Skip to content

Commit 4eb3e66

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into moving-mdi-mda-files-to-service-repos
2 parents cb03cbc + 5f668a3 commit 4eb3e66

27 files changed

+409
-269
lines changed

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 4 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,6 @@ Following proper investigation, all Defender for Cloud Apps alerts can be classi
4040

4141
You should use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
4242

43-
- Review the user's [investigation priority score](tutorial-ueba.md#understand-the-investigation-priority-score) and compare with the rest of the organization. This will help you identify which users in your organization pose the greatest risk.
4443
- If you identify a **TP**, review all the user's activities to gain an understanding of the impact.
4544
- Review all user activity for other indicators of compromise and explore the source and scope of impact. For example, review the following user device information and compare with known device information:
4645
- Operating system and version
@@ -712,74 +711,14 @@ Establishing a new user's activity pattern requires an initial learning period o
712711
1. Review the deletion activities and create a list of deleted files. If needed, recover the deleted files.
713712
1. Optionally, create a playbook using Power Automate to contact users and their managers to verify the activity.
714713

715-
### Investigation priority score increase (preview)
714+
### Investigation priority score increase (legacy)
716715

717-
Anomalous activities and activities that triggered alerts are given scores based on severity, user impact, and behavioral analysis of the user. The analysis is done based on other users in the tenants.
716+
Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired. If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
718717

719-
When there's a significant and anomalous increase in the investigation priority score of a certain user, the alert will be triggered.
718+
- [Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
720719

721-
This alert enables detecting potential breaches that are characterized by activities that don't necessarily trigger specific alerts but accumulate to a suspicious behavior for the user.
720+
- [Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
722721

723-
**Learning period**
724-
725-
Establishing a new user's activity pattern requires an initial learning period of seven days, during which alerts aren't triggered for any score increase.
726-
727-
**TP**, **B-TP**, or **FP**?
728-
729-
1. **TP**: If you're able to confirm that the activities of the user aren't legitimate.
730-
731-
**Recommended action**: Suspend the user, mark the user as compromised, and reset their password.
732-
733-
1. **B-TP**: If you're able to confirm that user indeed significantly deviated from usual behavior, but there's no potential breach.
734-
735-
1. **FP** (Unusual behavior): If you're able to confirm that the user legitimately performed the unusual activities, or more activities than the established baseline.
736-
737-
**Recommended action**: Dismiss the alert.
738-
739-
**Understand the scope of the breach**
740-
741-
1. Review all user activity and alerts for additional indicators of compromise.
742-
743-
#### Deprecation timeline
744-
745-
We're gradually retiring the **Investigation priority score increase** alert from Microsoft Defender for Cloud Apps by August 2024.
746-
747-
After careful analysis and consideration, we decided to deprecate it due to the high rate of false positives associated with this alert, which we found wasn't contributing effectively to the overall security of your organization.
748-
749-
Our research indicated that this feature wasn't adding significant value and wasn't aligned with our strategic focus on delivering high-quality, reliable security solutions.
750-
751-
We're committed to continuously improving our services and ensuring that they meet your needs and expectations.
752-
753-
For those who wish to continue using this alert, we suggest using the following advanced hunting query instead as a suggested template. Modify the query based on your needs.
754-
755-
```kql
756-
let time_back = 1d;
757-
let last_seen_threshold = 30;
758-
// the number of days which the resource is considered to be in use by the user lately, and therefore not indicates anomaly resource usage
759-
// anomaly score based on LastSeenForUser column in CloudAppEvents table
760-
let last_seen_scores =
761-
CloudAppEvents
762-
| where Timestamp > ago(time_back)
763-
| where isnotempty(LastSeenForUser)
764-
| mv-expand LastSeenForUser
765-
| extend resource = tostring(bag_keys(LastSeenForUser)[0])
766-
| extend last_seen = LastSeenForUser[resource]
767-
| where last_seen < 0 or last_seen > last_seen_threshold
768-
// score is calculated as the number of resources which were never seen before or breaching the chosen threshold
769-
| summarize last_seen_score = dcount(resource) by ReportId, AccountId;
770-
// anomaly score based on UncommonForUser column in CloudAppEvents table
771-
let uncommonality_scores =
772-
CloudAppEvents
773-
| where Timestamp > ago(time_back)
774-
| where isnotempty(UncommonForUser)
775-
| extend uncommonality_score = array_length(UncommonForUser)
776-
// score is calculated as the number of uncommon resources on the event
777-
| project uncommonality_score, ReportId, AccountId;
778-
last_seen_scores | join kind=innerunique uncommonality_scores on ReportId and AccountId
779-
| project-away ReportId1, AccountId1
780-
| extend anomaly_score = last_seen_score + uncommonality_score
781-
// joined scores
782-
```
783722

