Skip to content

Commit 49c8b98

Browse files
Merge pull request #2320 from MicrosoftDocs/main
Publish main to live, 01/06/25, 10:30 AM PT
2 parents e073517 + 43a3b95 commit 49c8b98

24 files changed

+123
-44
lines changed

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
3232
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
3333

34-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
3535

3636
|Customer provisioning location |Data storage location |
3737
|---------|---------|
@@ -65,7 +65,7 @@ Defender for Cloud Apps shares data, including customer data, among the followin
6565
- Microsoft Defender for Cloud
6666
- Microsoft Sentinel
6767
- Microsoft Defender for Endpoint
68-
- Microsoft Security Exposure Management (Preview)
68+
- Microsoft Security Exposure Management
6969
- Microsoft Purview
7070
- Microsoft Entra ID Protection
7171

defender-endpoint/android-whatsnew.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 01/03/2025
18+
ms.date: 01/06/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -40,7 +40,7 @@ Recommendation cards prominently display any active alerts, ensuring you stay in
4040

4141
The following screenshot is an example of what the user sees in their dashboard:
4242

43-
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing what the user sees on the device.":::
43+
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing the user's dashboard in the Microsoft Defender app.":::
4444

4545
**Recommendation cards for alerts**
4646

@@ -59,10 +59,10 @@ The current enterprise dashboard experience now features a tile view for your se
5959

6060
| Tile | Description |
6161
|---|---|
62-
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: | **Network protection** <br/>Your security team can see whether a connection is secured or unsecured. |
63-
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: | **Web protection** <br/>Your security team can see whether web protection is enabled on a user's device. |
64-
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: | **App security** <br/>Your security team can see whether any threats were found in apps installed on a user's device. |
65-
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: | **Global secure access** <br/>Your security team can see current connection status. |
62+
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: | **Network protection** <br/>The user can see whether a connection is secured or unsecured. |
63+
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: | **Web protection** <br/>The user can see whether web protection is enabled on a user's device. |
64+
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: | **App security** <br/>The user can see whether any threats were found in apps installed on a user's device. |
65+
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: | **Global secure access** <br/>The user can see current connection status. |
6666

6767
## Android low-touch onboarding is now GA
6868

@@ -125,7 +125,7 @@ Read the announcement [Tech Community Blog: Defender for Endpoint is now availab
125125

126126
## Privacy controls
127127

128-
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls(MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
128+
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls (MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
129129

130130
## Optional permissions and the ability to disable web protection
131131

defender-endpoint/api/get-assessment-secure-config.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 06/04/2021
18+
ms.date: 01/06/2025
1919
---
2020

2121
# Export secure configuration assessment per device
@@ -245,18 +245,18 @@ GET /api/machines/SecureConfigurationsAssessmentExport
245245
### 2.5 Properties
246246

247247
> [!NOTE]
248-
>
249-
> - The files are gzip compressed & in multiline Json format.
250-
> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
248+
> - The files are GZIP compressed & in multiline JSON format.
249+
> - The download URLs are only valid for 1 hour; otherwise you can use the parameter.
251250
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.
252251
252+
253253
<br>
254254

255255
****
256256

257257
Property (ID)|Data type|Description|Example of a returned value
258258
---|---|---|---
259-
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
259+
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
260260
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
261261
|
262262

defender-endpoint/view-incidents-queue.md

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,15 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 06/05/2024
18+
ms.date: 01/06/2025
1919
---
2020

2121
# View and organize the Microsoft Defender for Endpoint Incidents queue
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

2525
**Applies to:**
26+
2627
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2728
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2829
- [Microsoft Defender XDR](/defender-xdr)
@@ -31,12 +32,13 @@ ms.date: 06/05/2024
3132
3233
The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
3334

34-
By default, the queue displays incidents seen in the last 6 months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
35+
By default, the queue displays incidents seen in the last six months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
3536

3637
There are several options you can choose from to customize the Incidents queue view.
3738

3839
On the top navigation you can:
39-
- Customize columns to add or remove columns
40+
41+
- Customize columns to add or remove columns
4042
- Modify the number of items to view per page
4143
- Select the items to show per page
4244
- Batch-select the incidents to assign
@@ -46,7 +48,11 @@ On the top navigation you can:
4648

4749
:::image type="content" source="media/atp-incident-queue.png" alt-text="The Incidents queue" lightbox="media/atp-incident-queue.png":::
4850

51+
> [!TIP]
52+
> **Defender Boxed**, a series of cards showcasing your organization's security successes, improvements, and response actions in the past six months/year, appears for a limited time during January and July of each year. Learn how you can share your [Defender Boxed](/defender-xdr/incident-queue#defender-boxed) highlights.
53+
4954
## Sort and filter the incidents queue
55+
5056
You can apply the following filters to limit the list of incidents and get a more focused view.
5157

