Skip to content

Commit 5cb8c9f

Browse files
authored
Merge branch 'main' into WI410649-new-article-identity-security-iniatives
2 parents 16766b6 + d1ae806 commit 5cb8c9f

14 files changed

+54
-52
lines changed

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@ Session policies don't protect external business-to-business (B2B) collaboration
5454
## Session Controls with Non-Interactive Tokens
5555
Some applications utilize non-interactive access tokens to facilitate seamless redirection between apps within the same suite or realm. When one application is onboarded to Conditional Access App Control and the other is not, session controls may not be enforced as expected. For example, if the Teams client retrieves a non-interactive token for SharePoint Online (SPO), it can initiate an active session in SPO without prompting the user for reauthentication. As a result, the session control mechanism cannot intercept or enforce policies on these sessions. To ensure consistent enforcement, it's recommended to onboard all relevant applications, such as Teams, alongside SPO.
5656

57+
## IPv6 limitations
58+
Access and session policies support IPv4 only. If a request is made over IPv6, IP-based policy rules are not applied. This limitation applies when using both reverse proxy and Edge in-browser protection.
59+
5760
## Limitations for sessions that the reverse proxy serves
5861

5962
The following limitations apply only on sessions that the reverse proxy serves. Users of Microsoft Edge can benefit from in-browser protection instead of using the reverse proxy, so these limitations don't affect them.
@@ -98,6 +101,7 @@ The following table lists example results when you define the **Block upload of
98101

99102
The following limitations apply only on sessions that are served with Edge in-browser protection.
100103

104+
101105
### Deep link is lost when user switches to Edge by clicking 'Continue in Edge'
102106

103107
A user who starts a session in a browser other than Edge, is prompted to switch to Edge by clicking the ‘Continue in Edge’ button.

CloudAppSecurityDocs/troubleshooting-proxy-url.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ For example, Contoso protects its environment using conditional access app contr
2020
So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see the DNS entry or certificate because Contoso does.
2121

2222
> [!NOTE]
23-
> You may also see the following domains in the transparency logs:
23+
> You might also see the following domains in the transparency logs:
2424
>
2525
> - `*.admin-rs-mcas.ms`
2626
> - `*.rs-mcas.ms`
@@ -39,11 +39,12 @@ So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see t
3939
> - `*.admin-mcas-gov-df.ms`
4040
> - `*.mcas-gov-df.ms`
4141
42+
4243
## Here's why you see `*.mcas.ms`, `*.mcas-gov.us`, or `*.mcas-gov.ms` in your URL
4344

4445
This kind of URL is expected and indicates that your organization applies extra security controls to protect business-critical data.
4546

46-
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs and cookies relating to cloud apps that you use.
47+
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs, and cookies relating to cloud apps that you use.
4748

4849
So when you try accessing a cloud app such as Salesforce, SharePoint Online, or AWS, you notice that its URL is suffixed with `.mcas.ms`, `.mcas-gov.us`, or `.mcas-gov.ms`. For example, when using the XYZ app, the URL you're used to seeing changes from `XYZ.com` to `XYZ.com.mcas.ms`.
4950

@@ -52,10 +53,11 @@ If the URL doesn't exactly match one of the replacement patterns, such as `<app_
5253
If you don't recognize the remaining portion of the URL, such as **myurl.com**.mcas.ms, as associated with any of your business apps, we recommend that you investigate the issue further and consider blocking the URL to avoid any potential security risks.
5354

5455
> [!NOTE]
55-
> Microsoft Edge users benefit from in-browser protection, and are not redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56+
> Microsoft Edge users benefit from in-browser protection, and aren't redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
5657
5758
## Related content
5859

60+
- [Known limitations in Conditional Access app control](caac-known-issues.md)
5961
- [Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md)
6062
- [Troubleshooting access and session controls for admin users](troubleshooting-proxy.md)
61-
- [Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
63+
- [Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)

defender-xdr/m365d-action-center.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 5/9/2024
11+
ms.date: 4/28/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
@@ -40,11 +40,6 @@ The unified Action center ([https://security.microsoft.com/action-center](https:
4040

4141
:::image type="content" source="/defender/media/m3d-action-center-unified.png" alt-text="The unified Action center in the Microsoft Defender portal." lightbox="/defender/media/m3d-action-center-unified.png":::
4242

43-
For example:
44-
45-
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
46-
- If you were already using the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
47-
4843
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
4944

5045
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
@@ -59,20 +54,20 @@ You can use the unified Action center if you have appropriate permissions and on
5954
You can navigate to the list of actions pending approval in two different ways:
6055

6156
- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or
62-
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.
57+
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage, in the Automated investigation & response card, select **View pending actions**.
6358

