Skip to content

Commit 6dbc23a

Browse files
authored
Merge branch 'main' into patch-3
2 parents d7f81db + 64f7b5a commit 6dbc23a

File tree

49 files changed

+693
-522
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+693
-522
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

ATPDocs/privacy-compliance.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,13 @@ For more information see: [Microsoft Defender for Identity monitored activities]
2222

2323
Defender for Identity operates in the Microsoft Azure data centers in the following locations:
2424

25-
- European Union
26-
- United Kingdom
27-
- United States
28-
- Australia
29-
- Switzerland
30-
- Singapore
31-
32-
- India
25+
- European Union (West Europe, North Europe)
26+
- United Kingdom (UK South)
27+
- United States (East US, West US, West US2)
28+
- Australia (Australia East)
29+
- Switzerland (Switzerland North)
30+
- Singapore (Southeast Asia)
31+
- India (Central India, South India)
3332

3433
Customer data collected by the service might be stored as follows:
3534

CloudAppSecurityDocs/get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Now the risk scores given to discovered apps are configured precisely according
160160
Some features work best when they're customized to your needs.
161161
Provide a better experience for your users with your own email templates. Decide what notifications you receive and customize your risk score metric to fit your organization's preferences.
162162

163-
## Step 7: Organize the data according to your needs
163+
## Step 6: Organize the data according to your needs
164164

165165
**How to page**: [Working with IP ranges and tags](ip-tags.md)
166166

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,13 @@ Microsoft Entra ID supports both browser-based and non browser-based policies. W
3030

3131
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
3232

33-
Note: The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
34-
Please ensure the CA policy does not restrict access to this application in the **Target resources**.
35-
3633
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
34+
35+
> [!NOTE]
36+
> Microsoft Defender for Cloud Apps utilizes the application **Microsoft Defender for Cloud Apps - Session Controls** as part of the Conditional Access App Control service for user sign-in. This application is located within the 'Enterprise Applications' section of Entra ID.
37+
To protect your SaaS applications with Session Controls, you must allow access to this application.
38+
If you block access to this application through an Entra ID Conditional Access policy, end users won't be able to access the protected applications under session controls. <br>
39+
>
40+
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
41+
>
42+
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.

CloudAppSecurityDocs/ip-tags.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps*
4040

4141
- **Corporate**: These IPs should be all the public IP addresses of your internal network, your branch offices, and your Wi-Fi roaming addresses.
4242

43-
- **Risky**: These IPs should be any IP addresses that you consider risky. They can include suspicious IP addresses you've seen in the past, IP addresses in your competitors' networks, and so on.
43+
- **Risky**: These IPs should be any IP addresses that you consider risky. They can include suspicious IP addresses you've seen in the past, IP addresses in your competitors' networks, and so on. It is suggested to be cautious with applying automatic governance actions only based on risky IP, since there are some cases when IPs that serve malicious actors are also being in use by legitimate employees, hence our recommendation is to examine each case by itself.
4444

4545
- **VPN**: These IPs should be any IP addresses you use for remote workers. By using this category, you can avoid raising [impossible travel](anomaly-detection-policy.md#impossible-travel) alerts when employees connect from their home locations via the corporate VPN.
4646

CloudAppSecurityDocs/policies-threat-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ You must have at least one app connected using [app connectors](enable-instant-v
8888

8989
## Detect and alert when Admin activity is detected on risky IP addresses
9090

91-
Detect admin activities performed from and IP address that is considered a risky IP address, and notify the system admin for further investigation or set a governance action on the admin's account.
91+
Detect admin activities performed from and IP address that is considered a risky IP address, and notify the system admin for further investigation or set a governance action on the admin's account. Learn more [how to work with IP ranges and Risky IP](/defender-cloud-apps/ip-tags).
9292