784723
## See also
785724

CloudAppSecurityDocs/tutorial-ueba.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,12 +46,6 @@ Defender for Cloud Apps uses the following to measure risk:
4646

4747
Select the investigation priority score for an alert or an activity to view the evidence that explains how Defender for Cloud Apps scored the activity.
4848

49-
> [!NOTE]
50-
> We're gradually retiring the [**Investigation priority score increase**](investigate-anomaly-alerts.md#investigation-priority-score-increase-preview) alert from Microsoft Defender for Cloud Apps by August 2024. The investigation priority score and the procedure described in this article are not affected by this change.
51-
>
52-
> For more information, see [Investigation priority score increase deprecation timeline](investigate-anomaly-alerts.md#deprecation-timeline).
53-
54-
5549
## Phase 1: Connect to the apps you want to protect<a name="connect-apps-protect"></a>
5650

5751
Connect at least one app to Microsoft Defender for Cloud Apps using the [API connectors](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md). We recommend that you start by connecting [Microsoft 365](./connect-office-365.md).

defender-endpoint/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -934,6 +934,10 @@
934934
antivirus windows defender antivirus
935935
- name: Troubleshoot performance issues related to real-time protection
936936
href: troubleshoot-performance-issues.md
937+
- name: Troubleshoot Microsoft Defender Antivirus performance issues with WPRUI
938+
href: troubleshoot-av-performance-issues-with-wprui.md
939+
displayName: Troubleshoot antivirus performance issues with WPRUI windows
940+
performance recorder UI WPR windows performance recorder
937941
- name: Troubleshoot Microsoft Defender Antivirus performance issues with Process
938942
Monitor
939943
href: troubleshoot-av-performance-issues-with-procmon.md

defender-endpoint/api/export-firmware-hardware-assessment.md

Lines changed: 10 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 11/24/2022
18+
ms.date: 01/08/2025
1919
---
2020

2121
# Export Hardware and firmware assessment inventory per device
@@ -153,39 +153,31 @@ Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability
153153
GET /api/machines/HardwareFirmwareInventoryExport
154154
```
155155

156-
### 2.4 Parameters
157-
158-
- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).
159-
160-
### 2.5 Properties (JSON response)
156+
### 2.4 Properties (JSON response)
161157

162158
> [!NOTE]
163-
> The files are gzip compressed & in multiline Json format.
164-
>
165-
> The download URLs are only valid for 3 hours; otherwise, you can use the parameter.
166-
>
167-
> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
168159
>
169-
> Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
170-
>
171-
> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
160+
> - The files are gzip compressed & in multiline Json format.
161+
> - The download URLs are only valid for 1 hour.
162+
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
163+
> - Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
164+
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
172165
173166
Property (ID)|Data type|Description
174167
:---|:---|:---
175168
|Export files|String[array]|A list of download URLs for files holding the current snapshot of the organization.
176169
|GeneratedTime|DateTime|The time the export was generated.
177170

178171

172+
## 2.5 Examples
179173

180-
## 2.6 Example
181-
182-
### 2.6.1 Request example
174+
### 2.5.1 Request example
183175

184176
```http
185177
GET https://api.security.microsoft.com/api/machines/HardwareFirmwareInventoryExport
186178
```
187179

188-
### 2.6.2 Response example
180+
### 2.5.2 Response example
189181

190182
```json
191183
{

defender-endpoint/api/export-security-baseline-assessment.md

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 05/02/2022
18+
ms.date: 01/08/2025
1919
---
2020

2121
# Export security baselines assessment per device
@@ -158,35 +158,29 @@ Returns all security baselines assessments for all devices, on a per-device basi
158158
GET /api/machines/BaselineComplianceAssessmentExport
159159
```
160160

161-
### 2.4 Parameters
162-
163-
- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).
164-
165-
### 2.5 Properties (via files)
161+
### 2.4 Properties (via files)
166162

167163
> [!NOTE]
168-
> The files are gzip compressed & in multiline Json format.
169-
>
170-
> The download URLs are only valid for 3 hours; otherwise you can use the parameter.
171-
>
172-
> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
173-
>
174-
> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
164+
>
165+
> - The files are gzip compressed & in multiline Json format.
166+
> - The download URLs are only valid for 1 hours.
167+
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
168+
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
175169

176170
Property (ID)|Data type|Description
177171
:---|:---|:---
178172
|Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization.
179173
|GeneratedTime|String|The time that the export was generated.
180174

181-
## 2.6 Example
175+
## 2.5 Examples
182176

183-
### 2.6.1 Request example
177+
### 2.5.1 Request example
184178

185179
```http
186180
GET https://api.securitycenter.microsoft.com/api/machines/BaselineComplianceAssessmentExport
187181
```
188182

189-
### 2.6.2 Response example
183+
### 2.5.2 Response example
190184

191185
```json
192186
{

defender-endpoint/api/get-assessment-browser-extensions.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 06/01/2022
18+
ms.date: 01/08/2025
1919
---
2020

