Skip to content

Commit 2536eae

Browse files
Merge pull request #688 from MicrosoftDocs/main
publish main to live 10:30 AM 6/12/24
2 parents 350c019 + 26f1fbe commit 2536eae

10 files changed

+95
-81
lines changed

defender-endpoint/ios-install.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -195,9 +195,8 @@ Once the above configuration is done and synced with the device, the following a
195195
- Web Protection and other features will be activated.
196196

197197
> [!NOTE]
198-
> For supervised devices, admins can setup Zero touch onboarding with the new [ZeroTouch Control Filter Profile](#device-configuration-profile-control-filter).
199-
200-
Defender for Endpoint VPN Profile will not be installed on the device and Web protection will be provided by the Control Filter Profile.
198+
> - Zero touch setup can take up to 5 minutes to complete in the background.
199+
> - For supervised devices, admins can set up Zero touch onboarding with the [ZeroTouch Control Filter Profile](#device-configuration-profile-control-filter). Defender for Endpoint VPN Profile will not be installed on the device and Web protection will be provided by the Control Filter Profile.
201200
202201
### Auto-Onboarding of VPN profile (Simplified Onboarding)
203202

@@ -230,8 +229,6 @@ Admins can configure auto-setup of VPN profile. This will automatically set up t
230229
1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
231230

232231
## **User Enrollment setup** (only for Intune User Enrolled devices)
233-
> [!IMPORTANT]
234-
> User Enrollment for Microsoft Defender on iOS is in public preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
235232

236233
Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices using the following steps.
237234

@@ -258,9 +255,9 @@ Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices u
258255
Defender app is installed into the user's device. User signs in and completes the onboarding. Once the device is successfully onboarded, it will be visible in the Defender Security Portal under Device Inventory.
259256

260257
### Supported features and limitations
261-
1. Supported all the current capabilities of MDE iOS like – Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
258+
1. Supports all the current capabilities of Defender for Endpoint iOS like – Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
262259
1. Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
263-
1. For Vulnerability management of apps, only apps in the work profile will be visible.
260+
1. For vulnerability management of apps, only apps in the work profile will be visible.
264261
1. Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
265262

266263

defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,10 +73,7 @@ ms.date: 02/22/2024
7373
- The device is either enrolled with the [Intune Company Portal app](https://apps.apple.com/us/app/intune-company-portal/id719171358) or is registered with Microsoft Entra ID through [Microsoft Authenticator](https://apps.apple.com/app/microsoft-authenticator/id983156458) with the same account.
7474

7575
> [!NOTE]
76-
>
7776
> - Microsoft Defender for Endpoint on iOS isn't supported on user-less or shared devices.
78-
> - Microsoft Defender for Endpoint on iOS isn't supported currently while using iOS User Enrollment.
79-
8077
## Installation instructions
8178

8279
Deployment of Microsoft Defender for Endpoint on iOS can be done via Microsoft Intune and both supervised and unsupervised devices are supported. End-users can also directly install the app from the [Apple app store](https://aka.ms/mdatpiosappstore).

