Skip to content

Commit 394c4ea

Browse files
authored
Merge branch 'main' into docs-editor/attack-surface-reduction-rules-1732743585
2 parents 9a79ae3 + a8768b0 commit 394c4ea

15 files changed

+176
-134
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["ATADocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["ATADocs/" "ATPDocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

ATPDocs/technical-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ sections:
7070
7171
- **[UEBA capabilities](/cloud-app-security/tutorial-ueba)**: Insights into individual user risk through user investigation priority scoring. The score can assist SecOps in their investigations and help analysts understand unusual activities for the user and the organization.
7272
73-
- **Native integrations**: Integrates with Microsoft Defender for Cloud Apps and Azure AD Identity Protection to provide a hybrid view of what's taking place in both on-premises and hybrid environments.
73+
- **Native integrations**: Integrates with Microsoft Defender for Cloud Apps and Microsoft Entra ID Protection to provide a hybrid view of what's taking place in both on-premises and hybrid environments.
7474
7575
- **Contributes to Microsoft Defender XDR**: Contributes alert and threat data to Microsoft Defender XDR. Microsoft Defender XDR uses the Microsoft 365 security portfolio (identities, endpoints, data, and applications) to automatically analyze cross-domain threat data, building a complete picture of each attack in a single dashboard.
7676

ATPDocs/what-is.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What is Microsoft Defender for Identity?
33
description: This article describes the Microsoft Defender for Identity service and the sorts of suspicious activities Defender for Identity can detect.
4-
ms.date: 08/27/2023
4+
ms.date: 08/27/2024
55
ms.topic: overview
66
#customer intent: As a Microsoft Defender for Identity customer or potential customer, I want to understand the main use case scenarios for Defender for Identity so that I can best use my Microsoft Defender XDR deployment.
77
---

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Cloud Apps – privacy
33
description: Learn about how Microsoft Defender for Cloud Apps manages user privacy.
4-
ms.date: 06/19/2024
4+
ms.date: 11/24/2024
55
ms.topic: concept-article
66
---
77
# Privacy with Microsoft Defender for Cloud Apps
@@ -29,12 +29,25 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
2929
|---------|---------|
3030
|**Customers whose tenants are provisioned in the United States** | United States |
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
32-
|**Customers whose tenants are provisioned in the Asia Pacific** | Either Asia Pacific and/or the United States |
33-
|**Customers whose tenants are provisioned in Canada** | Canada and/or the United States |
34-
|**Customers whose tenants are provisioned in India** | Either India and/or the United States |
3532
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
3633

37-
Customer data collected by Defender for Cloud Apps is either stored in your tenant location, as described in the previous table, or in the geographic location of another online service that Defender for Cloud Apps shares data with, as defined by the data storage rules of that online service.
34+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
35+
36+
|Customer provisioning location |Data storage location |
37+
|---------|---------|
38+
|**Customers whose tenants are provisioned in the United States** | United States |
39+
|**Customers whose tenants are provisioned in in the European Union** | European Union |
40+
|**Customers whose tenants are provisioned in the United Kingdom** | United Kingdom |
41+
|**Customers whose tenants are provisioned in Australia** | Australia |
42+
|**Customers whose tenants are provisioned in Germany** | Germany |
43+
|**Customers whose tenants are provisioned in Canada** |Canada |
44+
|**Customers whose tenants are provisioned in France** | France |
45+
| **Customers whose tenants are provisioned in Japan** | Japan |
46+
| **Customers whose tenants are provisioned in India** | India |
47+
| **Customers whose tenants are provisioned in Asia Pacific** | Asia Pacific |
48+
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
49+
50+
Customer data collected by Defender for Cloud Apps is either stored in your tenant location, as described in the previous tables, or in the geographic location of another online service that Defender for Cloud Apps shares data with, as defined by the data storage rules of that online service.
3851

3952
If Defender for Cloud Apps data is stored in your tenant location, your tenant isn't movable after having been created. To view your Defender for Cloud Apps tenant location in the Microsoft Defender portal, go to **Settings > Cloud Apps > About > Region**.
4053

@@ -58,4 +71,4 @@ Defender for Cloud Apps shares data, including customer data, among the followin
5871

5972
## Related content
6073

61-
For more information, see the [Microsoft Service Trust portal](https://www.microsoft.com/en-us/trust-center/product-overview).
74+
For more information, see the [Microsoft Service Trust portal](https://www.microsoft.com/en-us/trust-center/product-overview).

