Skip to content

Commit 4a1893e

Browse files
committed
Merge branch 'WI402856-update-file-monitoring-m365-doc' of https://github.com/DeCohen/defender-docs-pr into WI402856-update-file-monitoring-m365-doc
2 parents 16b4a65 + 3f99f35 commit 4a1893e

20 files changed

+134
-137
lines changed

ATPDocs/health-alerts.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,12 @@ This section describes all the health issues for each component, listing the cau
3939

4040
Sensor-specific health issues are displayed in the **Sensor health issues** tab and domain related or aggregated health issues are displayed in the **Global health issues** tab as detailed in the following tables:
4141

42+
### Network configuration mismatch for sensors running on VMware
43+
44+
|Alert|Description|Resolution|Severity|Displayed in|
45+
|----|----|----|----|----|
46+
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
47+
4248
### A domain controller is unreachable by a sensor
4349

4450
|Alert|Description|Resolution|Severity|Displayed in|

ATPDocs/notifications.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,18 +19,19 @@ This article describes how to configure Defender for Identity notifications so t
1919
2020
## Configure email notifications
2121

22-
This section describes how to configure email notifications for Defender for Identity health issues or security alerts.
22+
This section describes how to configure email notifications for Defender for Identity health issues.
2323

2424
1. In [Microsoft Defender XDR](https://security.microsoft.com), select **Settings** > **Identities**.
2525

26-
1. Under **Notifications**, select **Health issues notifications** or **Alert notifications** as needed.
26+
1. Under **Notifications**, select **Health issues notifications**.
2727

2828
1. In the **Add recipient email**, enter the email address(es) where you want to receive email notifications, and select **+ Add**.
2929

30-
Whenever Defender for Identity detects a health issue or security alert, configured recipients receive an email notification with the details, with a link to Microsoft Defender XDR for more details.
30+
Whenever Defender for Identity detects a health issue, configured recipients receive an email notification with the details, with a link to Microsoft Defender XDR for more details.
3131

3232
> [!NOTE]
33-
> *Alert notifications* page will be deprecated by January 15, 2025. Please use the '[Email Notifications](https://security.microsoft.com/securitysettings/defender/email_notifications)' page under Defender XDR settings for new and existing notifications rules. [Learn more](https://aka.ms/IncidentsNotificationsDefenderXdr)
33+
> To receive email notifications about Incidents, please use the [Email Notifications](https://security.microsoft.com/securitysettings/defender/email_notifications) page under Defender XDR Settings for new and existing notifications rules. [Learn more](https://aka.ms/IncidentsNotificationsDefenderXdr).
34+
3435
## Configure Syslog notifications
3536

3637
This section describes how to configure Defender for Identity to send health issues and security events to a Syslog server through a configured sensor.
@@ -41,13 +42,13 @@ Events aren't sent from the Defender for Identity service to your Syslog server
4142

4243
1. In [Microsoft Defender XDR](https://security.microsoft.com), select **Settings** > **Identities**.
4344

44-
1. Under **Notifications**, select **Syslog notifications** and then toggle on the **Syslog service** option.
45+
1. Under **Notifications**, select **Syslog notifications**, and then toggle on the **Syslog service** option.
4546

4647
1. Select **Configure service** to open the **Syslog service** pane.
4748

4849
1. Enter the following details:
4950

50-
- **Sensor**: Select the sensor you want to send notifications to the Syslog server
51+
- **Sensor**: Select the sensor you want to send notifications to the Syslog server.
5152
- **Service endpoint** and **Port**: Enter the IP address or fully qualified domain name (FQDN) for the Syslog server, and then enter the port number. You can configure only one Syslog endpoint.
5253
- **Transport**: Select the **Transport** protocol (TCP or UDP).
5354
- **Format**: Select the format (RFC 3164 or RFC 5424).

ATPDocs/troubleshooting-known-issues.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224224

225225
## VMware virtual machine sensor issue
226226

227-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive the health alert **Some network traffic is not being analyzed**. This can happen because of a configuration mismatch in VMware.
227+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228228

229229
To resolve the issue:
230230

@@ -273,8 +273,6 @@ The domain controller hasn't been granted permission to retrieve the password of
273273

274274
Validate that the computer running the sensor has been granted permissions to retrieve the password of the gMSA account. For more information, see [Grant permissions to retrieve the gMSA account's password](deploy/create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password).
275275

