Skip to content

Commit 440da7d

Browse files
authored
Merge branch 'main' into v-smandalika-9477468
2 parents b9d1467 + 0cbcee0 commit 440da7d

11 files changed

+79
-37
lines changed

defender-xdr/advanced-hunting-behaviorentities-table.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.topic: reference
2020
ms.date: 12/29/2023
2121
---
2222

23-
# BehaviorEntities
23+
# BehaviorEntities (Preview)
2424

2525
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2626

@@ -32,6 +32,9 @@ The `BehaviorEntities` table in the [advanced hunting](advanced-hunting-overview
3232
> [!IMPORTANT]
3333
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3434
35+
> [!IMPORTANT]
36+
> Behaviors feature is now in preview. Have feedback to share? Fill out our [feedback form](https://forms.office.com/r/x0mX5hBkGu).
37+
3538
Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. [Read more about behaviors](/defender-cloud-apps/behaviors)
3639

3740
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).

defender-xdr/advanced-hunting-behaviorinfo-table.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.topic: reference
2020
ms.date: 12/29/2023
2121
---
2222

23-
# BehaviorInfo
23+
# BehaviorInfo (Preview)
2424

2525
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2626

@@ -36,6 +36,9 @@ The `BehaviorInfo` table in the [advanced hunting](advanced-hunting-overview.md)
3636
> [!IMPORTANT]
3737
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3838
39+
> [!IMPORTANT]
40+
> Behaviors feature is now in preview. Have feedback to share? Fill out our [feedback form](https://forms.office.com/r/x0mX5hBkGu).
41+
3942
Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. [Read more about behaviors](/defender-cloud-apps/behaviors)
4043

4144
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ The following reference lists all the tables in the schema. Each table name link
5757
| **[AADSpnSignInEventsBeta](advanced-hunting-aadspnsignineventsbeta-table.md)** | Microsoft Entra service principal and managed identity sign-ins |
5858
| **[AlertEvidence](advanced-hunting-alertevidence-table.md)** | Files, IP addresses, URLs, users, or devices associated with alerts |
5959
| **[AlertInfo](advanced-hunting-alertinfo-table.md)** | Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity, including severity information and threat categorization |
60-
| **[BehaviorEntities](advanced-hunting-behaviorentities-table.md)** | Behavior data types in Microsoft Defender for Cloud Apps |
61-
| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** | Alerts from Microsoft Defender for Cloud Apps |
60+
| **[BehaviorEntities](advanced-hunting-behaviorentities-table.md)** (Preview) | Behavior data types in Microsoft Defender for Cloud Apps |
61+
| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** (Preview) | Alerts from Microsoft Defender for Cloud Apps |
6262
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)** | Events involving accounts and objects in Office 365 and other cloud apps and services |
6363
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
6464
| **[DeviceFileCertificateInfo](advanced-hunting-DeviceFileCertificateInfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |

exposure-management/exposure-insights-overview.md

Lines changed: 12 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -49,17 +49,15 @@ Security Exposure Management provides initiatives that currently include:
4949
> [!IMPORTANT]
5050
> Initiatives that are in preview are marked accordingly. Preview initiatives are still in development, and are subject to change.
5151
52-
5352
### Initiative elements
5453

5554
**Element** | **Goal** | **Details**
5655
--- | --- | ---
57-
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
56+
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
5857
**Metric** | Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.| Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.
5958
**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. | All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/> Within initiatives, recommendations are assigned a compliance state.
6059
**Events** | Events help you to monitor initiative changes. | Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.
6160

62-
6361
## Working with initiatives
6462

6563
You can prioritize which initiatives you want to see on the **Overview** dashboard. Review the initiative score, and drill down into initiatives to see associated metrics and understand where gaps or risks reside.
@@ -69,15 +67,15 @@ You can prioritize which initiatives you want to see on the **Overview** dashboa
6967
On the **Metrics** tab of an initiative, or in the **Metrics** section of **Exposure Insights**, you can see the metric state, its effect and relative importance in an initiative, and recommendations to improve the metric. For each metric you can:
7068

