You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-trial-user-guide.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
7
7
manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: how-to
10
-
ms.date: 09/10/2024
10
+
ms.date: 11/11/2024
11
11
ms.collection:
12
12
- m365-security
13
13
- tier2
@@ -117,6 +117,8 @@ After you have onboarded devices, [run a detection test](run-detection-test.md).
117
117
118
118
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is a central location where you can view onboarded devices, security recommendations, detected threats, alerts, and more. To get started, see [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal).
119
119
120
+
> [!IMPORTANT]
121
+
> If you decide not to renew your trial or purchase a subscription, make sure to offboard devices before your trial expires.
Copy file name to clipboardExpand all lines: defender-endpoint/device-discovery-faq.md
+51-6Lines changed: 51 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier3
16
16
ms.topic: conceptual
17
17
search.appverid: met150
18
-
ms.date: 03/23/2021
18
+
ms.date: 11/12/2024
19
19
---
20
20
21
21
# Device discovery frequently asked questions
@@ -65,11 +65,54 @@ The discovery engine distinguishes between network events that are received in t
65
65
## What protocols are you capturing and analyzing?
66
66
67
67
By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
75
118
@@ -88,9 +131,10 @@ As device discovery uses passive methods to discover devices in the network, any
88
131
89
132
Devices will actively be probed when changes in device characteristics are observed to make sure the existing information is up to date (typically, devices probed no more than once in a three-week period)
90
133
91
-
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
134
+
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it. What should I do?
92
135
93
136
The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
## What is the amount of traffic being generated by the Standard discovery active probe?
@@ -101,13 +145,13 @@ Active probing can generate up to 50Kb of traffic between the onboarded device a
101
145
102
146
You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
103
147
104
-
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
148
+
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
105
149
106
150
## Can I onboard unmanaged devices that were found?
107
151
108
152
Yes. You can onboard unmanaged devices manually. Unmanaged endpoints in your network introduce vulnerabilities and risks to your network. Onboarding them to the service can increase the security visibility on them.
109
153
110
-
## I've noticed that unmanaged device health state is always "Active", why is that?
154
+
## I've noticed that unmanaged device health state is always "Active". Why is that?
111
155
112
156
Temporarily, unmanaged device health state is "Active" during the standard retention period of the device inventory, regardless of their actual state.
113
157
@@ -138,4 +182,5 @@ The device discovery capabilities have been built to only discover and identify
138
182
### You can exclude network lures from active probing
139
183
140
184
Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
185
+
141
186
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-get-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ Watch this short video to learn more about Attack simulation training.
65
65
66
66
- There are no corresponding PowerShell cmdlets for Attack simulation training.
67
67
68
-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, and ZAF.
68
+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, TWN and ZAF.
69
69
70
70
> [!NOTE]
71
71
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-email-spoof-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,10 +55,10 @@ This article describes how admins can manage entries for email senders in the Mi
55
55
56
56
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57
57
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
-[Exchange Online permissions](/exchange/permissions-exo/permissions-exo) in the **Exchange admin center** at <https://admin.exchange.microsoft.com>\>**Roles**\>**Admin Roles**:
59
59
-*Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
60
60
-**Organization Management** or **Security Administrator** (Security admin role).
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ For editable functions, more options are available when you select the vertical
43
43
-**Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
44
44
-**Delete** – deletes the function
45
45
46
-
### Use arg() operator for Azure Resource Graph queries (Preview)
46
+
### Use arg() operator for Azure Resource Graph queries
47
47
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
48
48
49
49
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.
Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, and Switzerland. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
31
+
Microsoft Defender XDR integrates with several different Microsoft security services, which collect data using various technologies. Integrated services allow Microsoft Defender XDR to access their data for the purpose of identifying cross-product correlations.
32
32
33
-
Customer data in pseudonymized form might also be stored in central storage and processing systems in the United States.
33
+
## Collected data
34
34
35
-
The table below shows the general information on the data retention of specific service sources in Defender XDR:
35
+
Customer data collected from integrated services includes *processed data*, such as incidents and alerts, and *configuration data*, such as connector settings, rules and so on.
