diff --git a/CloudAppSecurityDocs/ops-guide/ops-guide-daily.md b/CloudAppSecurityDocs/ops-guide/ops-guide-daily.md index 4dde9a602e..ac89969d30 100644 --- a/CloudAppSecurityDocs/ops-guide/ops-guide-daily.md +++ b/CloudAppSecurityDocs/ops-guide/ops-guide-daily.md @@ -13,7 +13,7 @@ This article lists daily operational activities that we recommend you perform wi Alerts and incidents are two of the most important items your security operations (SOC) team should be reviewing on a daily basis. -- Triage incidents and alerts regularly from the [incidents queue](https://security.microsoft.com/incidents-queue) in Microsoft Defender XDR, prioritizing high and medium severity alerts. +- Triage incidents and alerts regularly from the [incidents queue](https://security.microsoft.com/incidents) in Microsoft Defender XDR, prioritizing high and medium severity alerts. - If you're working with a SIEM system, your SIEM system is usually the first stop for triage. SIEM systems provide more context with extra logs and SOAR functionality. Then, use Microsoft Defender XDR for a deeper understanding of an alert or incident timeline. diff --git a/defender-endpoint/TOC.yml b/defender-endpoint/TOC.yml index 5fe2259865..becadd494f 100644 --- a/defender-endpoint/TOC.yml +++ b/defender-endpoint/TOC.yml @@ -11,7 +11,7 @@ - name: Trial user guide - Microsoft Defender for Endpoint href: defender-endpoint-trial-user-guide.md - name: Pilot and deploy Defender for Endpoint - href: /defender-xdr/pilot-deploy-defender-endpoint?toc=/defender-xdr/TOC.json&bc=/defender-xdr/breadcrumb/toc.json + href: /defender-xdr/pilot-deploy-defender-endpoint?toc=/defender-endpoint/TOC.json&bc=/defender-endpoint/breadcrumb/toc.json - name: Minimum requirements href: minimum-requirements.md - name: Supported Microsoft Defender for Endpoint capabilities by platform diff --git a/defender-endpoint/breadcrumb/toc.yml b/defender-endpoint/breadcrumb/toc.yml index f2f5363fb8..8cbb9188d0 100644 --- a/defender-endpoint/breadcrumb/toc.yml +++ b/defender-endpoint/breadcrumb/toc.yml @@ -5,10 +5,9 @@ - name: 'Microsoft Defender for Endpoint' tocHref: /defender-endpoint/ topicHref: /defender-endpoint/index - items: - - name: 'Microsoft Defender XDR' - tocHref: /defender-xdr/ - topicHref: /defender-xdr/pilot-deploy-defender-office-365 - name: 'Microsoft Defender for Endpoint' tocHref: /mem/intune/protect/ topicHref: /mem/intune/protect/ + - name: 'Microsoft Defender for Endpoint' + tocHref: /defender-xdr/ + topicHref: /defender-xdr/pilot-deploy-defender-endpoint diff --git a/defender-endpoint/health-status.md b/defender-endpoint/health-status.md index b042f75141..d518707443 100644 --- a/defender-endpoint/health-status.md +++ b/defender-endpoint/health-status.md @@ -13,7 +13,7 @@ ms.collection: ms.topic: conceptual ms.subservice: onboard search.appverid: met150 -ms.date: 05/06/2021 +ms.date: 11/04/2024 --- # Investigate agent health issues @@ -24,53 +24,59 @@ ms.date: 05/06/2021 - [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) - [Microsoft Defender XDR](/defender-xdr) -The following table provides information on the values returned when you run the `mdatp health` command and their corresponding descriptions. +The following table provides information about the values that are returned when you run the `mdatp health` command and their corresponding descriptions. -|Value|Description| +| Value | Description | |---|---| -|automatic_definition_update_enabled|True if automatic antivirus definition updates are enabled, false otherwise.| -|cloud_automatic_sample_submission_consent|Current sample submission level. Can be one of the following values:
`HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
Verify that the script has been run as an administrator.| |`15`|Failed to start SENSE service|Check the service health (`sc query sense` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).