6459
## Using the Action center
6560

6661
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
6762

68-
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**.
63+
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card in the homepage, select **View pending actions**.
6964

7065
3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
7166

7267
|Tab|Description|
7368
|---|---|
74-
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
75-
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
69+
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (like Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
70+
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
7671

7772
4. You can customize, sort, filter, and export data in the Action center.
7873

defender-xdr/m365d-autoir-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: View and manage actions in the Action center
3-
description: Use the Action center to view and manage remediation actions
3+
description: Use the Action center in the Microsoft Defender portal to view and manage remediation actions for affected assets.
44
search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
77
- NOCSH
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 11/25/2024
11+
ms.date: 04/28/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:

defender-xdr/m365d-autoir-results.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 08/11/2022
11+
ms.date: 04/28/2025
1212
manager: dansimp
1313
audience: ITPro
1414
ms.collection:
@@ -21,6 +21,7 @@ ms.custom:
2121
ms.reviewer: evaldm, isco
2222
appliesto:
2323
- Microsoft Defender XDR
24+
#customer intent: As a SOC analyst, I want to understand the results and key findings of automated investigation in Microsoft Defender XDR
2425
---
2526

2627
# Details and results of an automated investigation
@@ -29,9 +30,9 @@ appliesto:
2930

3031
With Microsoft Defender XDR, when an [automated investigation](m365d-autoir.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the [necessary permissions](m365d-action-center.md#required-permissions-for-action-center-tasks), you can view those details in an investigation details view that provides you with up-to-date status and the ability to approve any pending actions.
3132

32-
## (NEW) Unified investigation page
33+
## Unified investigation page
3334

34-
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
35+
The investigation page includes information across your devices, email, and collaboration content. The unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
3536

3637
- Any investigation page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview portal</a>
3738
- Any investigation page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))
@@ -42,11 +43,11 @@ The investigation page has recently been updated to include information across y
4243
You can open the investigation details view by using one of the following methods:
4344

4445
- [Select an item in the Action center](#select-an-item-in-the-action-center)
45-
- [Select an investigation from an incident details page](#open-an-investigation-from-an-incident-details-page)
46+
- [Select an investigation from an incident details page](#open-an-investigation-from-an-incident-page)
4647

4748
### Select an item in the Action center
4849

49-
The improved [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
50+
The [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
5051

5152
> [!TIP]
5253
> You must have [certain permissions](m365d-action-center.md#required-permissions-for-action-center-tasks) to approve, reject, or undo actions.
@@ -63,9 +64,9 @@ The improved [Action center](m365d-action-center.md) ([https://security.microsof
6364
- Select **Reject** to prevent a pending action from being taken.
6465
- Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
6566

66-
### Open an investigation from an incident details page
67+
### Open an investigation from an incident page
6768

68-
Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
69+
Use the incident page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
6970

7071
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
7172

@@ -77,17 +78,13 @@ Use an incident details page to view detailed information about an incident, inc
7778

7879
5. Select **Open investigation page**.
7980

80-
Here's an example.
81-
82-
:::image type="content" source="/defender/media/mtp-incidentdetails-tabs.png" alt-text="The investigation page in the Microsoft Defender portal" lightbox="/defender/media/mtp-incidentdetails-tabs.png":::
83-
8481
## Investigation details
8582

8683
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. Here's an example.
8784

8885
:::image type="content" source="/defender/media/mtp-air-investdetails.png" alt-text="The investigation details page in the Microsoft Defender portal" lightbox="/defender/media/mtp-air-investdetails.png":::
8986

90-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
87+
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Mailboxes**, **Devices**, **Users**, **Evidence**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
9188

9289
> [!NOTE]
9390
> The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
@@ -104,7 +101,6 @@ In the Investigation details view, you can see information on the **Investigatio
104101
|**Log** | Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.|
105102
| **Pending actions history** | Lists items that require approval to proceed. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) to approve pending actions. |
106103

107-
108104
## Investigation states
109105

110106
The following table lists investigation states and what they indicate.

defender-xdr/m365d-autoir.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 04/10/2023
11+
ms.date: 04/28/2025
1212
manager: dansimp
1313
audience: ITPro
1414
ms.collection:
@@ -91,11 +91,11 @@ To view investigations, go to the **Incidents** page. Select an incident, and th
9191

9292
## Automated investigation & response card
9393

94-
The new Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This new card visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
94+
The Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage. This card provides visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
9595

9696
:::image type="content" source="/defender/media/automated-investigation-response-card.png" alt-text="Screenshot that shows the automated investigation & response card.":::
9797

98-
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **Approve in Action Center** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
98+
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **View pending actions** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
9999

100100
## Next steps
101101

0 commit comments

Comments
 (0)