Skip to content

Commit 644067c

Browse files
authored
Merge pull request #1870 from MicrosoftDocs/main
Publish main to live, Tuesday 10:30 AM PST, 11/12
2 parents 3573239 + 9c6eeaa commit 644067c

17 files changed

+109
-42
lines changed

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Watch this short video to learn more about Attack simulation training.
6565

6666
- There are no corresponding PowerShell cmdlets for Attack simulation training.
6767

68-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, and ZAF.
68+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, TWN and ZAF.
6969

7070
> [!NOTE]
7171
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,10 @@ This article describes how admins can manage entries for email senders in the Mi
5555

5656
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
5757
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
58-
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
58+
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) in the **Exchange admin center** at <https://admin.exchange.microsoft.com> \> **Roles** \> **Admin Roles**:
5959
- *Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
6060
- **Organization Management** or **Security Administrator** (Security admin role).
61-
- **Security Operator** (Tenant AllowBlockList Manager).
61+
- **Security Operator** (Tenant AllowBlockList Manager role)
6262
- *Read-only access to the Tenant Allow/Block List*: Membership in one of the following role groups:
6363
- **Global Reader**
6464
- **Security Reader**

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ For editable functions, more options are available when you select the vertical
4343
- **Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
4444
- **Delete** – deletes the function
4545

46-
### Use arg() operator for Azure Resource Graph queries (Preview)
46+
### Use arg() operator for Azure Resource Graph queries
4747
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
4848

4949
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.

defender-xdr/breadcrumb/toc.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@
99
- name: Microsoft Defender XDR
1010
tocHref: /defender-for-identity/
1111
topicHref: /defender-xdr/index
12+
- name: Microsoft Defender XDR
13+
tocHref: /unified-secops-platform/
14+
topicHref: /defender-xdr/index
1215

1316
## Azure override
1417
- name: 'Microsoft Defender'
@@ -18,4 +21,3 @@
1821
- name: 'Microsoft Defender XDR'
1922
tocHref: /azure/sentinel/
2023
topicHref: /defender-xdr/index
21-

defender-xdr/data-privacy.md

Lines changed: 58 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.topic: conceptual
1919
search.appverid:
2020
- MOE150
2121
- MET150
22-
ms.date: 08/19/2024
22+
ms.date: 11/03/2024
2323
appliesto:
2424
- Microsoft Defender XDR
2525
---
@@ -28,22 +28,66 @@ appliesto:
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

31-
Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, and Switzerland. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
31+
Microsoft Defender XDR integrates with several different Microsoft security services, which collect data using various technologies. Integrated services allow Microsoft Defender XDR to access their data for the purpose of identifying cross-product correlations.
3232

33-
Customer data in pseudonymized form might also be stored in central storage and processing systems in the United States.
33+
## Collected data
3434

35-
The table below shows the general information on the data retention of specific service sources in Defender XDR:
35+
Customer data collected from integrated services includes *processed data*, such as incidents and alerts, and *configuration data*, such as connector settings, rules and so on.
3636

37-
|Product|Default data retention period|More information|
38-
|:---|:---|:---|
39-
|Microsoft Defender for Endpoint|180 days|[Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
40-
|Microsoft Defender for Office 365|Varies according to feature and license|[Defender for Office 365 data retention information](/defender-office-365/mdo-data-retention)|
41-
|Microsoft Defender for Identity|180 days|[Defender for Identity data storage and privacy](/defender-for-identity/privacy-compliance)|
42-
|Microsoft Defender for Cloud Apps|180 days|[Defender for Cloud Apps data storage and privacy](/defender-cloud-apps/cas-compliance-trust)|
43-
|Microsoft Entra|Varies according to feature and license|[Microsoft Entra data storage and privacy](/entra/identity/monitoring-health/reference-reports-data-retention)|
44-
|Microsoft Sentinel|90 days for Basic logs, varies depending on pricing|[Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/)|
37+
## Data storage location
4538

