You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-egnyte.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
79
79
>[!NOTE]
80
80
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
81
81
>
82
-
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
82
+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more information, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
@@ -192,10 +188,9 @@ The **Manage alert** pane allows you to view or specify:
192
188
- A comment on the alert.
193
189
194
190
> [!NOTE]
195
-
> Around August 29th, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
196
-
197
-
> [!NOTE]
198
-
> One way of managing alerts it through the use of tags. The tagging capability for Microsoft Defender for Office 365 is incrementally being rolled out and is currently in preview.
191
+
> - In August 2022, previously supported alert determination values (`Apt` and `SecurityPersonnel`) were deprecated and are no longer available via the API.
192
+
>
193
+
> - One way of managing alerts it through the use of tags. The tagging capability for Microsoft Defender for Office 365 is currently in preview, rolling out incrementally.
199
194
>
200
195
> Currently, modified tag names are only applied to alerts created *after* the update. Alerts that were generated before the modification will not reflect the updated tag name.
201
196
@@ -288,6 +283,7 @@ Create alert tuning rules from the Microsoft Defender XDR **Settings** area or f
288
283
289
284
> [!NOTE]
290
285
> The **alert title (Name)** is based on the **alert type (IoaDefinitionId)**, which decides the alert title. Two alerts that have the same alert type can change to a different alert title.
286
+
> The *Hide alert* feature is only available in Defender for Endpoint alerts.
Copy file name to clipboardExpand all lines: unified-secops-platform/overview-plan.md
+31-7Lines changed: 31 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,10 +32,10 @@ Microsoft Defender XDR services include:
32
32
33
33
| Service | Description |
34
34
| ------- | ----------- |
35
-
|[**Microsoft Defender for Identity**](/defender-for-identity/what-is)| Identifies, detects, and investigates threats from both on-premises Active Directory and cloud identities like Microsoft Entra ID. |
36
35
|[**Microsoft Defender for Office 365**](/defender-office-365/mdo-about)| Protects against threats posed by email messages, URL links, and Office 365 collaboration tools. |
36
+
|[**Microsoft Defender for Identity**](/defender-for-identity/what-is)| Identifies, detects, and investigates threats from both on-premises Active Directory and cloud identities like Microsoft Entra ID. |
37
37
|[**Microsoft Defender for Endpoint**](/defender-endpoint/microsoft-defender-endpoint)| Monitors and protects endpoint devices, detects and investigates device breaches, and automatically responds to security threats. |
38
-
|**Enterprise IoT monitoring** from [Microsoft Defender for IoT](/defender-for-iot/microsoft-defender-iot)| Provides both IoT device discovery and security value for IoT devices. |
38
+
|[**Microsoft Defender for IoT**](/defender-for-iot/microsoft-defender-iot)| Provides both IoT device discovery and security value for IoT devices. |
39
39
|[**Microsoft Defender Vulnerability Management**](/defender-vulnerability-management/defender-vulnerability-management)| Identifies assets and software inventory, and assesses device posture to find security vulnerabilities. |
40
40
|[**Microsoft Defender for Cloud Apps**](/defender-cloud-apps/what-is-defender-for-cloud-apps)| Protects and controls access to SaaS cloud apps. |
41
41
@@ -51,17 +51,18 @@ Other services supported in the Microsoft Defender portal as part of Microsoft's
51
51
52
52
## Review service prerequisites
53
53
54
-
Before you deploy Microsoft's unified security operations platform, review the prerequisites for each service you plan to use. The following table lists the services and links to their prerequisites:
54
+
Before you deploy Microsoft's unified security operations platform, review the prerequisites for each service you plan to use. The following table lists the services and links for more information:
| Microsoft Defender XDR and Microsoft Defender for Office |[Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
59
+
| Microsoft Defender XDR |[Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
