Skip to content

Commit 33dbc1d

Browse files
committed
Update data-storage-privacy.md
1 parent 91475cf commit 33dbc1d

File tree

1 file changed

+13
-56
lines changed

1 file changed

+13
-56
lines changed

defender-endpoint/data-storage-privacy.md

Lines changed: 13 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 05/14/2024
19+
ms.date: 08/08/2024
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -37,13 +37,13 @@ This section covers some of the most frequently asked questions regarding privac
3737
> [!NOTE]
3838
> This article explains the data storage and privacy details related to Defender for Endpoint and Defender for Business. For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576), and also [Windows privacy FAQ](https://go.microsoft.com/fwlink/?linkid=827577).
3939
40-
## What data does Microsoft Defender for Endpoint collect?
40+
## What are we collecting?
4141

4242
Microsoft Defender for Endpoint collects information from your configured devices and stores it in a customer-dedicated and segregated tenant specific to the service for administration, tracking, and reporting purposes.
4343

4444
Information collected includes file data (file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and device details (device identifiers, names, and the operating system version).
4545

46-
Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
46+
Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
4747

4848
This data enables Defender for Endpoint to:
4949

@@ -53,74 +53,31 @@ This data enables Defender for Endpoint to:
5353

5454
Microsoft doesn't use your data for advertising.
5555

56-
## Data protection and encryption
56+
## Data location
5757

58-
The Defender for Endpoint service utilizes state-of-the-art data protection technologies, which are based on Microsoft Azure infrastructure.
58+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in:
5959

60-
There are various aspects relevant to data protection that our service takes care of. Encryption is one of the most critical aspects, and it includes data encryption at rest, encryption in flight, and key management with Key Vault. For more information on other technologies used by the Defender for Endpoint service, see [Azure encryption overview](/azure/security/security-azure-encryption-overview).
60+
(a) the geo-location of the tenant as identified during provisioning; or
6161

62-
In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) at the minimum.
62+
(b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
6363

64-
## Data storage location
64+
## Data Retention
6565

66-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
66+
Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal.
6767

68-
Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
68+
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
6969

70-
Select **Need help?** in the Microsoft Defender portal to contact Microsoft support about provisioning Microsoft Defender XDR in a different data center location.
70+
In the advanced hunting investigation experience, it's accessible via a query for 30 days.
7171

7272
## Data sharing for Microsoft Defender for Endpoint
7373

7474
Microsoft Defender for Endpoint shares data, including customer data, among the following Microsoft products, also licensed by the customer.
7575

76+
- Microsoft Defender XDR
77+
- Microsoft Defender for Cloud Apps
7678
- Microsoft Sentinel
7779
- Microsoft Tunnel for Mobile Application Management - Android
7880
- Microsoft Defender for Cloud
7981
- Microsoft Defender for Identity
8082
- Microsoft Security Exposure Management (public preview)
8183

82-
## Is my data isolated from other customer data?
83-
84-
Yes, your data is isolated through access authentication and logical segregation based on customer identifier. Each customer can only access data collected from its own organization, and the generic data that Microsoft provides.
85-
86-
## How does Microsoft prevent malicious insider activities and abuse of high privilege roles?
87-
88-
Microsoft developers and administrators have, by design, been given sufficient privileges to carry out their assigned duties to operate and evolve the service. Microsoft deploys combinations of preventive, detective, and reactive controls including the following mechanisms to help protect against unauthorized developer and/or administrative activities:
89-
90-
- Tight access control to sensitive data
91-
- Combinations of controls that greatly enhance independent detection of malicious activity
92-
- Multiple levels of monitoring, logging, and reporting
93-
94-
Additionally, Microsoft conducts background verification checks of certain operations personnel, and limits access to applications, systems, and network infrastructure in proportion to the level of background verification. Operations personnel follow a formal process when they're required to access a customer's account or related information in the performance of their duties.
95-
96-
Access to data for services deployed in Microsoft Azure Government data centers is only granted to operating personnel who have been screened and approved to handle data that's subject to certain government regulations and requirements, such as FedRAMP, NIST 800.171 (DIB), ITAR, IRS 1075, DoD L4, and CJIS.
97-
98-
## Is data shared with other customers?
99-
100-
No. Customer data is isolated from other customers and isn't shared. However, threat intelligence on the data resulting from Microsoft processing, and which doesn't contain any customer-specific data, might be shared with other customers. Each customer can only access data collected from its own organization and generic data that Microsoft provides.
101-
102-
## How long will Microsoft store my data? What is Microsoft's data retention policy?
103-
104-
### At service onboarding
105-
106-
Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal. However, in the advanced hunting investigation experience, it's accessible via a query for 30 days.
107-
108-
### At contract termination or expiration
109-
110-
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
111-
112-
### Advanced Hunting data
113-
114-
Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data.
115-
116-
## Can Microsoft help us maintain regulatory compliance?
117-
118-
Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help them assess Defender for Endpoint services against their own legal and regulatory requirements. Defender for Endpoint has achieved a number of certifications including ISO, SOC, FedRAMP High, and PCI and continues to pursue additional national, regional, and industry-specific certifications.
119-
120-
By providing customers with compliant, independently verified services, Microsoft makes it easier for them to achieve compliance for the infrastructure and applications they run.
121-
122-
For more information on the Defender for Endpoint certification reports, see [Microsoft Trust Center](https://servicetrust.microsoft.com/).
123-
124-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-datastorage-belowfoldlink)
125-
126-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)