Skip to content

Commit 486f04d

Browse files
authored
Merge branch 'main' into docs-editor/manage-protection-updates-micr-1741662957
2 parents 982e014 + aa4cfc8 commit 486f04d

File tree

7 files changed

+142
-51
lines changed

7 files changed

+142
-51
lines changed

CloudAppSecurityDocs/behaviors.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,10 +147,14 @@ BehaviorEntities
147147
| project Timestamp, BehaviorId, ActionType, Categories, ServiceSource, AccountUpn, AccountObjectId, EntityType, EntityRole, RemoteIP, AccountName, AccountDomain
148148
```
149149

150+
### Role-Based Access Control (RBAC) scoping for 'Behaviors'
151+
152+
Starting March 2025, Defender for Cloud Apps customers can configure Role-Based Access Control (RBAC) scoping for 'Behaviors'. This new capability empowers administrators to define and manage access permissions more precisely, ensuring that users have the appropriate level of access to specific application data based on their roles and responsibilities. Read more here on how to configure - [Configure admin access](https://learn.microsoft.com/defender-cloud-apps/manage-admins).
153+
150154
## Next steps
151155

152156
- [TechCommunity Blog](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/transform-the-way-you-investigate-by-using-behaviors-amp-new/ba-p/3825154)
153157
- [Tutorial: Detect suspicious user activity with behavioral analytics](tutorial-suspicious-activity.md)
154158

155-
[!INCLUDE [Open support ticket](includes/support.md)].
159+
[!INCLUDE [Open support ticket](includes/support.md)]
156160

CloudAppSecurityDocs/manage-admins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The following specific admin roles can be configured in the Microsoft Defender p
7575
|**Compliance administrator** | Grants the same permissions as the Microsoft Entra Compliance administrator role but only to Defender for Cloud Apps. |
7676
|**Security reader** | Grants the same permissions as the Microsoft Entra Security reader role but only to Defender for Cloud Apps. |
7777
|**Security operator** | Grants the same permissions as the Microsoft Entra Security operator role but only to Defender for Cloud Apps. |
78-
|**App/instance admin** | Has full or read-only permissions to all of the data in Defender for Cloud Apps that deals exclusively with the specific app or instance of an app selected. <br><br>For example, you give a user admin permission to your Box European instance. The admin will see only data that relates to the Box European instance, whether it's files, activities, policies, or alerts: <ul><li>Activities page - Only activities about the specific app<li> Alerts - Only alerts relating to the specific app. In some cases, alert data related to another app if the data is correlated with the specific app. Visibility to alert data related to another app is limited, and there is no access to drill down for more details<li>Policies - Can view all policies and if assigned full permissions can edit or create only policies that deal exclusively with the app/instance<li>Accounts page - Only accounts for the specific app/instance<li> App permissions - Only permissions for the specific app/instance<li> Files page - Only files from the specific app/instance<li>Conditional access app control - No permissions<li> Cloud discovery activity - No permissions<li> Security extensions - Only permissions for API token with user permissions<li>Governance actions - Only for the specific app/instance<li> Security recommendations for cloud platforms - No permissions<li>IP ranges - No permissions </ul> |
78+
|**App/instance admin** | Has full or read-only permissions to all of the data in Defender for Cloud Apps that deals exclusively with the specific app or instance of an app selected. <br><br>For example, you give a user admin permission to your Box European instance. The admin will see only data that relates to the Box European instance, whether it's files, activities, policies, behaviors or alerts: <ul><li>Activities page - Only activities about the specific app<li> Alerts/Behaviors - Only relating to the specific app. In some cases, alert/behavior data related to another app if the data is correlated with the specific app. Visibility to alert data related to another app is limited, and there is no access to drill down for more details<li>Policies - Can view all policies and if assigned full permissions can edit or create only policies that deal exclusively with the app/instance<li>Accounts page - Only accounts for the specific app/instance<li> App permissions - Only permissions for the specific app/instance<li> Files page - Only files from the specific app/instance<li>Conditional access app control - No permissions<li> Cloud discovery activity - No permissions<li> Security extensions - Only permissions for API token with user permissions<li>Governance actions - Only for the specific app/instance<li> Security recommendations for cloud platforms - No permissions<li>IP ranges - No permissions </ul> |
7979
|**User group admin** | Has full or read-only permissions to all of the data in Defender for Cloud Apps that deals exclusively with the specific groups assigned to them. For example, if you assign a user admin permissions to the group "Germany - all users", the admin can view and edit information in Defender for Cloud Apps only for that user group. The User group admin has the following access: <br><br> <ul><li>Activities page - Only activities about the users in the group<li>Alerts - Only alerts relating to the users in the group. In some cases, alert data related to another user if the data is correlated with the users in the group. Visibility to alert data related to another users is limited, and there is no access to drill down for more details.<li>Policies - Can view all policies and if assigned full permissions can edit or create only policies that deal exclusively with users in the group<li>Accounts page - Only accounts for the specific users in the group<li>App permissions – No permissions<li>Files page – No permissions<li> Conditional access app control - No permissions<li> Cloud discovery activity - No permissions<li>Security extensions - Only permissions for API token with users in the group<li> Governance actions - Only for the specific users in the group<li>Security recommendations for cloud platforms - No permissions<li>IP ranges - No permissions </ul> <br><br>**Notes**: <ul><li>To assign groups to user group admins, you must first [import user groups](user-groups.md) from connected apps. <li>You can only assign user group admins permissions to imported Microsoft Entra groups.</ul> |
