Skip to content

Commit 5146896

Browse files
authored
Merge branch 'main' into unified-soc-opt
2 parents cbec2e1 + 3968cd0 commit 5146896

File tree

207 files changed

+1556
-1410
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

207 files changed

+1556
-1410
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-endpoint/configure-microsoft-threat-experts.md",
5+
"redirect_url": "/defender-xdr/defender-experts-for-hunting",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender-endpoint/microsoft-defender-antivirus-using-mde-security-set-mngmnt.md",
510
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
3232
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
3333

34-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
3535

3636
|Customer provisioning location |Data storage location |
3737
|---------|---------|
@@ -65,7 +65,7 @@ Defender for Cloud Apps shares data, including customer data, among the followin
6565
- Microsoft Defender for Cloud
6666
- Microsoft Sentinel
6767
- Microsoft Defender for Endpoint
68-
- Microsoft Security Exposure Management (Preview)
68+
- Microsoft Security Exposure Management
6969
- Microsoft Purview
7070
- Microsoft Entra ID Protection
7171

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 4 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,6 @@ Following proper investigation, all Defender for Cloud Apps alerts can be classi
4040

4141
You should use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
4242

43-
- Review the user's [investigation priority score](tutorial-ueba.md#understand-the-investigation-priority-score) and compare with the rest of the organization. This will help you identify which users in your organization pose the greatest risk.
4443
- If you identify a **TP**, review all the user's activities to gain an understanding of the impact.
4544
- Review all user activity for other indicators of compromise and explore the source and scope of impact. For example, review the following user device information and compare with known device information:
4645
- Operating system and version
@@ -712,74 +711,14 @@ Establishing a new user's activity pattern requires an initial learning period o
712711
1. Review the deletion activities and create a list of deleted files. If needed, recover the deleted files.
713712
1. Optionally, create a playbook using Power Automate to contact users and their managers to verify the activity.
714713

715-
### Investigation priority score increase (preview)
714+
### Investigation priority score increase (legacy)
716715

717-
Anomalous activities and activities that triggered alerts are given scores based on severity, user impact, and behavioral analysis of the user. The analysis is done based on other users in the tenants.
716+
Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired. If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
718717

719-
When there's a significant and anomalous increase in the investigation priority score of a certain user, the alert will be triggered.
718+
- [Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
720719

721-
This alert enables detecting potential breaches that are characterized by activities that don't necessarily trigger specific alerts but accumulate to a suspicious behavior for the user.
720+
- [Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
722721

723-
**Learning period**
724-
725-
Establishing a new user's activity pattern requires an initial learning period of seven days, during which alerts aren't triggered for any score increase.
726-
727-
**TP**, **B-TP**, or **FP**?
728-
729-
1. **TP**: If you're able to confirm that the activities of the user aren't legitimate.
730-
731-
**Recommended action**: Suspend the user, mark the user as compromised, and reset their password.
732-
733-
1. **B-TP**: If you're able to confirm that user indeed significantly deviated from usual behavior, but there's no potential breach.
734-
735-
1. **FP** (Unusual behavior): If you're able to confirm that the user legitimately performed the unusual activities, or more activities than the established baseline.
736-
737-
**Recommended action**: Dismiss the alert.
738-
739-
**Understand the scope of the breach**
740-
741-
1. Review all user activity and alerts for additional indicators of compromise.
742-
743-
#### Deprecation timeline
744-
745-
We're gradually retiring the **Investigation priority score increase** alert from Microsoft Defender for Cloud Apps by August 2024.
746-
747-
After careful analysis and consideration, we decided to deprecate it due to the high rate of false positives associated with this alert, which we found wasn't contributing effectively to the overall security of your organization.
748-
749-
Our research indicated that this feature wasn't adding significant value and wasn't aligned with our strategic focus on delivering high-quality, reliable security solutions.
750-
751-
We're committed to continuously improving our services and ensuring that they meet your needs and expectations.
752-
753-
For those who wish to continue using this alert, we suggest using the following advanced hunting query instead as a suggested template. Modify the query based on your needs.
754-
755-
```kql
756-
let time_back = 1d;
757-
let last_seen_threshold = 30;
758-
// the number of days which the resource is considered to be in use by the user lately, and therefore not indicates anomaly resource usage
759-
// anomaly score based on LastSeenForUser column in CloudAppEvents table
760-
let last_seen_scores =
761-
CloudAppEvents
762-
| where Timestamp > ago(time_back)
763-
| where isnotempty(LastSeenForUser)
764-
| mv-expand LastSeenForUser
765-
| extend resource = tostring(bag_keys(LastSeenForUser)[0])
766-
| extend last_seen = LastSeenForUser[resource]
767-
| where last_seen < 0 or last_seen > last_seen_threshold
768-
// score is calculated as the number of resources which were never seen before or breaching the chosen threshold
769-
| summarize last_seen_score = dcount(resource) by ReportId, AccountId;
770-
// anomaly score based on UncommonForUser column in CloudAppEvents table
771-
let uncommonality_scores =
772-
CloudAppEvents
773-
| where Timestamp > ago(time_back)
774-
| where isnotempty(UncommonForUser)
775-
| extend uncommonality_score = array_length(UncommonForUser)
776-
// score is calculated as the number of uncommon resources on the event
777-
| project uncommonality_score, ReportId, AccountId;
778-
last_seen_scores | join kind=innerunique uncommonality_scores on ReportId and AccountId
779-
| project-away ReportId1, AccountId1
780-
| extend anomaly_score = last_seen_score + uncommonality_score
781-
// joined scores
782-
```
783722

