You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-github.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,7 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
129
129
130
130
1. Select the **GitHub Profile picture** -> **your enterprises**.
131
131
1. Select **your enterprise account** and choose the account you want to connect to Microsoft Defender for Cloud Apps.
132
-
1. Confirm that the URL is the enterprise slug. For instance, in this example `https://github.com/enterprises/testEnterprise`*testEnterprise* is the enterprise slug.
132
+
1. Confirm that the URL is the enterprise slug. For instance, in this example `https://github.com/enterprises/testEnterprise`*testEnterprise* is the enterprise slug. Enter only the enterprise slug, not the entire URL.
133
133
134
134
1. Select **Next**.
135
135
@@ -142,7 +142,7 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
142
142
-**admin:org** - required for synchronizing your organization's audit log
143
143
-**read:user** and **user:email** - required for synchronizing your organization's members
144
144
-**repo:status** - required for synchronizing repository-related events in the audit log
145
-
-**admin:enterprise** - required for SSPM capabilities, Note that provided user must be the owner of the enterprise account.
145
+
-**read:enterprise** - required for SSPM capabilities. Note that provided user must be the owner of the enterprise account.
146
146
147
147
For more information about OAuth scopes, see [Understanding scopes for OAuth Apps](https://docs.github.com/developers/apps/building-oauth-apps/scopes-for-oauth-apps).
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,19 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
64
64
65
65
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-sec-ops-guide.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier1
17
17
description: A prescriptive playbook for SecOps personnel to manage Microsoft Teams protection in Microsoft Defender for Office 365.
18
18
ms.service: defender-office-365
19
-
ms.date: 04/16/2025
19
+
ms.date: 04/22/2025
20
20
appliesto:
21
21
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
22
22
---
@@ -83,6 +83,10 @@ SecOps team members can proactively hunt for potentially malicious Teams message
83
83
-**URL click** tab: This tab contains all user clicks on URLs in email, in supported Office files in SharePoint and OneDrive, and in Microsoft Teams. You can use the [available filters](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-url-clicks-view-in-threat-explorer) to hunt on detection data.
84
84
85
85
- On the **Advanced hunting** page in the Defender portal at <https://security.microsoft.com/v2/advanced-hunting>. The following hunting tables are available for Teams-related threats:
86
+
87
+
> [!NOTE]
88
+
> The hunting tables are currently in Preview.
89
+
86
90
-[MessageEvents](/defender-xdr/advanced-hunting-messageevents-table): Contains raw data about every internal and external Teams message that included a URL. Sender address, Sender display name, Sender type, and more are available in this table.
87
91
-[MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table): Contains raw data about ZAP events on Teams messages.
88
92
-[MessageUrlInfo](/defender-xdr/advanced-hunting-messageurlinfo-table): Contains raw data about URLs in Teams messages.
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-office-365.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.collection:
18
18
- highpri
19
19
- tier1
20
20
ms.topic: concept-article
21
-
ms.date: 05/31/2024
21
+
ms.date: 04/22/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
#customer intent: To learn how to pilot and deploy Microsoft Defender for Office 365 in your production Microsoft 365 tenant.
@@ -32,14 +32,12 @@ This article assumes you have a production Microsoft 365 tenant and are piloting
32
32
33
33
Defender for Office 365 contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
34
34
35
-
<!---
36
35
> [!TIP]
37
36
> For information about configuring protection for Microsoft Teams, see the following articles:
38
37
>
39
38
> -[Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](/defender-office-365/mdo-support-teams-about)
40
39
> -[Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2](/defender-office-365/mdo-support-teams-quick-configure)
41
40
> -[Security Operations Guide for Teams protection in Microsoft Defender for Office 365](/defender-office-365/mdo-support-teams-sec-ops-guide)
42
-
--->
43
41
44
42
## End-to-end deployment for Microsoft Defender XDR
@@ -147,6 +148,7 @@ The following table lists publicly disclosed threat actor names with their origi
147
148
|Storm-0247|China|ToddyCat, Websiic|
148
149
|Storm-0288|Group in development|FIN8|
149
150
|Storm-0302|Group in development|Narwhal Spider, TA544|
151
+
|[Storm-0408](https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/)|Group in development||
|[Storm-1865](https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/)|Group in development||
0 commit comments