You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/cas-compliance-trust.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
31
31
|**Customers whose tenants are provisioned in the European Union or the United Kingdom**| Either the European Union and/or the United Kingdom |
32
32
|**Customers whose tenants are provisioned in any other region**| The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
33
33
34
-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34
+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: reference
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 01/03/2025
18
+
ms.date: 01/06/2025
19
19
---
20
20
21
21
# What's new in Microsoft Defender for Endpoint on Android
@@ -40,7 +40,7 @@ Recommendation cards prominently display any active alerts, ensuring you stay in
40
40
41
41
The following screenshot is an example of what the user sees in their dashboard:
42
42
43
-
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing what the user sees on the device.":::
43
+
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing the user's dashboard in the Microsoft Defender app.":::
44
44
45
45
**Recommendation cards for alerts**
46
46
@@ -59,10 +59,10 @@ The current enterprise dashboard experience now features a tile view for your se
59
59
60
60
| Tile | Description |
61
61
|---|---|
62
-
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: |**Network protection** <br/>Your security team can see whether a connection is secured or unsecured. |
63
-
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: |**Web protection** <br/>Your security team can see whether web protection is enabled on a user's device. |
64
-
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: |**App security** <br/>Your security team can see whether any threats were found in apps installed on a user's device. |
65
-
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: |**Global secure access** <br/>Your security team can see current connection status. |
62
+
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: |**Network protection** <br/>The user can see whether a connection is secured or unsecured. |
63
+
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: |**Web protection** <br/>The user can see whether web protection is enabled on a user's device. |
64
+
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: |**App security** <br/>The user can see whether any threats were found in apps installed on a user's device. |
65
+
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: |**Global secure access** <br/>The user can see current connection status. |
66
66
67
67
## Android low-touch onboarding is now GA
68
68
@@ -125,7 +125,7 @@ Read the announcement [Tech Community Blog: Defender for Endpoint is now availab
125
125
126
126
## Privacy controls
127
127
128
-
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls(MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
128
+
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls(MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
129
129
130
130
## Optional permissions and the ability to disable web protection
Copy file name to clipboardExpand all lines: defender-endpoint/api/get-assessment-secure-config.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.topic: reference
15
15
ms.subservice: reference
16
16
ms.custom: api
17
17
search.appverid: met150
18
-
ms.date: 06/04/2021
18
+
ms.date: 01/06/2025
19
19
---
20
20
21
21
# Export secure configuration assessment per device
@@ -245,18 +245,18 @@ GET /api/machines/SecureConfigurationsAssessmentExport
245
245
### 2.5 Properties
246
246
247
247
> [!NOTE]
248
-
>
249
-
> - The files are gzip compressed & in multiline Json format.
250
-
> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
248
+
> - The files are GZIP compressed & in multiline JSON format.
249
+
> - The download URLs are only valid for 1 hour; otherwise you can use the parameter.
251
250
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.
252
251
252
+
253
253
<br>
254
254
255
255
****
256
256
257
257
Property (ID)|Data type|Description|Example of a returned value
258
258
---|---|---|---
259
-
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
259
+
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
260
260
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
28
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
29
-[Microsoft Defender XDR](/defender-xdr)
@@ -31,12 +32,13 @@ ms.date: 06/05/2024
31
32
32
33
The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
33
34
34
-
By default, the queue displays incidents seen in the last 6 months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
35
+
By default, the queue displays incidents seen in the last six months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
35
36
36
37
There are several options you can choose from to customize the Incidents queue view.
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](/defender-xdr/incident-queue#defender-boxed) highlights.
53
+
49
54
## Sort and filter the incidents queue
55
+
50
56
You can apply the following filters to limit the list of incidents and get a more focused view.
High </br>(Red) | Threats often associated with advanced persistent threats (APT). These incidents indicate a high risk due to the severity of damage they can inflict on devices.
57
63
Medium </br>(Orange) | Threats rarely observed in the organization, such as anomalous registry change, execution of suspicious files, and observed behaviors typical of attack stages.
58
-
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that do not necessarily indicate an advanced threat targeting the organization.
64
+
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that don't necessarily indicate an advanced threat targeting the organization.
59
65
Informational </br>(Grey) | Informational incidents might not be considered harmful to the network but might be good to keep track of.
60
66
61
67
## Assigned to
68
+
62
69
You can choose to filter the list by selecting assigned to anyone or ones that are assigned to you.
63
70
64
71
### Category
72
+
65
73
Incidents are categorized based on the description of the stage by which the cybersecurity kill chain is in. This view helps the threat analyst to determine priority, urgency, and corresponding response strategy to deploy based on context.
66
74
67
75
### Status
76
+
68
77
You can choose to limit the list of incidents shown based on their status to see which ones are active or resolved.
69
78
70
79
### Data sensitivity
80
+
71
81
Use this filter to show incidents that contain sensitivity labels.
72
82
73
83
## Incident naming
74
84
75
-
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories.
85
+
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources, or categories.
76
86
77
87
For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
78
88
79
89
> [!NOTE]
80
-
> Incidents that existed prior the rollout of automatic incident naming will retain their name.
81
-
90
+
> Incidents that existed prior to the rollout of automatic incident naming retains their original name.
