Skip to content

Commit 05cc210

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into yelevin/multi-tenant-case-mgmt
2 parents 3d41e34 + 5180c8c commit 05cc210

File tree

11 files changed

+60
-28
lines changed

11 files changed

+60
-28
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ ms.topic: how-to
77

88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025.
12+
>
13+
1014
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1115

1216
> [!NOTE]

ATPDocs/whats-new.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,15 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## May 2025
26+
27+
### Local administrators collection (using SAM-R queries) feature will be disabled
28+
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored.
29+
30+
### New Health Issue
31+
32+
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
33+
2534
## April 2025
2635

2736
### Privileged Identity Tag Now Visible in Defender for Identity Inventory
@@ -47,7 +56,6 @@ For more information, see: [Integrations Defender for Identity and PAM services.
4756

4857
### New Service Account Discovery page
4958

50-
5159
Microsoft Defender for Identity now includes a Service Account Discovery capability, offering you centralized visibility into service accounts across your Active Directory environment.
5260

5361
This update provides:
@@ -60,11 +68,6 @@ This update provides:
6068

6169
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md).
6270

63-
64-
### New Health Issue
65-
66-
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
67-
6871
### Enhanced Identity Inventory
6972

7073
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,14 +64,14 @@ Use this detection to control file uploads and downloads in real time with sessi
6464

6565
By enabling file sandboxing, files that according to their metadata and based on proprietary heuristics to be potentially risky, will also be sandbox scanned in a safe environment. The Sandbox scan may detect files that were not detected based on threat intelligence sources.
6666

67-
Defender for Cloud Apps supports malware detection for the following apps:
67+
Defender for Cloud Apps supports "File Sandboxing" malware detection for the following apps:
6868

6969
* Box
7070
* Dropbox
7171
* Google Workspace
7272

7373
> [!NOTE]
74-
>* Proactively sandboxing will be done in third party applications (*Box*, *Dropbox* etc.). In *OneDrive* and *SharePoint* files are being scanned and sandboxed as part of the service itself.
74+
>* Proactively sandboxing will be done in third party applications (*Box*, *Dropbox* etc.). **In *OneDrive* and *SharePoint* files are being scanned and sandboxed as part of the service itself**.
7575
> * In *Box*, *Dropbox*, and *Google Workspace*, Defender for Cloud Apps doesn't automatically block the file, but blocking may be performed according to the app's capabilities and the app's configuration set by the customer.
7676
> * If you're unsure about whether a detected file is truly malware or a false positive, go to the Microsoft Security Intelligence page at [https://www.microsoft.com/wdsi/filesubmission](https://www.microsoft.com/wdsi/filesubmission) and submit the file for further analysis.
7777

CloudAppSecurityDocs/cloud-discovery-policies.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Discovery policies enable you to set alerts that notify you when new apps are de
4444

4545
> [!NOTE]
4646
>
47-
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it may trigger additional alerts for apps that have already been discovered and alerted on.
48-
> - Data from **snapshot reports** do not trigger alerts in app discovery policies.
47+
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it might trigger additional alerts for apps that have already been discovered and alerted on.
48+
> - Data from **snapshot reports** don't trigger alerts in app discovery policies.
4949
5050
For example, if you're interested in discovering risky hosting apps found in your cloud environment, set your policy as follows:
5151

@@ -73,6 +73,11 @@ Defender for Cloud Apps searches all the logs in your cloud discovery for anomal
7373

7474
1. Under **Apply to** choose whether this policy applies **All continuous reports** or **Specific continuous reports**. Select whether the policy applies to **Users**, **IP addresses**, or both.
7575

76+
:::image type="content" source="media/apply-to-continous-reports.png" alt-text="Screenshot showing how to apply file polcies to specific continous reports" lightbox="media/apply-to-continous-reports.png":::
77+
78+
> [!IMPORTANT]
79+
> When you configure an app discovery policy and select **Apply to > All continuous reports**, multiple alerts are generated for each discovery stream, including the global stream which aggregates data from all sources. To control alert volume, select **Apply to > Specific continuous reports** and choose only the relevant streams for your policy.
80+
> Learn more: [Defender for Cloud apps continuous risk assessment reports](set-up-cloud-discovery.md#snapshot-and-continuous-risk-assessment-reports)
7681
1. Select the dates during which the anomalous activity occurred to trigger the alert under **Raise alerts only for suspicious activities occurring after date.**
7782

