Skip to content

Commit 42aff89

Browse files
Merge pull request #3153 from MicrosoftDocs/main
Publish main to live, 03/17, 11:00 AM IST
2 parents 6031454 + a7405b2 commit 42aff89

File tree

3 files changed

+38
-9
lines changed

3 files changed

+38
-9
lines changed

defender-xdr/pilot-deploy-defender-cloud-apps.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ f1.keywords:
77
- NOCSH
88
ms.author: bcarter
99
author: brendacarter
10-
ms.date: 01/12/2025
10+
ms.date: 03/14/2025
1111
ms.localizationpriority: medium
1212
manager: dansimp
1313
audience: ITPro
@@ -201,13 +201,13 @@ In this illustration, some apps are sanctioned for use. Sanctioning is a simple
201201

202202
One of the most powerful protections you can configure is Conditional access app control. This protection requires integration with Microsoft Entra ID. It allows you to apply Conditional Access policies, including related policies (like requiring healthy devices), to cloud apps you've sanctioned.
203203

204-
You might already have SaaS apps added to your Microsoft Entra tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Microsoft Entra ID. All you must do is configure a policy in Microsoft Entra ID to use conditional access app control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
204+
You might already have SaaS apps added to your Microsoft Entra tenant to enforce multifactor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Microsoft Entra ID. All you must do is configure a policy in Microsoft Entra ID to use conditional access app control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
205205

206206
:::image type="content" source="media/eval-defender-xdr/m365-defender-mcas-architecture-e.svg" alt-text="A diagram that shows the architecture for Defender for Cloud Apps conditional access app control." lightbox="media/eval-defender-xdr/m365-defender-mcas-architecture-e.svg":::
207207

208208
In this illustration:
209209

210-
- SaaS apps are integrated with the Microsoft Entra tenant. This integration allows Microsoft Entra ID to enforce conditional access policies, including multi-factor authentication.
210+
- SaaS apps are integrated with the Microsoft Entra tenant. This integration allows Microsoft Entra ID to enforce conditional access policies, including multifactor authentication.
211211
- A policy is added to Microsoft Entra ID to direct traffic for SaaS apps to Defender for Cloud Apps. The policy specifies which SaaS apps to apply this policy to. After Microsoft Entra ID enforces any conditional access policies that apply to these SaaS apps, Microsoft Entra ID then directs (proxies) the session traffic through Defender for Cloud Apps.
212212
- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.
213213

@@ -229,16 +229,16 @@ For sample policies, see [Recommended Microsoft Defender for Cloud Apps policies
229229

230230
Once you have session policies configured, apply them to your cloud apps to provide controlled access to those apps.
231231

232-
:::image type="content" source="media/eval-defender-xdr/m365-defender-office-architecture.svg" alt-text="A diagram that shows how cloud apps are accessed via session control policies with Defender for Cloud Apps." lightbox="media/eval-defender-xdr/m365-defender-office-architecture.svg":::
232+
:::image type="content" source="media/eval-defender-xdr/m365-defender-mcas-architecture-d.svg" alt-text="A diagram that shows how cloud apps are accessed via session control policies with Defender for Cloud Apps." lightbox="media/eval-defender-xdr/m365-defender-office-architecture.svg":::
233233

234234
In the illustration:
235235

236-
- Access to sanctioned cloud apps from users and devices in your organization is routed through Defender for Cloud Apps.
236+
- Access to sanctioned cloud apps from users and devices in your organization is routed through Defender for Cloud Apps where session policies can be applied to specific apps.
237237
- Cloud apps that you have not sanctioned or explicitly unsanctioned are not affected.
238238

239239
Session policies allow you to apply parameters to how cloud apps are used by your organization. For example, if your organization is using Salesforce, you can configure a session policy that allows only managed devices to access your organization's data at Salesforce. A simpler example could be configuring a policy to monitor traffic from unmanaged devices so you can analyze the risk of this traffic before applying stricter policies.
240240

241-
For more information, see [Conditional access app control in Microsoft Defender for Cloud Apps](/defender-cloud-apps/proxy-intro-aad).
241+
For more information, see [Create Microsoft Defender for Cloud Apps session policies](/defender-cloud-apps/session-policy-aad).
242242

243243
<a name="step-8"></a>
244244

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: reference
88
ms.service: exposure-management
9-
ms.date: 11/16/2024
9+
ms.date: 03/16/2025
1010
---
1111

