-alerts.md#contain-devices-from-the-network
10741074
- name: Contain user from the network
1075-
href: respond-machine-alerts.md#contain-user-from-the-network
1075+
href: respond-machine-alerts.md#contain-user-from-the-network
1076+
- name: Automatically apply GPO hardening (predictive shielding)
1077+
href: respond-machine-alerts.md#gpo-hardening
1078+
- name: Automatically apply Safeboot hardening (predictive shielding)
1079+
href: respond-machine-alerts.md#safeboot-hardening
10761080
- name: Consult a threat expert
10771081
href: respond-machine-alerts.md#consult-a-threat-expert
10781082
- name: Check activity details in Action center

defender-endpoint/respond-machine-alerts.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -361,6 +361,7 @@ When an identity in your network might be compromised, you must prevent that ide
361361

362362
### Contain user important notes
363363

364+
- When the contain user action is triggered by [predictive shielding](/defender-xdr/shield-predict-threats) (Preview), the contain user action applies restrictions more selectively, with a focus on users identified as high risk through prediction logic. The contain user action in predictive shielding prevents new sessions rather than terminating existing ones.
364365
- Blocking incoming communication with a "contained" user is supported on onboarded Microsoft Defender for Endpoint Windows 10 and 11 devices (Sense version 8740 and higher), Windows Server 2019+ devices, and Windows Servers 2012R2 and 2016 with the modern agent.
365366
- **Important**: Once a **Contain user** action is enforced on a domain controller, it starts a GPO update on the Default Domain Controller policy. A change of a GPO starts a sync across the domain controllers in your environment. This is expected behavior, and if you monitor your environment for AD GPO changes, you may be notified of such changes. Undoing the **Contain user** action reverts the GPO changes to their previous state, which will then start another AD GPO synchronization in your environment. Learn more about [merging of security policies on domain controllers](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj966251(v=ws.11)#merging-of-security-policies-on-domain-controllers).
366367

@@ -400,6 +401,22 @@ In addition, you can expand the investigation by using advanced hunting. Look fo
400401

401402
:::image type="content" source="/defender/media/defender-endpoint/user-contain-advanced-hunting.png" alt-text="Shows advanced hunting for user contain events" lightbox="/defender/media/defender-endpoint/user-contain-advanced-hunting.png":::
402403

404+
## GPO hardening
405+
406+
As part of the [predictive shielding](/defender-xdr/shield-predict-threats) (Preview) feature, Defender for Endpoint automatically applies the GPO hardening action. Group Policy Object (GPO) hardening temporarily stops new GPO policies from being applied to devices identified as high risk. This action helps prevent potential compromise by limiting changes to critical configurations.
407+
408+
To enrich predictive shielding actions, we recommend you use the Microsoft Defender for Identity sensor in your environment. For more information, see [Enrich predictive shielding with Microsoft Defender for Identity](/defender-xdr/shield-predict-threats-manage#enrich-predictive-shielding-data).
409+
410+
After the action is applied, you can view the action impact in the incident graph, track the actions in the Action center, and investigate further using advanced hunting. For more information, see [Manage predictive shielding actions](/defender-xdr/shield-predict-threats-manage).
411+
412+
## Safeboot hardening
413+
414+
As part of the [predictive shielding](/defender-xdr/shield-predict-threats) (Preview) feature, Defender for Endpoint automatically applies the Safeboot hardening action. Safeboot hardening helps protect devices from being compromised by enforcing stricter boot settings on devices that are predicted to be at high risk of compromise.
415+
416+
To enrich predictive shielding actions, we recommend you use the Microsoft Defender for Identity sensor in your environment. For more information, see [Enrich predictive shielding with Microsoft Defender for Identity](/defender-xdr/shield-predict-threats-manage#enrich-predictive-shielding-data).
417+
418+
After the action is applied, you can view the action impact in the incident graph, track the actions in the Action center, and investigate further using advanced hunting. For more information, see [Manage predictive shielding actions](/defender-xdr/shield-predict-threats-manage).
419+
403420
## Consult a threat expert
404421

405422
You can consult a Microsoft threat expert for more insights regarding a potentially compromised device or already compromised ones. Microsoft Threat Experts can be engaged directly from within the Microsoft Defender XDR for timely and accurate response. Experts provide insights not just regarding a potentially compromised device, but also to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, or a threat intelligence context that you see on your portal dashboard.

