Skip to content

Commit 56cbc57

Browse files
authored
Merge branch 'main' into diannegali-phishingtriage
2 parents 645ae1f + 7915f50 commit 56cbc57

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+213
-131
lines changed

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ Microsoft Defender for Cloud Apps collects information from your configured clou
2121
- System settings and policies
2222
- User and group configurations
2323

24+
> [!NOTE]
25+
> The data collected from the various applications is dependent on the customer-provided data from the various applications and may include personal information.
26+
2427
## Data storage location
2528

2629
Defender for Cloud Apps operates in the Microsoft Azure data centers in the following geographical regions:

CloudAppSecurityDocs/mde-govern.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,8 @@ To block an app, do the following steps:
120120
> - Any organizational scoping that was set manually on indicators that were created by Defender for Cloud Apps before the release of this feature will be overridden by Defender for Cloud Apps. The required scoping should be set from the Defender for Cloud Apps experience using the scoped profiles experience.
121121
> - To remove a selected scoping profile from an unsanctioned app, remove the unsanctioned tag and then tag the app again with the required scoped profile.
122122
> - It can take up to two hours for app domains to propagate and be updated in the endpoint devices once they're marked with the relevant tag or/and scoping.
123-
> - When an app is tagged as *Monitored*, the option to apply a scoped profile shows only if the built-in *Win10 Endpoint Users* data source has consistently recieved data during the past 30 days.
123+
> - When an app is tagged as *Monitored*, the option to apply a scoped profile shows only if the built-in *Win10 Endpoint Users* data source has consistently received data during the past 30 days.
124+
> - Device groups in Microsoft Defender for Business(MDB) are managed differently. Due to this- No device groups will appear in MDA device groups for customers with MDB license.
124125
125126
## Educate users when accessing risky apps
126127

CloudAppSecurityDocs/protect-github.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your GitHub Enterprise environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your GitHub Enterprise app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/05/2023
4+
ms.date: 04/27/2025
55
ms.topic: how-to
66
---
77
# How Defender for Cloud Apps helps protect your GitHub Enterprise environment
@@ -85,10 +85,6 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
8585

8686
1. **Create an OAuth App for Defender for Cloud Apps to connect your GitHub organization.** Repeat this step for each additional connected organization.
8787

88-
> [!NOTE]
89-
> If you have [preview features](/microsoft-365/security/defender/preview) and [app governance turned on](app-governance-get-started.md), use the **App governance** page instead of the **OAuth apps** page to perform this procedure.
90-
>
91-
9288
1. Browse to **Settings** > **Developer settings**, select **OAuth Apps**, and then select **Register an application**. Alternatively, if you have existing OAuth apps, select **New OAuth App**.
9389

9490
![Screenshot showing creating an oauth app.](media/connect-github-create-oauth-app.png)
@@ -129,8 +125,8 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
129125

130126
1. Select the **GitHub Profile picture** -> **your enterprises**.
131127
1. Select **your enterprise account** and choose the account you want to connect to Microsoft Defender for Cloud Apps.
132-
1. Confirm that the URL is the enterprise slug. For instance, in this example `https://github.com/enterprises/testEnterprise` *testEnterprise* is the enterprise slug. Enter only the enterprise slug, not the entire URL.
133-
128+
1. Confirm that the URL contains the enterprise slug. For instance, `https://github.com/enterprises/testEnterprise`
129+
2. Enter only the enterprise slug, not the entire URL. In this example, *testEnterprise* is the enterprise slug.
134130
1. Select **Next**.
135131

136132
1. Select **Connect GitHub**.

defender-endpoint/network-protection.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 04/08/2025
6+
ms.date: 04/25/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -40,6 +40,10 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](h
4040
Network protection helps protect devices by preventing connections to malicious or suspicious sites. Examples of dangerous domains are domains that host phishing scams, malicious downloads, tech scams, or other malicious content. Network protection expands the scope of [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(S) traffic that attempts to connect to poor-reputation sources (based on the domain or hostname).
4141