CloudAppSecurityDocs/get-started.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,12 @@
11
---
22
title: Get started | Microsoft Defender for Cloud Apps
33
description: This quickstart outlines the process for getting Defender for Cloud Apps up and running so you have cloud app use, insight, and control.
4-
ms.date: 05/15/2024
4+
ms.date: 11/28/2024
55
ms.topic: quickstart
66
---
77

88
# Get started with Microsoft Defender for Cloud Apps
99

10-
11-
1210
This quickstart describes how to start working with Microsoft Defender for Cloud Apps on the Microsoft Defender Portal.
1311

1412
Defender for Cloud Apps can help you use the benefits of cloud applications while maintaining control of your corporate resources. Defender for Cloud Apps improves your visibility into cloud activity and helps increase protection over your corporate data.
@@ -22,8 +20,15 @@ To set up Defender for Cloud Apps, you must at least be a Security Administrator
2220

2321
Users with admin roles have the same admin permissions across any cloud apps your organization is subscribed to, regardless of where you've assigned the role. For more information, see [Assign admin roles](/microsoft-365/admin/add-users/assign-admin-roles) and [Assigning administrator roles in Microsoft Entra ID](/azure/active-directory/roles/permissions-reference).
2422

23+
2524
Microsoft Defender for Cloud Apps is a security tool and therefore doesn't require Microsoft 365 productivity suite licenses. For Microsoft 365 Cloud App Security (Microsoft Defender for Cloud Apps only for Microsoft 365), see [What are the differences between Microsoft Defender for Cloud Apps and Microsoft 365 Cloud App Security?](editions-cloud-app-security-o365.md).
2625

26+
Microsoft Defender for Cloud Apps depends on the following Microsoft Entra ID applications to function properly. Do not disable these applications in Microsoft Entra ID:
27+
28+
- Microsoft Defender for Cloud Apps - APIs
29+
- Microsoft Defender for Cloud Apps - Customer Experience
30+
- Microsoft Defender for Cloud Apps - Information Protection
31+
- Microsoft Defender for Cloud Apps - MIP Server
2732

2833
## Access Defender for Cloud Apps
2934

CloudAppSecurityDocs/protect-google-workspace.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ Connecting Google Workspace to Defender for Cloud Apps gives you improved insigh
2424

2525
## How Defender for Cloud Apps helps to protect your environment
2626

27+
2728
- [Detect cloud threats, compromised accounts, and malicious insiders](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware)
2829
- [Discover, classify, label, and protect regulated and sensitive data stored in the cloud](best-practices.md#discover-classify-label-and-protect-regulated-and-sensitive-data-stored-in-the-cloud)
2930
- [Discover and manage OAuth apps that have access to your environment](manage-app-permissions.md)
@@ -183,7 +184,9 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
183184
184185
1. Upload the P12 **Certificate** file that you saved earlier.
185186
186-
1. Enter one **admin account email** of your Google Workspace admin.
187+
1. Enter the email address of your **Google Workspace Super Admin**.
188+
189+
Deploying with an account that is not a Google Workspace Super Admin will lead to failure in the API test and does not allow Defender for Cloud Apps to correctly function. We request specific scopes so even as Super Admin, Defender for Cloud Apps is still limited.
187190
188191
1. If you have a Google Workspace Business or Enterprise account, select the check box. For information about which features are available in Defender for Cloud Apps for Google Workspace Business or Enterprise, see [Enable instant visibility, protection, and governance actions for your apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md).
189192

CloudAppSecurityDocs/what-is-defender-for-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Overview
33
description: This article describes Microsoft Defender for Cloud Apps and how it works.
4-
ms.date: 06/14/2023
4+
ms.date: 06/14/2024
55
ms.topic: overview
66
---
77
# Microsoft Defender for Cloud Apps overview

defender-endpoint/linux-install-manually.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/28/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -495,9 +495,16 @@ Download the onboarding package from Microsoft Defender portal.
495495
496496
The following external package dependencies exist for the mdatp package:
497497
498-
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, `mde-netfilter`
499-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
500-
- For Mariner the mdatp package requires `attr`, `audit`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
498+
- The mdatp RPM package requires `glibc >= 2.17`, `policycoreutils`, `selinux-policy-targeted`, `mde-netfilter`
499+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `mde-netfilter`
500+
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
501+
502+
> [!NOTE]
503+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
504+
> If eBPF is not supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following additional dependency on the auditd package exists for mdatp:
505+
> - The mdatp RPM package requires `audit`, `semanage`.
506+
> - For DEBIAN the mdatp package requires `auditd`.
507+
> - For Mariner the mdatp package requires `audit`.
501508
502509
The mde-netfilter package also has the following package dependencies:
503510

defender-endpoint/linux-support-ebpf.md

Lines changed: 19 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/11/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -116,7 +116,9 @@ Post reboot, run the following command to check if audit rules were cleared:
116116
The output of previous command should show no rules or any user added rules. In case where the rules weren't removed, do the following steps to clear the audit rules file:
117117