If the device is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the device. If rebooting the device doesn't address the issue, upgrade to KB4015217 and try onboarding again.| |`15`|Failed to start SENSE service|If the message of the error is: System error 577 or error 1058 has occurred, you need to enable the Microsoft Defender Antivirus ELAM driver, see [Ensure that Microsoft Defender Antivirus is not disabled by a policy](#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy) for instructions.| -|`15`|Failed to start SENSE service|The SENSE Feature on Demand (FoD) may not be installed. To determine whether it is installed, enter the following command from an Admin CMD/PowerShell prompt: `DISM.EXE /Online /Get-CapabilityInfo /CapabilityName:Microsoft.Windows.Sense.Client~~~` If it returns an error or the state is not "Installed," then the SENSE FoD must be installed. See [Available Features on Demand: SENSE Client for Microsoft Defender for Endpoint](/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod?view=windows-11&preserve-view=true) for installation instructions.| +|`15`|Failed to start SENSE service|The SENSE Feature on Demand (FoD) may not be installed. To determine whether it is installed, enter the following command from an Admin CMD/PowerShell prompt: `DISM.EXE /Online /Get-CapabilityInfo /CapabilityName:Microsoft.Windows.Sense.Client~~~~` If it returns an error or the state is not "Installed," then the SENSE FoD must be installed. See [Available Features on Demand: SENSE Client for Microsoft Defender for Endpoint](/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod?view=windows-11&preserve-view=true) for installation instructions.| |`30`|The script failed to wait for the service to start running|The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).| |`35`|The script failed to find needed onboarding status registry value|When the SENSE service starts for the first time, it writes onboarding status to the registry location
`HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status`.
The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
|`40`|SENSE service onboarding status isn't set to **1**|The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
diff --git a/defender-office-365/TOC.yml b/defender-office-365/TOC.yml
index 8e49fe3e4b..b5e990b60c 100644
--- a/defender-office-365/TOC.yml
+++ b/defender-office-365/TOC.yml
@@ -38,7 +38,7 @@
- name: Deploy
items:
- name: Pilot and deploy Defender for Office 365
- href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-xdr/TOC.json&bc=/defender-xdr/breadcrumb/toc.json
+ href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-office-365/TOC.json&bc=/defender-office-365/breadcrumb/toc.json
- name: Get started with Microsoft Defender for Office 365
href: mdo-deployment-guide.md
- name: Step 1 - Configure email authentication
diff --git a/defender-office-365/breadcrumb/toc.yml b/defender-office-365/breadcrumb/toc.yml
index 7bb4e72e14..cb856c7895 100644
--- a/defender-office-365/breadcrumb/toc.yml
+++ b/defender-office-365/breadcrumb/toc.yml
@@ -5,7 +5,7 @@
- name: 'Microsoft Defender for Office 365'
tocHref: /defender-office-365/
topicHref: /defender-office-365/index
- items:
- - name: 'Microsoft Defender XDR'
- tocHref: /defender-xdr/
- topicHref: /defender-xdr/pilot-deploy-defender-endpoint
+ - name: 'Microsoft Defender for Office 365'
+ tocHref: /defender-xdr/
+ topicHref: /defender-xdr/pilot-deploy-defender-endpoint
+
diff --git a/defender-office-365/mdo-sec-ops-manage-incidents-and-alerts.md b/defender-office-365/mdo-sec-ops-manage-incidents-and-alerts.md
index 175a995099..00a40a1a4b 100644
--- a/defender-office-365/mdo-sec-ops-manage-incidents-and-alerts.md
+++ b/defender-office-365/mdo-sec-ops-manage-incidents-and-alerts.md
@@ -27,7 +27,7 @@ appliesto:
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
-An [incident](/defender-xdr/incidents-overview) in Microsoft Defender XDR is a collection of correlated alerts and associated data that define the complete story of an attack. Defender for Office 365 [alerts](/purview/alert-policies#default-alert-policies), [automated investigation and response (AIR)](air-about.md#the-overall-flow-of-air), and the outcome of the investigations are natively integrated and correlated on the **Incidents** page in Microsoft Defender XDR at