Skip to content

Commit 66d391c

Browse files
authored
Merge branch 'main' into mdav-release
2 parents 37f2fce + 1db7f16 commit 66d391c

File tree

202 files changed

+1392
-561
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

202 files changed

+1392
-561
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 76 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -171,6 +170,31 @@
171170
"redirect_url": "/defender-xdr/",
172171
"redirect_document_id": false
173172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
174198
{
175199
"source_path": "defender-xdr/tickets.md",
176200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -181,10 +205,60 @@
181205
"redirect_url": "/defender-xdr/troubleshoot",
182206
"redirect_document_id": false
183207
},
208+
{
209+
"source_path": "defender-xdr/mto-advanced-hunting.md",
210+
"redirect_url": "/unified-secops-platform/mto-advanced-hunting",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path": "defender-xdr/mto-dashboard.md",
215+
"redirect_url": "/unified-secops-platform/mto-dashboard",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path": "defender-xdr/mto-endpoint-security-policy.md",
220+
"redirect_url": "/unified-secops-platform/mto-endpoint-security-policy",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path": "defender-xdr/mto-incidents-alerts.md",
225+
"redirect_url": "/unified-secops-platform/mto-incidents-alerts",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path": "defender-xdr/mto-overview.md",
230+
"redirect_url": "/unified-secops-platform/mto-overview",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path": "defender-xdr/mto-requirements.md",
235+
"redirect_url": "/unified-secops-platform/mto-requirements",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path": "defender-xdr/mto-tenant-devices.md",
240+
"redirect_url": "/unified-secops-platform/mto-tenant-devices",
241+
"redirect_document_id": false
242+
},
243+
{
244+
"source_path": "defender-xdr/mto-tenantgroups.md",
245+
"redirect_url": "/unified-secops-platform/mto-tenantgroups",
246+
"redirect_document_id": false
247+
},
248+
{
249+
"source_path": "defender-xdr/mto-tenants.md",
250+
"redirect_url": "/unified-secops-platform/mto-tenants",
251+
"redirect_document_id": false
252+
},
253+
{
254+
"source_path": "defender-xdr/portals.md",
255+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
256+
"redirect_document_id": false
257+
},
184258
{
185259
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
186260
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
187261
"redirect_document_id": false
188262
}
189263
]
190-
}
264+
}
-43.2 KB
Binary file not shown.

ATPDocs/deploy/active-directory-federation-services.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,6 @@ Configure the SQL server to allow the Directory Service Account with the followi
5555
- *read*
5656
- *select*
5757

58-
> [!NOTE]
59-
> If the AD FS database runs on a dedicated SQL server instead of the local AD FS server, and you're using a group Managed Service Account (gMSA) as the Directory Service Account, make sure that you grant the SQL server the [required permissions](create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password) to retrieve the gMSA's password.
60-
6158
### Grant access to the AD FS database
6259

6360
Grant access to the AD FS database by using SQL Server Management Studio, Transact-SQL (T-SQL), or PowerShell.

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,8 @@ Use the following steps to prepare for deploying Defender for Identity:
5050
1. [Plan your Defender for Identity capacity](capacity-planning.md).
5151

5252
> [!TIP]
53-
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
54-
>
55-
> The link to the *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
53+
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54+
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5655
5756
## Deploy Defender for Identity
5857

@@ -71,12 +70,12 @@ The following procedures help you complete the deployment process:
7170

7271
- [**Enable and configure unified role-based access control (RBAC)**](../role-groups.md) for Defender for Identity.
7372

74-
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities
73+
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities.
7574

7675
- [**Configure remote calls to SAM**](remote-calls-sam.md) as needed. While this step is optional, we recommend that you configure remote calls to SAM-R for lateral movement path detection with Defender for Identity.
7776

7877
> [!TIP]
79-
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, please open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
78+
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
8079
>
8180
8281
> [!IMPORTANT]

