Skip to content

Commit 3f4ccf6

Browse files
authored
Merge branch 'main' into WI516033-whats-new-macos-mde-release-version
2 parents 89674dd + 5fafe47 commit 3f4ccf6

File tree

50 files changed

+212
-82
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+212
-82
lines changed

defender-for-cloud-apps/anomaly-detection-policy.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ Based on the policy results, security alerts are triggered. Defender for Cloud A
3636
> - [Suspicious inbox forwarding](#suspicious-inbox-forwarding).
3737
> - [Unusual ISP for an OAuth App](#unusual-isp-for-an-oauth-app).
3838
> - [Suspicious file access activity (by user)](#unusual-activities-by-user).
39-
> - [Ransomware activity](#ransomware-activity).
4039
>
4140
> You will continue to receive the same standard of protection without disruption to your existing security coverage. No action is required from your side.
4241
@@ -92,10 +91,6 @@ This detection identifies that users were active from an IP address that has bee
9291

9392
### Ransomware activity
9493

95-
> [!NOTE]
96-
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Ransomware payment instruction file uploaded to {Application}**.
97-
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
98-
9994
Defender for Cloud Apps extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity, Defender for Cloud Apps ensures holistic and robust protection. If Defender for Cloud Apps identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Defender for Cloud Apps detects ransomware, see [Protecting your organization against ransomware](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware).
10095

10196
### Activity performed by terminated user

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Compare Microsoft Defender Vulnerability Management plans and capabilities
33
description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
44
search.appverid: MET150

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Microsoft Defender Vulnerability Management frequently asked questions
33
description: Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulnerability Management.
44
ms.service: defender-vuln-mgmt

defender-vulnerability-management/defender-vulnerability-management-trial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: About the Microsoft Defender Vulnerability Management trial
33
description: Learn about the Microsoft Defender Vulnerability Management trial
44
ms.service: defender-vuln-mgmt

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Microsoft Defender Vulnerability Management
33
description: Microsoft Defender Vulnerability Management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
4-
author: denisebmsft
5-
ms.author: deniseb
6-
manager: deniseb
4+
author: limwainstein
5+
ms.author: lwainstein
6+
manager: bagol
77
ms.topic: overview
88
ms.service: defender-vuln-mgmt
99
ms.localizationpriority: medium

defender-vulnerability-management/device-restart-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Device restart status
33
description: Learn about the device restart status tag in Microsoft Defender Vulnerability Management
44
ms.service: defender-vuln-mgmt

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Vulnerability support in Microsoft Defender Vulnerability Management
33
description: List the reported inaccuracies that were fixed
44
search.appverid: MET150

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Sign up for Microsoft Defender Vulnerability Management
33
description: Get Microsoft Defender Vulnerability Management
44
search.appverid: MET150

defender-vulnerability-management/mdvm-onboard-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Onboard to Microsoft Defender Vulnerability Management
33
description: Learn how to onboard endpoints to Microsoft Defender Vulnerability Management service
44
ms.author: lwainstein

defender-vulnerability-management/retention-logic-mdvm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Understand retention logic in Microsoft Defender Vulnerability Management
33
description: Get an overview of retention logic for inactive devices or uninstalled software in Microsoft Defender Vulnerability Management.
44
author: limwainstein

0 commit comments

Comments
 (0)