Skip to content

Commit 2578e6d

Browse files
Merge pull request #4822 from MicrosoftDocs/main
[AutoPublish] main to live - 08/25 01:35 PDT | 08/25 14:05 IST
2 parents 406486c + ca60865 commit 2578e6d

File tree

4 files changed

+31
-26
lines changed

4 files changed

+31
-26
lines changed

CloudAppSecurityDocs/protect-office-365.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,8 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
138138
- You must [enable auditing in Power BI](/power-bi/admin/service-admin-auditing) to get the logs from there. Once auditing is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
139139
- You must [enable auditing in Dynamics 365](/power-platform/admin/enable-use-comprehensive-auditing#enable-auditing) to get the logs from there. Once auditing is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
140140

141+
- You must [enable the service principal](/graph/api/serviceprincipal-get?view=graph-rest-1.0&tabs=http) to get Malware detection and response support (this service API is enabled by default). Once API is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
142+
141143
**To connect Microsoft 365 to Defender for Cloud Apps**:
142144

143145
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.

defender-endpoint/mac-whatsnew.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,18 @@ This feature enables organizations to configure offline updates for security int
7474

7575
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
7676

77+
### Aug-2025 (Build: 101.25062.0006 | Release version: 20.125062.6.0)
78+
79+
| Build: | **101.25062.0006** |
80+
|--------------------|----------------------|
81+
| Release version: | **20.125062.6.0** |
82+
| Engine version: | **1.1.25070.3000** |
83+
| Signature version: | **1.435.357.0** |
84+
85+
##### What's new
86+
87+
- Bug and performance fixes
88+
7789
### Jul-2025 (Build: 101.25062.0005 | Release version: 20.125062.5.0)
7890

7991
| Build: | **101.25062.0005** |
@@ -982,7 +994,7 @@ Live Response for macOS is now available for all Mac devices onboarded to Defend
982994

983995
> [!IMPORTANT]
984996
> We're working on a new and enhanced syntax for the `mdatp` command-line tool. The new syntax is currently the default in the Insider Fast and Insider Slow update channels. We encourage you to familiarize yourself with this new syntax.
985-
> We continue supporting the old syntax in parallel with the new syntax and provides more communications around the deprecation plan for the old syntax in the upcoming months.
997+
> We continue supporting the old syntax in parallel with the new syntax and provide more communications around the deprecation plan for the old syntax in the upcoming months.
986998
- Addressed a kernel panic that occurred sometimes when accessing SMB file shares.
987999
- Performance improvements & Product improvements
9881000

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 6 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -119,30 +119,12 @@ After you connect your workspace to the Defender portal, **Microsoft Sentinel**
119119

120120
Many of the existing Microsoft Sentinel features are integrated into the Defender portal. For these features, notice that the experience between Microsoft Sentinel in the Azure portal and Defender portal are similar. Use the following articles to help you start working with Microsoft Sentinel in the Defender portal. When using these articles, keep in mind that your starting point in this context is the [Defender portal](https://security.microsoft.com/) instead of the Azure portal.
121121

