Skip to content

Commit 2b34fc4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into mde-updates
2 parents 871980e + 8d00532 commit 2b34fc4

File tree

3 files changed

+39
-7
lines changed

3 files changed

+39
-7
lines changed

CloudAppSecurityDocs/governance-actions.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,13 @@ The following governance actions can be taken for connected apps either on a spe
8383

8484
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint)
8585

86+
> [!NOTE]
87+
> These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
88+
- Security Operator
89+
- Security administrator
90+
- Global administrator
91+
- Cloud app security administrator
92+
8693
:::image type="content" source="media/governance-actions/governance-actions-dropbox-google-workspace.png" alt-text="Screenshot that shows malware governance actions." lightbox="media/governance-actions/governance-actions-dropbox-google-workspace.png":::
8794

8895
> [!NOTE]

CloudAppSecurityDocs/release-notes.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,18 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2929

3030
## June 2025
3131

32+
### “Behaviors” data type in Microsoft Defender for Cloud Apps - General Availability
33+
34+
The **Behaviors** data type significantly enhances overall threat detection accuracy by reducing alerts on generic anomalies and surfacing alerts only when observed patterns align with real security scenarios. You can now use **Behaviors** to conduct investigations in [Advanced Hunting](https://learn.microsoft.com/defender-xdr/advanced-hunting-overview), build better [custom detections](https://learn.microsoft.com/defender-xdr/custom-detection-rules) based on behavioral signals, and benefit from automatic inclusion of context-related behaviors into [incidents](https://learn.microsoft.com/defender-xdr/incidents-overview). This provides clearer context and helps security operations teams to reduce alert fatigue, prioritize, and respond more efficiently.
35+
36+
For more information, see:
37+
- [Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors).
38+
- [TechCommunity Blog](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/transform-the-way-you-investigate-by-using-behaviors--new-detections-in-xdr-star/3825154).
39+
3240
### New Dynamic Threat Detection model
3341

3442
Microsoft Defender for Cloud Apps new dynamic threat detection model continuously adapts to the ever-changing SaaS apps threat landscape. This approach ensures your organization remains protected with up-to-date detection logic without the need for manual policy updates or reconfiguration. Several legacy anomaly detection policies have already been seamlessly transitioned to this adaptive model, delivering smarter and more responsive security coverage.
43+
3544
For more information, see [Create Defender for Cloud Apps anomaly detection policies](anomaly-detection-policy.md).
3645

3746

@@ -111,7 +120,7 @@ Defender for Cloud Apps customers can now configure Role-Based Access Control (R
111120
For more information, see:
112121

113122
- [Configure admin access](/defender-cloud-apps/manage-admins)
114-
- [Investigate behaviors with advanced hunting (Preview)](/defender-cloud-apps/behaviors)
123+
- [Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors)
115124

116125
## February 2025
117126

defender-office-365/email-authentication-dkim-configure.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 04/14/2025
8+
ms.date: 06/19/2025
99
audience: ITPro
1010
ms.topic: how-to
1111

@@ -94,7 +94,7 @@ In Microsoft 365, two public-private key pairs are generated when DKIM signing u
9494
The selector that's used to verify the DKIM signature (which infers the private key that was used to sign the message) is stored in the **s=** value in the **DKIM-Signature** header field (for example, `s=selector1-contoso-com`).
9595

9696
> [!IMPORTANT]
97-
> Use the Defender portal or Exchange Online PowerShell to view the required CNAME values for DKIM signing of outbound messages using a custom domain. The values presented here are for illustration only. To get the required values for your custom domains or subdomains, use the procedures later in this article.
97+
> Use the Defender portal or Exchange Online PowerShell to view the required CNAME values for DKIM signing of outbound messages using a custom domain. **The values presented here are for illustration only**. To get the required values for your custom domains or subdomains, use the procedures later in this article.
9898
9999
The basic syntax of the DKIM CNAME records for custom domains that send mail from Microsoft 365 is:
100100