defender-xdr/TOC.yml

Lines changed: 25 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
items:
55
- name: Overview
66
items:
7-
- name: What is Microsoft Defender XDR
7+
- name: What is Microsoft Defender XDR?
88
href: microsoft-365-defender.md
99
- name: What's new
1010
href: whats-new.md
@@ -68,20 +68,36 @@
6868
href: m365d-enable.md
6969
- name: 2. Deploy supported services
7070
href: deploy-supported-services.md
71-
- name: Setup guides for Microsoft Defender XDR
72-
href: deploy-configure-m365-defender.md
73-
- name: Turning on Microsoft Defender XDR FAQs
74-
href: m365d-enable-faq.md
75-
- name: Train your security staff
76-
href: microsoft-365-defender-train-security-staff.md
71+
- name: 3. Train your security staff
72+
href: microsoft-365-defender-train-security-staff.md
73+
- name : Guides and FAQs
74+
items:
75+
- name: Setup guides for Microsoft Defender XDR
76+
href: deploy-configure-m365-defender.md
77+
- name: Turning on Microsoft Defender XDR FAQs
78+
href: m365d-enable-faq.md
79+
- name: Guides for your security staff
80+
items:
81+
- name: Respond to your first incident
82+
href: respond-first-incident-365-defender.md
83+
- name: Analyze your first incident
84+
href: respond-first-incident-analyze.md
85+
- name: Remediate your first incident
86+
href: respond-first-incident-remediate.md
87+
- name: Additional incident examples
88+
items:
89+
- name: Phishing email
90+
href: first-incident-path-phishing.md
91+
- name: Identity
92+
href: first-incident-path-identity.md
7793
- name: Protect against threats
7894
items:
7995
- name: Microsoft Secure Score
8096
items:
81-
- name: What's new
82-
href: microsoft-secure-score-whats-new.md
8397
- name: Overview
8498
href: microsoft-secure-score.md
99+
- name: What's new
100+
href: microsoft-secure-score-whats-new.md
85101
- name: Assess your security posture
86102
href: microsoft-secure-score-improvement-actions.md
87103
- name: Track your score history and meet goals
@@ -124,20 +140,6 @@
124140
href: manage-incidents.md
125141
- name: Export incidents queue to CSV file
126142
href: export-incidents-queue.md
127-
- name: Respond to your first incident
128-
items:
129-
- name: Overview
130-
href: respond-first-incident-365-defender.md
131-
- name: Analyze your first incident
132-
href: respond-first-incident-analyze.md
133-
- name: Remediate your first incident
134-
href: respond-first-incident-remediate.md
135-
- name: Additional incident examples
136-
items:
137-
- name: Phishing email
138-
href: first-incident-path-phishing.md
139-
- name: Identity
140-
href: first-incident-path-identity.md
141143
- name: Investigate incidents
142144
items:
143145
- name: Incidents

defender-xdr/microsoft-threat-actor-naming.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 04/29/2024
19+
ms.date: 06/12/2024
2020
---
2121

2222
# How Microsoft names threat actors
@@ -85,12 +85,14 @@ Use the following reference table to understand how our previously publicly disc
8585
|Lemon Sandstorm|RUBIDIUM|Iran|Fox Kitten, UNC757, PioneerKitten|
8686
|Leopard Typhoon|LEAD|China|KAOS, Mana, Winnti, Red Diablo|
8787
|Lilac Typhoon|DEV-0234|China||
88+
|Luna Tempest|Storm-0744|Financially motivated||
8889
|Manatee Tempest|DEV-0243|Financially motivated|EvilCorp, UNC2165, Indrik Spider|
8990
|Mango Sandstorm|MERCURY|Iran|MuddyWater, SeedWorm, Static Kitten, TEMP.Zagros|
9091
|Marbled Dust|SILICON|Türkiye|Sea Turtle|
9192
|Marigold Sandstorm|DEV-0500|Iran|Moses Staff|
9293
|Midnight Blizzard|NOBELIUM|Russia|APT29, Cozy Bear|
9394
|Mint Sandstorm|PHOSPHORUS|Iran|APT35, Charming Kitten|
95+
|Moonstone Sleet|Storm-1789|North Korea||
9496
|Mulberry Typhoon|MANGANESE|China|APT5, Keyhole Panda, TABCTENG|
9597
|Mustard Tempest|DEV-0206|Financially motivated|Purple Vallhund|
9698
|Night Tsunami|DEV-0336|Private sector offensive actor|NSO Group|
@@ -106,6 +108,7 @@ Use the following reference table to understand how our previously publicly disc
106108
|Pistachio Tempest|DEV-0237|Financially motivated|FIN12|
107109
|Plaid Rain|POLONIUM|Lebanon||
108110
|Pumpkin Sandstorm|DEV-0146|Iran|ZeroCleare|
111+
|Purple Typhoon|POTASSIUM|China|APT10, Cloudhopper, MenuPass|
109112
|Raspberry Typhoon|RADIUM|China|APT30, LotusBlossom|
110113
|Ruby Sleet|CERIUM|North Korea||
111114
|Salmon Typhoon|SODIUM|China|APT4, Maverick Panda|
@@ -124,7 +127,7 @@ Use the following reference table to understand how our previously publicly disc
124127
|Storm-0324||Financially motivated|TA543, Sagrid|
125128
|Storm-0381||Financially motivated||
126129
|Storm-0530||North Korea|H0lyGh0st|
127-
|Storm-0539||Financially motivated||
130+
|Storm-0539||Financially motivated|Atlas Lion|
128131
|Storm-0558||China||
129132
|Storm-0569||Financially motivated||
130133
|Storm-0587||Russia|SaintBot, Saint Bear, TA471|
@@ -155,6 +158,9 @@ Use the following reference table to understand how our previously publicly disc
155158
|Storm-1567||Financially motivated|Akira|
156159
|Storm-1575||Group in development|Dadsec|
157160
|Storm-1674||Financially motivated||
161+
|Storm-1679||Russia, Influence operations||
162+
|Storm-1811||Financially motivated||
163+
|Storm-1849||China|UAT4356|
158164
|Strawberry Tempest||Financially motivated|LAPSUS$|
159165
|Sunglow Blizzard||Russia||
160166
|Tomato Tempest|SPURR|Financially motivated|Vatet|

