Skip to content

Commit 15c4ce8

Browse files
authored
Merge branch 'main' into shdyas-workflows
2 parents 1ca5e1b + db9f26e commit 15c4ce8

File tree

8 files changed

+46
-25
lines changed

8 files changed

+46
-25
lines changed

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@ If you're using Intune to manage Defender for Endpoint settings, you can use it
5555
- Under **Connectivity**, see [Allow USB Connection](/windows/client-management/mdm/policy-csp-Connectivity#allowusbconnection)** and [Allow Bluetooth](/windows/client-management/mdm/policy-csp-Connectivity#allowbluetooth) settings.
5656
- Under **Bluetooth**, see a list of settings that pertain to Bluetooth connections and services. For more details, see [Policy CSP - Bluetooth](/windows/client-management/mdm/policy-csp-Bluetooth?WT.mc_id=Portal-fx).
5757
- Under **Device Control**, you can configure custom policies with reusable settings. For more details, see [Device control overview: Rules](device-control-policies.md#rules).
58+
- Under **System**, see [Allow Storage Card](/windows/client-management/mdm/policy-csp-System#allowstoragecard) settings.
5859

5960
6. After you have configured your settings, proceed to the **Scope tags** tab, where you can specify [scope tags](/mem/intune/fundamentals/scope-tags) for the policy.
6061

defender-endpoint/mac-install-with-intune.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 08/01/2024
17+
ms.date: 08/20/2024
1818
---
1919

2020
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -100,6 +100,9 @@ As part of the Endpoint Detection and Response capabilities, Microsoft Defender
100100

101101
Download [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
102102

103+
> [!IMPORTANT]
104+
> Only one `.mobileconfig` (plist) for Network Filter is supported. Adding multiple Network Filters leads to network connectivity issues on Mac. This issue is not specific to Defender for Endpoint on macOS.
105+
103106
To configure your network filter:
104107

105108
1. Under **Configuration profiles**, select **Create Profile**.
11.4 KB
Loading

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ f1.keywords: NOCSH
1313
ms.collection:
1414
- m365-security
1515
- Tier1
16-
ms.date: 04/02/2024
16+
ms.date: 08/14/2024
1717
---
1818

1919
# Compare Microsoft Defender Vulnerability Management plans and capabilities
@@ -30,17 +30,17 @@ This article helps clarify the Defender Vulnerability Management capabilities in
3030
- [Microsoft Defender Vulnerability Management](defender-vulnerability-management.md)
3131
- [Microsoft Defender for Servers](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
3232

33+
> [!NOTE]
34+
> Microsoft Defender Vulnerability Management isn't currently available to Microsoft Defender for Business customers.
35+
3336
## Start a trial
3437

38+
> [!NOTE]
39+
> The Microsoft Defender Vulnerability Management trial isn't currently available to US Government customers using GCC High, and DoD. For more information on purchase options available, see [Microsoft Defender Vulnerability Management](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-vulnerability-management-pricing?msockid=17c438e9b0b8628c22d52cd3b1c763eb).
40+
3541
- If you already have Defender for Endpoint Plan 2 [Try Defender Vulnerability Management Add-on trial for Defender for Endpoint Plan 2 customers](get-defender-vulnerability-management.md#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
3642
- For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers the **Microsoft Defender Vulnerability Management Standalone is now generally available**. To try it, go to [Try Defender Vulnerability Management Standalone](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
3743

38-
> [!NOTE]
39-
> Trial offerings for Microsoft Defender Vulnerability Management aren't currently available to:
40-
>
41-
> - US Government customers using GCC High, and DoD
42-
> - Microsoft Defender for Business customers
43-
4444
## Vulnerability Management capabilities for endpoints
4545

4646
The table below shows the availability of Defender Vulnerability Management capabilities for endpoints:

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,25 +14,30 @@ ms.collection:
1414
- m365-security
1515
- tier1
1616
- essentials-get-started
17-
ms.date: 08/01/2023
17+
ms.date: 08/14/2023
1818
---
1919

2020
# Sign up for Microsoft Defender Vulnerability Management
2121

22-
Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers.
22+
> [!NOTE]
23+
> Microsoft Defender Vulnerability Management isn't currently available to Microsoft Defender for Business customers.
24+
25+
## Starting a trial
2326