5258
### Severity
@@ -55,32 +61,36 @@ Incident severity | Description
5561
:---|:---
5662
High </br>(Red) | Threats often associated with advanced persistent threats (APT). These incidents indicate a high risk due to the severity of damage they can inflict on devices.
5763
Medium </br>(Orange) | Threats rarely observed in the organization, such as anomalous registry change, execution of suspicious files, and observed behaviors typical of attack stages.
58-
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that do not necessarily indicate an advanced threat targeting the organization.
64+
Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that don't necessarily indicate an advanced threat targeting the organization.
5965
Informational </br>(Grey) | Informational incidents might not be considered harmful to the network but might be good to keep track of.
6066

6167
## Assigned to
68+
6269
You can choose to filter the list by selecting assigned to anyone or ones that are assigned to you.
6370

6471
### Category
72+
6573
Incidents are categorized based on the description of the stage by which the cybersecurity kill chain is in. This view helps the threat analyst to determine priority, urgency, and corresponding response strategy to deploy based on context.
6674

6775
### Status
76+
6877
You can choose to limit the list of incidents shown based on their status to see which ones are active or resolved.
6978

7079
### Data sensitivity
80+
7181
Use this filter to show incidents that contain sensitivity labels.
7282

7383
## Incident naming
7484

75-
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories.
85+
To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources, or categories.
7686

7787
For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
7888

7989
> [!NOTE]
80-
> Incidents that existed prior the rollout of automatic incident naming will retain their name.
81-
90+
> Incidents that existed prior to the rollout of automatic incident naming retains their original name.
8291
8392
## See also
93+
8494
- [Incidents queue](view-incidents-queue.md)
8595
- [Manage incidents](manage-incidents.md)
8696
- [Investigate incidents](investigate-incidents.md)
46.4 KB
Loading
26.7 KB
Loading
27.7 KB
Loading
95.2 KB
Loading

defender-for-iot/set-up-rbac.md

Lines changed: 47 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -28,49 +28,78 @@ To make general changes to RBAC roles and permissions that relate to all other a
2828

2929
## Access management options
3030

31-
There are two ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The two systems are:
31+
There are three ways to manage user access to the Defender portal, depending on the type of tenent you're using. Each system has different named permissions that allow access for site security. The systems are:
3232

3333
- [Global Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference).
34-
- [Microsoft Defender XDR Unified RBAC](/defender-xdr/custom-roles): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
34+
- [Microsoft Defender XDR Unified RBAC](/defender-xdr/manage-rbac): Use Defender XDR Unified role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
35+
- [Microsoft Defender for Endpoint XDR RBAC](/defender-endpoint/user-roles): Use Defender for Endpoint XDR role-based access control (RBAC) to manage access to specific data, tasks, and capabilities in the Defender portal.
3536

36-
The instructions and permission settings listed in this article apply to Defender XDR Unified RBAC.
37-
38-
### RBAC for version 1 or 2
39-
40-
Depending on your tenant, you might have access to RBAC version 1 or 2 instead of Defender XDR Unified RBAC. For more information, see [permissions for RBAC version 1](/defender-endpoint/prepare-deployment), or [permissions for RBAC version 2](/defender-endpoint/user-roles#permission-options).
41-
42-
If you're using the Defender portal for the first time, you need to set up all of your roles and permissions. For more information, see [manage portal access using role-based access control](/defender-xdr/manage-rbac).
37+
The instructions and permission settings listed in this article apply to both Defender XDR Unified and Microsoft Defender for Endpoint XDR RBAC.
4338

4439
## Set up Defender XDR Unified RBAC roles for site security
4540

46-
Assign RBAC permissions and roles, based on the [summary table](#summary-of-roles-and-permissions-for-site-security), to give users access to site security features:
41+
Assign RBAC permissions and roles, based on the [summary table](#summary-of-rbac-roles-and-permissions-for-site-security), to give users access to site security features:
4742

48-
1. In the Defender portal, select **Settings** \> **Microsoft XDR** \> **Permissions and roles**.
43+
1. In the Defender portal, select **Settings** \> **Microsoft Defender XDR** \> **Permissions and roles**.
4944
1. Enable **Endpoints & Vulnerability Management**.
5045
1. Select **Go to Permissions and roles**.
5146
1. Select **Create custom role**.
5247
1. Type a **Role name**, and then select **Next** for Permissions.
5348