defender-xdr/security-copilot-m365d-guided-response.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -54,25 +54,25 @@ Each card contains information about the recommended action, including the entit
5454

5555
The guided response cards can be sorted based on the available status for each card. You can select a specific status when viewing the guided responses by clicking on **Status** and selecting the appropriate status you want to view. All guided response cards regardless of status are shown by default.
5656

57-
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-status-small.png" alt-text="Screenshot highlighting the status of responses in the Copilot pane in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-status.png":::
57+
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-status-small.png" alt-text="Screenshot that shows the status of responses in the Copilot pane in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-status.png":::
5858

5959
To use guided responses, perform the following steps:
6060

6161
1. Open an incident page. Copilot automatically generates guided responses upon opening an incident page. The Copilot pane appears on the right side of the incident page, showing the guided response cards.
6262

63-
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-small.png" alt-text="Screenshot highlighting the Copilot pane with the guided responses in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response.png":::
63+
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-small.png" alt-text="Screenshot that shows the Copilot pane with the guided responses in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response.png":::
6464

6565
2. Review each card before applying the recommendations. Select the More actions ellipsis (...) on top of a response card to view the options available for each recommendation. Here are some examples.
6666

67-
![Screenshot highlighting the options available to users in a guided response card in the Copilot side panel.](/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-more-actions1.png)
67+
![Screenshot that shows the options available to users in a guided response card in the Copilot side panel.](/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-more-actions1.png)
6868

69-
![Screenshot highlighting the options available to users in an automation response card in the Copilot pane in Microsoft Defender XDR.](/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-more-actions2.png)
69+
![Screenshot that shows the options available to users in an automation response card in the Copilot pane in Microsoft Defender XDR.](/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-more-actions2.png)
7070

7171
3. To apply an action, select the desired action found on each card. The guided response action on each card is tailored to the type of incident and the specific entity involved.
7272

73-
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-actions-small.png" alt-text="Screenshot of the guided response cards in the Copilot pane in Microsoft Defender." lightbox="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-actions.png":::
73+
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-actions-small.png" alt-text="Screenshot that shows the guided response cards in the Copilot pane in Microsoft Defender." lightbox="/defender/media/copilot-in-defender/guided-response/copilot-defender-guided-response-actions.png":::
7474

75-
4. You can provide feedback to each response card to continuously enhance future responses from Copilot. To provide feedback, select the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](/defender/media/copilot-in-defender/copilot-defender-feedback.png) found on the bottom right of each card.
75+
4. You can provide feedback to each response card to continuously enhance future responses from Copilot. To provide feedback, select the feedback icon ![Screenshot that shows the feedback icon for Copilot in Defender cards](/defender/media/copilot-in-defender/copilot-defender-feedback.png) found on the bottom right of each card.
7676

