Skip to content

Commit 28e41f7

Browse files
authored
Merge branch 'main' into poliveria-ah-identityevents-08072025
2 parents 875ee0e + c76341b commit 28e41f7

File tree

7 files changed

+27
-17
lines changed

7 files changed

+27
-17
lines changed

.github/workflows/TierManagement.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,15 @@ name: Tier management
22

33
permissions:
44
pull-requests: write
5-
contents: read
5+
contents: write
66

77
on:
88
issue_comment:
99
types: [created, edited]
1010

11+
pull_request_target:
12+
types: [opened, reopened]
13+
1114
jobs:
1215

1316
tier-mgmt:

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -239,6 +239,8 @@
239239
href: advanced-hunting-cloudauditevents-table.md
240240
- name: CloudProcessEvents
241241
href: advanced-hunting-cloudprocessevents-table.md
242+
- name: CloudStorageAggregatedEvents
243+
href: advanced-hunting-cloudstorageaggregatedevents-table.md
242244
- name: DataSecurityBehaviors
243245
href: advanced-hunting-datasecuritybehaviors-table.md
244246
- name: DataSecurityEvents
282 KB
Loading
87.1 KB
Loading

unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- cx-ti
1818
ms.topic: article
1919
search.appverid: met150
20-
ms.date: 7/31/2025
20+
ms.date: 8/11/2025
2121
---
2222

2323
# How Microsoft names threat actors
@@ -44,9 +44,9 @@ Threat actors within the same weather family are given an adjective to distingui
4444

4545
The following table shows how the family names map to the threat actors that we track.
4646

47-
|Threat actor category|Type|Family name|
47+
|Threat actor category|Origin/Type|Family name|
4848
|:---|:---|:---|
49-
|Nation-state|China<br>Germany<br>India<br>Iran<br>North Korea<br>Lebanon<br>Pakistan<br>Palestinian Authority<br>Russia<br>Singapore<br>South Korea<br>Spain<br>Syria<br>Türkiye<br>Ukraine<br>United States<br>Vietnam|Typhoon<br>Gale<br>Monsoon<br>Sandstorm<br>Sleet<br>Rain<br>Whirlwind<br>Lightning<br>Blizzard<br>Squall<br>Hail<br>Derecho<br>Haze<br>Dust<br>Frost<br>Tornado<br>Cyclone|
49+
|Nation-state|Australia<br>Canada<br>China<br>Germany<br>India<br>Iran<br>Israel<br>New Zealand<br>North Korea<br>Lebanon<br>Pakistan<br>Palestinian Authority<br>Russia<br>Singapore<br>South Korea<br>Spain<br>Syria<br>Türkiye<br>Ukraine<br>United Arab Emirates<br>United Kingdom<br>United States<br>Vietnam|Waterspout<br>Freeze<br>Typhoon<br>Gale<br>Monsoon<br>Sandstorm<br>Heatwave<br>Swell<br>Sleet<br>Rain<br>Whirlwind<br>Lightning<br>Blizzard<br>Squall<br>Hail<br>Derecho<br>Haze<br>Dust<br>Frost<br>Gust<br>Fog<br>Tornado<br>Cyclone|
5050
|Financially motivated|Financially motivated|Tempest|
5151
|Private sector offensive actors|PSOAs|Tsunami|
5252
|Influence operations|Influence operations|Flood|

unified-secops-platform/mto-urbac.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,17 @@
22
title: Manage unified role-based access control in multitenant management
33
description: Overview of how to manage the unified role-based access control multitenant management in the Microsoft Defender portal.
44
ms.service: unified-secops-platform
5-
ms.author: diannegali
6-
author: diannegali
5+
ms.author: bagol
6+
author: batamig
77
ms.localizationpriority: medium
8-
manager: deniseb
8+
manager: orspodek
99
audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- highpri
1313
- tier1
1414
ms.topic: how-to
15-
ms.date: 05/29/2025
15+
ms.date: 08/06/2025
1616
appliesto:
1717
- Microsoft Defender XDR
1818
- Microsoft Sentinel in the Microsoft Defender portal
@@ -21,18 +21,17 @@ appliesto:
2121