@@ -109,7 +109,23 @@ Points to address or value: selector2-<CustomDomainWithDashes>._domainkey.<Initi
109109
- **Hostname**: The values are the same for all Microsoft 365 organizations: `selector1._domainkey` and `selector2._domainkey`.
110110
- **\<CustomDomainWithDashes\>**: The custom domain or subdomain with periods replaced by dashes. For example, `contoso.com` becomes `contoso-com`, or `marketing.contoso.com` becomes `marketing-contoso-com`.
111111
- **\<InitialDomainPrefix\>**: The custom part of the \*.onmicrosoft.com you used to enroll in Microsoft 365. For example, if you used `contoso.onmicrosoft.com`, the value is `contoso`.
112-
- **\<DynamicPartitionCharacter\>**: A dynamically generated character that's used for both selectors.
112+
- **\<DynamicPartitionCharacter\>**: A dynamically generated character that's used for both selectors (for example, r or n). The value is automatically assigned by Microsoft when you add a new custom domain and enable DKIM. The value is determined by Microsoft's internal routing logic and isn't configurable.
113+
- This value is part of the updated DKIM record format for new custom domains in Microsoft 365 introduced in May 2025. Existing custom domains and initial domains continue to use the old DKIM format:
114+
115+
```text
116+
Hostname: selector1._domainkey
117+
Points to address or value: selector1-contoso-com._domainkey.contoso.onmicrosoft.com
118+
119+
Hostname: selector2._domainkey
120+
Points to address or value: selector2-contoso-com._domainkey.contoso.onmicrosoft.com
121+
```
122+
123+
- **The old and new and old formats can't coexist for the same selector**. To retrieve the correct DKIM CNAME values for a domain, including the assigned \<DynamicPartitionCharacter\> value, replace contoso.com with the domain value, and then run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
124+
125+
```powershell
126+
Get-DkimSigningConfig -Identity contoso.com | Format-List Name,Enabled,Status,Selector1CNAME,Selector2CNAME
127+
```
128+
113129
- **v1**: The current CNAME format version that's used for both selectors.
114130
- **dkim.mail.microsoft**: The parent DNS zone that's the same for both selectors.
115131
@@ -120,15 +136,15 @@ For example, your organization has the following domains in Microsoft 365:
120136
121137
You need to create two CNAME records in DNS in each custom domain, for a total of four CNAME records:
122138
123-
- **CNAME records in the cohovineyard.com domain**:
139+
- <u>CNAME records in the cohovineyard.com domain</u>:
124140
125141
**Hostname**: `selector1._domainkey`<br>
126142
**Points to address or value**: `selector1-cohovineyard-com._domainkey.cohovineyardandwinery.n-v1.dkim.mail.microsoft`
127143
128144
**Hostname**: `selector2._domainkey`<br>
129145
**Points to address or value**: `selector2-cohovineyard-com._domainkey.cohovineyardandwinery.n-v1.dkim.mail.microsoft`
130146
131-
- **CNAME records in the cohowinery.com domain**:
147+
- <u>CNAME records in the cohowinery.com domain</u>:
132148
133149
**Hostname**: `selector1._domainkey`<br>
134150
**Points to address or value**: `selector1-cohowinery-com._domainkey.cohovineyardandwinery.r-v1.dkim.mail.microsoft`
@@ -201,7 +217,7 @@ Proceed if the domain satisfies these requirements.
201217

202218
It takes a few minutes (or possibly longer) for Microsoft 365 to detect the new CNAME records that you created.
203219

204-
7. After a while, return to the domain properties flout that you left open in Step 5, and select the **Sign messages for this domain with DKIM signatures** toggle.
220+
7. After a while, return to the domain properties flyout that you left open in Step 5, and select the **Sign messages for this domain with DKIM signatures** toggle.
205221

206222
After a few seconds, the following dialog opens:
207223

0 commit comments

Comments
 (0)