mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 16:27:22 +00:00
Fix suggestions
To fix suggestions
This commit is contained in:
parent
b9881fc796
commit
3aaab802b0
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Grant access to managed security service provider (MSSP)
|
||||
description: Take the necessary steps to configure the MSSP integration with Microsoft Defender ATP
|
||||
description: Steps to configure the MSSP integration with Microsoft Defender ATP
|
||||
keywords: managed security service provider, mssp, configure, integration
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Create indicators for files
|
||||
ms.reviewer:
|
||||
description: Create indicators for a file hash that define the detection, prevention, and exclusion of entities.
|
||||
keywords: file, hash, manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain
|
||||
keywords: file, hash, manage, allowed, blocked, block, clean, malicious, file hash, ip address, urls, domain
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Create indicators for IPs and URLs/domains
|
||||
ms.reviewer:
|
||||
description: Create indicators for IPs and URLs/domains that define the detection, prevention, and exclusion of entities.
|
||||
keywords: ip, url, domain, manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain
|
||||
keywords: ip, url, domain, manage, allowed, blocked, block, clean, malicious, file hash, ip address, urls, domain
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
|
@ -40,7 +40,7 @@ When you investigate an incident, you'll see:
|
||||
## Analyze incident details
|
||||
Click an incident to see the **Incident pane**. Select **Open incident page** to see the incident details and related information (alerts, devices, investigations, evidence, graph).
|
||||
|
||||

|
||||

|
||||
|
||||
### Alerts
|
||||
You can investigate the alerts and see how they were linked together in an incident.
|
||||
@ -83,7 +83,7 @@ The **Graph** tells the story of the cybersecurity attack. For example, it shows
|
||||
|
||||
You can click the circles on the incident graph to view the details of the malicious files, associated file detections, how many instances have there been worldwide, whether it’s been observed in your organization, if so, how many instances.
|
||||
|
||||

|
||||

|
||||
|
||||
## Related topics
|
||||
- [Incidents queue](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue)
|
||||
|
Loading…
x
Reference in New Issue
Block a user