ATPDocs/privacy-compliance.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,14 @@ For more information see: [Microsoft Defender for Identity monitored activities]
2222

2323
Defender for Identity operates in the Microsoft Azure data centers in the following locations:
2424

25-
- European Union (West Europe, North Europe)
26-
- United Kingdom (UK South)
27-
- United States (East US, West US, West US2)
28-
- Australia (Australia East)
29-
- Switzerland (Switzerland North)
30-
- Singapore (Southeast Asia)
25+
- Asia (Southeast Asia)
26+
- Australia (Australia East, Australia Southeast)
27+
- Europe (West Europe, North Europe)
3128
- India (Central India, South India)
29+
- North America (East US, West US, West US2)
30+
- Switzerland (Switzerland North, Switzerland West)
31+
- United Kingdom (UK South)
32+
3233

3334
Customer data collected by the service might be stored as follows:
3435

CloudAppSecurityDocs/ops-guide/ops-guide-daily.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Based on the data you review, you might want to create new or adjust app governa
146146

147147
For more information, see:
148148

149-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
149+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
150150
- [View your app details with app governance](../app-governance-visibility-insights-view-apps.md)
151151
- [Create app policies in app governance](../app-governance-app-policies-create.md).
152152

@@ -163,7 +163,7 @@ App governance uses machine learning-based detection algorithms to detect anomal
163163

164164
For more information, see:
165165

166-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
166+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
167167
- [View your app details with app governance](../app-governance-visibility-insights-view-apps.md)
168168
- [Getting detailed information on an app](../app-governance-visibility-insights-view-apps.md#getting-detailed-information-on-an-app)
169169

@@ -199,7 +199,7 @@ By default, there's no access or session policies deployed, and therefore no rel
199199

200200
For more information, see:
201201

202-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
202+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
203203
- [Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](../proxy-intro-aad.md)
204204
- [Block and protect download of sensitive data to unmanaged or risky devices](../best-practices.md#block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices)
205205
- [Secure collaboration with external users by enforcing real-time session controls](../best-practices.md#secure-collaboration-with-external-users-by-enforcing-real-time-session-controls)
@@ -231,7 +231,7 @@ Create app discovery policies to start alerting and tagging newly discovered app
231231
232232
For more information, see:
233233

234-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
234+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
235235
- [Cloud discovery policies](../policies-cloud-discovery.md)
236236
- [Create cloud discovery policies](../cloud-discovery-policies.md)
237237
- [Set up cloud discovery](../set-up-cloud-discovery.md)
@@ -298,7 +298,7 @@ Use the results of these queries to adjust existing file policies or create new
298298

299299
For more information, see:
300300

301-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
301+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
302302
- [Information protection policies](../policies-information-protection.md).
303303

304304
## Related content

CloudAppSecurityDocs/protect-docusign.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ ms.topic: how-to
77

88
# How Defender for Cloud Apps helps protect your DocuSign environment
99

10-
10+
> [!NOTE]
11+
> The DocuSign App Connector requires an active, paid DocuSign and DocuSign Monitor subscription to access and retrieve events.
1112
1213
DocuSign helps organizations manage electronic agreements, and so your DocuSign environment holds sensitive information for your organization. Any abuse of DocuSign by a malicious actor or any human error may expose your most critical assets to potential attacks.
1314

@@ -136,4 +137,4 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
136137
> [!div class="nextstepaction"]
137138
> [Control cloud apps by using policies](control-cloud-apps-with-policies.md)
138139
139-
[!INCLUDE [Open support ticket](includes/support.md)]
140+
[!INCLUDE [Open support ticket](includes/support.md)]

