Skip to content

Commit 3c8997e

Browse files
authored
Merge pull request #950 from MicrosoftDocs/main
Publish main to live, Monday 10:30AM PDT, 07/15
2 parents 0f256b3 + b9d7296 commit 3c8997e

14 files changed

+93
-112
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,11 @@
194194
"source_path": "defender-endpoint/collect-diagnostic-data-update-compliance.md",
195195
"redirect_url": "/defender-endpoint/collect-diagnostic-data",
196196
"redirect_document_id": false
197+
},
198+
{
199+
"source_path": "defender-endpoint/attack-simulations.md",
200+
"redirect_url": "/defender-endpoint/defender-endpoint-demonstrations",
201+
"redirect_document_id": true
197202
}
198203
]
199204
}

defender-endpoint/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -321,8 +321,6 @@
321321
items:
322322
- name: Integration with Microsoft Defender for Cloud
323323
href: azure-server-integration.md
324-
- name: Run simulated attacks on devices
325-
href: attack-simulations.md
326324
- name: Create an onboarding or offboarding notification rule
327325
href: onboarding-notification.md
328326
- name: Manage Microsoft Defender for Endpoint configuration settings on devices with Microsoft Intune

defender-endpoint/attack-simulations.md

Lines changed: 0 additions & 71 deletions
This file was deleted.

defender-for-iot/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,11 @@
77
- name: Overview
88
items:
99
- name: What is Microsoft Defender for IoT in the Defender portal?
10-
href: microsoft-defender-iot.md
10+
href: microsoft-defender-iot.md
11+
- name: What's new
12+
href: whats-new.md
1113
- name: Site security
12-
href: site-security-overview.md
14+
href: site-security-overview.md
1315
- name: Get started
1416
items:
1517
- name: Prerequisites

defender-for-iot/investigate-threats.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,17 @@ Defender for IoT generates its own unique alert.
5959

6060
| Name | Description |
6161
|----|----|
62-
|**Possible operational impact due to a compromised device** |A compromised device communicated with an operational technology (OT) asset. An attacker might be attempting to control or disrupt physical operations. |
62+
|**Possible operational impact due to a compromised device** |A compromised device communicated with an operational technology (OT) asset. An attacker might be attempting to control or disrupt physical operations. |
63+
64+
## Advanced hunting
65+
66+
Use the **Site** property listed in the **DeviceInfo** table to write queries for advanced hunting. This allows you to filter devices according to a specific site, for example, all devices that communicated with malicious devices at a specific site.
67+
68+
The following query lists all endpoint devices with the specific IP address at the San Francisco site.
69+
70+
```kusto
71+
DeviceInfo
72+
|where Site == "SanFrancisco" and PublicIP == "192.168.1.1" and DeviceCategory == "Endpoint"
73+
```
74+
75+
This is relevant for both the device inventory and site security. For more information, see [Advanced hunting](/../defender-xdr/advanced-hunting-overview) and the [Advanced hunting DeviceInfo schema](/../defender-xdr/advanced-hunting-deviceinfo-table).

defender-for-iot/whats-new.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: What's new in Microsoft Defender for IoT in the Defender portal
3+
description: This article describes new features available in Microsoft Defender for IoT in the Defender portal, including both OT and Enterprise IoT networks.
4+
ms.topic: whats-new
5+
ms.service: defender-for-iot
6+
author: lwainstein
7+
ms.author: lwainstein
8+
ms.localizationpriority: medium
9+
ms.date: 03/07/2024
10+
ms.custom: enterprise-iot
11+
---
12+
13+
# What's new in Microsoft Defender for IoT?
14+
15+
This article describes features available in Microsoft Defender for IoT in the Defender portal, across both OT and Enterprise IoT networks.
16+
17+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
18+
19+
## July 2024
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | - [Site property added DeviceInfo schema](#new-site-property-added-deviceinfo-schema) |
24+
25+
### New Site property added DeviceInfo schema
26+
27+
In the advanced hunting tables, the **Site** property is added to the **DeviceInfo** schema. For more information, see [investigate threats](investigate-threats.md#advanced-hunting).
28+
29+
## Next steps
30+
31+
[Get started with Defender for IoT](get-started.md)

defender-office-365/advanced-delivery-policy-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom:
1717
description: Admins can learn how to use the advanced delivery policy in Exchange Online Protection (EOP) to identify messages that shouldn't be filtered in specific supported scenarios (third-party phishing simulations and messages delivered to security operations (SecOps) mailboxes.
1818
ms.service: defender-office-365
19-
ms.date: 11/2/2023
19+
ms.date: 07/16/2024
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -128,7 +128,7 @@ There must be a match on at least one **Domain** and one **Sending IP**, but no
128128
If your MX record doesn't point to Microsoft 365, the IP address in the `Authentication-results` header must match the IP address in the advanced delivery policy. If the IP addresses don't match, you might need to configure [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so the correct IP address is detected.
129129