2427
> [!NOTE]
25-
> The trial offering for Microsoft Defender Vulnerability Management isn't currently available to:
26-
>
27-
> - US Government customers using GCC High, and DoD
28-
> - Microsoft Defender for Business customers
28+
> The Microsoft Defender Vulnerability Management trial isn't currently available to US Government customers using GCC High, and DoD.
29+
>
30+
> For more information on purchase options available, see [Microsoft Defender Vulnerability Management](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-vulnerability-management-pricing?msockid=17c438e9b0b8628c22d52cd3b1c763eb).
31+
32+
Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers.
2933

3034
- If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer sign up to try the [Defender Vulnerability Management Standalone Trial](#try-defender-vulnerability-management-standalone)
3135
- If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on Trial](#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers)
3236

3337
> [!NOTE]
3438
> Trials will be available to customers using the New Commerce Experience (NCE) for a 30 day period. After the 30 day period customers will be able to purchase Microsoft Defender Vulnerability Management through NCE.
3539
40+
3641
## Required roles for starting the trial
3742

3843
As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:

defender-xdr/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -478,9 +478,11 @@
478478
items:
479479
- name: SOC optimization overview
480480
display name: SOC optimization
481-
href: https://aka.ms/soc-opt-from-defender
481+
href: /azure/sentinel/soc-optimization/soc-optimization-access?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
482+
- name: Use SOC optimizations programmatically
483+
href: /azure/sentinel/soc-optimization/soc-optimization-api?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
482484
- name: SOC optimization reference
483-
href: https://aka.ms/soc-opt-ref
485+
href: /azure/sentinel/soc-optimization/soc-optimization-reference?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
484486
- name: Manage multitenant environments
485487
items:
486488
- name: Overview

defender-xdr/microsoft-threat-actor-naming.md

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,16 @@ ms.service: defender-xdr
66
ms.mktglfcycl: secure
77
ms.sitesec: library
88
ms.localizationpriority: medium
9-
ms.author: vpattnaik
10-
author: diannegali
9+
ms.author: diannegali
10+
author: vpattnaik
1111
manager: dansimp
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
1515
- tier2
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 06/12/2024
18+
ms.date: 08/19/2024
1919
---
2020

2121
# How Microsoft names threat actors
@@ -54,6 +54,7 @@ Use the following reference table to understand how our previously publicly disc
5454