4242
Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for [Web Content Filtering](web-content-filtering.md) (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and nonbrowser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](indicators-overview.md) to block specific domains or host names.
43+
44+
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
45+
46+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2d0270f9-f216-4e9e-85c7-5e2b183c6d73]
4347
4448
### Network protection coverage
4549

@@ -51,9 +55,11 @@ The following table summarizes network protection areas of coverage.
5155
| [Custom Indicators](indicators-overview.md) | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
5256
| [Web Content Filtering](web-content-filtering.md) | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
5357

58+
To ensure that SmartScreen is enabled for Microsoft Edge, use [Edge Policy: SmartScreen Enabled](/deployedge/microsoft-edge-policies#smartscreenenabled).
59+
5460
> [!NOTE]
55-
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
5661
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
62+
> On Mac and Linux, the Microsoft Edge browser only integrates Web Threat Protection. Network protection must be enabled in block mode to support Custom Indicators and Web Content Filtering in Edge and other browsers.
5763
5864
### Known issues & limitations
5965
- IP addresses are supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
@@ -64,11 +70,7 @@ The following table summarizes network protection areas of coverage.
6470
- FQDNs loaded via HTTP2 connection coalescing can only be blocked in Microsoft Edge
6571
- Network Protection will block connections on all ports (not just 80 and 443).
6672

67-
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
68-
69-
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
70-
71-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2d0270f9-f216-4e9e-85c7-5e2b183c6d73]
73+
There might be up to two hours of latency (usually less) between when an indicator/policy is added and a matching URL/IP is blocked.
7274

7375
## Requirements for network protection
7476

@@ -112,7 +114,7 @@ The network protection component of Defender for Endpoint identifies and blocks
112114

113115
#### Network protection: C2 detection and remediation
114116

115-
In its initial form, ransomware is a commodity threat that's preprogrammed and focused on limited, specific outcomes (like encrypting a computer). However, ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on larger scale and more widespread outcomes, like holding an entire organization's assets or data for ransom.
117+
Ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on large scale outcomes, like holding an entire organization's assets or data for ransom.
116118

117119
Support for Command and Control servers (C2) is an important part of this ransomware evolution, and it's what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For more information about C2 detection and remediation, see [Tech Community blog: Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
118120

@@ -155,8 +157,10 @@ A user visits a website. If the url has an unknown or uncertain reputation, a to
155157
> The images shown in this article for both the `warn` experience and `block` experience use "blocked url" as example placeholder text. In a functioning environment, the actual url or domain is listed.
156158
157159
#### Use CSP to enable `Convert warn verdict to block`
160+
By default, SmartScreen verdicts for malicious sites result in a warning that can be overridden by the user. A policy can be set to convert the warning to blocks, preventing such overrides.
158161

159-
[Defender CSP: Configuration/EnableConvertWarnToBlock](/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock)
162+
For non-Edge browsers, see [Defender CSP: Configuration/EnableConvertWarnToBlock](/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock).
163+
For Edge browsers, see [Edge Policy: Prevent SmartScreen Prompt Override](/deployedge/microsoft-edge-policies#preventsmartscreenpromptoverride).
160164

161165
#### Use Group Policy to enable Convert warn verdict to block
162166

@@ -202,7 +206,7 @@ Network protection is enabled per device, which is typically done using your man
202206
> [!NOTE]
203207
> Microsoft Defender Antivirus must be in active mode to enable network protection.
204208
205-
You can enable network protection in `audit` mode or `block` mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in audit mode, and gather data on what would be blocked. Audit mode logs whenever end users connect to an address or site that would otherwise be blocked by network protection. In order for indicators of compromise (IoC) or Web content filtering (WCF) to work, network protection must be in `block` mode.
209+
You can enable network protection in `audit` mode or `block` mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in [audit mode](overview-attack-surface-reduction.md). Audit mode logs whenever end users connect to an address or site that would otherwise be blocked by network protection. To enforce blocking of custom indicators or Web content filtering categories, network protection must be in `block` mode.
206210