2222
# Manage unified role-based access control in multitenant management
2323

24-
> [!IMPORTANT]
25-
> Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
24+
Use the Microsoft Defender multimanagement portal to manage unified role-based access control (URBAC) across multiple tenants. This capability provides a comprehensive view of permissions and access for your tenants and a centralized administration to manage these permissions.
2625

27-
You can now view and manage user permissions across multiple tenants in multitenant management. This capability provides a comprehensive view of permissions and access for your tenants. It also provides a centralized administration to manage these permissions.
26+
## View custom roles
2827

29-
The multitenant management portal offers an aggregated view of all unified role-based access (URBAC) roles. Navigate to the page through **System > Permissions**.
28+
In the multitenant portal, navigate to the **Permissions & roles page** by selecting **System > Permissions**.
3029

3130
:::image type="content" source="media/mto-urbac/urbac-main.png" alt-text="Screenshot of main Permissions and roles page":::
3231

33-
You can create or edit a custom role, import and delete roles, and search for a specific role using the Search function from this page. You can also Filter the roles according to assigned data sources, permissions category, assignee type, and tenant name.
32+
Create or edit a custom role, import and delete roles, and search for a specific role using the **Search** function from this page. You can also filter the roles according to assigned data sources, permissions category, assignee type, and tenant name.
3433

35-
## Create or edit a custom role
34+
## Create or edit a custom role (Preview)
3635

3736
You can create a custom role to provide flexibility and control over access to specific data. To create a custom role, follow these steps:
3837

@@ -72,7 +71,7 @@ To edit an existing role, select the three dots beside the role name in the Perm
7271

7372
:::image type="content" source="media/mto-urbac/urbac-edit-role.png" alt-text="Screenshot of the Edit option in the Permissions page":::
7473

75-
## Delete roles
74+
## Delete roles (Preview)
7675

7776
You can delete roles by selecting a role from the list and then selecting **Delete roles**. You can select multiple roles from various tenants to delete.
7877

@@ -86,7 +85,7 @@ The **Delete role** option is also available when editing a specific role.
8685

8786
:::image type="content" source="media/mto-urbac/urbac-delete-edit-pane.png" alt-text="Screenshot highlighting the Delete option in the Edit role pane":::
8887

89-
## Import roles
88+
## Import roles (Preview)
9089

9190
You can import existing roles from a tenant’s workloads to migrate permissions and assignments. Imported roles become available in the Permissions and roles list.
9291

unified-secops-platform/whats-new.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,16 @@ This article lists recent features added for unified security operations in the
2222

2323
## August 2025
2424

25+
- [Viewing unified RBAC in multitenant management to GA](#viewing-unified-rbac-in-multitenant-management-to-ga)
2526
- [Tenant groups in multitenant management renamed to distribution profiles](#tenant-groups-in-multitenant-management-renamed-to-distribution-profiles)
2627
- [Distribute Microsoft Defender for Endpoint security policies with multitenant management](#distribute-microsoft-defender-for-endpoint-security-policies-with-multitenant-management)
2728

29+
### Viewing unified RBAC in multitenant management to GA
30+
31+
Viewing unified role-based access control (RBAC) in the Microsoft Defender multitenant management portal is now generally available. This feature allows you to view a comprehensive view of permissions and access for your tenants.
32+
33+
Creating and editing custom roles remains in preview. For more information, see [Manage unified role-based access control in multitenant management](mto-urbac.md).
34+
2835
### Tenant groups in multitenant management renamed to distribution profiles
2936

3037
In the multitenant portal, tenant groups are now renamed to **content distribution profiles**.
@@ -45,7 +52,6 @@ The original policy’s page also shows the overall distribution status and list
4552

4653
For more information, see [Endpoint security policies in multitenant management](mto-endpoint-security-policy.md) and [Content distribution in multitenant management](mto-distribution-profiles.md).
4754

48-
4955
## July 2025
5056

5157
- [For new customers only: Automatic onboarding and redirection to the Microsoft Defender portal](#for-new-customers-only-automatic-onboarding-and-redirection-to-the-microsoft-defender-portal)

0 commit comments

Comments
 (0)