You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some applications utilize non-interactive access tokens to facilitate seamless redirection between apps within the same suite or realm. When one application is onboarded to Conditional Access App Control and the other is not, session controls may not be enforced as expected. For example, if the Teams client retrieves a non-interactive token for SharePoint Online (SPO), it can initiate an active session in SPO without prompting the user for reauthentication. As a result, the session control mechanism cannot intercept or enforce policies on these sessions. To ensure consistent enforcement, it's recommended to onboard all relevant applications, such as Teams, alongside SPO.
56
56
57
+
## IPv6 limitations
58
+
Access and session policies support IPv4 only. If a request is made over IPv6, IP-based policy rules are not applied. This limitation applies when using both reverse proxy and Edge in-browser protection.
59
+
57
60
## Limitations for sessions that the reverse proxy serves
58
61
59
62
The following limitations apply only on sessions that the reverse proxy serves. Users of Microsoft Edge can benefit from in-browser protection instead of using the reverse proxy, so these limitations don't affect them.
@@ -98,6 +101,7 @@ The following table lists example results when you define the **Block upload of
98
101
99
102
The following limitations apply only on sessions that are served with Edge in-browser protection.
100
103
104
+
101
105
### Deep link is lost when user switches to Edge by clicking 'Continue in Edge'
102
106
103
107
A user who starts a session in a browser other than Edge, is prompted to switch to Edge by clicking the ‘Continue in Edge’ button.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/troubleshooting-proxy-url.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ For example, Contoso protects its environment using conditional access app contr
20
20
So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see the DNS entry or certificate because Contoso does.
21
21
22
22
> [!NOTE]
23
-
> You may also see the following domains in the transparency logs:
23
+
> You might also see the following domains in the transparency logs:
24
24
>
25
25
> -`*.admin-rs-mcas.ms`
26
26
> -`*.rs-mcas.ms`
@@ -39,11 +39,12 @@ So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see t
39
39
> -`*.admin-mcas-gov-df.ms`
40
40
> -`*.mcas-gov-df.ms`
41
41
42
+
42
43
## Here's why you see `*.mcas.ms`, `*.mcas-gov.us`, or `*.mcas-gov.ms` in your URL
43
44
44
45
This kind of URL is expected and indicates that your organization applies extra security controls to protect business-critical data.
45
46
46
-
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs and cookies relating to cloud apps that you use.
47
+
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs, and cookies relating to cloud apps that you use.
47
48
48
49
So when you try accessing a cloud app such as Salesforce, SharePoint Online, or AWS, you notice that its URL is suffixed with `.mcas.ms`, `.mcas-gov.us`, or `.mcas-gov.ms`. For example, when using the XYZ app, the URL you're used to seeing changes from `XYZ.com` to `XYZ.com.mcas.ms`.
49
50
@@ -52,10 +53,11 @@ If the URL doesn't exactly match one of the replacement patterns, such as `<app_
52
53
If you don't recognize the remaining portion of the URL, such as **myurl.com**.mcas.ms, as associated with any of your business apps, we recommend that you investigate the issue further and consider blocking the URL to avoid any potential security risks.
53
54
54
55
> [!NOTE]
55
-
> Microsoft Edge users benefit from in-browser protection, and are not redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56
+
> Microsoft Edge users benefit from in-browser protection, and aren't redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56
57
57
58
## Related content
58
59
60
+
-[Known limitations in Conditional Access app control](caac-known-issues.md)
59
61
-[Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md)
60
62
-[Troubleshooting access and session controls for admin users](troubleshooting-proxy.md)
61
-
-[Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
63
+
-[Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
Copy file name to clipboardExpand all lines: defender-xdr/m365d-action-center.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 5/9/2024
11
+
ms.date: 4/28/2025
12
12
manager: deniseb
13
13
audience: ITPro
14
14
ms.collection:
@@ -40,11 +40,6 @@ The unified Action center ([https://security.microsoft.com/action-center](https:
40
40
41
41
:::image type="content" source="/defender/media/m3d-action-center-unified.png" alt-text="The unified Action center in the Microsoft Defender portal." lightbox="/defender/media/m3d-action-center-unified.png":::
42
42
43
-
For example:
44
-
45
-
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
46
-
- If you were already using the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
47
-
48
43
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
49
44
50
45
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
@@ -59,20 +54,20 @@ You can use the unified Action center if you have appropriate permissions and on
59
54
You can navigate to the list of actions pending approval in two different ways:
60
55
61
56
- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or
62
-
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.
57
+
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage, in the Automated investigation & response card, select **View pending actions**.
63
58
64
59
## Using the Action center
65
60
66
61
1. Go to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a> and sign in.
67
62
68
-
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**.