36
36
37
-
|Product|Default data retention period|More information|
38
-
|:---|:---|:---|
39
-
|Microsoft Defender for Endpoint|180 days|[Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
40
-
|Microsoft Defender for Office 365|Varies according to feature and license|[Defender for Office 365 data retention information](/defender-office-365/mdo-data-retention)|
41
-
|Microsoft Defender for Identity|180 days|[Defender for Identity data storage and privacy](/defender-for-identity/privacy-compliance)|
42
-
|Microsoft Defender for Cloud Apps|180 days|[Defender for Cloud Apps data storage and privacy](/defender-cloud-apps/cas-compliance-trust)|
43
-
|Microsoft Entra|Varies according to feature and license|[Microsoft Entra data storage and privacy](/entra/identity/monitoring-health/reference-reports-data-retention)|
44
-
|Microsoft Sentinel|90 days for Basic logs, varies depending on pricing|[Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/)|
37
+
## Data storage location
45
38
46
-
> [!NOTE]
47
-
> [Advanced hunting](advanced-hunting-overview.md) lets you query up to 30 days of raw data.
39
+
Microsoft Defender XDR operations in Microsoft Azure data centers in the following geographical regions:
40
+
41
+
-**European Union**: North Europe and West Europe
42
+
-**United Kingdom**: UK South and UK West
43
+
-**United States**: East US 2 and Central US
44
+
-**Australia**: Australia East and Australia Southeast
45
+
-**Switzerland**: Switzerland North and Switzerland West
46
+
-**India**: Central India and South India
47
+
48
+
Once created, the Microsoft Defender XDR tenant isn't movable to a different region. Your geographical region is shown in the Microsoft Defender portal, under **Settings > Microsoft Defender XDR > Account**.
49
+
50
+
Customer data stored by integrated services might also be stored in the following locations:
51
+
52
+
- The original location for the relevant service.
53
+
- A region defined by data storage rules of an integrated service, if Microsoft Defender XDR shares data with that service.
54
+
55
+
## Data retention
56
+
57
+
Microsoft Defender XDR data is retained for 180 days, and is visible across the Microsoft Defender portal during that time, except for in **Advanced hunting** queries.
58
+
59
+
In the Microsoft Defender portal's **Advanced hunting** page, data is accessible via queries for only 30 days, unless it's streamed through [Microsoft's unified security operations platform with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration?toc=%2Fdefender-xdr%2Ftoc.json&bc=%2Fdefender-xdr%2Fbreadcrumb%2Ftoc.json&tabs=defender-portal), where retention periods may be longer.
60
+
61
+
Data continues to be retained and visible, even when a license is under a grace period or in suspended mode. At the end of any grace period or suspension, and no later than 180 days from a contract termination or expiration, data is deleted from Microsoft's systems and is unrecoverable.
62
+
63
+
Most Defender services also have a default data retention period of 180 days. More information on data retention period per product is found in [relevant service docs](#related-content).
64
+
65
+
## Data sharing
66
+
67
+
Microsoft Defender XDR shares data among the following Microsoft products, also licensed by the customer:
68
+
69
+
- Microsoft Defender for Cloud
70
+
- Microsoft Defender for Identity
71
+
- Microsoft Defender for Endpoint
72
+
- Microsoft Defender for Cloud Apps
73
+
- Microsoft Defender for Office 365
74
+
- Microsoft Defender for IoT
75
+
- Microsoft Sentinel
76
+
- Microsoft Intune
77
+
- Microsoft Purview
78
+
- Microsoft Entra
79
+
- Microsoft Defender Vulnerability Management
80
+
- Microsoft Copilot for Security
81
+
82
+
## Related content
83
+
84
+
For more information, see:
85
+
86
+
-[Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)
87
+
-[Defender for Office 365 data retention information](/defender-office-365/mdo-data-retention)
88
+
-[Defender for Identity data storage and privacy](/defender-for-identity/privacy-compliance)
89
+
-[Defender for Cloud Apps data storage and privacy](/defender-cloud-apps/cas-compliance-trust)
90
+
-[Microsoft Entra data storage and privacy](/entra/identity/monitoring-health/reference-reports-data-retention)
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,11 +29,13 @@ For more information on what's new with other Microsoft Defender security produc
29
29
30
30
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
31
31
32
+
## November 2024
33
+
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
32
34
33
35
## October 2024
34
36
35
37
-[Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
36
-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries-preview), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
38
+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
37
39
38
40
## September 2024
39
41
@@ -337,7 +339,7 @@ The security operations team can view all actions pending approval, and the stip
337
339
338
340
## June 2021
339
341
340
-
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
342
+
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
341
343
342
344
Threat tags help you focus on specific threat categories and review the most relevant reports.
0 commit comments