Skip to content

Commit 55a1c3d

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents 9495b81 + e8de3ce commit 55a1c3d

9 files changed

+35
-19
lines changed

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: linux
1616
search.appverid: met150
17-
ms.date: 04/04/2024
17+
ms.date: 05/06/2024
1818
---
1919

2020
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
@@ -521,17 +521,24 @@ For more information, see [New device health reporting for Microsoft Defender an
521521

522522
To ensure that the device is correctly onboarded and reported to the service, run the following detection test:
523523

524-
- Antimalware detections:
524+
- Open a Terminal window and execute the following command to run an antimalware detection test:
525525

526526
```bash
527-
curl -o /tmp/eicar.com.txt https://www.eicar.org/download/eicar.com.txt
527+
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
528528
```
529+
530+
- You can run additional detection tests on zip files using either of the following commands:
529531

530-
If the detection doesn't show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
532+
```bash
533+
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
534+
curl -o /tmp/eicarcom2.zip https://secure.eicar.org/eicarcom2.zip
535+
```
536+
537+
> [!NOTE]
538+
> If the detections do not show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
539+
540+
- Endpoint detection and response (EDR) detections, see [Experience Microsoft Defender for Endpoint through simulated attacks](attack-simulations.md). If the detection doesn't show up, then it could be that we're missing event or alerts in portal. For more information, see [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
531541

532-
- Endpoint detection and response (EDR) detections:
533-
For more information, see [Experience Microsoft Defender for Endpoint through simulated attacks](attack-simulations.md).
534-
If the detection doesn't show up, then it could be that we're missing event or alerts in portal. For more information, see [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
535542
- For more information about unified submissions in Microsoft Defender XDR and the ability to submit **False Positives** and **False Negatives** through the portal, see [Unified submissions in Microsoft Defender XDR now Generally Available! - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770).
536543

537544
## 20. Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux

defender-endpoint/mac-device-control-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Example 1: JAMF using [schema.json](https://github.com/microsoft/mdatp-xplat/tre
6464

6565
:::image type="content" source="media/macos-device-control-jamf-json.png" alt-text="Screenshot that shows how to enable Device Control in Microsoft Defender for Endpoint Data Loss Prevention / Features.":::
6666

67-
Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/mobileconfig/demo.mobileconfig)
67+
Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig)
6868