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ Learn more:
3333

3434
|Feature |Preview/GA |Description |
3535
|---------|------------|-------------|
36+
|New predictive shielding response actions. |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
3637
|[Custom data collection](custom-data-collection.md) |Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
3738

3839
## October 2025

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ To turn on automatic windows auditing:
2020
1. In the **General** section, select **Advanced features**.
2121
1. Turn on **Automatic Windows auditing configuration**.​
2222

23-
If you do not select automatic Windows event auditing, you must manually configure Windows event collection on your domain controller.
23+
If you do not select automatic Windows auditing configuration, you must manually configure Windows event auditing in the Defender portal or using PowerShell.
2424

2525
## Configure Windows event auditing with the Defender for Identity sensor v2.x
2626

defender-xdr/advanced-hunting-query-results.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ While you can construct your [advanced hunting](advanced-hunting-overview.md) qu
3636
- [Export tables and charts](#export-tables-and-charts)
3737
- [Drill down to detailed entity information](#drill-down-from-query-results)
3838
- [Tweak your queries directly from the results](#tweak-your-queries-from-the-results)
39-
- [View timeline of events](#automatic-timeline-rendering-preview)
39+
- [View timeline of events](#automatic-timeline-rendering)
4040

4141
## View query results as a table or chart
4242

@@ -195,7 +195,7 @@ You can do the same for your saved functions, queries, and custom detections in
195195
> [!NOTE]
196196
> Some tables in this article might not be available at Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
197197
198-
## Automatic timeline rendering (preview)
198+
## Automatic timeline rendering
199199

200200
By default, a timeline appears above the advanced hunting results that displays event counts over time. The timeline is automatically rendered based on the `Timestamp` or `timeGenerated` column in the query results. It automatically updates when you apply filters and can help you quickly identify abnormal behavior and trends and focus on interesting results.
201201

defender-xdr/security-copilot-agents-defender.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,11 @@ To discover and deploy agents in the Microsoft Defender portal:
6262

6363
You can manage centralized purchases for partner-published agents through public offers, or through private offers, as described in [How to Purchase SaaS Solutions (Private Offers)](/security/store/how-to-purchase-saas-solutions-private-offers).
6464

65-
1. After purchasing the agent, select **Security Copilot > Security Store**, find your agent in the **Ready for setup** section, and then select **Set up** to begin agent setup.
65+
1. After purchasing the agent, select **Security Copilot > Agents**, find your agent in the **Ready for setup** section, and then select **Set up** to begin agent setup.
66+
67+
For more information on setting up, managing, and running partner-published agents, see [Manage Security Copilot agents](/copilot/security/agents-manage#set-up-for-partner-built-agents).
68+
69+
For more information on Microsoft Security Copilot agents, see [Microsoft Security Copilot agents in Microsoft Defender](#microsoft-security-copilot-agents-in-microsoft-defender).
6670

6771
After setup, the agent appears in the **Agents in use** section.
6872

defender-xdr/shield-predict-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,9 +93,9 @@ This dynamic understanding allows Defender XDR to move beyond reactive responses
9393

9494
Predictive shielding uses Defender for Endpoint-based actions. To use these actions, you need a Defender for Endpoint license.
9595

96-
- Safeboot hardening - hardens the device against booting into Safe Mode. Booting into Safe Mode is a common tactic used by attackers to bypass security controls and maintain persistence on compromised systems.
96+
- [Safeboot hardening](/defender-endpoint/respond-machine-alerts#safeboot-hardening) - hardens the device against booting into Safe Mode. Booting into Safe Mode is a common tactic used by attackers to bypass security controls and maintain persistence on compromised systems.
9797

98-
- GPO hardening - hardens Group Policy Objects (GPOs) to prevent attackers from exploiting misconfigurations or weaknesses in GPO settings to escalate privileges or move laterally within the network.
98+
- [GPO hardening](/defender-endpoint/respond-machine-alerts#gpo-hardening) - hardens Group Policy Objects (GPOs) to prevent attackers from exploiting misconfigurations or weaknesses in GPO settings to escalate privileges or move laterally within the network.
9999

100100
- [Proactive user containment (contain user)](/defender-endpoint/respond-machine-alerts#contain-user-from-the-network) - infuses activity data with exposure data to identify exposed credentials at risk of being compromised and reused to conduct malicious activity. Proactively restricts the activity of the users associated with those credentials.
101101

0 commit comments

Comments
 (0)