207211
For information about network protection for Linux and macOS see the following articles:
208212

@@ -229,7 +233,7 @@ DeviceEvents
229233
:::image type="content" source="media/network-protection-advanced-hunting.png" alt-text="Advanced hunting for auditing and identifying events." lightbox="media/network-protection-advanced-hunting.png":::
230234

231235
> [!TIP]
232-
> These entries have data in the **AdditionalFields** column which gives you great info around the action, if you expand **AdditionalFields** you can also get the fields: **IsAudit**, **ResponseCategory**, and **DisplayName**.
236+
> These entries have data in the **AdditionalFields** column which supplies more info around the action, including the fields: **IsAudit**, **ResponseCategory**, and **DisplayName**.
233237
234238
Here's another example:
235239

@@ -266,21 +270,19 @@ DeviceEvents
266270
267271
```
268272

269-
You can use the resulting list of URLs and IPs to determine what would be blocked if network protection is set to block mode on the device. You can also see which features would block URLs and IPs. Review the list to identify any URLS or IPs that are necessary for your environment. You can then create an allow indicator for those URLs or IP addresses. Allow indicators take precedence over any blocks.
273+
You can use the resulting list of URLs and IPs to determine what would be blocked if network protection is set to block mode on the device. You can also see which features would block URLs and IPs. Review the list to identify any URLS or IPs that are necessary for your environment. You can then create an allow indicator for those URLs or IP addresses. Allow indicators take precedence over any blocks. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
270274

271-
Once you've created an indicator, you can look at resolving the underlying issue as follows:
275+
After creating an indicator to unblock a site, you may attempt to resolve the original block as follows:
272276

273-
- **SmartScreen**: request review
277+
- **SmartScreen**: report false positive, if appropriate
274278
- **Indicator**: modify existing indicator
275279
- **MCA**: review unsanctioned app
276280
- **WCF**: request recategorization
277281

278-
Using this data you can make an informed decision on enabling network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
279-
280282
> [!NOTE]
281-
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit until you can rectify the challenge and you will still receive the auditing events.
283+
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit to receive the auditing events.
282284
283-
For information about how to report false positives see [Report false positives](web-protection-overview.md#report-false-positives).
285+
For information about how to report false positives in SmartScreen data, see [Report false positives](web-protection-overview.md#report-false-positives).
284286

285287
For details on how to create your own Power BI reports, see [Create custom reports using Power BI](api/api-power-bi.md).
286288

@@ -301,9 +303,7 @@ In non-Microsoft Edge processes, Network Protection determines the fully qualifi
301303

302304
Network protection works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into exploit protection events and blocks as part of [alert investigation scenarios](investigate-alerts.md).
303305

304-
When network protection blocks a connection, a notification is displayed from the Action Center. Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your organization's details and contact information.
305-
306-
You can also use [audit mode](overview-attack-surface-reduction.md) to evaluate how network protection would impact your organization if it were enabled.
306+
When network protection blocks a connection, a notification is displayed on the client. Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your organization's details and contact information.
307307

308308
<a name='review-network-protection-events-in-the-microsoft-365-defender-portal'></a>
309309

@@ -315,7 +315,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
315315

316316
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
317317

318-
1. [Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
318+
1. [Create an XML query](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
319319

320320
2. Select **OK**.
321321

@@ -344,7 +344,6 @@ Here's an example of how that works:
344344
Due to the multi-user nature of Windows 10 Enterprise, keep the following points in mind:
345345

346346
- Network protection is a device-wide feature and can't be targeted to specific user sessions.
347-
- Web content filtering policies are also device-wide.
348347
- If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
349348
- Test network protection in audit mode to assess its behavior before rolling out.
350349
- Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.

0 commit comments

Comments
 (0)