130130
> [!NOTE]
131-
> Enhanced Filtering for Connectors doesn't work for third-party phishing simulations in complex email routing scenarios (for example, email from the internet is routed to Microsoft 365, then to an on-premises environment or third-party security service, and then back to Microsoft 365). EOP can't identify the true IP address of the message source. Don't try to work around this limitation by adding the IP addresses of the on-premises or third-party sending infrastructure to the third-party phishing simulation. Doing so effectively bypasses spam filtering for any internet sender who impersonates the domain that's specified in the third-party phishing simulation.
131+
> Enhanced Filtering for Connectors doesn't work for third-party phishing simulations in email routing scenarios that involve mail coming to Exchange online twice (for example, internet email routed to Microsoft 365, then to an on-premises environment or third-party security service, and then back to Microsoft 365). EOP can't identify the true IP address of the message source. Don't try to work around this limitation by adding the IP addresses of the on-premises or third-party sending infrastructure to the third-party phishing simulation. Doing so effectively bypasses spam filtering for any internet sender who impersonates the domain that's specified in the third-party phishing simulation. Routing scenarios where the MX record points to a third party service and then mail is routed to Exchange Online are supported if Enhanced Filtering for Connectors is configured.
132132
>
133133
> Currently, the advanced delivery policy for third-party phishing simulations doesn't support simulations within the same organization (`DIR:INT`), especially when email is routed through an Exchange Server gateway before Microsoft 365 in Hybrid mail flow. To work around this issue, you have the following options:
134134
>

defender-office-365/attack-simulation-training-faq.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ Custom payloads have the option to add the External tag to messages. For more in
109109

110110
There are no built-in options to add safety tips to payloads, but you can use the following methods on the **Configure payload** page of the payload setup wizard::
111111

112-
- Use an existing email message that contains the safety tip as a template. Safe the message as HTML and copy the information.
112+
- Use an existing email message that contains the safety tip as a template. Save the message as HTML and copy the information.
113113
- Use the following sample code for the First contact safety tip:
114114

