You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ If you require more than 10 data sources, we recommend that you split the data s
46
46
To work with a network appliance that isn't listed, select **Other > Customer log format** or **Other (manual only)**. For more information, see [Working with the custom log parser](custom-log-parser.md).
47
47
48
48
>[!NOTE]
49
-
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings or your firewall/proxy.
49
+
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings on your firewall/proxy. For more information, see [Advanced log collector management](log-collector-advanced-management.md).
50
50
51
51
Repeat this process for each firewall and proxy whose logs can be used to detect traffic on your network.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/log-collector-advanced-management.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,9 @@ You should be able to view the following contents:
50
50
- `ssl_update`
51
51
- `config.json`
52
52
53
-
### Customize certificate files
53
+
### Add certificate files
54
54
55
-
This procedure describes how to customize the certificate files used for secure connections to the cloud discovery Docker instance.
55
+
This procedure describes how to add the required certificate files used for secure connections to the cloud discovery Docker instance.
56
56
57
57
1. Open an FTP client and connect to the log collector host.
58
58
@@ -63,7 +63,7 @@ This procedure describes how to customize the certificate files used for secure
63
63
|**FTP**|- **pure-ftpd.pem**: Includes the key and certificate data |
64
64
|**Syslog**|- **ca.pem**: The certificate authority's certificate that was used to sign the client’s certificate. <br>- **server-key.pem** and **server-cert.pem**: The log collector's certificate and key <br><br>Syslog messages are sent over TLS to the log collector, which requires mutual TLS authentication, including authenticating both the client and server certificates. |
65
65
66
-
Filenames are mandatory. If any of the files are missing, the update fails.
66
+
Files are mandatory. If any of the filesfor the receiver type are missing, the update fails.
To secure the docker image and ensure that only one IP address is allowed to send the syslog messages to the log collector, create an IP table rule on the host machine to allow input traffic and drop the traffic coming over specific ports, such as TCP/601 or UDP/514, depending on the deployment.
163
163
164
-
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4`` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
164
+
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+22-8Lines changed: 22 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,8 @@
2
2
title: What's new in Microsoft Defender for Endpoint on Mac
3
3
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Mac.
4
4
ms.service: defender-endpoint
5
-
author: emmwalshh
6
-
ms.author: ewalsh
7
-
ms.reviewer: joshbregman
5
+
author: deniseb
6
+
ms.author: deniseb
8
7
manager: deniseb
9
8
ms.localizationpriority: medium
10
9
ms.date: 01/24/2025
@@ -16,6 +15,7 @@ ms.collection:
16
15
ms.topic: reference
17
16
ms.subservice: macos
18
17
search.appverid: met150
18
+
ms.reviewer: mavel
19
19
---
20
20
21
21
# What's new in Microsoft Defender for Endpoint on Mac
@@ -64,18 +64,32 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
64
64
65
65
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
- Removed support of macOS 12, the minimal requirement is now macOS 13.0 or later
78
+
- Fix: Defender quarantines a file even if it is marked as immutable
79
+
-`mdatp health` can return [`out_of_date`](device-health-microsoft-defender-antivirus-health.md#up-to-date-definitions) status for `definitions_status`
-**Improved User/Group Permission Handling** - Added reporting in `mdatp-health` for user/group permission issues for Defender files. On restart Defender attempts to cure these issues.
-[Securities and Exchange Commission - "Phishing" Fraud](https://www.sec.gov/investor/pubs/phishing.htm)
206
-
-[Use the Report Message add-in](https://support.microsoft.com/office/b5caa9f1-cdf3-4443-af8c-ff724ea719d2) to report spam email directly to Microsoft and/or admins (depending on how [User reported settings](submissions-user-reported-messages-custom-mailbox.md) are configured).
206
+
-[Report messages as phishing](https://support.microsoft.com/office/9ba3ea70-1169-4993-801b-ec2bb8fc071d) to Microsoft and/or admins (depending on how [User reported settings](submissions-user-reported-messages-custom-mailbox.md) are configured in the organization).
Copy file name to clipboardExpand all lines: defender-office-365/submissions-outlook-report-messages.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -41,7 +41,9 @@ Admins configure user reported messages to go to a specified reporting mailbox,
41
41
## Use the built-in Report button in Outlook
42
42
43
43
- The built-in **Report** button is available in the following versions of Outlook:
44
-
- Outlook for Microsoft 365 version 16.0.17827.15010 or later and Outlook 2021 Version 2407 (Build 17830.20138) or later.
44
+
- Outlook for Microsoft 365:
45
+
-**Current channel**: Version 16.0.17827.15010 or later.
46
+
-**Monthly Enterprise Channel**: Version 16.0.18025.20000 or later.
45
47
- Outlook for Mac version 16.89 (24090815) or later.
46
48
- Outlook for iOS and Android version 4.2446 or later.
47
49
- The new Outlook for Windows.