8080
|**Cloud Discovery global admin** | Has permission to view and edit all cloud discovery settings and data. The Global Discovery admin has the following access: <br><br><ul><li>Settings: System settings - View only; Cloud Discovery settings - View and edit all (anonymization permissions depend on whether it was allowed during role assignment) <li> Cloud discovery activity - full permissions<li>Alerts - view and manage only alerts related to the relevant cloud discovery report<li> Policies - Can view all policies and can edit or create only cloud discovery policies <li> Activities page - No permissions<li>Accounts page - No permissions<li> App permissions – No permissions<li> Files page – No permissions<li> Conditional access app control - No permissions<li> Security extensions - Creating and deleting their own API tokens<li> Governance actions - Only Cloud Discovery related actions<li> Security recommendations for cloud platforms - No permissions<li> IP ranges - No permissions</ul> |
8181
|**Cloud Discovery report admin** | <ul><li> Settings: System settings - View only; Cloud discovery settings - View all (anonymization permissions depend on whether it was allowed during role assignment)<li>Cloud discovery activity - read permissions only<li> Alerts – view only alerts related to the relevant cloud discovery report<li>Policies - Can view all policies and can create only cloud discovery policies, without the possibility to govern application (tagging, sanction and unsanctioned)<li> Activities page - No permissions<li> Accounts page - No permissions<li>App permissions – No permissions<li>Files page – No permissions<li> Conditional access app control - No permissions<li> Security extensions - Creating and deleting their own API tokens<li>Governance actions – view only actions related to the relevant cloud discovery report<li>Security recommendations for cloud platforms - No permissions<li>IP ranges - No permissions |

CloudAppSecurityDocs/release-notes.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,17 @@ For more information on what's new with other Microsoft Defender security produc
1919

2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

22+
## March 2025
23+
24+
### RBAC scoping for "Behaviors" (Preview)
25+
26+
Defender for Cloud Apps customers can now configure Role-Based Access Control (RBAC) scoping for 'Behaviors'. This new capability empowers administrators to define and manage access permissions more precisely, ensuring that users have the appropriate level of access to specific application data based on their roles and responsibilities. By leveraging RBAC scoping, organizations can enhance their security posture, streamline operations, and reduce the risk of unauthorized access.
27+
28+
For more information, see:
29+
30+
- [Configure admin access](https://learn.microsoft.com/defender-cloud-apps/manage-admins)
31+
- [Investigate behaviors with advanced hunting (Preview)](https://learn.microsoft.com/defender-cloud-apps/behaviors)
32+
2233
## November 2024
2334

2435
### Internal Session Controls application notice

defender-endpoint/api/isolate-machine.md

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: reference
1414
ms.subservice: reference
1515
ms.custom: api
1616
search.appverid: met150
17-
ms.date: 02/28/2025
17+
ms.date: 03/11/2025
1818
---
1919

2020
# Isolate machine API
@@ -36,7 +36,7 @@ Isolates a device from accessing external network.
3636

3737
## Limitations
3838

39-
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
39+
1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
4040

4141
[!include[Device actions note](../../includes/machineactionsnote.md)]
4242

@@ -45,8 +45,7 @@ Isolates a device from accessing external network.
4545
> - Full isolation is available for all supported Linux devices. See [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux).
4646
> - Selective isolation is available for devices on Windows 10, version 1709 or later, and on Windows 11.
4747
> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
48-
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action.
49-
48+
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action. The IsolationType value should be set to 'UnManagedDevice.'
5049
5150
## Permissions
5251

@@ -59,10 +58,9 @@ Delegated (work or school account)|Machine.Isolate|'Isolate machine'
5958

6059
> [!NOTE]
6160
> When obtaining a token using user credentials:
62-
>
63-
> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
64-
> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
65-
>
61+
> - The user needs to have at least the following role permission: 'Active remediation actions.' For more information, see [Create and manage roles](../user-roles.md).
62+
> - The user needs to have access to the device, based on device group settings. See [Create and manage device groups](../machine-groups.md) for more information.
63+
>
6664
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
6765
6866
## HTTP request
@@ -82,15 +80,16 @@ Content-Type|string|application/json. **Required**.
8280

8381
In the request body, supply a JSON object with the following parameters:
8482

85-
Parameter|Type|Description
86-
:---|:---|:---
87-
Comment|String|Comment to associate with the action. **Required**.
88-
IsolationType|String|Type of the isolation. Allowed values are: 'Full' or 'Selective'.
83+
|Parameter|Type|Description|
84+
|:---|:---|:---|
85+
|Comment|String|Comment to associate with the action. **Required**.|
86+
|IsolationType|String|Type of the isolation. Allowed values are: **Full**, **Selective**, or **UnManagedDevice**.|
8987

9088
**IsolationType** controls the type of isolation to perform and can be one of the following:
9189

92-
- Full: Full isolation
93-
- Selective: Restrict only limited set of applications from accessing the network (see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network) for more details)
90+
- Full: Full isolation. Works for managed devices.
91+
- Selective: Restrict only limited set of applications from accessing the network on managed devices. For more information, see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network).
92+
- UnManagedDevice: The isolation targets unmanaged devices only.
9493

9594
## Response
9695

@@ -100,7 +99,7 @@ If successful, this method returns 201 - Created response code and [Machine Acti
10099

101100
### Request
102101

103-
Here is an example of the request.
102+
Here's an example of the request.
104103

105104
```http
106105
POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate

defender-endpoint/linux-whatsnew.md

Lines changed: 30 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: What's new in Microsoft Defender for Endpoint on Linux
33
description: List of major changes for Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr
88
ms.localizationpriority: medium
9-
ms.date: 02/20/2025
9+
ms.date: 03/11/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,6 +43,26 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### Mar-2025 Build: 101.25012.0000 | Release version: 30.125012.0000.0
47+
48+
| Build: | **101.25012.0000** |
49+
| -------- | -------- |
50+
|Released:|March 11, 2025|
51+
|Released:| **March 11, 2025**|
52+
| Released: |**March 11, 2025** |
53+
| Published: | **March 11, 2025** |
54+
| Release version: | **30.125012.0000.0** |
55+
| Engine version: | **1.1.24090.13** |
56+
| Signature version: | **1.421.226.0** |
57+
58+
What's new
59+
60+
- The MDATP package rollout into production will be done gradually. From the time the release notes are published, it might take up to a week for the package to be pushed to all production machines.
61+
62+
- The vulnerability in curl, CVE-2024-7264, has been addressed.
63+
64+
- Other stability improvements and bug fixes.
65+
4666
### Feb-2025 Build: 101.24122.0008 | Release version: 30.124112.0008.0
4767

4868
| Build: | **101.24122.0008** |
@@ -96,10 +116,10 @@ What's new
96116
- Enabled: When eBPF is enabled as working as expected.
97117
- Disabled: When eBPF is disabled due to one of the following reasons:
98118
- When MDE is using auditD as a supplementary sensor
99-
- When eBPF is not present and we fallback to Netlink as supplementary event provider
100-
- There is no supplementary sensor present.
119+
- When eBPF isn't present and we fallback to Netlink as supplementary event provider
120+
- There's no supplementary sensor present.
101121

102-
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast and insiderSlow, are unaffected by this change.
122+
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast, and insiderSlow, are unaffected by this change.
103123

104124
- Stability and performance improvements.
105125

@@ -211,7 +231,7 @@ There are multiple fixes and new changes in this release.
211231

212232
There are multiple fixes and new changes in this release.
213233

214-
- This release fixes a bug related to high memory usage eventually leading to high CPU due to eBPF memory leak in kernel space resulting in servers going into unusable states. This only impacted the kernel versions 3.10x and <= 4.16x, majorly on RHEL/CentOS distros. Update to the latest MDE version to avoid any impact.
234+
- This release fixes a bug related to high memory usage eventually leading to high CPU due to eBPF memory leak in kernel space resulting in servers going into unusable states. This only affected the kernel versions 3.10x and <= 4.16x, majorly on RHEL/CentOS distros. Update to the latest MDE version to avoid any impact.
215235

216236
- We have now simplified the output of `mdatp health --detail features`
217237

@@ -1040,7 +1060,7 @@ sudo systemctl disable mdatp
10401060

10411061
#### Known issues
10421062

1043-
- While upgrading mdatp to version `101.94.13`, you might notice that health is false, with health_issues as "no active supplementary event provider". This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Take a backup of following file: `/etc/audit/rules.d/audit.rules` as these steps are only to identify failures.
1063+
- While upgrading mdatp to version `101.94.13`, you might notice that health is false, with health_issues as "no active supplementary event provider. This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Take a backup of following file: `/etc/audit/rules.d/audit.rules` as these steps are only to identify failures.
10441064

10451065
```bash
10461066
echo -c >> /etc/audit/rules.d/audit.rules
@@ -1333,7 +1353,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
13331353

13341354
##### What's new
13351355

1336-
- Added a capability to detect vulnerable log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal.
1356+
- Added a capability to detect vulnerable Log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded Log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal.
13371357

13381358
#### Build: 101.47.76 | Release version: 30.121092.14776.0
13391359

@@ -1343,7 +1363,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
13431363

13441364
##### What's new
13451365

1346-
- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through mdatp config scan-archives --value [enabled/disabled]. By default, this setting is set to enabled.
1366+
- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through mdatp config scan-archives--value [enabled/disabled]. By default, this setting is set to enabled.
13471367

13481368
- Bug fixes
13491369

0 commit comments

Comments
 (0)