46-
> [!NOTE]
47-
> [Advanced hunting](advanced-hunting-overview.md) lets you query up to 30 days of raw data.
39+
Microsoft Defender XDR operations in Microsoft Azure data centers in the following geographical regions:
40+
41+
- **European Union**: North Europe and West Europe
42+
- **United Kingdom**: UK South and UK West
43+
- **United States**: East US 2 and Central US
44+
- **Australia**: Australia East and Australia Southeast
45+
- **Switzerland**: Switzerland North and Switzerland West
46+
- **India**: Central India and South India
47+
48+
Once created, the Microsoft Defender XDR tenant isn't movable to a different region. Your geographical region is shown in the Microsoft Defender portal, under **Settings > Microsoft Defender XDR > Account**.
49+
50+
Customer data stored by integrated services might also be stored in the following locations:
51+
52+
- The original location for the relevant service.
53+
- A region defined by data storage rules of an integrated service, if Microsoft Defender XDR shares data with that service.
54+
55+
## Data retention
56+
57+
Microsoft Defender XDR data is retained for 180 days, and is visible across the Microsoft Defender portal during that time, except for in **Advanced hunting** queries.
58+
59+
In the Microsoft Defender portal's **Advanced hunting** page, data is accessible via queries for only 30 days, unless it's streamed through [Microsoft's unified security operations platform with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration?toc=%2Fdefender-xdr%2Ftoc.json&bc=%2Fdefender-xdr%2Fbreadcrumb%2Ftoc.json&tabs=defender-portal), where retention periods may be longer.
60+
61+
Data continues to be retained and visible, even when a license is under a grace period or in suspended mode. At the end of any grace period or suspension, and no later than 180 days from a contract termination or expiration, data is deleted from Microsoft's systems and is unrecoverable.
62+
63+
Most Defender services also have a default data retention period of 180 days. More information on data retention period per product is found in [relevant service docs](#related-content).
64+
65+
## Data sharing
66+
67+
Microsoft Defender XDR shares data among the following Microsoft products, also licensed by the customer:
68+
69+
- Microsoft Defender for Cloud
70+
- Microsoft Defender for Identity
71+
- Microsoft Defender for Endpoint
72+
- Microsoft Defender for Cloud Apps
73+
- Microsoft Defender for Office 365
74+
- Microsoft Defender for IoT
75+
- Microsoft Sentinel
76+
- Microsoft Intune
77+
- Microsoft Purview
78+
- Microsoft Entra
79+
- Microsoft Defender Vulnerability Management
80+
- Microsoft Copilot for Security
81+
82+
## Related content
83+
84+
For more information, see:
85+
86+
- [Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)
87+
- [Defender for Office 365 data retention information](/defender-office-365/mdo-data-retention)
88+
- [Defender for Identity data storage and privacy](/defender-for-identity/privacy-compliance)
89+
- [Defender for Cloud Apps data storage and privacy](/defender-cloud-apps/cas-compliance-trust)
90+
- [Microsoft Entra data storage and privacy](/entra/identity/monitoring-health/reference-reports-data-retention)
91+
- [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/)
4892

4993
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/whats-new.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,13 @@ For more information on what's new with other Microsoft Defender security produc
2929

3030
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3131

32+
## November 2024
33+
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
3234

3335
## October 2024
3436

3537
- [Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
36-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries-preview), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
38+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
3739

3840
## September 2024
3941

@@ -337,7 +339,7 @@ The security operations team can view all actions pending approval, and the stip
337339

338340
## June 2021
339341

340-
- (Preview) [View reports per threat tags](threat-analytics.md#view- reports-by-category)
342+
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
341343

342344
Threat tags help you focus on specific threat categories and review the most relevant reports.
343345

exposure-management/exposure-insights-overview.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 08/20/2024
9+
ms.date: 11/04/2024
1010
---
1111

1212
# Overview - Exposure insights
@@ -51,12 +51,12 @@ Security Exposure Management provides initiatives that currently include:
5151
5252
### Initiative elements
5353

54-
**Element** | **Goal** | **Details**
55-
--- | --- | ---
56-
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
57-
**Metric** | Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.| Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.
58-
**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. | All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/> Within initiatives, recommendations are assigned a compliance state.
59-
**Events** | Events help you to monitor initiative changes. | Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.
54+
|**Element** | **Goal** | **Details**|
55+
|--- | --- | ---|
56+
|**Initiative** |Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.|Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/>The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.|
57+
|**Metric** |Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.|Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.|
58+
|**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. |All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/>Within initiatives, recommendations are assigned a compliance state.|
59+
|**Events** |Events help you to monitor initiative changes. |Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.|
6060