defender-endpoint/TOC.yml

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,8 @@
234234
href: mac-troubleshoot-mode.md
235235
- name: Troubleshoot macOS installation issues
236236
href: mac-support-install.md
237+
- name: Troubleshoot macOS configuration
238+
href: mac-support-configuration.md
237239
- name: Troubleshoot macOS performance issues overview
238240
href: mac-support-perf-overview.md
239241
displayName: Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -259,7 +261,7 @@
259261
items:
260262
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
261263
href: mde-linux-arm.md
262-
- name: Installer script
264+
- name: Installer script based deployment
263265
href: linux-installer-script.md
264266
- name: Ansible based deployment
265267
href: linux-install-with-ansible.md
@@ -1532,17 +1534,21 @@
15321534
- name: Microsoft Security Resources
15331535
items:
15341536
- name: Threat actor naming
1535-
href: /defender-xdr/microsoft-threat-actor-naming
1537+
href: /unified-secops-platform/microsoft-threat-actor-naming
1538+
15361539
- name: Malware names
1537-
href: /defender-xdr/malware-naming
1540+
href: /unified-secops-platform/malware-naming
1541+
15381542
- name: How Microsoft identifies malware and PUA
15391543
href: /defender-xdr/criteria
15401544
- name: Submit files for analysis
1541-
href: /defender-xdr/submission-guide
1545+
href: /unified-secops-platform/submission-guide
1546+
15421547
- name: Troubleshoot MSI portal errors caused by admin block
15431548
href: /defender-xdr/portal-submission-troubleshooting
15441549
- name: Microsoft virus initiative
1545-
href: /defender-xdr/virus-initiative-criteria
1550+
href: /unified-secops-platform/virus-initiative-criteria
1551+
15461552
- name: Software developer FAQ
15471553
href: /defender-xdr/developer-faq
15481554
- name: Malware information

defender-endpoint/address-unwanted-behaviors-mde.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ In this scenario, a legitimate app is blocked from writing to folders that are p
116116

117117
In this scenario, a third-party app that isn't a threat is detected and identified as malicious by Microsoft Defender Antivirus.
118118

119-
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/defender-xdr/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
119+
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/unified-secops-platform/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
120120

121121
### An app is incorrectly detected and identified as malicious by Defender for Endpoint
122122

defender-endpoint/assign-portal-access.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- m365-security
1414
- tier2
1515
ms.topic: conceptual
16-
ms.date: 06/25/2024
16+
ms.date: 01/28/2025
1717
---
1818

1919
# Assign user access
@@ -36,18 +36,22 @@ Defender for Endpoint supports two ways to manage permissions:
3636

3737
- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac.md).
3838

39+
> [!IMPORTANT]
40+
> Starting February 16, 2025, new Microsoft Defender for Endpoint customers will only have access to the Unified Role-Based Access Control (URBAC).
41+
> Existing customers keep their current roles and permissions. For more information, see URBAC [Unified Role-Based Access Control (URBAC) for Microsoft Defender for Endpoint](/defender-xdr/manage-rbac).
42+
3943
## Change from basic permissions to RBAC
4044

41-
If you have already assigned basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
45+
If you have basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
4246

43-
- Users who have full access (users who are assigned either the Global Administrator or Security Administrator directory role in Microsoft Entra ID) are automatically assigned the default Defender for Endpoint administrator role, which also has full access.
47+
- Users who have full access are automatically assigned the default Defender for Endpoint administrator role.
4448
- Other Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC.
4549
- Only users who are assigned the Defender for Endpoint administrator role can manage permissions using RBAC.
46-
- Users who have read-only access (Security Readers) lose access to the portal until they are assigned a role. Only Microsoft Entra user groups can be assigned a role under RBAC.
50+
- Users who have read-only access (Security Readers) lose access to the portal until they're assigned a role. Only Microsoft Entra user groups can be assigned a role under RBAC.
4751
- After switching to RBAC, you can't switch back to using basic permissions management.
4852

4953
> [!IMPORTANT]
50-
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
54+
> Microsoft recommends that you use roles with the fewest permissions as it helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5155
5256
## Related articles
5357

0 commit comments

Comments
 (0)