Skip to content

Commit 262df0b

Browse files
authored
Merge branch 'main' into patch-1
2 parents 9cc5be7 + faddeb7 commit 262df0b

File tree

57 files changed

+460
-267
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+460
-267
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ Select the total score link to review all feedback on clarity, consistency, tone
5151
"
5252
**More information about Acrolinx**
5353
54-
- [Install Acrolinx locally for VSCode for Magic](https://review.docs.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
54+
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.docs.microsoft.com/help/contribute/acrolinx-error-messages)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
5858
5959
"
6060
}

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

1010
> [!IMPORTANT]
11-
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025.
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. This change will happen automatically by the specified dates. No admin action is required.
1212
>
1313
1414
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.

ATPDocs/service-account-discovery.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
1717
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
1818
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
1919

20-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
2121

2222
Service account types are displayed in the Identity Info table within Advanced Hunting.
2323

@@ -68,7 +68,7 @@ You can use the sort and filter functionality on each service account tab to get
6868
|**Tags** | Sensitive or Honey Token |
6969
|**Auth protocols** | Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
7070
|**Sources** | The number of potential source logins. |
71-
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
71+
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include many resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
7272
|**Connections** | The number of unique connections made between sources and destinations. |
7373
|**Created** |The timestamp when the service account was first created. |
7474
|**Last updated** | The timestamp of the most recent update to the service account. |
@@ -79,7 +79,7 @@ You can use the sort and filter functionality on each service account tab to get
7979

8080
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
8181

82-
When you investigate a specific Service account, you'll see the following details under the connections tab:
82+
When you investigate a specific Service account, you see the following details under the connections tab:
8383

8484
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
8585

@@ -96,8 +96,10 @@ When you investigate a specific Service account, you'll see the following detail
9696
Last seen | The date and time of the most recent sign in event over this connection. |
9797

9898

99-
10099
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
101100

101+
## Related content
102+
- [Service principal names](/windows/win32/ad/service-principal-names)
103+
- [How to configure SPN](/windows-server/identity/ad-ds/manage/how-to-configure-spn?tabs=add%2Caduc)
102104

103105
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).

ATPDocs/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For updates about versions and features released six months ago or earlier, see
2525
## May 2025
2626

2727
### Local administrators collection (using SAM-R queries) feature will be disabled
28-
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored.
28+
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored. This change will happen automatically by the specified dates. No admin action is required.
2929

3030
### New Health Issue
3131

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,8 +170,21 @@ You can export all activities from the past six months by clicking the Export bu
170170

171171
![Click the export icon to export records.](media/activity-filters-queries/export-button-of-activity-logs.png)
172172

173-
When exporting data:
173+
> [!NOTE]
174+
> **Required Permissions for Exporting Capabilities:** To utilize the exporting features, users must be assigned one of the following roles:
175+
> - **Built-in admin roles in Defender for Cloud Apps-** These roles must be granted via [Microsoft Defender for Cloud Apps Permissions and roles settings](/defender-cloud-apps/manage-admins):
176+
> - Global Admin
177+
> - Cloud Discovery Global Admin
178+
> - Security Operator
179+
> - Compliance Admin
180+
> - Security Reader
181+
> - **Microsoft Entra ID Roles-** These roles must be assigned through [Microsoft Entra ID built-in roles](/entra/identity/role-based-access-control/permissions-reference):
182+
> - Global Administrator
183+
> - Security Administrator
184+
> - Cloud App Security Administrator
185+
> - Global Reader
174186
187+
When exporting data:
175188
- You can choose a date range of up to six months.
176189
- You can choose to exclude private activities.
177190
- The exported file is limited to 100,000 records and is delivered in CSV format.

CloudAppSecurityDocs/app-governance-visibility-insights-compliance-posture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ For sensitivity labeling data, cards show the number apps that have accessed con
5252

5353
For example:
5454

55-
> [!div class="mx-imgBorder"]
56-
> ![number apps that have accessed content with sensitivity labels.](sensitive-data-accessed-chart1.png)
55+
The number of apps that have accessed content with sensitivity labels.
56+
> :::image type="content" source="media/sensitive-data-accessed-chart1.png" alt-text="Number of apps that have accessed content with sensitivity labels.":::
5757
5858
## Next steps
5959

CloudAppSecurityDocs/in-browser-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To use in-browser protection, users must also have the following environmental r
2727
|**Operating systems**|Windows 10 or 11, macOS|
2828
|**Identity platform**|Microsoft Entra ID|
2929
|**Microsoft Edge for Business versions**|The last two stable versions. For example, if the newest Microsoft Edge is 126, in-browser protection works for v126 and v125. <br> For more information, see [Microsoft Edge releases](/deployedge/microsoft-edge-release-schedule#microsoft-edge-releases).|
30-
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\sensitive files)</li><li>Block\Monitor file upload (all files\sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.|
30+
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\\*sensitive files)</li><li>Block\Monitor file upload (all files\\*sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.<br> *Sensitive files identified by built-in DLP scanning are not supported for Edge in-browser protection|
3131

3232
All other scenarios are served automatically with the standard reverse proxy technology, including user sessions from browsers that don't support in-browser protection, or for policies not supported by in-browser protection.
3333

@@ -105,7 +105,7 @@ Administrators who understand the power of Microsoft Edge browser protection can
105105

106106
4. When you're finished on the **Edge for Business protection** page, select **Save**.
107107

108-
:::image type="content" source="media/in-browser-protection/edge-for-business-protection-settings.png" alt-text="Screenshot of Microsoft Edge for business protection settings." lightbox="media/in-browser-protection/edge-for-business-protection-settings.png":::
108+
:::image type="content" source="media/in-browser-protection/edge-for-business-protection-settings.png" alt-text="Screenshot of Microsoft Edge for business protection settings." lightbox="media/in-browser-protection/edge-for-business-protection-settings.png":::
109109

110110
## Related content
111111

CloudAppSecurityDocs/mde-integration.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Integrate Microsoft Defender for Endpoint
33
description: This article describes how to integrate Microsoft Defender for Endpoint with Defender for Cloud Apps for enhanced visibility into Shadow IT and risk management.
4-
ms.date: 06/03/2024
4+
ms.date: 05/12/2025
55
ms.topic: how-to
66
---
77

@@ -18,10 +18,12 @@ This article describes the out-of-the-box integration available between Microsof
1818

1919
- Microsoft Defender for Cloud Apps license
2020

21+
- Devices must be onboarded to [Microsoft Defender for Endpoint](/defender-endpoint/onboard-client)
22+
2123
- One of the following:
2224

2325
- Microsoft Defender for Endpoint with Plan 2
24-
- Microsoft Defender for Business with a premium or standalone license
26+
- Microsoft Defender for Business (standalone or as part of Microsoft 365 Business Premium)
2527

2628
For more information, see [Compare Microsoft endpoint security plans](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2).
2729

-30.7 KB
Binary file not shown.
137 KB
Loading

0 commit comments

Comments
 (0)