Copy file name to clipboardExpand all lines: defender-for-iot/set-up-rbac.md
+47-18Lines changed: 47 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,49 +28,78 @@ To make general changes to RBAC roles and permissions that relate to all other a
28
28
29
29
## Access management options
30
30
31
-
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The two systems are:
31
+
There are three ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The systems are:
32
32
33
33
-[Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
34
-
-[Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
34
+
-[Microsoft Defender XDR Unified RBAC](/defender-xdr/manage-rbac): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
35
+
-[Microsoft Defender for Endpoint XDR RBAC](/defender-endpoint/user-roles): Use Defender for Endpoint XDR role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
35
36
36
-
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
37
-
38
-
### RBAC for version 1 or 2
39
-
40
-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
41
-
42
-
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
37
+
The instructions and permission settings listed in this article apply to both Defender XDR Unified and Microsoft Defender for Endpoint XDR RBAC.
43
38
44
39
## Set up Defender XDR Unified RBAC roles for site security
45
40
46
-
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-site-security), to give users access to site security features:
41
+
Assign RBAC permissions and roles, based on the [summary table](#summary-of-rbac-roles-and-permissions-for-site-security), to give users access to site security features:
47
42
48
-
1. In the Defender portal, select **Settings**\>**Microsoft XDR**\>**Permissions and roles**.
43
+
1. In the Defender portal, select **Settings**\>**Microsoft Defender XDR**\>**Permissions and roles**.
1. Type a **Role name**, and then select **Next** for Permissions.
53
48
54
49
:::image type="content" source="media/set-up-rbac/permissions-set-up.png" alt-text="Screenshot of the permissions set up page for site security." lightbox="media/set-up-rbac/permissions-set-up.png":::
55
50
56
-
1. Select **Security operations**, and select **Select custom permissions**.
57
-
1. In **Security settings**, select **Security data basics** and select **Apply**
58
-
1. Select **Authorization and settings**, select **Select custom permissions**.
59
-
1. In **Security data** ,select **Core security settings (manage)** and select **Apply**
51
+
1. For read permissions, select **Security operations**, and select **Select custom permissions**.
52
+
1. In **Security data**, select **Security data basics(read)** and select **Apply**.
53
+
54
+
:::image type="content" source="media/set-up-rbac/permissions-unified-read-options.png" alt-text="Screenshot of the permissions set up page with the specific read permissions chosen for site security." lightbox="media/set-up-rbac/permissions-unified-read-options.png":::
55
+
56
+
1. For write permissions, in **Authorization and settings**, select **Select custom permissions**.
57
+
1. In **Security data**, select **Core security settings (manage)** and select **Apply**.
60
58
61
-
:::image type="content" source="media/set-up-rbac/permissions-choose-options.png" alt-text="Screenshot of the permissions set up page with the specific permissions chosen for site security." lightbox="media/set-up-rbac/permissions-choose-options.png":::
59
+
:::image type="content" source="media/set-up-rbac/permissions-choose-options.png" alt-text="Screenshot of the permissions set up page with the specific write permissions chosen for site security." lightbox="media/set-up-rbac/permissions-choose-options.png":::
62
60
63
61
1. Select **Next** for Assignments.
64
62
1. Select **Add assignment**, type a name, choose users and groups and select the Data sources.
65
63
1. Select **Add**.
66
64
1. Select **Next** to **Review and finish**.
67
65
1. Select **Submit**.
68
66
69
-
### Summary of roles and permissions for site security
67
+
## Set up Microsoft Defender for Endpoint XDR RBAC (Version 2) roles for site security
68
+
69
+
Assign RBAC permissions and roles, based on the [summary table](#summary-of-rbac-roles-and-permissions-for-site-security), to give users access to site security features:
70
+
71
+
1. In the Defender portal, select **Settings**\>**Endpoints**\>**Roles**.
72
+
1. Select **Add role**.
73
+
1. Type a **Role name**, and a **Description**.
74
+
1. Select **Next** for Permissions.
75
+
76
+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-add-role.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-add-role.png":::
77
+
78
+
1. For read permissions, in **View Data**, select **Security Operations**.
79
+
80
+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-read-options.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page with the specific read permissions chosen for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-read-options.png":::
81
+
82
+
1. For write permissions, select **Manage security settings in Security Center**.
83
+
84
+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-write-options.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page with the specific read and write permissions chosen for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-write-options.png":::
85
+
86
+
1. Select **Next**.
87
+
1. In **Assigned user groups**, select the user groups from the list to assign to this role.
88
+
1. Select **Submit**.
89
+
90
+
### Summary of RBAC roles and permissions for site security
91
+
92
+
**For Unified RBAC**:
93
+
94
+
|Write permissions |Read permissions |
95
+
|----|----|
96
+
|**Defender permissions**: Core security settings (manage) under Authorization and Settings and scoped to all device groups. <br>**Entra ID roles**: Global Administrator, Security Administrator, Security Operator and scoped to all device groups.| Write roles (including roles that are non-scoped to all device groups). <br> **Defender permissions**: Security data basics (under Security Operations).<br>**Entra ID roles**: Global Reader, Security Reader.|
97
+
98
+
**For Microsoft Defender for Endpoint XDR RBAC (version 2)**:
70
99
71
100
|Write permissions |Read permissions |
72
101
|----|----|
73
-
|**Defender Permissions**: Core security settings scoped to all device groups.<br>**Entra ID roles**: Global Administrator, Security Administrator, Security Operator scoped to all device groups.| Write roles (including roles that aren't scoped to all device groups). <br> **Defender Permissions**: Security data basics (under Security Operations).<br>**Entra ID roles**: Global Reader, Security Reader.|
102
+
|**Defender for Endpoint roles**: Manage security settings in Security Center and scoped to all device groups.<br>**Entra ID roles**: Global Administrator, Security Administrator.| Write roles (including roles that are non-scoped to all device groups). <br> **Defender for Endpoint roles**: View data - Security operations (read). <br>**Entra ID roles**: Global Reader, Security Reader.|
0 commit comments