7169
- Review metrics properties, including:
72-
- **14-day trend**: Shows the metric value changes over the last 14 days.
73-
- **Affected items**: The number of items within the metric. In most cases, these items would be assets that are exposed or that create a risk factor. In other cases, affected items would be the number of missing Microsoft secure score points to effectively implement recommended controls.
74-
- **Total**: Total number of assets under the metric scope.
75-
- **Weight**: The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. From one (lowest) to ten (highest).
76-
- **Score impact**: The impact that completing the metric (getting it to 0%) has on the security initiative. Meaning if a given metric is completed, the score impact is the addition seen to the initiative score.
77-
- **State**: Shows whether the metric needs attention, the risk was mitigated outside Security Exposure Management and shouldn't affect the initiative score, or was mitigated and the initiative score should be adjusted accordingly.
78-
- **Current value**: Current percentage of exposed assets within the total assets covered by the metric, with the state for each metric. Zero percent is best since there's no exposure, while 100% is worst.
79-
- **Recommendations**: Security recommendations associated with the metric.
80-
- **Last Updated** shows the last date the metric was updated.
70+
- **14-day trend**: Shows the metric value changes over the last 14 days.
71+
- **Affected items**: The number of items within the metric. In most cases, these items would be assets that are exposed or that create a risk factor. In other cases, affected items would be the number of missing Microsoft secure score points to effectively implement recommended controls.
72+
- **Total**: Total number of assets under the metric scope.
73+
- **Weight**: The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. From one (lowest) to ten (highest).
74+
- **Score impact**: The impact that completing the metric (getting it to 0%) has on the security initiative. Meaning if a given metric is completed, the score impact is the addition seen to the initiative score.
75+
- **State**: Shows whether the metric needs attention, the risk was mitigated outside Security Exposure Management and shouldn't affect the initiative score, or was mitigated and the initiative score should be adjusted accordingly.
76+
- **Current value**: Current percentage of exposed assets within the total assets covered by the metric, with the state for each metric. Zero percent is best since there's no exposure, while 100% is worst.
77+
- **Recommendations**: Security recommendations associated with the metric.
78+
- **Last Updated** shows the last date the metric was updated.
8179

8280
- Filter metrics for specific findings.
8381
- Drill down into metrics to review and fix associated issues.
@@ -90,7 +88,6 @@ In some cases, metrics display grayed out because the underlying data for the me
9088

9189
Grayed out metrics aren't considered for score calculation.
9290

93-
9491
## Working with recommendations
9592

9693
Security Exposure Management ingests security recommendations from multiple sources, including Microsoft Defender for Cloud running the [Defender for Cloud Security Posture Management (CSPM) plan](/azure/defender-for-cloud/concept-cloud-security-posture-management), [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), Microsoft threat analytics, and other Microsoft workloads. Security Exposure Management integrates all of these recommendations into a single security catalog.
@@ -122,7 +119,7 @@ Security Exposure Management uses secure score as one of its sources for initiat
122119

123120
The exposure state for a security initiative is reflected in the initiative score.
124121

125-
- **Initiatives with metrics**: For initiatives with metrics, the score is calculated based on the value and weight of metrics within the initiative.
122+
- **Initiatives with metrics**: For initiatives with metrics, the score is calculated based on the value and weight of metrics within the initiative.
126123
- **Initiatives without metrics**: For threat initiatives that don't have metrics, the initiative score is calculated in the same way that [Secure Score is calculated](/defender-xdr/microsoft-secure-score#how-recommended-actions-are-scored).
127124

128125
For initiatives with metrics:
@@ -139,7 +136,6 @@ On the **History** tab of an initiative, you can:
139136
- Filter for specific time points.
140137
- Drill down to specific changes.
141138

142-
143139
:::image type="content" source="media/exposure-insights-overview/initiatives-history.png" alt-text="Screenshot of the Initiative history tab showing the graph and dates of changes." lightbox="media/exposure-insights-overview/initiatives-history.png":::
144140

145141
When you drill down into a specific change, you can see the percentage effects of metrics in the initiative score, along with the change reason. Reasons include:
@@ -149,22 +145,19 @@ When you drill down into a specific change, you can see the percentage effects o
149145
- **Metric removed** - The metric is no longer relevant for that specific initiative. For instance, if a better suggestion is introduced or it becomes irrelevant.
150146
- **Metric depreciated** - The metric is removed globally.
151147

152-
153148
Selecting the metric that changed provides more details about the change. For instance, it might display the new weight of a property change, or the number of affected assets before or after the change.
154149

155150
:::image type="content" source="media/exposure-insights-overview/initiatives-history-details.png" alt-text="Screenshot of the metric change side panel in the Initiatives history tab." lightbox="media/exposure-insights-overview/initiatives-history-details.png":::
156151

157152
You can't control the metric or score changes in advance.
158153

159-
160154
## Reviewing events
161155

162-
163156
Events measure the score drop or worsening in the metric status. Events include:
164157

