mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
add new mte topics
This commit is contained in:
parent
8c9201a95d
commit
126923f445
@ -96,6 +96,10 @@
|
||||
|
||||
|
||||
|
||||
#### [Microsoft Threat Experts](windows-defender-atp/microsoft-threat-experts.md)
|
||||
|
||||
|
||||
|
||||
#### [Portal overview](windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
@ -409,6 +413,10 @@
|
||||
##### [Configure managed security service provider (MSSP) support](windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
#### [Configure and manage Microsoft Threat Experts capabilities](windows-defender-atp/configure-microsoft-threat-experts.md)
|
||||
####
|
||||
|
||||
|
||||
#### Configure Microsoft threat protection integration
|
||||
##### [Configure conditional access](windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md)
|
||||
##### [Configure Microsoft Cloud App Security integration](windows-defender-atp/microsoft-cloud-app-security-config.md)
|
||||
|
@ -94,6 +94,10 @@
|
||||
#### [Information protection in Windows overview](information-protection-in-windows-overview.md)
|
||||
|
||||
|
||||
|
||||
### [Microsoft Threat Experts](microsoft-threat-experts.md)
|
||||
|
||||
|
||||
### [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
@ -411,6 +415,11 @@
|
||||
|
||||
#### [Configure managed security service provider (MSSP) support](configure-mssp-support-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
|
||||
|
||||
### [Configure and manage Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md)
|
||||
|
||||
### Configure Microsoft Threat Protection integration
|
||||
#### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md)
|
||||
#### [Configure Microsoft Cloud App Security in Windows](microsoft-cloud-app-security-config.md)
|
||||
|
@ -0,0 +1,100 @@
|
||||
---
|
||||
title:
|
||||
keywords:
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author:
|
||||
author:
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
# Configure and manage Microsoft Threat Experts capabilities
|
||||
**Applies to:**
|
||||
|
||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||
|
||||
PUT GENERAL INTRO
|
||||
|
||||
## Before you begin
|
||||
To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a valid Premier customer service and support account. However, you will not be charged for the Experts on demand service during the preview.
|
||||
|
||||
You also need to ensure that you have Windows Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up.
|
||||
|
||||
|
||||
## Register to Microsoft Threat Experts preview
|
||||
If you’re already a Windows Defender ATP customer, you can apply for preview through the portal.
|
||||
|
||||
1. From the navigation pane, go to **Settings > General > Advanced features > Threat Experts**.
|
||||
|
||||
insert image
|
||||
|
||||
2. Click **Apply for preview**.
|
||||
|
||||
3. In the Apply for preview dialog box, read and make sure you understand the preview’s terms of agreement.
|
||||
|
||||
4. Enter your name and email address so that Microsoft can get back to you on your application.
|
||||
|
||||
5. Read the privacy statement, then click Submit when you’re done.
|
||||
|
||||
>[!NOTE]
|
||||
>You will receive a welcome email once your application is approved. Then, from the navigation pane, go to** Settings > General > Advanced features** to turn the Threat Experts toggle on. Click **Save preferences**.
|
||||
|
||||
|
||||
## Get targeted attack notification from Microsoft Threat Experts
|
||||
You can receive targeted attack notification from Microsoft Threat Experts through the following:
|
||||
- The Windows Defender ATP portal’s Alerts dashboard
|
||||
- Your email, if you choose to configure it
|
||||
|
||||
To receive targeted attack notifications through email, you need to create an email notification rule.
|
||||
|
||||
### Create an email notification rule
|
||||
You can create rules to send email notifications for notification recipients.
|
||||
|
||||
1. In the navigation pane, select **Settings > Alert notifications**.
|
||||
2. Click **Add notification rule**.
|
||||
3. Specify the General information:
|
||||
- Rule name - Specify a name for the notification rule.
|
||||
- Include organization name - Specify the customer name that appears on the email notification.
|
||||
- Include tenant-specific portal link - Adds a link with the tenant ID to allow access to a specific tenant.
|
||||
- Machines - Choose whether to notify recipients for alerts on all machines (Global administrator role only) or on selected machine groups. For more information, see Create and manage machine groups.
|
||||
- Alert severity - Choose the High alert severity level
|
||||
|
||||
4. Click **Next**.
|
||||
5. Enter the recipient's email address then click **Add recipient**. You can add multiple email addresses.
|
||||
|
||||
6. Check that email recipients are able to receive the email notifications by selecting **Send test email**.
|
||||
7. Click **Save notification rule**.
|
||||
|
||||
>[!NOTE]
|
||||
> See Configure alert notifications to edit, delete, or troubleshoot email notification for alerts details.
|
||||
|
||||
|
||||
## View the targeted attack notification
|
||||
You’ll start receiving targeted attack notification from Microsoft Threat Experts in your email after you have configured your system to receive email notification.
|
||||
|
||||
1. Click the link in the email to go to the corresponding alert context in the dashboards tagged with Threat Experts.
|
||||
|
||||
image
|
||||
|
||||
2. From the dashboard, select the same alert topic that you got from the email, to view the details.
|
||||
|
||||
|
||||
## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization
|
||||
You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard.
|
||||
|
||||
1. Navigate to the** Dashboard > Security operations**.
|
||||
2. Select the information that you’d like to investigate with the help of Microsoft's threat intelligence optics. Ensure that page for the relevant alert or machine is in view before raising an inquiry.
|
||||
3. From the menu, select **Ask a threat expert**.
|
||||
4. Asking a threat expert is a two-step process: you need to provide the necessary information and open a support ticket.
|
||||
a. Provide enough information to give the Microsoft Threat Experts enough context to start the investigation.
|
||||
|
||||
image
|
||||
|
||||
b. Select the inquiry category from the **Provide information > Inquiry** details drop-down menu.
|
||||
|
||||
image
|
||||
|
||||
c. Enter the additional details to give the threat experts more context of what you’d like to investigate. Click **Next**.
|
@ -0,0 +1,37 @@
|
||||
---
|
||||
title:
|
||||
keywords:
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author:
|
||||
author:
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
# Microsoft Threat Experts
|
||||
**Applies to:**
|
||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||
|
||||
[!include[Prerelease<73>information](prerelease.md)]
|
||||
|
||||
Microsoft Threat Experts is a managed hunting service that provides Security Operation Centers with expert level oversight and analysis to help them ensure that critical threats in their unique environments don’t get missed.
|
||||
|
||||
This new capability provides expert-driven insights and data through targeted attack notification and access to experts on demand.
|
||||
|
||||
## Targeted attack notification
|
||||
Microsoft Threat Experts provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyber espionage. The managed hunting service includes:
|
||||
- Constant cybersecurity oversight and vigilance, reducing dwell time and risk to the business
|
||||
- Hunter-trained artificial intelligence to discover and prioritize both known and unknown attacks
|
||||
- Identifying the most important risks, helping SOC maximize time and energy
|
||||
- Full context of incident, including method of entry, scope of incident, which SOC can quickly act on. Related attacker motivation and attribution may be provided via Threat Analytics.
|
||||
|
||||
## Collaborate with experts, on demand
|
||||
Customers can engage our security experts directly from within Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can:
|
||||
|
||||
- Get additional clarification on alerts including root cause or scope of the incident
|
||||
- Gain clarity into suspicious machine behavior and next steps if faced with an advanced attacker
|
||||
- Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques
|
||||
- Seamlessly transition to Microsoft Incident Response (IR) or other third-party Incident Response services when necessary
|
Loading…
x
Reference in New Issue
Block a user