276-
277-
278276
### Cause 2
279277

280278
The sensor service runs as *LocalService* and performs impersonation of the Directory Service account.
@@ -446,16 +444,16 @@ Ensure that the sensor can browse to \*.atp.azure.com directly or through the co
446444
For more information, see [Run a silent installation with a proxy configuration](install-sensor.md#run-a-silent-installation-with-a-proxy-configuration) and [Install the Microsoft Defender for Identity sensor](deploy/install-sensor.md).
447445
448446
> [!IMPORTANT]
449-
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
447+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
450448
>
451449
452-
## Sensor service could not run and remains in Starting state
450+
## Sensor service couldn't run and remains in Starting state
453451
454452
The following errors will appear in the **System log** in **Event viewer**:
455453
456454
- The Open procedure for service ".NETFramework" in DLL "C:\Windows\system32\mscoree.dll" failed with error code Access is denied. Performance data for this service won't be available.
457-
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service will not be available.
458-
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device is not ready". Performance data for this service won't be available.
455+
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service won't be available.
456+
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device isn't ready". Performance data for this service won't be available.
459457
460458
The Microsoft.TriSensorError.log will contain an error similar to this:
461459
26.9 KB
Loading
43.9 KB
Loading

CloudAppSecurityDocs/network-requirements.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,7 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
4949
static2.sharepointonline.com
5050
*.blob.core.windows.net
5151
discoveryresources-cdn-prod.cloudappsecurity.com
52-
discoveryresources-cdn-gov.cloudappsecurity.com
53-
52+
discoveryresources-cdn-gov.cloudappsecurity.us
5453
```
5554

5655
1. Allow the following items based on your data center:

CloudAppSecurityDocs/protect-office-365.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99

1010

11-
As a major productivity suite providing cloud file storage, collaboration, BI, and CRM tools, Microsoft 365 enables your users to share their documents across your organization and partners in a streamlined and efficient way. Using Microsoft 365 may expose your sensitive data not only internally, but also to external collaborators, or even worse make it publicly available via a shared link. Such incidents might occur due to malicious actor, or by an unaware employee. Microsoft 365 also provides a large third-party app eco-system to help boost productivity. Using these apps can expose your organization to the risk of malicious apps or use of apps with excessive permissions.
11+
As a major productivity suite providing cloud file storage, collaboration, BI, and CRM tools, Microsoft 365 enables your users to share their documents across your organization and partners in a streamlined and efficient way. Using Microsoft 365 might expose your sensitive data not only internally, but also to external collaborators, or even worse make it publicly available via a shared link. Such incidents might occur due to malicious actor, or by an unaware employee. Microsoft 365 also provides a large third-party app eco-system to help boost productivity. Using these apps can expose your organization to the risk of malicious apps or use of apps with excessive permissions.
1212

1313
Connecting Microsoft 365 to Defender for Cloud Apps gives you improved insights into your users' activities, provides threat detection using machine learning based anomaly detections, information protection detections (such as detecting external information sharing), enables automated remediation controls, and detects threats from enabled third-party apps in your organization.
1414

@@ -17,7 +17,11 @@ Defender for Cloud Apps integrates directly with [Microsoft 365's audit logs](/m
1717
[!INCLUDE [security-posture-management-connector](includes/security-posture-management-connector.md)]
1818

1919

20-
## File scanning improvements for Microsoft 365
20+
## File scanning updates for Microsoft 365
21+
22+
To enhance file scanning efficiency and accuracy within Microsoft 365 environments, Defender for Cloud Apps has updated the file scanning process for Microsoft 365. Unless you activate information protection policies, Defender for Cloud Apps won't scan or store organizational files.
23+
24+
When you actively use information protection policies, organizational files might have significant scanning durations due to high volumes of file scanning activities.
2125

2226
Defender for Cloud Apps has added new file scanning improvements for SharePoint and OneDrive:
2327

@@ -26,7 +30,7 @@ Defender for Cloud Apps has added new file scanning improvements for SharePoint
2630
- Better identification for a file's access level in SharePoint: file access level in SharePoint will be marked by default as **Internal**, and not as **Private** (since every file in SharePoint is accessible by the site owner, and not only by the file owner).
2731

2832
>[!NOTE]
29-
>This change could impact your file policies (if a file policy is looking for **Internal** or **Private** files in SharePoint).
33+
>This change could affect your file policies (if a file policy is looking for **Internal** or **Private** files in SharePoint).
3034
3135
## Main threats
3236

@@ -79,7 +83,7 @@ Review our best practices for [securing and collaborating with external users](b
7983

8084
## Defender for Cloud Apps integration with Microsoft 365
8185

82-
Defender for Cloud Apps supports the legacy Microsoft 365 Dedicated Platform as well as the latest offerings of Microsoft 365 services, commonly referred as the *vNext* release family of Microsoft 365.
86+
Defender for Cloud Apps supports the legacy Microsoft 365 Dedicated Platform and the latest offerings of Microsoft 365 services, commonly referred as the *vNext* release family of Microsoft 365.
8387

8488