5449
:::image type="content" source="media/set-up-rbac/permissions-set-up.png" alt-text="Screenshot of the permissions set up page for site security." lightbox="media/set-up-rbac/permissions-set-up.png":::
5550

56-
1. Select **Security operations**, and select **Select custom permissions**.
57-
1. In **Security settings**, select **Security data basics** and select **Apply**
58-
1. Select **Authorization and settings**, select **Select custom permissions**.
59-
1. In **Security data** ,select **Core security settings (manage)** and select **Apply**
51+
1. For read permissions, select **Security operations**, and select **Select custom permissions**.
52+
1. In **Security data**, select **Security data basics(read)** and select **Apply**.
53+
54+
:::image type="content" source="media/set-up-rbac/permissions-unified-read-options.png" alt-text="Screenshot of the permissions set up page with the specific read permissions chosen for site security." lightbox="media/set-up-rbac/permissions-unified-read-options.png":::
55+
56+
1. For write permissions, in **Authorization and settings**, select **Select custom permissions**.
57+
1. In **Security data**, select **Core security settings (manage)** and select **Apply**.
6058

61-
:::image type="content" source="media/set-up-rbac/permissions-choose-options.png" alt-text="Screenshot of the permissions set up page with the specific permissions chosen for site security." lightbox="media/set-up-rbac/permissions-choose-options.png":::
59+
:::image type="content" source="media/set-up-rbac/permissions-choose-options.png" alt-text="Screenshot of the permissions set up page with the specific write permissions chosen for site security." lightbox="media/set-up-rbac/permissions-choose-options.png":::
6260

6361
1. Select **Next** for Assignments.
6462
1. Select **Add assignment**, type a name, choose users and groups and select the Data sources.
6563
1. Select **Add**.
6664
1. Select **Next** to **Review and finish**.
6765
1. Select **Submit**.
6866

69-
### Summary of roles and permissions for site security
67+
## Set up Microsoft Defender for Endpoint XDR RBAC (Version 2) roles for site security
68+
69+
Assign RBAC permissions and roles, based on the [summary table](#summary-of-rbac-roles-and-permissions-for-site-security), to give users access to site security features:
70+
71+
1. In the Defender portal, select **Settings** \> **Endpoints** \> **Roles**.
72+
1. Select **Add role**.
73+
1. Type a **Role name**, and a **Description**.
74+
1. Select **Next** for Permissions.
75+
76+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-add-role.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-add-role.png":::
77+
78+
1. For read permissions, in **View Data**, select **Security Operations**.
79+
80+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-read-options.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page with the specific read permissions chosen for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-read-options.png":::
81+
82+
1. For write permissions, select **Manage security settings in Security Center**.
83+
84+
:::image type="content" source="media/set-up-rbac/permissions-mde-rbac2-write-options.png" alt-text="Screenshot of the Microsoft Defender for Endpoint XDR RBAC (version2) permissions set up page with the specific read and write permissions chosen for site security." lightbox="media/set-up-rbac/permissions-mde-rbac2-write-options.png":::
85+
86+
1. Select **Next**.
87+
1. In **Assigned user groups**, select the user groups from the list to assign to this role.
88+
1. Select **Submit**.
89+
90+
### Summary of RBAC roles and permissions for site security
91+
92+
**For Unified RBAC**:
93+
94+
|Write permissions |Read permissions |
95+
|----|----|
96+
| **Defender permissions**: Core security settings (manage) under Authorization and Settings and scoped to all device groups. <br>**Entra ID roles**: Global Administrator, Security Administrator, Security Operator and scoped to all device groups.| Write roles (including roles that are non-scoped to all device groups). <br> **Defender permissions**: Security data basics (under Security Operations).<br>**Entra ID roles**: Global Reader, Security Reader.|
97+
98+
**For Microsoft Defender for Endpoint XDR RBAC (version 2)**:
7099

71100
|Write permissions |Read permissions |
72101
|----|----|
73-
| **Defender Permissions**: Core security settings scoped to all device groups. <br>**Entra ID roles**: Global Administrator, Security Administrator, Security Operator scoped to all device groups.| Write roles (including roles that aren't scoped to all device groups). <br> **Defender Permissions**: Security data basics (under Security Operations).<br>**Entra ID roles**: Global Reader, Security Reader.|
102+
| **Defender for Endpoint roles**: Manage security settings in Security Center and scoped to all device groups.<br>**Entra ID roles**: Global Administrator, Security Administrator.| Write roles (including roles that are non-scoped to all device groups). <br> **Defender for Endpoint roles**: View data - Security operations (read). <br>**Entra ID roles**: Global Reader, Security Reader.|
74103

75104
## Next steps
76105

0 commit comments

Comments
 (0)