115115
```html
@@ -148,7 +148,7 @@ Yes. For more information, see [Training campaigns in Attack simulation training
148148

149149
The [Users tab](attack-simulation-training-simulations.md#users-tab) for the simulation is filterable by **Simulation message delivery: Failed to deliver**.
150150

151-
If you won the sender domain, the undelivered simulation report is returned in a non-delivery report (also known as an NDR or bounce message). For more information about the codes in the NDR, see [Email non-delivery reports and SMTP errors in Exchange Online](/exchange/troubleshoot/email-delivery/ndr/non-delivery-reports-in-exchange-online).
151+
If you own the sender domain, the undelivered simulation report is returned in a non-delivery report (also known as an NDR or bounce message). For more information about the codes in the NDR, see [Email non-delivery reports and SMTP errors in Exchange Online](/exchange/troubleshoot/email-delivery/ndr/non-delivery-reports-in-exchange-online).
152152

153153
## Issues with Attack simulation training reporting
154154

@@ -326,14 +326,14 @@ A: See the following table:
326326
|Simulation metadata|18 months unless the [simulation is deleted sooner by an admin](attack-simulation-training-simulations.md#remove-simulations).|
327327
|Simulation automation|18 months unless the [simulation automation is deleted sooner by an admin](attack-simulation-training-simulation-automations.md#remove-simulation-automations).|
328328
|Payload automation|18 months unless the [payload automation is deleted sooner by an admin](attack-simulation-training-payload-automations.md#remove-payload-automations).|
329-
|User activity in simulation metadata|18 months unless deleted by an admin.|
329+
|User activity in simulation metadata|18 months unless the [simulation is deleted sooner by an admin](attack-simulation-training-simulations.md#remove-simulations).|
330330
|Global payloads|Persisted unless deleted by Microsoft.|
331331
|Tenant payloads|18 months unless the [archived payload is deleted sooner by an admin](attack-simulation-training-payloads.md#remove-archived-payloads).|
332332
|User activity in training metadata|18 months unless the [simulation is deleted sooner by an admin](attack-simulation-training-simulations.md#remove-simulations).|
333333
|MDO recommended payloads|6 months.|
334334
|Global end user notifications|Persisted unless deleted by Microsoft.|
335335
|Tenant end user notifications|18 months unless the [notification is deleted sooner by an admin](attack-simulation-training-end-user-notifications.md#remove-end-user-notifications).|
336-
|Global login pages|Persisted unless deleted by the service.|
336+
|Global login pages|Persisted unless deleted by Microsoft.|
337337
|Tenant login pages|18 months unless the [login page is deleted sooner by an admin](attack-simulation-training-login-pages.md#remove-login-pages).|
338338
|Global landing pages|Persisted unless deleted by Microsoft|
339339
|Tenant landing pages|18 months unless the [landing page is deleted sooner by an admin](attack-simulation-training-landing-pages.md#remove-landing-pages).|

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ For more information on what's new with other Microsoft Defender security produc
5151

5252
- **Automated end user feedback**: The user submission automatic feedback response capability in Microsoft Defender for Office 365 enables organizations to automatically respond to end user submissions of phishing based on the verdict from the automated investigation. [Learn more](air-user-automatic-feedback-response.md).
5353

54-
- We are introducing **Sender's copy clean-up features** in Threat Explorer, email entity, Summary Panel, and Advanced hunting. These new features will streamline the process of managing Sent items, particularly for admins who use Soft delete and Move to inbox actions. For more information, see [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md). Key highlights:
54+
- We are introducing **Sender's copy clean-up features** in Threat Explorer, email entity, Summary Panel, and Advanced hunting. These new features will streamline the process of managing Sent items, particularly for admins who use the actions **Move to mailbox folder** \> **Soft delete** and **Move to mailbox folder** \> **Inbox**. For more information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard). Key highlights:
5555
- Integration with Soft delete: Sender's copy clean-up will be incorporated as part of the Soft delete action.
5656
- Wide support: This action will be supported across various Defender XDR platforms including Threat Explorer, Take Action wizard from the email entity, Summary Panel, Advanced hunting, and through Microsoft Graph API.
5757
- Undo capability: An undo action will be available, allowing you to reverse the clean-up by moving items back to the Sent folder.

defender-office-365/mdo-email-entity-page.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The details pane on the left side of the page contains collapsible sections with
8080
- **Quarantine**
8181
- **Unknown**
8282
- **Latest Threats**
83-
- **Latest delivery location**: The location of the message after system actions on the message (for example, [ZAP](zero-hour-auto-purge.md)), or admin actions on the message (for example, [Move to Deleted Items](threat-explorer-threat-hunting.md#email-remediation)). User actions on the message (for example, deleting or archiving the message) aren't shown, so this value doesn't guarantee the _current location_ of the message.
83+
- **Latest delivery location**: The location of the message after system actions on the message (for example, [ZAP](zero-hour-auto-purge.md)), or admin actions on the message (for example, [Move to Deleted Items](threat-explorer-threat-hunting.md#the-take-action-wizard)). User actions on the message (for example, deleting or archiving the message) aren't shown, so this value doesn't guarantee the _current location_ of the message.
8484

8585
> [!TIP]
8686
> There are scenarios where **Original delivery location**/**Latest delivery location** and/or **Delivery action** have the value **Unknown**. For example:
@@ -459,7 +459,7 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
459459

460460
The following actions are available at the top of the Email entity page:
461461

462-
- :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action**: For information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation).
462+
- :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action**: For information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard).
463463
- :::image type="icon" source="media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **Email preview**¹ ²
464464
- :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options**:
465465
- :::image type="icon" source="media/m365-cc-sc-open-icon.png" border="false"::: **Go to quarantined email**: Available only if the message was quarantined. Selecting this action opens the **Email** tab on the **Quarantine** page at <https://security.microsoft.com/quarantine>, filtered by the unique **Message ID** value of the message. For more information, see [View quarantined email](quarantine-admin-manage-messages-files.md#view-quarantined-email).

0 commit comments

Comments
 (0)