You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-get-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ Watch this short video to learn more about Attack simulation training.
65
65
66
66
- There are no corresponding PowerShell cmdlets for Attack simulation training.
67
67
68
-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, and ZAF.
68
+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, TWN and ZAF.
69
69
70
70
> [!NOTE]
71
71
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-email-spoof-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,10 +55,10 @@ This article describes how admins can manage entries for email senders in the Mi
55
55
56
56
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57
57
-[Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration**\>**Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
-[Exchange Online permissions](/exchange/permissions-exo/permissions-exo) in the **Exchange admin center** at <https://admin.exchange.microsoft.com>\>**Roles**\>**Admin Roles**:
59
59
-*Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
60
60
-**Organization Management** or **Security Administrator** (Security admin role).
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ For editable functions, more options are available when you select the vertical
43
43
-**Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
44
44
-**Delete** – deletes the function
45
45
46
-
### Use arg() operator for Azure Resource Graph queries (Preview)
46
+
### Use arg() operator for Azure Resource Graph queries
47
47
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
48
48
49
49
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,11 +32,12 @@ You can also get product updates and important notifications through the [messag
32
32
## November 2024
33
33
34
34
- (Preview) Cloud-native investigation and response actions are now available for container-related alerts in the Microsoft Defender portal. Security operations center (SOC) analysts can now investigate and respond to container-related alerts in near real-time with cloud-native response actions and investigation logs to hunt for related activities. For more information, see [Investigate and respond to container threats in the Microsoft Defender portal](investigate-respond-container-threats.md).
35
+
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
35
36
36
37
## October 2024
37
38
38
39
-[Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
39
-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries-preview), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
40
+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
40
41
41
42
## September 2024
42
43
@@ -340,7 +341,7 @@ The security operations team can view all actions pending approval, and the stip
340
341
341
342
## June 2021
342
343
343
-
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
344
+
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
344
345
345
346
Threat tags help you focus on specific threat categories and review the most relevant reports.
Copy file name to clipboardExpand all lines: exposure-management/exposure-insights-overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,12 +51,12 @@ Security Exposure Management provides initiatives that currently include:
51
51
52
52
### Initiative elements
53
53
54
-
**Element** | **Goal** | **Details**
55
-
--- | --- | ---
56
-
**Initiative** |Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.|Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/>The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
57
-
**Metric** |Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.|Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.
58
-
**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. |All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/>Within initiatives, recommendations are assigned a compliance state.
59
-
**Events** |Events help you to monitor initiative changes. |Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.
54
+
|**Element**|**Goal**|**Details**|
55
+
|--- | --- | ---|
56
+
|**Initiative**|Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.|Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/>The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.|
57
+
|**Metric**|Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.|Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.|
58
+
|**Recommendations**|Security recommendations help you to understand the compliance state for a specific security initiative. |All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/>Within initiatives, recommendations are assigned a compliance state.|
59
+
|**Events**|Events help you to monitor initiative changes. |Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.|
Copy file name to clipboardExpand all lines: exposure-management/security-metrics.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlanger
6
6
manager: rayne-wiselman
7
7
ms.topic: overview
8
8
ms.service: exposure-management
9
-
ms.date: 08/20/2024
9
+
ms.date: 11/12/2024
10
10
---
11
11
12
12
# Investigate security metrics
@@ -22,8 +22,8 @@ Security Exposure Management is currently in public preview.
22
22
- Learn about [security metrics](exposure-insights-overview.md#working-with-metrics).
23
23
-[Review permissions and prerequisites needed](prerequisites.md) for working with Security Exposure Management.
24
24
- Note possible preview issues:
25
-
- Some instances of affected assets information (largely information originating in Secure score) don't appear on the **Affected Items** tab in an individual metric.
26
-
- Some critical asset information for assets in the **Affected Items** tab doesn't show.
25
+
- Some instances of affected assets information (largely information originating in Secure score) don't appear on the **Affected Assets** tab in an individual metric.
26
+
- Some critical asset information for assets in the **Affected Assets** tab doesn't show.
27
27
- Asset details are calculated on demand.
28
28
- Cloud-related metrics are only available if Microsoft Defender for Cloud is available in the subscription, and the Defender Cloud Security Posture Management (CSPM) plan is enabled.
29
29
- In some cases, metrics are more specific than the scope of the related recommendations. In this case, the asset detail shown doesn't align with the asset details of the related recommendations.
@@ -43,18 +43,18 @@ Security Exposure Management is currently in public preview.
43
43
-**State**: Current state of metric.
44
44
-**Last state update**: The last time metric state was updated.
45
45
-**Current value**: Current exposure score from significant to no/low exposure.
46
-
-**Affected items**. The number of affected items in the total items.
47
-
-**Weight**: Metric weight or maximum metric score possible.
46
+
-**Affected assets**. The number of affected assets out of the total assets.
47
+
-**Weight**: Metric weight which affects the metric impact on initiative score.
48
48
-**Score impact**: Possible score gain.
49
49
-**Security recommendations**: Recommendations associated with the metric.
50
50
51
-
## Edit the metric value
51
+
## Edit the metric weight
52
52
53
-
You can customize metric values for your business needed.
53
+
You can customize metric weight according to your business needs.
54
54
55
-
1. To edit the metric value, select a specific metric.
56
-
1. In the metric properties page, select weight, change the value, and apply.
57
-
1. To accept the risk described by the metric, set the weight to zero.
55
+
1. To edit the metric weight, select a specific metric.
56
+
1. In the metric properties side panel, select Edit metric, then change the metric weight and apply.
57
+
1. To accept the risk described by the metric, set the metric weight to **Risk accepted**.
0 commit comments