118118
1. Switch to ebpf mode.
119+
119120
2. Remove the file `/etc/audit/rules.d/mdatp.rules`.
121+
120122
3. Reboot the machine.
121123

122124
### Troubleshooting and Diagnostics
@@ -131,23 +133,29 @@ uname -a
131133

132134
1. Enabling eBPF on RHEL 8.1 version with SAP might result in kernel panic. To mitigate this issue, you can take one of the following steps:
133135

134-
- Use a distro version higher than RHEL 8.1.
135-
- Switch to AuditD mode if you need to use RHEL 8.1 version.
136+
- Use a distro version higher than RHEL 8.1.
137+
- Switch to AuditD mode if you need to use RHEL 8.1 version.
136138

137139
2. Using Oracle Linux 8.8 with kernel version **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** might result in kernel panic. To mitigate this issue, you can take one of the following steps:
138140

139-
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
140-
- Switch to AuditD mode if you need to use the same kernel version
141+
- Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. The minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
142+
- Switch to AuditD mode if you need to use the same kernel version
141143

142-
```bash
143-
sudo mdatp config ebpf-supplementary-event-provider --value disabled
144-
```
144+
```bash
145+
sudo mdatp config ebpf-supplementary-event-provider --value disabled
146+
```
147+
148+
- The following two sets of data help analyze potential issues and determine the most effective resolution options.
149+
150+
1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
145151

146-
The following two sets of data help analyze potential issues and determine the most effective resolution options.
152+
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
147153

148-
1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
154+
3. System hangs on Oracle Linux 7.9 running Defender for Linux when ksplice is used for live kernel patching.
149155

150-
2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
156+
- Auto-install patching of ksplice simply adds a cron job to the endpoint.
157+
- To mitigate the hang issue, you can create a cron job which will first stop the mdatp service, apply ksplice based patching, then start the service.
158+
- As kernel patching is few seconds activity so this will not have major exposure in terms of security.
151159

152160
#### Troubleshooting performance issues
153161

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-linux
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 10/11/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
@@ -165,7 +165,9 @@ Once hosted, copy the absolute path of the hosted server (up to and not includin
165165

166166
For example, if the script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, the corresponding URI is: `www.example.server.com:8000/linux/production/`
167167

168-
Once the Mirror Server is set up, we need to propagate this URL to the Linux endpoints using the Managed Configuration as described in the next section.
168+
We can also use the absolute path of directory (local / remote mount point) like `/tmp/wdav-update/linux/production`.
169+
170+
Once the Mirror Server is set up, we need to propagate this URL to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
169171

170172
## Configure the Endpoints
171173

@@ -182,17 +184,17 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
182184
"offlineDefintionUpdateFallbackToCloud":false,
183185
"offlineDefinitionUpdate": "enabled"
184186
},
185-
"features": {
186-
"offlineDefinitionUpdateVerifySig": "enabled"
187-
}
187+
"features": {
188+
"offlineDefinitionUpdateVerifySig": "enabled"
189+
}
188190
}
189191
```
190192

191193
| Field Name | Values | Comments |
192194
|-------------------------------------------|----------------------|-----------------------------------------------------|
193195
| `automaticDefinitionUpdateEnabled` | `True` / `False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
194196
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
195-
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. |
197+
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. This can be either in terms of the remote server URL, or a directory (local / remote mount point). |
196198
| `offlineDefinitionUpdate` | `enabled` / `disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
197199
| `offlineDefinitionUpdateFallbackToCloud` | `True` / `False` | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
198200
| `offlineDefinitionUpdateVerifySig` | `enabled` / `disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints, else vice versa. |
@@ -287,16 +289,6 @@ offline_definition_update_fallback_to_cloud : false[managed]
287289
mdatp definitions update
288290
```
289291

290-
### Known Issues:
291-
292-
Offline signature update might fail in the following scenario:
293-
294-
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
295-
296-
Mitigation steps:
297-
298-
A fix for this issue is planned to release soon.
299-
300292
## Useful Links
301293

302294
### Downloader script

0 commit comments

Comments
 (0)