6161
## Working with initiatives
6262

@@ -88,6 +88,12 @@ In some cases, metrics display grayed out because the underlying data for the me
8888

8989
Grayed out metrics aren't considered for score calculation.
9090

91+
> [!NOTE]
92+
> The versioning feature in Exposure Management provides proactive notifications to users about upcoming version updates, providing advanced visibility into the expected metric changes and their impact on related initiatives.
93+
> A dedicated side panel offers more details about the update, including the expected date of the change, release notes, and current and new metric values, as well as changes to the related initiatives' scores.
94+
> Users can share feedback about the update directly through the platform.
95+
> The information is dynamic and may vary depending on when it is accessed.
96+
9197
## Working with recommendations
9298

9399
Security Exposure Management ingests security recommendations from multiple sources, including Microsoft Defender for Cloud running the [Defender for Cloud Security Posture Management (CSPM) plan](/azure/defender-for-cloud/concept-cloud-security-posture-management), [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), Microsoft threat analytics, and other Microsoft workloads. Security Exposure Management integrates all of these recommendations into a single security catalog.
@@ -103,7 +109,7 @@ Security Exposure Management categorizes recommendations by compliance status, a
103109
- **Mitigated by organization**: Displays when steps to mitigate recommendations were taken elsewhere, and Security Exposure Management can't know whether recommendations are compliant. For example, by changing a status in Secure score.
104110
- **Not available**: Means there isn't enough information to determine the compliance status.
105111

106-
:::image type="content" source="./media//exposure-insights-overview/recommendation-ransomeware-advanced-protection.png" alt-text="Screenshot of the ransomware advanced protection recommendation details ":::
112+
:::image type="content" source="./media//exposure-insights-overview/recommendation-ransomware-advanced-protection.png" alt-text="Screenshot of the ransomware advanced protection recommendation details ":::
107113

108114
### Secure score
109115

@@ -145,9 +151,9 @@ When you drill down into a specific change, you can see the percentage effects o
145151
- **Metric removed** - The metric is no longer relevant for that specific initiative. For instance, if a better suggestion is introduced or it becomes irrelevant.
146152
- **Metric depreciated** - The metric is removed globally.
147153

148-
Selecting the metric that changed provides more details about the change. For instance, it might display the new weight of a property change, or the number of affected assets before or after the change.
154+
Selecting the metric that changed provides more details about the change. For instance, it might display the new weight of a property change, and the number of affected assets before and after the change. It also offers a dropdown for changes to exposed assets, displaying up to the top 100 assets and indicating whether the asset exposure was added or removed.
149155

150-
:::image type="content" source="media/exposure-insights-overview/initiatives-history-details.png" alt-text="Screenshot of the metric change side panel in the Initiatives history tab." lightbox="media/exposure-insights-overview/initiatives-history-details.png":::
156+
:::image type="content" source="media/exposure-insights-overview/Initiatives-history-updated.png" alt-text="Screenshot of initative history side panel" lightbox="media/exposure-insights-overview/Initiatives-history-updated.png":::
151157

152158
You can't control the metric or score changes in advance.
153159

exposure-management/initiatives.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,9 @@ The changes in your score provide you with useful feedback about how well you're
7777
1. If needed, filter for specific time points.
7878
1. Choose the time point and select to examine the percent effect on the initiative score and the reason for the change.
7979
1. Select a metric to explore the change's effect further, if applicable.
80+
1. Open the **Changes to exposed assets** dropdown to view up to the top 100 changed assets. The status will indicate whether the asset exposure has been added or removed.
8081

81-
:::image type="content" source="media/initiatives/history-details.png" alt-text="Screenshot of the history metric change details side panel.":::
82+
:::image type="content" source="media/exposure-insights-overview/initiatives-history-details-redcued.jpg" alt-text="Screenshot of history side panel" lightbox="media/initiatives/initiatives-history-details.png":::
8283

8384
## Review metrics and recommendations
8485

218 KB
Loading
27.1 KB
Loading

0 commit comments

Comments
 (0)