Skip to content

Commit 35845ab

Browse files
authored
Merge pull request #2882 from MicrosoftDocs/main
Published main to live, Friday 5:00 PM IST, 02/21
2 parents 977fe2d + b28c748 commit 35845ab

File tree

6 files changed

+15
-10
lines changed

6 files changed

+15
-10
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ For more information on what's new with other Microsoft Defender security produc
174174

175175
## April 2023
176176

177-
- [Using machine learning to drive more effective simulations in Attack Simulation and Training](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/attack-simulation-training-using-machine-learning-to-drive-more/ba-p/3791023): Make use of intelligent predicted compromise rate (PCR) and Microsoft Defender for Office 365 payload recommendations for utilizing high-quality payloads in your simulation.
177+
- [Using machine learning to drive more effective simulations in Attack Simulation and Training](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/attack-simulation-training-using-machine-learning-to-drive-more-effective-simula/3791023): Make use of intelligent predicted compromise rate (PCR) and Microsoft Defender for Office 365 payload recommendations for utilizing high-quality payloads in your simulation.
178178
- [Training only campaigns available with an expanded library](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/training-only-campaign-is-now-available-with-an-expanded-training-module-library/3795237): You can now directly assign training content to your organization without needing to tie training to a phishing simulation campaign. We have also expanded our training module library to more than 70 different modules.
179179

180180
## March 2023

defender-office-365/mdo-portal-permissions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ You need to be member of the **Global Administrator**<sup>\*</sup> role in Micro
3939
- Some Defender for Office 365 features require additional permissions in Exchange Online. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
4040
- Microsoft Defender XDR has its own Unified role-based access control (RBAC). This model provides a single permissions management experience in one central location where admins can control permissions across different security solutions. These permissions are different from the permissions described in this article. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](/defender-xdr/manage-rbac).
4141
- **If you activate Defender XDR RBAC for Email & collaboration, the permissions page at <https://security.microsoft.com/emailandcollabpermissions> is no longer available in the Defender portal, so you need to ensure that you configure or import your roles _before_ you activate Defender XDR Unified RBAC.**
42+
43+
:::image type="content" source="media/defender-xdr-rbac-permissions-page.png" alt-text="Screenshot of the Permissions page in the Microsoft Defender portal showing Microsoft Defender XDR roles and Email & Collaboration roles." lightbox="media/defender-xdr-rbac-permissions-page.png":::
44+
4245
- For information about permissions in the Microsoft Purview compliance portal, see [Permissions in the Microsoft Purview compliance portal](/purview/microsoft-365-compliance-center-permissions).
4346

4447
> [!IMPORTANT]

defender-office-365/scc-permissions.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ description: Admins can learn about the roles and role groups in Microsoft Defen
2020
ms.custom:
2121
- seo-marvel-apr2020
2222
ms.service: defender-office-365
23-
ms.date: 11/27/2024
23+
ms.date: 02/20/2025
2424
---
2525

2626
# Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview
@@ -43,8 +43,10 @@ This article contains the inventory of Defender for Office 365 and Microsoft Pur
4343

4444
> [!NOTE]
4545
> In the Microsoft Defender XDR preview program, a different Microsoft Defender 365 RBAC model is also available. The permissions in this RBAC model are different from the Defender for Office 365 permissions as described in this article. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](/defender-xdr/manage-rbac).
46-
>
47-
> **If you activate Defender XDR RBAC for Email & collaboration, the permissions page at <https://security.microsoft.com/emailandcollabpermissions> is no longer available in the Defender portal**.
46+
>
47+
> **If you activate Defender XDR RBAC for Email & collaboration, the permissions page at <https://security.microsoft.com/emailandcollabpermissions> is no longer available in the Defender portal, so you need to ensure that you configure or import your roles _before_ you activate Defender XDR Unified RBAC.**
48+
>
49+
> :::image type="content" source="media/defender-xdr-rbac-permissions-page.png" alt-text="Screenshot of the Permissions page in the Microsoft Defender portal showing Microsoft Defender XDR roles and Email & Collaboration roles." lightbox="media/defender-xdr-rbac-permissions-page.png":::
4850
4951
## Role groups in Microsoft Defender for Office 365 and Microsoft Purview
5052

defender-xdr/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,13 @@
5555
- name: Protect against threats
5656
items:
5757
- name: Protect your endpoints
58-
href: /defender-endpoint
58+
href: /defender-endpoint/microsoft-defender-endpoint?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
5959
- name: Protect your identities
60-
href: /defender-for-identity
60+
href: /defender-for-identity/what-is?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
6161
- name: Protect your Office 365 workloads
62-
href: /defender-office-365
62+
href: /defender-office-365/mdo-about?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
6363
- name: Protect your cloud apps
64-
href: /defender-cloud-apps
64+
href: /defender-cloud-apps/what-is-defender-for-cloud-apps?toc=/defender-xdr/toc.json&bc=/defender-xdr/breadcrumb/toc.json
6565
- name: Microsoft Secure Score
6666
items:
6767
- name: Overview

defender-xdr/advanced-hunting-datasecuritybehaviors-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ For information on other tables in the advanced hunting schema, [see the advance
5757
|`ServiceSource`| `string`| Product or service that identified the behavior|
5858
|`DetectionSource`| `string`| Detection technology or sensor that identified the notable component or activity|
5959
|`ActivityCount`| `int`| Total user activity events recorded under this behavior|
60-
|`IsAnomalous`| `bool`| Indicates if this user behavior is anomalous by itself or based on insider risk management global settings|
60+
|`IsAnomalous`| `bool`| Indicates if this behavior is anomalous (1) or not (0)|
6161
|`IsContentHidden`| `bool`| Indicates if the behavior involves hidden content on a device|
6262
|`AccountUpn`| `string`| User principal name (UPN) of the account|
6363
|`AccountEmail`| `string`| Email address of the account|

defender-xdr/microsoft-365-security-center-defender-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ ms.custom: admindeeplinkDEFENDER
2929
- [Microsoft Defender XDR](microsoft-365-defender.md)
3030
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/)
3131

32-
[Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) is now part of Microsoft Defender XDR. Security teams can now access Defender for Cloud alerts and incidents within the Microsoft Defender portal, providing richer context to investigations that span cloud resources, devices, and identities. In addition, security teams can get the complete picture of an attack, including suspicious and malicious events that happen in their cloud environment, through immediate correlations of alerts and incidents.
32+
Security teams with provisioned access to Microsoft Defender for Cloud can now view Defender for Cloud alerts and incidents in the Microsoft Defender portal. This helps security teams gain richer context to investigations that span cloud resources, devices, and identities. In addition, security teams can get the complete picture of an attack, including suspicious and malicious events that happen in their cloud environment, through immediate correlations of alerts and incidents.
3333

3434
The Microsoft Defender portal combines protection, detection, investigation, and response capabilities to protect attacks on device, email, collaboration, identity, and cloud apps. The portal's detection and investigation capabilities are now extended to cloud entities, offering security operations teams a single pane of glass to significantly improve their operational efficiency.
3535

0 commit comments

Comments
 (0)