Skip to content

Commit 10a8fc8

Browse files
authored
Merge branch 'main' into WI408102-Entra-PIM-integration-MDI-release-note
2 parents d5fd3b1 + 6d0acc3 commit 10a8fc8

18 files changed

+37
-19
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,17 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5-
5+
6+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
8+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
9+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
10+
611
on:
712
schedule:
8-
- cron: "0 9 1 * *"
13+
- cron: "0 9 1,15-31 * *"
914

10-
# workflow_dispatch:
15+
workflow_dispatch:
1116

1217

1318
jobs:
765 Bytes
Loading

CloudAppSecurityDocs/protect-atlassian.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
88

99

1010

11-
Atlassian is an online collaborative and software development platform (including Confluence, Jira and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
11+
Atlassian is an online collaborative and software development platform (including Confluence, Jira, and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
1212

13-
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities.
13+
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities.
1414

1515
Main threats include:
1616

@@ -68,7 +68,7 @@ For more information, see:
6868
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Atlassian products using the App Connector APIs. This connection gives you visibility into and control over your organization's Atlassian use.
6969

7070
>[!NOTE]
71-
>The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
71+
>The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
7272
7373
### Prerequisites
7474

@@ -116,19 +116,17 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
116116
>[!NOTE]
117117
>
118118
> - The first connection can take up to four hours to get all users and their activities.
119-
> - The activities that will display are the activities that were generated from the moment the connector is connected.
119+
> - The activities displayed are the activities that were generated from the moment the connector is connected.
120120
> - Activities from the "Atlassian Access" audit log are fetched by Defender for Cloud apps. Other activities aren't fetched currently. See [Product Audit Logs](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/).
121121
> - After the connector’s **Status** is marked as **Connected**, the connector is live and works.
122122
123123
### Revoke and renew API keys
124124

125125
1. Microsoft recommends using short lived keys or tokens for connecting apps as a security best practice.
126126
1. We recommend refreshing the Atlassian API key every 6 months as a best practice. To refresh the key, revoke the existing API key and generate a new key.
127-
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration and select **Revoke**.
127+
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration, and select **Revoke**.
128128
1. Recreate an API key in the Atlassian admin portal with the steps described above.
129-
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector:
130-
131-
![Edit connector.](media/atlassian-edit-connector.png)
129+
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector.
132130

133131
1. Enter the new generated new **API key** and select **Connect Atlassian**.
134132
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
@@ -148,13 +146,13 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
148146

149147
## Rate limits and limitations
150148

151-
- **Rate limits** include 1000 requests per minute (per API key/connector instance).
149+
- **Rate limits** include 1,000 requests per minute (per API key/connector instance).
152150

153151
For more information about the Atlassian API limitation, see [Atlassian admin REST APIs](https://developer.atlassian.com/cloud/admin/about/#about-the-cloud-admin-rest-apis).
154152

155153
- **Limitations** include:
156154

157-
- Activities will be shown in Defender for Cloud Apps only for users with a verified domain.
155+
- Activities are shown in Defender for Cloud Apps only for users with a verified domain.
158156

159157
- The API key has a maximum expiration period of one year. After one year, you'll need to create another API key from the Atlassian Admin portal and replace it for the old API Key in the Defender for Cloud Apps console.
160158

CloudAppSecurityDocs/protect-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99

1010

11-
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
11+
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
1212

1313
Connecting Azure to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, and unusual deletions of VMs.
1414

@@ -74,7 +74,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
7474
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7575

7676
> [!NOTE]
77-
> After connecting Azure, data will be pulled. You will see data from then onwards.
77+
> After connecting to Azure, data will be pulled. You'll see data from then onwards.
7878
7979
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
8080

defender-xdr/dlp-investigate-alerts-defender.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,14 @@ It's best practice to only grant minimal permissions to alerts in the Microsoft
8383

8484
1. Search for the DLP policy name of the alerts and incidents you're interested in.
8585

86-
1. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
86+
1. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page. Select **Summarize** (preview) for Security Copilot to generate a summary of the alert. The alert summary will contain the:
87+
88+
- alert severity
89+
- alert title
90+
- the name of the policy that was matched
91+
- the name file involved and a link to the file
92+
- alert status
93+
- the email address of the user who performed the action that matched the policy
8794

8895
1. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
8996

defender/threat-intelligence/security-copilot-and-defender-threat-intelligence.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,12 @@ ms.custom:
1616
- cx-ti
1717
- cx-mdti
1818
ms.topic: conceptual
19-
ms.date: 01/15/2025
19+
ms.date: 04/22/2025
2020
---
2121

2222
# Microsoft Security Copilot in Microsoft Defender Threat Intelligence
2323

24-
Microsoft Security Copilot is a cloud-based AI platform that provides natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, read [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot).
24+
Microsoft Security Copilot is a cloud-based AI platform that provides a natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, read [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot).
2525

2626
Security Copilot customers gain for each of their authenticated Copilot users access to Microsoft Defender Threat Intelligence (Defender TI). To ensure that you have access to Copilot, see the [Security Copilot purchase and licensing information](/copilot/security/faq-security-copilot).
2727

@@ -158,9 +158,17 @@ Get detailed information about an indicator (for example, IP addresses, domains,
158158
- Show me all resolutions for IP address _\<IP address\>_.
159159
- Show me the open services in _\<IP address\>_.
160160

161+
### Malware information
162+
163+
Get detailed information about a specific malware detection, which is derived from the [Microsoft Security Intelligence threat encyclopedia](https://www.microsoft.com/en-us/wdsi/threats/threat-search).
164+
165+
**Sample prompt**:
166+
167+
- What can you tell me about Ransom:Win32/WannaCrypt?
168+
161169
## Provide feedback
162170

163-
Your feedback on the Defender TI integration in Security Copilot helps with development. To provide feedback, in Copilot, select **How's this response?** At the bottom of each completed prompt and choose any of the following options:
171+
Your feedback on the Defender TI integration in Security Copilot helps with development. To provide feedback, in Copilot, select **How's this response?** at the bottom of each completed prompt and choose any of the following options:
164172
- **Looks right** - Select this button if the results are accurate, based on your assessment.
165173
- **Needs improvement** - Select this button if any detail in the results is incorrect or incomplete, based on your assessment.
166174
- **Inappropriate** - Select this button if the results contain questionable, ambiguous, or potentially harmful information.
-9.32 KB
Loading
313 KB
Loading
-13.2 KB
Loading
-23.4 KB
Loading

0 commit comments

Comments
 (0)