7883
1. Set a **Daily alert limit** under **Alerts**. Select if the alert is sent as an email. Then provide email addresses as needed.
61.6 KB
Loading

defender-endpoint/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,7 @@
326326
- name: User experiences in Defender for Endpoint on Android
327327
href: android-new-ux.md
328328
- name: User experiences in Defender for Endpoint on iOS
329+
href: ios-new-ux.md
329330
- name: Mobile device resources for Defender for Endpoint
330331
href: mobile-resources-defender-endpoint.md
331332
- name: Configure Defender for Endpoint on Android features

defender-endpoint/data-storage-privacy.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Microsoft Defender for Endpoint data storage and privacy
33
description: Learn about how Microsoft Defender for Endpoint handles privacy and data that it collects.
44
keywords: Microsoft Defender for Endpoint, data storage and privacy, storage, privacy, licensing, geolocation, data retention, data
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 08/20/2024
19+
ms.date: 05/12/2025
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -27,7 +27,6 @@ ms.date: 08/20/2024
2727

2828
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
3130
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3231

3332
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)

defender-vulnerability-management/tvm-security-baselines.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 04/24/2025
15+
ms.date: 05/12/2025
1616
---
1717

1818
# Security baselines assessment
@@ -33,14 +33,14 @@ A security baseline profile is a customized profile that you can create to asses
3333
Security baselines provide support for Center for Internet Security (**CIS)** benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (**STIG)** benchmarks for Windows 10 and Windows Server 2019.
3434

3535
> [!NOTE]
36-
> The benchmarks currently only support Group Policy Object (GPO) configurations and not Microsoft Configuration Manager (Intune).
36+
> - The benchmarks currently only support Group Policy Object (GPO) configurations and not Microsoft Configuration Manager (Intune).</br>
37+
> - Security baseline assessment is not supported on non-English Windows system locale.</br>
38+
> - Security baseline assessment is not supported when DFSS (Dynamic Fair Share Scheduling) is enabled on Windows Server 2012 R2.</br>
39+
> - For security baseline assessment to be successful, **PowerShell Constrained Language Mode** must be set to **off** on your devices.
3740
3841
> [!TIP]
3942
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
4043
41-
> [!NOTE]
42-
> Security baseline assessment is not supported when DFSS (Dynamic Fair Share Scheduling) is enabled on Windows Server 2012 R2.
43-
4444
## Get started with security baselines assessment
4545

4646
1. Go to **Vulnerability management** > **Baselines assessment** in the [Microsoft Defender portal](https://security.microsoft.com).
@@ -74,9 +74,6 @@ Useful icons to be aware of:
7474

7575
![Not using the default value](/defender/media/defender-vulnerability-management/customized_value.png) - This configuration has been customized and is not using the default value.
7676

77-
> [!NOTE]
78-
> For security baseline assessment to be successful, **PowerShell Constrained Language Mode** must be set to **off** on your devices.
79-
8077
## Security baselines assessment overview
8178

8279
On the security baselines assessment overview page you can view device compliance, profile compliance, top failing devices and top misconfigured devices.

defender-xdr/alert-policies.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -344,4 +344,12 @@ Here are some tasks you can perform to manage alerts.
344344
- The name (and link) of the corresponding alert policy.
345345
- The incident where the alert is aggregated.
346346
347-
- [**Tune an alert**](investigate-alerts.md#tune-an-alert): You can set properties, conditions, and actions to hide or resolve an alert.
347+
- **[Tune an alert](investigate-alerts.md#tune-an-alert)**: You can set properties, conditions, and actions to hide or resolve an alert.
348+
- **Change the severity level for an alert policy**
349+
350+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) using credentials for an administrator account in your Microsoft 365 organization.
351+
2. Navigate to **Email & Collaboration > Policies & rules** page, then select **Alerts policy**.
352+
3. Select the policy you want to update from the list. In the **Actions** column, select the three dots then select **Edit**.
353+
4. In the **Edit Policy** pane, select the dropdown menu to adjust the **Severity** level. If applicable, you can also modify the **Trigger settings** for the policy.
354+
5. Select **Next** to proceed to rest of the steps.
355+
6. Select **Submit** to apply the new changes to the policy, then select **Done** to finish editing.

defender-xdr/automatic-attack-disruption-exclusions.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 02/16/2025
21+
ms.date: 05/12/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
---
@@ -116,8 +116,14 @@ To remove an exclusion:
116116

117117
- Device group exclusions can be configured in the **Device groups** tab. Select the device group you want to configure from the list and choose the appropriate exclusion from the flyout pane. Select **Save** to save the exclusion.
118118

119+
## Opt out of automatic attack disruption
120+
121+
If you must opt out of attack disruption, you can do so by opening a support case in the Microsoft Defender portal with the subject *Attack disruption opt-out*. In your request, please specify that you wish to opt out of attack disruption and include a brief explanation about your decision. This feedback helps us improve the feature and better understand customer needs. By opting out, you'll still receive alerts related to attack disruption but no automated actions are taken.
122+
123+
Opting out of attack disruption can greatly increase security risk. Consider [excluding specific entities](automatic-attack-disruption-exclusions.md#review-or-change-automated-response-exclusions-for-assets) instead.
124+
119125
## See also
120126

121127
- [View details and results of automated attack disruption actions](autoad-results.md)
122128

123-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
129+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)