63
+
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card in the homepage, select **View pending actions**.
69
64
70
65
3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
71
66
72
67
|Tab|Description|
73
68
|---|---|
74
-
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
75
-
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
69
+
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (like Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
70
+
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
76
71
77
72
4. You can customize, sort, filter, and export data in the Action center.
Copy file name to clipboardExpand all lines: defender-xdr/m365d-autoir-results.md
+9-13Lines changed: 9 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 08/11/2022
11
+
ms.date: 04/28/2025
12
12
manager: dansimp
13
13
audience: ITPro
14
14
ms.collection:
@@ -21,6 +21,7 @@ ms.custom:
21
21
ms.reviewer: evaldm, isco
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
+
#customer intent: As a SOC analyst, I want to understand the results and key findings of automated investigation in Microsoft Defender XDR
24
25
---
25
26
26
27
# Details and results of an automated investigation
@@ -29,9 +30,9 @@ appliesto:
29
30
30
31
With Microsoft Defender XDR, when an [automated investigation](m365d-autoir.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the [necessary permissions](m365d-action-center.md#required-permissions-for-action-center-tasks), you can view those details in an investigation details view that provides you with up-to-date status and the ability to approve any pending actions.
31
32
32
-
## (NEW) Unified investigation page
33
+
## Unified investigation page
33
34
34
-
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
35
+
The investigation page includes information across your devices, email, and collaboration content. The unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). To access the unified investigation page, select the link in the yellow banner you'll see on:
35
36
36
37
- Any investigation page in the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077149"target="_blank">Microsoft Purview portal</a>
37
38
- Any investigation page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))
@@ -42,11 +43,11 @@ The investigation page has recently been updated to include information across y
42
43
You can open the investigation details view by using one of the following methods:
43
44
44
45
-[Select an item in the Action center](#select-an-item-in-the-action-center)
45
-
-[Select an investigation from an incident details page](#open-an-investigation-from-an-incident-details-page)
46
+
-[Select an investigation from an incident details page](#open-an-investigation-from-an-incident-page)
46
47
47
48
### Select an item in the Action center
48
49
49
-
The improved [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
50
+
The [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
50
51
51
52
> [!TIP]
52
53
> You must have [certain permissions](m365d-action-center.md#required-permissions-for-action-center-tasks) to approve, reject, or undo actions.
@@ -63,9 +64,9 @@ The improved [Action center](m365d-action-center.md) ([https://security.microsof
63
64
- Select **Reject** to prevent a pending action from being taken.
64
65
- Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
65
66
66
-
### Open an investigation from an incident details page
67
+
### Open an investigation from an incident page
67
68
68
-
Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
69
+
Use the incident page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
69
70
70
71
1. Go to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a> and sign in.
71
72
@@ -77,17 +78,13 @@ Use an incident details page to view detailed information about an incident, inc
77
78
78
79
5. Select **Open investigation page**.
79
80
80
-
Here's an example.
81
-
82
-
:::image type="content" source="/defender/media/mtp-incidentdetails-tabs.png" alt-text="The investigation page in the Microsoft Defender portal" lightbox="/defender/media/mtp-incidentdetails-tabs.png":::
83
-
84
81
## Investigation details
85
82
86
83
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. Here's an example.
87
84
88
85
:::image type="content" source="/defender/media/mtp-air-investdetails.png" alt-text="The investigation details page in the Microsoft Defender portal" lightbox="/defender/media/mtp-air-investdetails.png":::
89
86
90
-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
87
+
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Mailboxes**, **Devices**, **Users**, **Evidence**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
91
88
92
89
> [!NOTE]
93
90
> The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
@@ -104,7 +101,6 @@ In the Investigation details view, you can see information on the **Investigatio
104
101
|**Log**| Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.|
105
102
|**Pending actions history**| Lists items that require approval to proceed. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) to approve pending actions. |
106
103
107
-
108
104
## Investigation states
109
105
110
106
The following table lists investigation states and what they indicate.
Copy file name to clipboardExpand all lines: defender-xdr/m365d-autoir.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
ms.localizationpriority: medium
11
-
ms.date: 04/10/2023
11
+
ms.date: 04/28/2025
12
12
manager: dansimp
13
13
audience: ITPro
14
14
ms.collection:
@@ -91,11 +91,11 @@ To view investigations, go to the **Incidents** page. Select an incident, and th
91
91
92
92
## Automated investigation & response card
93
93
94
-
The new Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This new card visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
94
+
The Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage. This card provides visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
95
95
96
96
:::image type="content" source="/defender/media/automated-investigation-response-card.png" alt-text="Screenshot that shows the automated investigation & response card.":::
97
97
98
-
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **Approve in Action Center** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
98
+
Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **View pending actions** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
0 commit comments