@@ -54,7 +56,7 @@ Admins configure user reported messages to go to a specified reporting mailbox,
54
56
55
57
If user reporting is turned off and a non-Microsoft add-in button is selected, the **Report** button isn't available in supported versions of Outlook.
56
58
57
-
- The built-in **Report** button in Outlook on the web, Outlook for Android and the new Outlook for Windows supports reporting messages from shared mailboxes or other mailboxes by a delegate.
59
+
- The built-in **Report** button in Outlook on the web, Outlook for Android, and the new Outlook for Windows supports reporting messages from shared mailboxes or other mailboxes by a delegate.
58
60
- Shared mailboxes require Send As or Send On Behalf permission for the user.
59
61
- Other mailboxes require Send As or Send On Behalf permission _and_ Read and Manage permissions for the delegate.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-cloudappevents-table.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,13 +39,13 @@ For information on other tables in the advanced hunting schema, [see the advance
39
39
|`ActionType`|`string`| Type of activity that triggered the event |
40
40
|`Application`|`string`| Application that performed the recorded action |
41
41
|`ApplicationId`|`int`| Unique identifier for the application |
42
-
|`AppInstanceId`|`int`| Unique identifier for the instance of an application. To convert this to Microsoft Defender for Cloud Apps App-connector-ID, use `CloudAppEvents| distinct ApplicationId,AppInstanceId,binary_or(binary_shift_left(AppInstanceId,20),ApplicationId|order by ApplicationId,AppInstanceId` |
42
+
|`AppInstanceId`|`int`| Unique identifier for the instance of an application. To convert this to Microsoft Defender for Cloud Apps App-connector-ID, use `CloudAppEvents| distinct ApplicationId,AppInstanceId,binary_or(binary_shift_left(AppInstanceId,20),Application|order by ApplicationId,AppInstanceId` |
43
43
|`AccountObjectId`|`string`| Unique identifier for the account in Microsoft Entra ID |
44
44
|`AccountId`|`string`| An identifier for the account as found by Microsoft Defender for Cloud Apps. Could be Microsoft Entra ID, user principal name, or other identifiers. |
45
45
|`AccountDisplayName`|`string`| Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user. |
46
46
|`IsAdminOperation`|`bool`| Indicates whether the activity was performed by an administrator |
47
47
|`DeviceType`|`string`| Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
48
-
|`OSPlatform`|`string`| Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
48
+
|`OSPlatform`|`string`| Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7. |
49
49
|`IPAddress`|`string`| IP address assigned to the device during communication |
50
50
|`IsAnonymousProxy`|`boolean`| Indicates whether the IP address belongs to a known anonymous proxy |
51
51
|`CountryCode`|`string`| Two-letter code indicating the country where the client IP address is geolocated |
@@ -67,10 +67,10 @@ For information on other tables in the advanced hunting schema, [see the advance
67
67
|`RawEventData`|`dynamic`| Raw event information from the source application or service in JSON format |
68
68
|`AdditionalFields`|`dynamic`| Additional information about the entity or event |
69
69
|`LastSeenForUser`|`dynamic`|Indicates the number of days since a specific attribute was last seen for the user. A value of 0 means the attribute was seen today, a negative value indicates the attribute is being seen for the first time, and a positive value represents the number of days since the attribute was last seen. For example: `{"ActionType":"0","OSPlatform":"4","ISP":"-1"}`|
70
-
|`UncommonForUser`|`dynamic`|Lists the attributes in the event that are considered uncommon for the user. Using this data can help rule out false positives and find anomalies. For example: `["ActivityType","ActionType"]`|
71
-
|`AuditSource`|`string`|Audit data source. Possible values are one of the following: <br>- Defender for Cloud Apps access control <br>- Defender for Cloud Apps session control <br>- Defender for Cloud Apps app connector |
70
+
|`UncommonForUser`|`dynamic`|Lists the attributes in the event that are uncommon for the user, helping to rule out false positives and find anomalies. For example: `["ActivityType","ActionType"].` To filter out nonanomalous results: events with low or insignificant security value won't go through enrichment processes and will have a value of "", while high-value events will go through enrichment processes and, if no anomalies are found, will have a value of "[]".|
71
+
|`AuditSource`|`string`|Audit data source. Possible values are one of the following: <br>- Defender for Cloud Apps access control <br>- Defender for Cloud Apps session control <br>- Defender for Cloud Apps app connector |
72
72
|`SessionData`|`dynamic`|The Defender for Cloud Apps session ID for access or session control. For example: `{InLineSessionId:"232342"}`|
73
-
|`OAuthAppId`|`string`|A unique identifier that is assigned to an application when it is registered to Microsoft Entra with OAuth 2.0 protocol.|
73
+
|`OAuthAppId`|`string`|A unique identifier that is assigned to an application when it's registered to Microsoft Entra with OAuth 2.0 protocol.|
0 commit comments