mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Added a reference link to a blog
This commit is contained in:
@ -8,7 +8,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
ms.author: dansimp
|
||||
author: dansimp
|
||||
ms.date: 09/12/2019
|
||||
ms.date: 10/04/2019
|
||||
ms.reviewer: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
@ -290,7 +290,7 @@ You can create custom alerts and response actions with the WDATP Connector and t
|
||||
|
||||
**Investigate:** Initiate investigations, collect investigation package, and isolate a machine.
|
||||
|
||||
**Threat Scanning** on USB devices
|
||||
**Threat Scanning** on USB devices.
|
||||
|
||||
**Restrict execution of all applications** on the machine except a predefined set
|
||||
MDATP connector is one of over 200 pre-defined connectors including Outlook, Teams, Slack, etc. Custom connectors can be built.
|
||||
@ -300,6 +300,8 @@ MDATP connector is one of over 200 pre-defined connectors including Outlook, Tea
|
||||
Both machine and file level actions can be applied.
|
||||
- [More information on Custom Detection Rules Response Actions](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules)
|
||||
|
||||
For information on device control related advance hunting events and examples on how to create custom alerts, see [Advanced hunting updates: USB events, machine-level actions, and schema changes](https://techcommunity.microsoft.com/t5/Microsoft-Defender-ATP/Advanced-hunting-updates-USB-events-machine-level-actions-and/ba-p/824152).
|
||||
|
||||
## Respond to threats
|
||||
|
||||
You can create custom alerts and automatic response actions with the [Microsoft Defender ATP Custom Detection Rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules). Response actions within the custom detection cover both machine and file level actions. You can also create alerts and automatic response actions using [PowerApps](https://powerapps.microsoft.com/) and [Flow](https://flow.microsoft.com/) with the [Microsoft Defender ATP connector](https://docs.microsoft.com/connectors/wdatp/). The connector supports actions for investigation, threat scanning, and restricting running applications. It is one of over 200 pre-defined connectors including Outlook, Teams, Slack, and more. Custom connectors can also be built. See [Connectors](https://docs.microsoft.com/connectors/) to learn more about connectors.
|
||||
|
Reference in New Issue
Block a user