Skip to content

Commit 20ae0bb

Browse files
authored
Merge branch 'main' into diannegali-cloudresponse
2 parents 367bb49 + 9c6eeaa commit 20ae0bb

File tree

8 files changed

+26
-23
lines changed

8 files changed

+26
-23
lines changed

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Watch this short video to learn more about Attack simulation training.
6565

6666
- There are no corresponding PowerShell cmdlets for Attack simulation training.
6767

68-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, and ZAF.
68+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, TWN and ZAF.
6969

7070
> [!NOTE]
7171
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,10 @@ This article describes how admins can manage entries for email senders in the Mi
5555

5656
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
5757
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
58-
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
58+
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) in the **Exchange admin center** at <https://admin.exchange.microsoft.com> \> **Roles** \> **Admin Roles**:
5959
- *Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
6060
- **Organization Management** or **Security Administrator** (Security admin role).
61-
- **Security Operator** (Tenant AllowBlockList Manager).
61+
- **Security Operator** (Tenant AllowBlockList Manager role)
6262
- *Read-only access to the Tenant Allow/Block List*: Membership in one of the following role groups:
6363
- **Global Reader**
6464
- **Security Reader**

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ For editable functions, more options are available when you select the vertical
4343
- **Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
4444
- **Delete** – deletes the function
4545

46-
### Use arg() operator for Azure Resource Graph queries (Preview)
46+
### Use arg() operator for Azure Resource Graph queries
4747
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
4848

4949
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.

defender-xdr/breadcrumb/toc.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@
99
- name: Microsoft Defender XDR
1010
tocHref: /defender-for-identity/
1111
topicHref: /defender-xdr/index
12+
- name: Microsoft Defender XDR
13+
tocHref: /unified-secops-platform/
14+
topicHref: /defender-xdr/index
1215

1316
## Azure override
1417
- name: 'Microsoft Defender'
@@ -18,4 +21,3 @@
1821
- name: 'Microsoft Defender XDR'
1922
tocHref: /azure/sentinel/
2023
topicHref: /defender-xdr/index
21-

defender-xdr/whats-new.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,12 @@ You can also get product updates and important notifications through the [messag
3232
## November 2024
3333

3434
- (Preview) Cloud-native investigation and response actions are now available for container-related alerts in the Microsoft Defender portal. Security operations center (SOC) analysts can now investigate and respond to container-related alerts in near real-time with cloud-native response actions and investigation logs to hunt for related activities. For more information, see [Investigate and respond to container threats in the Microsoft Defender portal](investigate-respond-container-threats.md).
35+
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
3536

3637
## October 2024
3738

3839
- [Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
39-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries-preview), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
40+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
4041

4142
## September 2024
4243

@@ -340,7 +341,7 @@ The security operations team can view all actions pending approval, and the stip
340341

341342
## June 2021
342343

343-
- (Preview) [View reports per threat tags](threat-analytics.md#view- reports-by-category)
344+
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
344345

345346
Threat tags help you focus on specific threat categories and review the most relevant reports.
346347

exposure-management/exposure-insights-overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,12 @@ Security Exposure Management provides initiatives that currently include:
5151
5252
### Initiative elements
5353

54-
**Element** | **Goal** | **Details**
55-
--- | --- | ---
56-
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
57-
**Metric** | Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.| Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.
58-
**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. | All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/> Within initiatives, recommendations are assigned a compliance state.
59-
**Events** | Events help you to monitor initiative changes. | Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.
54+
|**Element** | **Goal** | **Details**|
55+
|--- | --- | ---|
56+
|**Initiative** |Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.|Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/>The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.|
57+
|**Metric** |Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.|Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.|
58+
|**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. |All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/>Within initiatives, recommendations are assigned a compliance state.|
59+
|**Events** |Events help you to monitor initiative changes. |Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.|
6060

6161
## Working with initiatives
6262

671 KB
Loading

exposure-management/security-metrics.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 08/20/2024
9+
ms.date: 11/12/2024
1010
---
1111

1212
# Investigate security metrics
@@ -22,8 +22,8 @@ Security Exposure Management is currently in public preview.
2222
- Learn about [security metrics](exposure-insights-overview.md#working-with-metrics).
2323
- [Review permissions and prerequisites needed](prerequisites.md) for working with Security Exposure Management.
2424
- Note possible preview issues:
25-
- Some instances of affected assets information (largely information originating in Secure score) don't appear on the **Affected Items** tab in an individual metric.
26-
- Some critical asset information for assets in the **Affected Items** tab doesn't show.
25+
- Some instances of affected assets information (largely information originating in Secure score) don't appear on the **Affected Assets** tab in an individual metric.
26+
- Some critical asset information for assets in the **Affected Assets** tab doesn't show.
2727
- Asset details are calculated on demand.
2828
- Cloud-related metrics are only available if Microsoft Defender for Cloud is available in the subscription, and the Defender Cloud Security Posture Management (CSPM) plan is enabled.
2929
- In some cases, metrics are more specific than the scope of the related recommendations. In this case, the asset detail shown doesn't align with the asset details of the related recommendations.
@@ -43,18 +43,18 @@ Security Exposure Management is currently in public preview.
4343
- **State**: Current state of metric.
4444
- **Last state update**: The last time metric state was updated.
4545
- **Current value**: Current exposure score from significant to no/low exposure.
46-
- **Affected items**. The number of affected items in the total items.
47-
- **Weight**: Metric weight or maximum metric score possible.
46+
- **Affected assets**. The number of affected assets out of the total assets.
47+
- **Weight**: Metric weight which affects the metric impact on initiative score.
4848
- **Score impact**: Possible score gain.
4949
- **Security recommendations**: Recommendations associated with the metric.
5050

51-
## Edit the metric value
51+
## Edit the metric weight
5252

53-
You can customize metric values for your business needed.
53+
You can customize metric weight according to your business needs.
5454

55-
1. To edit the metric value, select a specific metric.
56-
1. In the metric properties page, select weight, change the value, and apply.
57-
1. To accept the risk described by the metric, set the weight to zero.
55+
1. To edit the metric weight, select a specific metric.
56+
1. In the metric properties side panel, select Edit metric, then change the metric weight and apply.
57+
1. To accept the risk described by the metric, set the metric weight to **Risk accepted**.
5858

5959
## Next steps
6060

0 commit comments

Comments
 (0)