1212
# Predefined classifications
@@ -42,7 +42,7 @@ Current asset types are:
4242
| Security Operations Admin Device | Device | High | Critical devices used to configure, manage, and monitor the security within an organization are vital for security operations administration and are at high risk of cyber threats. They require top-level security measures to prevent unauthorized access.  Note: We apply a logic to identify devices belonging to an admin based on multiple factors, including the frequent usage of administrative tools.|
4343
| Network Admin Device | Device | Medium | Critical devices used to configure, manage, and monitor the network assets within the organization are vital for network administration and are at high risk of cyber threats. They require top-level security to prevent unauthorized access. _Note: We apply a logic to identify devices belonging to an admin based on multiple factors, including the frequent usage of administrative tools._|
4444
| VMware ESXi | Device | High | The VMware ESXi hypervisor is essential for running and managing virtual machines within your infrastructure. As a bare-metal hypervisor, it's providing the foundation for creating and managing virtual resources. |
45-
| VMware vCenter | Device | High | The VMware vCenter Server is crucial for managing virtual environments. It provides centralized management of virtual machines and ESXi hosts. If it fails, it could disrupt the administration and control of your virtual infrastructure, including provisioning, migration, load balancing of virtual machines, and datacenter automation. However, as there are often redundant vCenter Servers and High Availability configurations, the immediate halt of all operations might not occur. Its failure could still cause significant inconvenience and potential performance issues |
45+
| VMware vCenter | Device | High | The VMware vCenter Server is crucial for managing virtual environments. It provides centralized management of virtual machines and ESXi hosts. If it fails, it could disrupt the administration and control of your virtual infrastructure, including provisioning, migration, load balancing of virtual machines, and datacenter automation. However, as there are often redundant vCenter Servers and High Availability configurations, the immediate halt of all operations might not occur. Its failure could still cause significant inconvenience and potential performance issues. |
4646
| Hyper-V Server | Device | High | The Hyper-V hypervisor is essential for running and managing virtual machines within your infrastructure, serving as the core platform for their creation and management. If the Hyper-V host fails, it can lead to the unavailability of hosted virtual machines, potentially causing downtime and disrupting business operations. Moreover, it can result in significant performance degradation and operational challenges. Ensuring the reliability and stability of Hyper-V hosts is therefore critical for maintaining seamless operations in a virtual environment. |
4747

4848
##### Identity
@@ -73,6 +73,7 @@ Current asset types are:
7373
| Password Administrator | Identity | Very High | Identities in this role can reset passwords for nonadministrators and Password Administrators. |
7474
| Privileged Authentication Administrator | Identity | Very High | Identities in this role can view, set, and reset authentication method information for any user (admin or nonadmin). |
7575
| Privileged Role Administrator | Identity | Very High | Identities in this role can manage role assignments in Microsoft Entra ID, and all aspects of Privileged Identity Management. |
76+
| Security Operations Admin User | Identity | High | Identities in this role can configure, manage, monitor, and respond to threats within the organization.  **Note**: This rule’s logic relies on the predefined critical device classification “Security Operations Admin Device”. |
7677
| Security Administrator | Identity | High | Identities in this role can read security information and reports, and manage configuration in Microsoft Entra ID and Office 365. |
7778
| Security Operator | Identity | High | Identities in this role can create and manage security events. |
7879
| Security Reader | Identity | High | Identities in this role can read security information and reports in Microsoft Entra ID and Office 365. |
@@ -102,6 +103,13 @@ Current asset types are:
102103
| Yammer Administrator | Identity | High | Identities in this role can manage all aspects of the Yammer service. |
103104
| Authentication Extensibility Administrator | Identity | High | Identities in this role can customize sign in and sign up experiences for users by creating and managing custom authentication extensions. |
104105
| Lifecycle Workflows Administrator | Identity | High | Identities in this role create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Microsoft Entra ID. |
106+
| Senior Executive (Technology) | Identity | Very High | Identities with this classification belong to senior executives in the field of Technology. |
107+
| Senior Executive (Finance) | Identity | Very High | Identities with this classification belong to senior executives in the field of Finance. |
108+
| Senior Executive (Operations) | Identity | Very High | Identities with this classification belong to senior executives in the field of Operations. |
109+
| Senior Executive (Marketing) | Identity | Very High | Identities with this classification belong to senior executives in the field of Marketing. |
110+
| Senior Executive (Information) | Identity | Very High | Identities with this classification belong to senior executives in the field of Information. |
111+
| Senior Executive (Execution) | Identity | Very High | Identities with this classification belong to senior executives in the field of Execution. |
112+
| Senior Executive (Human Resources) | Identity | Very High | Identities with this classification belong to senior executives in the field of Human Resources. |
105113

106114
##### Cloud resource
107115

exposure-management/whats-new.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 12/03/2024
9+
ms.date: 03/16/2025
1010

1111
---
1212

@@ -24,8 +24,29 @@ Learn more about MSEM by reading the blogs, [here](https://techcommunity.microso
2424
>
2525
> `https://aka.ms/msem/rss`
2626
27+
## March 2025
28+
29+
### New predefined classifications
30+
31+
The following predefined **Identity** classification rules were added to the critical assets list:
32+
33+
| Classification | Description |
34+
| ---------------------------------- | ------------------------------------------------------------ |
35+
| Senior Executive (Technology) | This rule applies to identities classified as senior executives in the field of Technology. |
36+
| Senior Executive (Finance) | This rule applies to identities classified as senior executives in the field of Finance. |
37+
| Senior Executive (Operations) | This rule applies to identities classified as senior executives in the field of Operations. |
38+
| Senior Executive (Marketing) | This rule applies to identities classified as senior executives in the field of Marketing. |
39+
| Senior Executive (Information) | This rule applies to identities classified as senior executives in the field of Information. |
40+
| Senior Executive (Execution) | This rule applies to identities classified as senior executives in the field of Execution. |
41+
| Senior Executive (Human Resources) | This rule applies to identities classified as senior executives in the field of Resources. |
42+
| Security Operations Admin User | This rule applies to security operations admin users that configure, manage, monitor, and respond to threats within the organization. |
43+
44+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
45+
2746
## February 2025
2847

48+
### New predefined classifications
49+
2950
The following predefined classification rules were added to the critical assets list:
3051

3152
| Classification | Description |

0 commit comments

Comments
 (0)