You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/prerequisites-sensor-version-3.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,13 +70,13 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
70
70
**Steps to apply the configuration:**
71
71
72
72
1. In the **Microsoft Defender portal**, navigate to: **System > Settings > Microsoft Defender XDR > Asset Rule Management**.
73
-
1. Create a new rule.
73
+
1.Select **Create a new rule**
74
74
75
75

76
76
77
77
3. In the side panel:
78
78
79
-
1.Select a **name**for the rule.
79
+
1.Enter a **Rule name**and **Description**.
80
80
81
81
1. Set **rule conditions** using `Device name`, `Domain`, or `Device tag` to target the desired machines.
82
82
@@ -88,9 +88,15 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
88
88
89
89

90
90
91
-
5.Click**Submit** to save the rule.
91
+
5.Select**Next** to review and finish creating the rule and then select **Submit**.
92
92
93
-
Offboarding a device from this configuration can be done by **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
93
+
### Updating rules
94
+
Offboarding a device from this configuration can be done **only** from **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
95
+
96
+
>[!NOTE]
97
+
> It may take up to 1 hour for changes to be reflected in the portal.
98
+
99
+
Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rules)
Copy file name to clipboardExpand all lines: defender-office-365/detect-and-remediate-outlook-rules-forms-attack.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -269,9 +269,9 @@ Look for the key `EnableUnsafeClientMailRules`:
269
269
270
270
Customers with on-premises Exchange installations should consider blocking older versions of Outlook that don't have patches available. Details on this process can be found in the article [Configure Outlook client blocking](/exchange/configure-outlook-client-blocking-exchange-2013-help).
271
271
272
-
## See also:
272
+
## See also
273
273
274
-
-[Malicious Outlook Rules](https://silentbreaksecurity.com/malicious-outlook-rules/) by SilentBreak Security Post about Rules Vector provides a detailed review of how the Outlook Rules.
274
+
-[Malicious Outlook Rules](https://www.netspi.com/blog/technical/adversary-simulation/malicious-outlook-rules/) by SilentBreak Security Post about Rules Vector provides a detailed review of how the Outlook Rules.
275
275
-[MAPI over HTTP and Mailrule Pwnage](https://sensepost.com/blog/2016/mapi-over-http-and-mailrule-pwnage/) on the Sensepost blog about Mailrule Pwnage discusses a tool called Ruler that lets you exploit mailboxes through Outlook rules.
276
276
-[Outlook forms and shells](https://sensepost.com/blog/2017/outlook-forms-and-shells/) on the Sensepost blog about Forms Threat Vector.
Copy file name to clipboardExpand all lines: unified-secops-platform/microsoft-threat-actor-naming.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,7 +167,7 @@ The following table lists publicly disclosed threat actor names with their origi
167
167
|[Storm-1101](https://www.microsoft.com/en-us/security/blog/2023/03/13/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit/)|Group in development||
|[Storm-1865](https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/)|Group in development||
|[Storm-2246](https://blogs.microsoft.com/on-the-issues/2025/09/16/microsoft-seizes-338-websites-to-disrupt-rapidly-growing-raccoono365-phishing-service/)|Group in development||
183
185
|[Storm-2372](https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/)|Group in development||
0 commit comments