60
60
| Microsoft Sentinel |[Prerequisites to deploy Microsoft Sentinel](/azure/sentinel/prerequisites)|
61
61
|**Optional Microsoft Defender XDR services**||
62
+
| Microsoft Defender for Office |[Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
62
63
| Microsoft Defender for Identity |[Microsoft Defender for Identity prerequisites](/defender-for-identity/deploy/prerequisites)|
63
64
| Microsoft Defender for Endpoint |[Set up Microsoft Defender for Endpoint deployment](/defender-endpoint/production-deployment)|
64
-
| Enterprise monitoring with Microsoft Defender for IoT |[Prerequisites for Enterprise IoT security](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint#prerequisites)|
65
+
| Enterprise monitoring with Microsoft Defender for IoT |[Prerequisites for Defender for IoT in the Defender portal](/defender-for-iot/prerequisites)|
65
66
| Microsoft Defender Vulnerability Management |[Prerequisites & Permissions for Microsoft Defender Vulnerability Management](/defender-vulnerability-management/tvm-prerequisites)|
66
67
| Microsoft Defender for Cloud Apps |[Get started with Microsoft Defender for Cloud Apps](/defender-cloud-apps/get-started)|
67
68
|**Other services supported in the Microsoft Defender portal**||
@@ -71,6 +72,29 @@ Before you deploy Microsoft's unified security operations platform, review the p
71
72
| Microsoft Defender Threat Intelligence |[Prerequisites for Defender Threat Intelligence](/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal#prerequisites)|
72
73
| Microsoft Entra ID Protection |[Prerequisites for Microsoft Entra ID Protection](/entra/id-protection/how-to-deploy-identity-protection#prerequisites)|
73
74
75
+
## Review data security and privacy practices
76
+
77
+
Before you deploy Microsoft's unified security operations platform, make sure that you understand the data security and privacy practices for each service you plan to use. The following table lists the services and links for more information. Note that several services use the data security and retention practices for Microsoft Defender XDR instead of have separate practices of their own.
| Microsoft Defender XDR |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
83
+
| Microsoft Sentinel |[Geographical availability and data residency in Microsoft Sentinel](/azure/sentinel/geographical-availability-data-residency)|
84
+
|**Optional Microsoft Defender XDR services**||
85
+
| Microsoft Defender for Office |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
86
+
| Microsoft Defender for Identity |[Privacy with Microsoft Defender for Identity](/defender-for-identity/privacy-compliance)|
87
+
| Microsoft Defender for Endpoint |[Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
88
+
| Enterprise monitoring with Microsoft Defender for IoT |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
89
+
| Microsoft Defender Vulnerability Management |[Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
90
+
| Microsoft Defender for Cloud Apps |[Privacy with Microsoft Defender for Cloud Apps](/defender-cloud-apps/cas-compliance-trust)|
91
+
|**Other services supported in the Microsoft Defender portal**||
92
+
| Microsoft Security Exposure Management |[Data freshness, retention, and related functionality](/security-exposure-management/microsoft-security-exposure-management#data-freshness-retention-and-related-functionality)|
93
+
| Microsoft Security Copilot |[Privacy and data security in Microsoft Security Copilot](/copilot/security/privacy-data-security)|
94
+
| Microsoft Defender for Cloud |[Microsoft Defender for Cloud data security](/azure/defender-for-cloud/data-security)|
95
+
| Microsoft Defender Threat Intelligence |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
96
+
| Microsoft Entra ID Protection |[Microsoft Entra data retention](/entra/identity/monitoring-health/reference-reports-data-retention)|
97
+
74
98
## Plan your Log Analytics workspace architecture
75
99
76
100
To use Microsoft's unified SecOps platform, you need a Log Analytics workspace enabled for Microsoft Sentinel. A single Log Analytics workspace might be sufficient for many environments, but many organizations create multiple workspaces to optimize costs and better meet different business requirements. Microsoft's unified SecOps platform supports only a single workspace.
0 commit comments