165158
- **Metric score drop events**: These events are issued with there's a decrease of at least 2% in metric score (exposure grew by 2%) since yesterday.
166159
- **Initiative score drop events**: These events are issued when there's a decrease of at least 2% in initiative score since yesterday.
167-
- **New Initiave event**: These events are issued when a new inititave is available in MSEM.
160+
- **New Initiative event**: These events are issued when a new initiative is available in MSEM.
168161

169162
## Next steps
170163

263 KB
Loading
248 KB
Loading
41.1 KB
Loading
261 KB
Loading

exposure-management/review-attack-paths.md

Lines changed: 27 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,23 +25,42 @@ Security Exposure Management is currently in public preview.
2525
- If you don't have licenses defined for workloads integrated and represented in the attack path.
2626
- If you don't fully define critical assets.
2727

28-
## View attack paths
28+
### Attack path dashboard
2929

30-
1. To access [attack paths](https://security.microsoft.com/attack-paths), select **Attack surface -> Attack path**.
30+
The dashboard provides a high-level overview of all identified attack paths within the environment. It enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively. The overview includes:
3131

32-
:::image type="content" source="./media/review-attack-paths/attack-paths.png" alt-text="Screenshot of the Security Exposure Management attack path window" lightbox="media/review-attack-paths/attack-paths.png":::
32+
- Graph of attack paths over time
33+
- Top choke points
34+
- Top attack path scenarios
35+
- Top targets
36+
- Top entry points
37+
38+
:::image type="content" source="media/work-attack-paths-overview/attack-paths-dashboard.png" alt-text="Screenshot of attack path dashboard" lightbox="media/work-attack-paths-overview/attack-paths-dashboard.png":::
39+
40+
### View attack paths
41+
42+
1. You can access [attack paths](https://security.microsoft.com/attack-paths) from the attack path dashboard, or by selecting **Attack surface -> Attack path**.
43+
44+
:::image type="content" source="media/review-attack-paths/attack-path-list.png" alt-text="Screenshot of attack path list" lightbox="media/review-attack-paths/attack-path-list.png":::
3345

3446
1. To change how attack paths are displayed, you can select a heading name to sort by a specific column heading.
3547

36-
## Group by choke points
48+
### Group attack paths
49+
50+
To group attack paths by specific criteria:
51+
52+
Select **Group** to group by **Attack path name**, **Entry point**,**Entry point type**, **Target type**, **Risk level**, **Status**, **Target criticality**, **Target**.
3753

38-
To group by choke point:
54+
### View choke points and blast radius
3955

40-
1. Select **Attack surface -> Attack path**.
56+
1. Go the choke points tab to view a list of choke points on the attack path dashboard. By focusing on these choke points, you can reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
57+
1. Select a choke point to open the side panel, select **View blast radius** and explore the attack paths from a choke point. The blast radius provides a detailed visualization showing how the compromise of one asset could affect others. This enables security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
58+
59+
:::image type="content" source="media/review-attack-paths/choke points and blast radius.png" alt-text="Screenshot of choke point and blast radius " lightbox="media/review-attack-paths/choke points and blast radius.png":::
4160

42-
1. Select **Group** to group by **Name**, **Entry point type**, **Target type**, **Target criticality**, **Status**, or **choke point**.
61+
:::image type="content" source="media/review-attack-paths/choke-points on map.png" alt-text="Screenshot of choke point on attack map" lightbox="media/review-attack-paths/choke-points on map.png":::
4362

44-
## Examine an attack path
63+
### Examine an attack path
4564

4665
1. Select a specific attack path to examine it further for potential exploitable vulnerabilities.
4766

exposure-management/whats-new.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,21 @@ Security Exposure Management is currently in public preview.
2525
>
2626
> `https://aka.ms/msem/rss`
2727
28+
## October 2024
29+
30+
### New in attack paths
31+
32+
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
33+
34+
The new features include:
35+
36+
- **Attack path widget on exposure management overview page**: Provides users with an at-a-glance, high-level view of discovered attack paths. It displays a timeline of newly identified paths, key entry points, target types, and more, ensuring security teams stay informed about emerging threats and can respond quickly.
37+
- **Attack path dashboard**: Provides a high-level overview of all identified attack paths within the environment. This feature enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively.
38+
- **Choke points**: Highlights critical assets that multiple attack paths intersect, identifying them as key vulnerabilities within the environment. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
39+
- **Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
40+
41+
For more information, see [Overview of attack paths](work-attack-paths-overview.md).
42+
2843
## September 2024
2944

3045
### New Enterprise IoT Security Initiative

0 commit comments

Comments
 (0)