122-
- Search
123-
- [Search across long time spans in large datasets](/azure/sentinel/search-jobs?tabs=defender-portal)
124-
- [Restore archived logs from search](/azure/sentinel/restore)
125-
- Threat management
126-
- [Visualize and monitor your data by using workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal)
127-
- [Conduct end-to-end threat hunting with Hunts](/azure/sentinel/hunts)
128-
- [Use hunting bookmarks for data investigations](/azure/sentinel/bookmarks)
129-
- [Use hunting Livestream in Microsoft Sentinel to detect threat](/azure/sentinel/livestream)
130-
- [Hunt for security threats with Jupyter notebooks](/azure/sentinel/notebooks-hunt)
131-
- [Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file](/azure/sentinel/indicators-bulk-file-import?tabs=defender-portal)
132-
- [Work with threat indicators in Microsoft Sentinel](/azure/sentinel/work-with-threat-indicators?tabs=defender-portal)
133-
- [Understand security coverage by the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage)
134-
- Content management
135-
- [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy?tabs=defender-portal)
136-
- [Microsoft Sentinel content hub catalog](/azure/sentinel/sentinel-solutions-catalog)
137-
- [Deploy custom content from your repository](/azure/sentinel/ci-cd)
138-
- Configuration
139-
- [Find your Microsoft Sentinel data connector](/azure/sentinel/data-connectors-reference)
140-
- [Create custom analytics rules to detect threats](/azure/sentinel/create-analytics-rules?tabs=defender-portal)
141-
- [Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel](/azure/sentinel/create-nrt-rules?tabs=defender-portal)
142-
- [Create watchlists](/azure/sentinel/watchlists-create?tabs=defender-portal)
143-
- [Manage watchlists in Microsoft Sentinel](/azure/sentinel/watchlists-manage)
144-
- [Create automation rules](/azure/sentinel/create-manage-use-automation-rules)
145-
- [Create and customize Microsoft Sentinel playbooks from content templates](/azure/sentinel/use-playbook-templates)
122+
| Feature category | Links |
123+
|--------------------|----------|
124+
| **Search** | - [Search across long time spans in large datasets](/azure/sentinel/search-jobs?tabs=defender-portal)<br>- [Restore archived logs from search](/azure/sentinel/restore) |
125+
| **Threat management** | - [Visualize and monitor your data by using workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal)<br>- [Conduct end-to-end threat hunting with Hunts](/azure/sentinel/hunts)<br>- [Use hunting bookmarks for data investigations](/azure/sentinel/bookmarks)<br>- [Use hunting Livestream in Microsoft Sentinel to detect threat](/azure/sentinel/livestream)<br>- [Hunt for security threats with Jupyter notebooks](/azure/sentinel/notebooks-hunt)<br>- [Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file](/azure/sentinel/indicators-bulk-file-import?tabs=defender-portal)<br>- [Work with threat indicators in Microsoft Sentinel](/azure/sentinel/work-with-threat-indicators?tabs=defender-portal)<br>- [Understand security coverage by the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage) |
126+
| **Content management** | - [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy?tabs=defender-portal)<br>- [Microsoft Sentinel content hub catalog](/azure/sentinel/sentinel-solutions-catalog)<br>- [Deploy custom content from your repository](/azure/sentinel/ci-cd) |
127+
| **Configuration** | - [Find your Microsoft Sentinel data connector](/azure/sentinel/data-connectors-reference)<br>- [Create custom analytics rules to detect threats](/azure/sentinel/create-analytics-rules?tabs=defender-portal)<br>- [Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel](/azure/sentinel/create-nrt-rules?tabs=defender-portal)<br>- [Create watchlists](/azure/sentinel/watchlists-create?tabs=defender-portal)<br>- [Manage watchlists in Microsoft Sentinel](/azure/sentinel/watchlists-manage)<br>- [Create automation rules](/azure/sentinel/create-manage-use-automation-rules)<br>- [Create and customize Microsoft Sentinel playbooks from content templates](/azure/sentinel/use-playbook-templates) |
146128

147129
Find Microsoft Sentinel settings in the Defender portal under **System** > **Settings** > **Microsoft Sentinel**.
148130

unified-secops-platform/whats-new.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: unified-security-operations
77
ms.author: bagol
88
author: batamig
99
ms.localizationpriority: medium
10-
ms.date: 07/31/2025
10+
ms.date: 08/20/2025
1111
manager: orspodek
1212
audience: ITPro
1313
ms.collection:
@@ -23,10 +23,19 @@ This article lists recent features added for unified security operations in the
2323

2424
## August 2025
2525

26+
2627
- [Viewing unified RBAC in multitenant management to GA](#viewing-unified-rbac-in-multitenant-management-to-ga)
2728
- [Tenant groups in multitenant management renamed to distribution profiles](#tenant-groups-in-multitenant-management-renamed-to-distribution-profiles)
2829
- [Distribute Microsoft Defender for Endpoint security policies with multitenant management](#distribute-microsoft-defender-for-endpoint-security-policies-with-multitenant-management)
2930

31+
### Edit workbooks directly in the Microsoft Defender portal
32+
33+
Now you can create and edit Microsoft Sentinel workbooks directly in the Microsoft Defender portal. This enhancement streamlines your workflow and allows you to manage your workbooks more efficiently and brings the workbook experience more closely aligned with the experience in the Azure portal.
34+
35+
Microsoft Sentinel workbooks are based on Azure Monitor workbooks, and help you visualize and monitor the data ingested to Microsoft Sentinel. Workbooks add tables and charts with analytics for your logs and queries to the tools already available.
36+
37+
Workbooks are available in the Defender portal under **Microsoft Sentinel > Threat management > Workbooks**. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](/azure/sentinel/monitor-your-data).
38+
3039
### Viewing unified RBAC in multitenant management to GA
3140

3241
Viewing unified role-based access control (RBAC) in the Microsoft Defender multitenant management portal is now generally available. This feature allows you to view a comprehensive view of permissions and access for your tenants.

0 commit comments

Comments
 (0)