7777
> [!NOTE]
7878
> Grayed out action buttons mean these actions are limited by your permission. [Refer to the unified role-based access (RBAC) permissions](manage-rbac.md) page for more information.

defender-xdr/security-copilot-m365d-incident-summary.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ ms.date: 04/01/2024
3333
- Microsoft Defender XDR
3434
- Microsoft Defender unified security operations center (SOC) platform
3535

36-
Microsoft Defender XDR applies the capabilities of [Copilot for Security](/security-copilot/microsoft-security-copilot) to summarize incidents, delivering impactful information and insights to simplify investigation tasks. Attack investigation is a crucial step for incident response teams to successfully defend an organization against further damage from a cyber threat. Investigations can oftentimes be time-consuming as it involves numerous steps. Incident response teams need to understand how the attack happened: sort through numerous alerts, identify which assets and entities are involved, and assess the scope and impact of an attack.
36+
Microsoft Defender XDR applies the capabilities of [Copilot for Security](/security-copilot/microsoft-security-copilot) to summarize incidents, delivering impactful information and insights to simplify investigation tasks. Attack investigation is a crucial step for incident response teams to successfully defend an organization against further damage from a cyber threat. Investigations can often be time-consuming as it involves numerous steps. Incident response teams need to understand how the attack happened: sort through numerous alerts, identify which assets and entities are involved, and assess the scope and impact of an attack.
3737

3838
Incident responders can easily gain the right context to investigate and remediate incidents through Defender XDR's correlation capabilities and Copilot for Security's AI-powered data processing and contextualization. With an incident summary, responders can quickly get important information to help in their investigation.
3939

@@ -57,12 +57,17 @@ To summarize an incident, perform the following steps:
5757
1. Open an incident page. Copilot automatically creates an incident summary upon opening the page. You can stop the summary creation by selecting **Cancel** or restart creation by selecting **Regenerate**.
5858

5959
2. The incident summary card loads on the Copilot pane. Review the generated summary on the card.
60-
:::image type="content" source="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-small.png" alt-text="Screenshot of the incident summary card on the Copilot pane as seen in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary.png":::
60+
61+
:::image type="content" source="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-small.png" alt-text="Screenshot that shows the incident summary card on the Copilot pane as seen in the Microsoft Defender incident page." lightbox="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary.png":::
62+
6163
> [!TIP]
6264
> You can navigate to a file, IP, or URL page from the Copilot results pane by clicking on the evidence in the results.
63-
3. Select the **More actions** ellipsis (...) at the top of the incident summary card to copy or regenerate the summary, or view the summary in the Copilot for Security portal. Selecting **Open in Copilot for Security** opens a new tab to the Copilot for Security standalone portal where you can input prompts and access other plugins.
64-
:::image type="content" source="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-more-actions.png" alt-text="Screenshot highlighting the actions available on the incident summary card." lightbox="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-more-actions.png":::
65-
4. Review the summary and use the information to guide your investigation and response to the incident. You can provide feedback on the summary by selecting the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](/defender/media/copilot-in-defender/copilot-defender-feedback.png) found on the bottom of the Copilot pane.
65+
66+
1. Select the **More actions** ellipsis (...) at the top of the incident summary card to copy or regenerate the summary, or view the summary in the Copilot for Security portal. Selecting **Open in Copilot for Security** opens a new tab to the Copilot for Security standalone portal where you can input prompts and access other plugins.
67+
68+
:::image type="content" source="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-more-actions.png" alt-text="Screenshot that shows the actions available on the incident summary card." lightbox="/defender/media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-more-actions.png":::
69+
70+
1. Review the summary and use the information to guide your investigation and response to the incident. You can provide feedback on the summary by selecting the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](/defender/media/copilot-in-defender/copilot-defender-feedback.png) found on the bottom of the Copilot pane.
6671

6772
## See also
6873

0 commit comments

Comments
 (0)