In some cases, a vNext service release differs slightly at the administrative and management levels from the standard Microsoft 365 offering.
8589

@@ -115,7 +119,9 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
115119

116120
[!INCLUDE [security-posture-management-connector](includes/security-posture-management-connector.md)]
117121

118-
**Prerequisites**:
122+
#### Prerequisites:
123+
124+
- To enable file monitoring of Microsoft 365 files, you must use a relevant Entra Admin ID, such as Application Administrator or Cloud Application Administrator. For more information, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference)
119125

120126
- You must have at least one assigned Microsoft 365 license to connect Microsoft 365 to Defender for Cloud Apps.
121127

@@ -126,7 +132,6 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
126132
- You must [enable auditing in Power BI](/power-bi/admin/service-admin-auditing) to get the logs from there. Once auditing is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
127133
- You must [enable auditing in Dynamics 365](/power-platform/admin/enable-use-comprehensive-auditing#enable-auditing) to get the logs from there. Once auditing is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
128134

129-
130135
**To connect Microsoft 365 to Defender for Cloud Apps**:
131136

132137
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
@@ -139,7 +144,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
139144
> [!NOTE]
140145
>
141146
> - For best protection, we recommend selecting all Microsoft 365 components.
142-
> - The **Azure AD files** component, requires the **Azure AD activities** component and Defender for Cloud Apps file monitoring (**Settings** > **Cloud Apps** > **Files** > **Enable file monitoring**).
147+
> - The **Microsoft 365 files** component, requires enabling Defender for Cloud Apps file monitoring (**Settings** > **Cloud Apps** > **Files** > **Enable file monitoring**).
143148
144149
:::image type="content" source="media/connect-office-365-components.png" alt-text="Connect Office 365 components" lightbox="media/connect-office-365-components.png":::
145150

defender-endpoint/api/isolate-machine.md

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: reference
1414
ms.subservice: reference
1515
ms.custom: api
1616
search.appverid: met150
17-
ms.date: 02/28/2025
17+
ms.date: 03/11/2025
1818
---
1919

2020
# Isolate machine API
@@ -36,7 +36,7 @@ Isolates a device from accessing external network.
3636

3737
## Limitations
3838

39-
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
39+
1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
4040

4141
[!include[Device actions note](../../includes/machineactionsnote.md)]
4242

@@ -45,8 +45,7 @@ Isolates a device from accessing external network.
4545
> - Full isolation is available for all supported Linux devices. See [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux).
4646
> - Selective isolation is available for devices on Windows 10, version 1709 or later, and on Windows 11.
4747
> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
48-
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action.
49-
48+
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action. The IsolationType value should be set to 'UnManagedDevice.'
5049
5150
## Permissions
5251

@@ -59,10 +58,9 @@ Delegated (work or school account)|Machine.Isolate|'Isolate machine'
5958

6059
> [!NOTE]
6160
> When obtaining a token using user credentials:
62-
>
63-
> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
64-
> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
65-
>
61+
> - The user needs to have at least the following role permission: 'Active remediation actions.' For more information, see [Create and manage roles](../user-roles.md).
62+
> - The user needs to have access to the device, based on device group settings. See [Create and manage device groups](../machine-groups.md) for more information.
63+
>
6664
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
6765
6866
## HTTP request
@@ -82,15 +80,16 @@ Content-Type|string|application/json. **Required**.
8280

8381
In the request body, supply a JSON object with the following parameters:
8482

85-
Parameter|Type|Description
86-
:---|:---|:---
87-
Comment|String|Comment to associate with the action. **Required**.
88-
IsolationType|String|Type of the isolation. Allowed values are: 'Full' or 'Selective'.
83+
|Parameter|Type|Description|
84+
|:---|:---|:---|
85+
|Comment|String|Comment to associate with the action. **Required**.|
86+
|IsolationType|String|Type of the isolation. Allowed values are: **Full**, **Selective**, or **UnManagedDevice**.|
8987

9088
**IsolationType** controls the type of isolation to perform and can be one of the following:
9189

92-
- Full: Full isolation
93-
- Selective: Restrict only limited set of applications from accessing the network (see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network) for more details)
90+
- Full: Full isolation. Works for managed devices.
91+
- Selective: Restrict only limited set of applications from accessing the network on managed devices. For more information, see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network).
92+
- UnManagedDevice: The isolation targets unmanaged devices only.
9493

9594
## Response
9695

@@ -100,7 +99,7 @@ If successful, this method returns 201 - Created response code and [Machine Acti
10099

101100
### Request
102101

103-
Here is an example of the request.
102+
Here's an example of the request.
104103

105104
```http
106105
POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
17-
ms.date: 03/04/2025
17+
ms.date: 03/11/2025
1818
ms.subservice: onboard
1919
---
2020

@@ -55,8 +55,8 @@ Defender for Endpoint supports non-persistent VDI session onboarding. There migh
5555
- In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
5656

5757
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
58-
5958
- Multiple entries for each device - one for each VDI instance.
59+
- For all VDI machines, when they onboard for the first time, there's a client delay of approximately 3-4 hours.
6060

6161
> [!IMPORTANT]
6262
> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.

0 commit comments

Comments
 (0)