5555
|Threat actor name|Previous name|Origin/Threat|Other names|
5656
|:---:|:---:|:---:|:---:|
57+
|Antique Typhoon|Storm-0558|China||
5758
|Aqua Blizzard|ACTINIUM|Russia|UNC530, Primitive Bear, Gamaredon|
5859
|Blue Tsunami||Private sector offensive actor|Black Cube|
5960
|Brass Typhoon|BARIUM|China|APT41|
@@ -97,7 +98,7 @@ Use the following reference table to understand how our previously publicly disc
9798
|Night Tsunami|DEV-0336|Private sector offensive actor|NSO Group|
9899
|Nylon Typhoon|NICKEL|China|ke3chang, APT15, Vixen Panda|
99100
|Octo Tempest|Storm-0875|Financially motivated|0ktapus, Scattered Spider, UNC3944|
100-
|Onyx Sleet|PLUTONIUM|North Korea|Silent Chollima, Andariel, DarkSeoul|
101+
|Onyx Sleet|PLUTONIUM|North Korea|APT45, Silent Chollima, Andariel, DarkSeoul|
101102
|Opal Sleet|OSMIUM|North Korea|Konni|
102103
|Peach Sandstorm|HOLMIUM|Iran|APT33, Refined Kitten|
103104
|Pearl Sleet|DEV-0215 (LAWRENCIUM)|North Korea||
@@ -110,13 +111,15 @@ Use the following reference table to understand how our previously publicly disc
110111
|Purple Typhoon|POTASSIUM|China|APT10, Cloudhopper, MenuPass|
111112
|Raspberry Typhoon|RADIUM|China|APT30, LotusBlossom|
112113
|Ruby Sleet|CERIUM|North Korea||
114+
|Ruza Flood|Storm-1099|Russia, Influence operations||
113115
|Salmon Typhoon|SODIUM|China|APT4, Maverick Panda|
114116
|Sangria Tempest|ELBRUS|Financially motivated|Carbon Spider, FIN7|
115117
|Sapphire Sleet|COPERNICIUM|North Korea|Genie Spider, BlueNoroff|
116118
|Seashell Blizzard|IRIDIUM|Russia|APT44, Sandworm|
117119
|Secret Blizzard|KRYPTON|Russia|Venomous Bear, Turla, Snake|
120+
|Sefid Flood|Storm-1364|Iran, Influence operations||
118121
|Silk Typhoon|HAFNIUM|China||
119-
|Smoke Sandstorm|BOHRIUM|Iran||
122+
|Smoke Sandstorm|BOHRIUM|Iran|UNC1549|
120123
|Spandex Tempest|CHIMBORAZO|Financially motivated|TA505|
121124
|Star Blizzard|SEABORGIUM|Russia|Callisto, Reuse Team|
122125
|Storm-0062||China|DarkShadow, Oro0lxy|
@@ -125,23 +128,24 @@ Use the following reference table to understand how our previously publicly disc
125128
|Storm-0257||Group in development|UNC1151|
126129
|Storm-0324||Financially motivated|TA543, Sagrid|
127130
|Storm-0381||Financially motivated||
131+
|Storm-0501||Group in development||
132+
|Storm-0506||Group in development||
128133
|Storm-0530||North Korea|H0lyGh0st|
129134
|Storm-0539||Financially motivated|Atlas Lion|
130-
|Storm-0558||China||
131135
|Storm-0569||Financially motivated||
132136
|Storm-0587||Russia|SaintBot, Saint Bear, TA471|
133137
|Storm-0744||Financially motivated||
134138
|Storm-0784||Iran||
135139
|Storm-0829||Group in development|Nwgen Team|
136140
|Storm-0835||Group in development|EvilProxy|
137141
|Storm-0842||Iran||
142+
|Storm-0844||Group in development||
138143
|Storm-0861||Iran||
139144
|Storm-0867||Egypt|Caffeine|
140145
|Storm-0971||Financially motivated|(Merged into Octo Tempest)|
141146
|Storm-0978||Group in development|RomCom, Underground Team|
142147
|Storm-1044||Financially motivated|Danabot|
143148
|Storm-1084||Iran|DarkBit|
144-
|Storm-1099||Russia||
145149
|Storm-1101||Group in development|NakedPages|
146150
|Storm-1113||Financially motivated||
147151
|Storm-1133||Palestinian Authority||
@@ -151,17 +155,22 @@ Use the following reference table to understand how our previously publicly disc
151155
|Storm-1283||Group in development||
152156
|Storm-1286||Group in development||
153157
|Storm-1295||Group in development|Greatness|
154-
|Storm-1364||Iran||
155-
|Storm-1376||China, Influence operations||
156158
|Storm-1516||Russia, Influence operations||
157159
|Storm-1567||Financially motivated|Akira|
158160
|Storm-1575||Group in development|Dadsec|
161+
|Storm-1660||Iran, Influence operations||
159162
|Storm-1674||Financially motivated||
160163
|Storm-1679||Russia, Influence operations||
164+
|Storm-1804||Iran, Influence operations||
165+
|Storm-1805||Iran, Influence operations||
161166
|Storm-1811||Financially motivated||
167+
|Storm-1841||Russia, Influence operations||
162168
|Storm-1849||China|UAT4356|
169+
|Storm-1852||Group in development||
170+
|Storm-2035||Iran, Influence operations||
163171
|Strawberry Tempest||Financially motivated|LAPSUS$|
164172
|Sunglow Blizzard||Russia||
173+
|Taizi Flood|Storm-1376|China, Influence operations|Spamouflage, Dragonbridge|
165174
|Tomato Tempest|SPURR|Financially motivated|Vatet|
166175
|Vanilla Tempest|DEV-0832|Financially motivated||
167176
|Velvet Tempest|DEV-0504|Financially motivated||

defender-xdr/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ You can also get product updates and important notifications through the [messag
3131

3232
## August 2024
3333

34+
- (Preview) Microsoft Sentinel data is now available with Defender XDR data in Microsoft Defender multitenant management. Only one Microsoft Sentinel workspace per tenant is currently supported in the Microsoft unified security operations platform. So, Microsoft Defender multitenant management shows security information and event management (SIEM) data from one Microsoft Sentinel workspace per tenant. For more information, see [Microsoft Defender multitenant management](mto-overview.md) and [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal).
3435
- To ensure a smooth experience while navigating the Microsoft Defender portal, configure your network firewall by adding the appropriate addresses to your allow list. For more information, see [Network firewall configuration for Microsoft Defender XDR](m365d-enable.md#configure-your-network-firewall).
3536

3637
## July 2024

0 commit comments

Comments
 (0)