2121
# Export browser extensions assessment per device
@@ -39,7 +39,7 @@ Different API calls get different types of data. Because the amount of data can
3939

4040
- [Export browser extensions assessment **JSON response**](#1-export-browser-extensions-assessment-json-response) The API pulls all data in your organization as Json responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.
4141

42-
- [Export browser extensions assessment **via files**](#2-export-browser-extension-assessment-via-files) This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
42+
- [Export browser extensions assessment **via files**](#2-export-browser-extension-assessment-via-files) This API solution enables pulling larger amounts of data faster and more reliably. This is recommended for large organizations with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
4343
- Call the API to get a list of download URLs with all your organization data.
4444
- Download all the files using the download URLs and process the data as you like.
4545

@@ -57,7 +57,7 @@ This API response contains all the data for installed browser extensions per dev
5757
#### 1.1.1 Limitations
5858

5959
- Maximum page size is 200,000.
60-
- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.
60+
- Rate limitations for this API are 30 calls per minute and 1,000 calls per hour.
6161

6262
### 1.2 Permissions
6363

@@ -83,11 +83,11 @@ GET /api/Machines/BrowserExtensionsInventoryByMachine
8383

8484
> [!NOTE]
8585
>
86-
> - Each record is approximately 0.5KB of data. You should take this into account when choosing the correct pageSize parameter for you.
87-
> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
88-
> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
86+
> - Each record is 0.5KB of data. You should take this size into account when choosing the correct pageSize parameter for you.
87+
> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output isn't necessarily returned in the same order listed in this table.
88+
> - Some other columns might be returned in the response. These columns are temporary and might be removed so use only the documented columns.
8989
90-
<br>
90+
</br>
9191

9292
****
9393

@@ -103,7 +103,7 @@ ExtensionRisk|string|The highest risk level generated by the browser extension.
103103
ExtensionVersion|string|Version number of a specific browser extension.
104104
IsActivated|Boolean|Indicates whether a browser extension is active.
105105
RbacGroupId|integer|The role-based access control (RBAC) group ID.
106-
RbacGroupName|string|The role-based access control (RBAC) group. If this device is not assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
106+
RbacGroupName|string|The role-based access control (RBAC) group. If this device is not assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."
107107
InstallationTime|string|The time the browser extension was installed.
108108
Permissions|Array[string]|The set of permissions requested by a specific browser extension.
109109

@@ -182,17 +182,13 @@ Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability
182182
GET /api/machines/browserextensionsinventoryExport
183183
```
184184

185-
### 2.4 Parameters
186-
187-
- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours)
188-
189-
### 2.5 Properties
185+
### 2.4 Properties
190186

191187
> [!NOTE]
192188
>
193189
> - The files are gzip compressed & in multiline JSON format.
194-
> - The download URLs are only valid for 3 hours. Otherwise you can use the parameter.
195-
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region that your data resides.
190+
> - The download URLs are only valid for 1 hour.
191+
> - For maximum download speed of your data, you can make sure you're downloading from the same Azure region that your data resides.
196192
197193
<br>
198194

defender-endpoint/api/get-assessment-information-gathering.md

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
19-
ms.date: 07/26/2022
18+
ms.date: 01/08/2025
2019
---
2120

2221
# Information gathering assessment per device
@@ -70,35 +69,29 @@ Delegated (work or school account)|Vulnerability.Read|\'Read Threat and Vulnerab
7069
GET /api/Machines/InfoGatheringExport
7170
```
7271

73-
### 1.4 Parameters
74-
75-
- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours)
76-
77-
### 1.5 Properties
72+
### 1.4 Properties
7873

7974
> [!NOTE]
80-
> The files are gzip compressed & in multiline Json format.
81-
>
82-
> The download URLs are only valid for 3 hours; otherwise, you can use the parameter.
83-
>
84-
> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
85-
>
86-
> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
75+
>
76+
> - The files are gzip compressed & in multiline Json format.
77+
> - The download URLs are only valid for 1 hour.
78+
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
79+
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
8780
8881
Property (ID)|Data type|Description
8982
:---|:---|:---
9083
|Export files|String[array]|A list of download URLs for files holding the current snapshot of the organization.
9184
|GeneratedTime|DateTime|The time the export was generated.
9285

93-
### 1.6 Examples
86+
### 1.5 Examples
9487

95-
#### 1.6.1 Request example
88+
#### 1.5.1 Request example
9689

9790
```http
9891
GET https://api.securitycenter.microsoft.com/api/machines/InfoGatheringExport?$sasValidHours=1
9992
```
10093

101-
#### 1.6.2 Response example
94+
#### 1.5.2 Response example
10295

10396
```json
10497
{

0 commit comments

Comments
 (0)