6969
```xml
7070
<key>dlp</key>

exposure-management/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
1-
- name: Microsoft Security Exposure Management (public preview)
1+
- name: Microsoft Security Exposure Management (preview)
22
href: index.yml
33
expanded: true
44
items:
55
- name: Overview
66
items:
77
- name: What is Microsoft Security Exposure Management?
88
href: microsoft-security-exposure-management.md
9-
- name: Compare secure score and Security Exposure Management
9+
- name: Compare Secure Score and Security Exposure Management
1010
href: compare-secure-score-security-exposure-management.md
1111
- name: Get started
1212
items:
1313
- name: Prerequisites and support
1414
href: prerequisites.md
15-
- name: Start using Microsoft Security Exposure Management
15+
- name: Start using Security Exposure Management
1616
href: get-started-exposure-management.md
1717
- name: Explore cross-workload attack surfaces
1818
items:

exposure-management/classify-critical-assets.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,8 @@ Security Exposure Management is currently in public preview.
2020
## Prerequisites
2121

2222
- Before you start, learn about [critical asset management](critical-asset-management.md) in Security Exposure Management.
23-
- To manage critical assets, you need one of these roles: Global Administrator, Security Administrator, Security Operator, Global Reader, Security Reader.
23+
- [Review required permissions](prerequisites.md#permissions) for working with the critical assets.
24+
2425

2526
## Review critical assets
2627

exposure-management/compare-secure-score-security-exposure-management.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,22 +11,22 @@ ms.date: 03/12/2024
1111

1212
# Compare Microsoft Security Exposure Management with secure score
1313

14-
This article discusses the differences between Microsoft [secure score](/defender-xdr/microsoft-secure-score) and [Microsoft Security Exposure Management](microsoft-security-exposure-management.md).
14+
This article discusses the differences between Microsoft [Secure Score](/defender-xdr/microsoft-secure-score) and [Microsoft Security Exposure Management](microsoft-security-exposure-management.md).
1515

1616
Security Exposure Management is currently in public preview.
1717

1818
[!INCLUDE [prerelease](../includes//prerelease.md)]
1919

2020
## Comparison
2121

22-
**Area** | **Security Exposure Management** | **Secure score**
22+
**Area** | **Security Exposure Management** | **Secure Score**
2323
--- | --- | ---
2424
**Business goal** | Provides a unified view of organizational security posture, and tools for identifying and exploring attack surfaces, and reducing security risk exposure. | Acts as an industry baseline and benchmark to measure organizational security posture.
25-
**Recommendations** | Includes secure score recommendations, and recommendations from other sources, such as Microsoft Defender for Cloud. | Recommendations focus mostly on posture assessment of Microsoft Defender products.
25+
**Recommendations** | Includes Secure Score recommendations, and recommendations from other sources, such as Microsoft Defender for Cloud. | Recommendations focus mostly on posture assessment of Microsoft Defender products.
2626
**Recommendation measurements** | Views adherence to recommendations from a compliance/non-compliance perspective. | Measures recommendations in terms of points achieved out of a total number of points, and whether points regress or are gained based on specific actions.
2727
**Metrics** | Gathers recommendations for similar assets together into metrics. </br></br>Metrics enable you to quickly gauge exposure levels for groups of similar assets. | Uses security control metrics.
2828
**Initiatives** | Metrics are gathered into predefined initiatives. For instance, the ransomware initiative gathers and defines multiple metrics/recommendations related to ransomware risk. | Not available.
29-
**Additional tools** | Security insights help you to manage security exposure, and tools such as the enterprise exposure graph and the attack surface map enable you to query, review, analyze, and visualize cross-organizational attack surfaces.</br></br> Security Exposure Management also generates and provides visibility into potential attack paths across the organization. | Secure score metrics only.
29+
**Additional tools** | Security insights help you to manage security exposure. Tools such as the enterprise exposure graph and the attack surface map enable you to query, review, analyze, and visualize cross-organizational attack surfaces.</br></br> Security Exposure Management also generates and provides visibility into potential attack paths across the organization. | Secure Score metrics only.
3030

3131
## Next steps
3232

exposure-management/enterprise-exposure-map.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,11 @@ Security Exposure Management is currently in public preview.
1717

1818
[!INCLUDE [prerelease](../includes//prerelease.md)]
1919

20+
## Prerequisites
21+
22+
- [Read about](cross-workload-attack-surfaces.md) attack surface management.
23+
- [Review required permissions](prerequisites.md#permissions) for working with the graph.
24+
2025
## Access the map
2126

2227
1. In the device inventory, select a device.
@@ -35,7 +40,7 @@ The exposure map gives you visibility into asset connections.
3540
- **Hovering**: Hover over nodes and edges to get additional information.
3641
- **Explore assets and their edges**. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
3742
- **Asset details**: To view details, select the asset icon.
38-
- **Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the Graph view when selecting an individual [attack path](review-attack-paths.md).
43+
- **Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md).
3944
- **Search**: Helps you to discover items by node type. By selecting **all results**, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.
4045

4146

exposure-management/microsoft-security-exposure-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 03/11/2024
1212

1313
# What is Microsoft Security Exposure Management?
1414

15-
Microsoft Security Exposure Management is a security solution that provides a unified view of security posture across company assets and workloads. Security Exposure Management enriches asset information with security context that helps you to manage attack surfaces, protect critical assets, and explore and mitigate exposure risk.
15+
Microsoft Security Exposure Management is a security solution that provides a unified view of security posture across company assets and workloads. Security Exposure Management enriches asset information with security context that helps you to proactively manage attack surfaces, protect critical assets, and explore and mitigate exposure risk.
1616

1717
Security Exposure Management is currently in public preview.
1818

exposure-management/query-enterprise-exposure-graph.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,10 @@ Security Exposure Management is currently in public preview.
1919

2020
[!INCLUDE [prerelease](../includes//prerelease.md)]
2121

22+
## Prerequisites
2223

24+
- [Read about](cross-workload-attack-surfaces.md) attack surface management.
25+
- [Review required permissions](prerequisites.md#permissions) for working with the graph.
2326

2427
## Build advanced hunting queries
2528

exposure-management/review-attack-paths.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Security Exposure Management is currently in public preview.
2020
## Prerequisites
2121

2222
- [Read about attack paths](work-attack-paths-overview.md) before you start.
23-
- [Review prerequisites and permissions](prerequisites.md) for working with Security Exposure Management.
23+
-- [Review required permissions](prerequisites.md#permissions) for working with attack paths.
2424
- The value of attack paths increases based on the data used as a source. If no data is available or the data doesn't reflect your organization's environment, attack paths might not appear. Attack paths might not be fully representative:
2525
- If you don't have licenses defined for workloads integrated and represented in the attack path.
2626
- If you don't fully define critical assets.

0 commit comments

Comments
 (0)