784723
## See also
785724

CloudAppSecurityDocs/network-requirements.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,15 @@ ms.topic: reference
1111

1212
This article provides a list of ports and IP addresses you need to allow and allowlist to work with Microsoft Defender for Cloud Apps.
1313

14+
In order to stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Cloud Apps services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
15+
16+
| Service tag name | Defender for Cloud Apps services included |
17+
|:---|:---|
18+
| MicrosoftCloudAppSecurity | Portal access, Access and session controls, SIEM agent connection, App connector, Mail server, Log collector. |
19+
20+
The following tables list the current static IP ranges covered by the MicrosoftCloudAppSecurity service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
21+
22+
1423
## View your data center
1524

1625
Some of the requirements below depend on which data center you're connected to.

CloudAppSecurityDocs/tutorial-ueba.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,12 +46,6 @@ Defender for Cloud Apps uses the following to measure risk:
4646

4747
Select the investigation priority score for an alert or an activity to view the evidence that explains how Defender for Cloud Apps scored the activity.
4848

49-
> [!NOTE]
50-
> We're gradually retiring the [**Investigation priority score increase**](investigate-anomaly-alerts.md#investigation-priority-score-increase-preview) alert from Microsoft Defender for Cloud Apps by August 2024. The investigation priority score and the procedure described in this article are not affected by this change.
51-
>
52-
> For more information, see [Investigation priority score increase deprecation timeline](investigate-anomaly-alerts.md#deprecation-timeline).
53-
54-
5549
## Phase 1: Connect to the apps you want to protect<a name="connect-apps-protect"></a>
5650

5751
Connect at least one app to Microsoft Defender for Cloud Apps using the [API connectors](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md). We recommend that you start by connecting [Microsoft 365](./connect-office-365.md).

defender-endpoint/TOC.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -934,6 +934,15 @@
934934
antivirus windows defender antivirus
935935
- name: Troubleshoot performance issues related to real-time protection
936936
href: troubleshoot-performance-issues.md
937+
- name: Troubleshoot Microsoft Defender Antivirus performance issues with WPRUI
938+
href: troubleshoot-av-performance-issues-with-wprui.md
939+
displayName: Troubleshoot antivirus performance issues with WPRUI windows
940+
performance recorder UI WPR windows performance recorder
941+
- name: Troubleshoot Microsoft Defender Antivirus performance issues with Process
942+
Monitor
943+
href: troubleshoot-av-performance-issues-with-procmon.md
944+
displayName: Troubleshoot Microsoft Defender Antivirus MDAV performance perf
945+
issues with Process Monitor ProcMon
937946
- name: Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus
938947
href: troubleshoot-microsoft-defender-antivirus.yml
939948
- name: Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Advanced technologies at the core of Microsoft Defender Antivirus
33
description: Microsoft Defender Antivirus engines and advanced technologies
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: emmwalshh
5+
ms.author: ewalsh
6+
ms.reviewer: yongrhee
67
manager: deniseb
78
ms.service: defender-endpoint
89
ms.topic: overview

defender-endpoint/amsi-on-mdav.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: "Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus"
33
description: Describes fileless malware and how Microsoft Defender Antivirus uses AMSI to protect against hidden threats.
4-
author: denisebmsft
5-
ms.author: deniseb
4+
author: emmwalshh
5+
ms.author: ewalsh
66
manager: deniseb
77
ms.reviewer: yongrhee
88
ms.date: 12/05/2024

defender-endpoint/analyzer-feedback.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,9 @@ description: Provide feedback on the Microsoft Defender for Endpoint client anal
44
ms.service: defender-endpoint
55
f1.keywords:
66
- NOCSH
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
9+
ms.reviewer: yongrhee
910
ms.localizationpriority: medium
1011
manager: deniseb
1112
audience: ITPro

defender-endpoint/android-whatsnew.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 01/03/2025
18+
ms.date: 01/06/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -40,7 +40,7 @@ Recommendation cards prominently display any active alerts, ensuring you stay in
4040

4141
The following screenshot is an example of what the user sees in their dashboard:
4242

43-
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing what the user sees on the device.":::
43+
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing the user's dashboard in the Microsoft Defender app.":::
4444

4545
**Recommendation cards for alerts**
4646

@@ -59,10 +59,10 @@ The current enterprise dashboard experience now features a tile view for your se
5959

6060
| Tile | Description |
6161
|---|---|
62-
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: | **Network protection** <br/>Your security team can see whether a connection is secured or unsecured. |
63-
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: | **Web protection** <br/>Your security team can see whether web protection is enabled on a user's device. |
64-
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: | **App security** <br/>Your security team can see whether any threats were found in apps installed on a user's device. |
65-
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: | **Global secure access** <br/>Your security team can see current connection status. |
62+
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: | **Network protection** <br/>The user can see whether a connection is secured or unsecured. |
63+
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: | **Web protection** <br/>The user can see whether web protection is enabled on a user's device. |
64+
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: | **App security** <br/>The user can see whether any threats were found in apps installed on a user's device. |
65+
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: | **Global secure access** <br/>The user can see current connection status. |
6666

6767
## Android low-touch onboarding is now GA
6868

@@ -125,7 +125,7 @@ Read the announcement [Tech Community Blog: Defender for Endpoint is now availab
125125

126126
## Privacy controls
127127

128-
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls(MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
128+
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls (MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
129129

130130
## Optional permissions and the ability to disable web protection
131131

0 commit comments

Comments
 (0)