|
| 1 | +--- |
| 2 | +title: Release notes |
| 3 | +description: This page is updated frequently with the latest updates in Microsoft Security Exposure Management. |
| 4 | +ms.author: dlanger |
| 5 | +author: dlanger |
| 6 | +manager: rayne-wiselman |
| 7 | +ms.topic: overview |
| 8 | +ms.service: exposure-management |
| 9 | +ms.date: 08/14/2024 |
| 10 | +--- |
| 11 | + |
| 12 | +# What's new in Microsoft Security Exposure Management? |
| 13 | + |
| 14 | +Microsoft Security Exposure Management (MSEM) is in active development and receives improvements on an ongoing basis. To stay up to date with the most recent developments, this page provides you with information about new features, bug fixes, and deprecated functionality. |
| 15 | + |
| 16 | +<!-- Please don't adjust this next line without getting approval from the Defender for Cloud documentation team. It is necessary for proper RSS functionality. --> |
| 17 | +This page is updated frequently with the latest updates in Microsoft Security Exposure Management. |
| 18 | + |
| 19 | +Learn more about MSEM by reading the blogs, [here](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/bg-p/MicrosoftSecurityandCompliance). |
| 20 | + |
| 21 | +Security Exposure Management is currently in public preview. |
| 22 | + |
| 23 | +> [!TIP] |
| 24 | +> Get notified when this page is updated by copying and pasting the following URL into your feed reader: |
| 25 | +> |
| 26 | +> `https://aka.ms/msem/rss` |
| 27 | +
|
| 28 | +## August 2024 |
| 29 | + |
| 30 | +### New predefined classifications |
| 31 | + |
| 32 | +The following predefined **Identity** classification rules were added to the critical assets list: |
| 33 | + |
| 34 | +| Classification | Description | |
| 35 | +| --------------------------------------------- | ------------------------------------------------------------ | |
| 36 | +| External Identity Provider Administrator | This rule applies to identities assigned with the Microsoft Entra "External Identity Provider Administrator" role. | |
| 37 | +| Domain Name Administrator | This rule applies to identities assigned with the Microsoft Entra "Domain Name Administrator" role. | |
| 38 | +| Permissions Management Administrator | This rule applies to identities assigned with the Microsoft Entra "Permissions Management Administrator" role. | |
| 39 | +| Billing Administrator | This rule applies to identities assigned with the Microsoft Entra "Billing Administrator" role. | |
| 40 | +| License Administrator | This rule applies to identities assigned with the Microsoft Entra "License Administrator" role. | |
| 41 | +| Teams Administrator | This rule applies to identities assigned with the Microsoft Entra "Teams Administrator" role. | |
| 42 | +| External ID User Flow Administrator | This rule applies to identities assigned with the Microsoft Entra "External ID User Flow Administrator" role. | |
| 43 | +| External ID User Flow Attribute Administrator | This rule applies to identities assigned with the Microsoft Entra "External ID User Flow Attribute Administrator" role. | |
| 44 | +| B2C IEF Policy Administrator | This rule applies to identities assigned with the Microsoft Entra "B2C IEF Policy Administrator" role. | |
| 45 | +| Compliance Data Administrator | This rule applies to identities assigned with the Microsoft Entra "Compliance Data Administrator" role. | |
| 46 | +| Authentication Policy Administrator | This rule applies to identities assigned with the Microsoft Entra "Authentication Policy Administrator" role. | |
| 47 | +| Knowledge Administrator | This rule applies to identities assigned with the Microsoft Entra "Knowledge Administrator" role. | |
| 48 | +| Knowledge Manager | This rule applies to identities assigned with the Microsoft Entra "Knowledge Manager" role. | |
| 49 | +| Attribute Definition Administrator | This rule applies to identities assigned with the Microsoft Entra "Attribute Definition Administrator" role. | |
| 50 | +| Attribute Assignment Administrator | This rule applies to identities assigned with the Microsoft Entra "Attribute Assignment Administrator" role. | |
| 51 | +| Identity Governance Administrator | This rule applies to identities assigned with the Microsoft Entra "Identity Governance Administrator" role. | |
| 52 | +| Cloud App Security Administrator | This rule applies to identities assigned with the Microsoft Entra "Cloud App Security Administrator" role. | |
| 53 | +| Windows 365 Administrator | This rule applies to identities assigned with the Microsoft Entra "Windows 365 Administrator" role. | |
| 54 | +| Yammer Administrator | This rule applies to identities assigned with the Microsoft Entra "Yammer Administrator" role. | |
| 55 | +| Authentication Extensibility Administrator | This rule applies to identities assigned with the Microsoft Entra "Authentication Extensibility Administrator" role. | |
| 56 | +| Lifecycle Workflows Administrator | This rule applies to identities assigned with the Microsoft Entra "Lifecycle Workflows Administrator" role. | |
| 57 | + |
| 58 | +For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md) |
| 59 | + |
| 60 | +### New Initiative Event |
| 61 | + |
| 62 | +A new event type has been created to notify users when a new initiative is added to MSEM. |
| 63 | + |
| 64 | +For more information, see, [Overview - Exposure insights](exposure-insights-overview.md) |
| 65 | + |
| 66 | +### News from the Research Team |
| 67 | + |
| 68 | +Read more about what the research team has been up to in this blog - [Bridging the On-premises to Cloud Security Gap: Cloud Credentials Detection](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/bridging-the-on-premises-to-cloud-security-gap-cloud-credentials/ba-p/4211794) |
| 69 | + |
| 70 | +## July 2024 |
| 71 | + |
| 72 | +### New predefined classifications |
| 73 | + |
| 74 | +The following predefined classification rules were added to the critical assets list: |
| 75 | + |
| 76 | +| Classification | Description | |
| 77 | +| ------------------------------------------------------------ | ------------------------------------------------------------ | |
| 78 | +| **Exchange** | This rule applies to devices identified as operational Exchange servers within a domain. These servers might hold sensitive data of the organization. | |
| 79 | +| **VMware ESXi** | This rule applies to devices identified as operational ESXi servers. These devices might hold other sensitive or critical devices. | |
| 80 | +| **VMware vCenter** | This rule applies to devices identified as operational VMware vCenter and frequently used by admins to manage the virtual infrastructure. | |
| 81 | +| **Identity with Privileged Azure Role** | This rule applies to identities assigned with a Privileged Azure role, over a potentially business-critical scope. | |
| 82 | +| **Exchange Administrator** | This rule applies to identities assigned with the Microsoft Entra "Exchange Administrator" role. | |
| 83 | +| **SharePoint Administrator** | This rule applies to identities assigned with the Microsoft Entra "SharePoint Administrator" role. | |
| 84 | +| **Compliance Administrator** | This rule applies to identities assigned with the Microsoft Entra "Compliance Administrator" role. | |
| 85 | +| **Groups Administrator** | This rule applies to identities assigned with the Microsoft Entra "Groups Administrator" role. | |
| 86 | +| **Confidential Azure Virtual Machine** | This rule applies to Azure confidential Virtual Machines. | |
| 87 | +| **Locked Azure Virtual Machine** | This rule applies to Azure virtual machines that are safeguarded by a lock. | |
| 88 | +| **Azure Virtual Machine with High Availability and Performance** | This rule applies to Azure Virtual Machines that use premium Azure storage and are configured with an availability set. | |
| 89 | +| **Immutable Azure Storage** | This rule applies to Azure storage accounts that have immutability support enabled. | |
| 90 | +| **Immutable and Locked Azure Storage** | This rule applies to Azure storage accounts that have immutability support enabled with a locked policy in place. | |
| 91 | +| **Azure Virtual Machine has a Critical Signed-in user** | This rule applies to Azure Virtual Machines with a Critical user signed in protected by Defender for Endpoint with high or very high-criticality users signed in. | |
| 92 | +| **Azure Key Vaults with Many Connected Identities** | This rule applies to Azure Key Vaults with high access compared to others, indicating critical workload usage. | |
| 93 | + |
| 94 | +For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md) |
| 95 | + |
| 96 | +## May 2024 |
| 97 | + |
| 98 | +### Integration with Threat Analytics |
| 99 | + |
| 100 | +- New integration with Threat Analytics to enhance the set of domain security initiatives with threat-based security initiatives. These initiatives focus on specific attack techniques and active threat actors, as seen and analyzed by expert Microsoft security researchers. |
| 101 | + |
| 102 | +- **Blog** - [Respond to trending threats and adopt zero-trust with Exposure Management](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/respond-to-trending-threats-and-adopt-zero-trust-with-exposure/ba-p/4130133) |
| 103 | + |
| 104 | +For more information, see, [Review security initiatives](initiatives.md) |
| 105 | + |
| 106 | +### New Exposure Management Tables |
| 107 | + |
| 108 | +- MSEM released two new powerful tables within Advanced Hunting: *ExposureGraphNodes* and *ExposureGraphEdges*. |
| 109 | + |
| 110 | +- **Blog** - [Microsoft Security Exposure Management Graph: unveiling the power](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-security-exposure-management-graph-unveiling-the-power/ba-p/4148546) |
| 111 | + |
| 112 | +For more information, see, [Query the enterprise exposure graph](query-enterprise-exposure-graph.md) |
| 113 | + |
| 114 | +## April 2024 |
| 115 | + |
| 116 | +### Critical Asset Protection |
| 117 | + |
| 118 | +- Microsoft Security Exposure Management introduces a contextual risk-based approach, allowing organizations to identify and prioritize critical assets effectively. By assessing potential exposures in real time, security teams gain clarity and focus on safeguarding their digital assets. |
| 119 | + |
| 120 | +- **Blog** - [Critical Asset Protection with Microsoft Security Exposure Management](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/critical-asset-protection-with-microsoft-security-exposure/ba-p/4122645) |
| 121 | + |
| 122 | +For more information, see, [Overview of critical asset management](critical-asset-management.md) |
0 commit comments