9393
### Prerequisites
9494

CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ App connector errors can be seen in the app connector dialog after attempting to
4949
> |Get Permissions: NoHttpResponseException: `*******.salesforce.com:443` failed to respond|Salesforce|IP restriction on customer ENV.|In the Salesforce portal, under **Setup** > **Session Settings**, clear the **Lock sessions to the IP address from which they originated** check box.|
5050
> |team_not_authorized|Slack|Slack Discovery API is not enabled.|Contact Slack support and ask to enable Discovery API.|
5151
> |RuntimeException: com.adallom.adalib.httputils.exceptions.HttpRequestFailure: Server returned: 403 Forbidden|ServiceNow|Permissions are incorrect|Follow the process to connect ServiceNow to Defender for Cloud Apps again using an admin account.|
52+
> |Operation you are attempting to perform is not supported by your plan|Smartsheet|The Smartsheet Plan is not correct, an enterprise license with the platinum package is required|Upgrade Smartsheet license.|
5253
> |Get events: {"code":403,"serverResponse"<br />Get users: {"code":403,"serverResponse"<br />…<br />"body":"{"error":"permission denied"}"|Workday|Insufficient permission to access audit logs and/or user endpoints|Verify all permissions are in place. [Learn more](./connect-workday.md#prerequisites)|
5354
> |"code":400,"serverResponse"<br />…<br />body":"{"error":"invalid_grant"}|Workday|Authentication issue|Account used to set up the instance may be locked or disabled. To verify, view the Workday account and select **View Sign-on History**. You may see an authentication failure message in the report specifying that the System Account is disabled. [Learn more](./connect-workday.md#how-to-connect-workday-to-defender-for-cloud-apps-using-oauth)|
5455
> |"code":401,"serverResponse":<br />…<br />body":"{"error":"invalid_client"}"|Workday|Client token validity issue|OAuth 2.0 REST API Client token not valid. The token may have expired, or may be incorrect. Generate another token and assign it to the connected instance. [Learn more](./connect-workday.md#how-to-connect-workday-to-defender-for-cloud-apps-using-oauth)|

defender-endpoint/TOC.yml

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -605,9 +605,6 @@
605605
- name: Manage device group and tags
606606
href: machine-tags.md
607607

608-
- name: Host firewall reporting in Microsoft Defender for Endpoint
609-
href: host-firewall-reporting.md
610-
611608
- name: Tamper resiliency
612609
href: tamper-resiliency.md
613610

@@ -633,8 +630,6 @@
633630
href: attack-surface-reduction-rules-deployment-operationalize.md
634631
- name: Attack surface reduction rules reference
635632
href: attack-surface-reduction-rules-reference.md
636-
- name: Attack surface reduction rules report
637-
href: attack-surface-reduction-rules-report.md
638633
- name: Troubleshoot attack surface reduction rules
639634
href: troubleshoot-asr-rules.md
640635
- name: Enable ASR rules alternate configuration methods
@@ -665,8 +660,6 @@
665660
href: device-control-deploy-manage-gpo.md
666661
- name: Device control frequently asked questions
667662
href: device-control-faq.md
668-
- name: Device control reports
669-
href: device-control-report.md
670663
- name: Exploit protection
671664
items:
672665
- name: Protect devices from exploits
@@ -703,8 +696,6 @@
703696
items:
704697
- name: Web threat protection overview
705698
href: web-threat-protection.md
706-
- name: Monitor web security
707-
href: web-protection-monitoring.md
708699
- name: Respond to web threats
709700
href: web-protection-response.md
710701
- name: Web content filtering
@@ -910,13 +901,6 @@
910901

911902
- name: Diagnostics for Microsoft Defender Antivirus
912903
items:
913-
- name: Device health reports
914-
href: device-health-reports.md
915-
items:
916-
- name: Microsoft Defender Antivirus health report
917-
href: device-health-microsoft-defender-antivirus-health.md
918-
- name: Sensor health and OS report
919-
href: device-health-sensor-health-os.md
920904
- name: Microsoft Defender Core service overview
921905
href: microsoft-defender-core-service-overview.md
922906
- name: Microsoft Defender Core service configurations and experimentation
@@ -1121,14 +1105,27 @@
11211105
items:
11221106
- name: Reports
11231107
items:
1124-
- name: Monthly security summary
1125-
href: monthly-security-summary-report.md
1126-
- name: Create custom reports using Power BI
1127-
href: api/api-power-bi.md
1128-
- name: Threat protection reports
1108+
- name: Microsoft Defender for Endpoint reports
11291109
href: threat-protection-reports.md
1110+
- name: Device health reports
1111+
href: device-health-reports.md
1112+
items:
1113+
- name: Microsoft Defender Antivirus health report
1114+
href: device-health-microsoft-defender-antivirus-health.md
1115+
- name: Sensor health and OS report
1116+
href: device-health-sensor-health-os.md
1117+
- name: Host firewall reporting
1118+
href: host-firewall-reporting.md
1119+
- name: Web protection and monitoring reports
1120+
href: web-protection-monitoring.md
1121+
- name: Device control reports
1122+
href: device-control-report.md
1123+
- name: Attack surface reduction rules report
1124+
href: attack-surface-reduction-rules-report.md
11301125
- name: Aggregated reports
1131-
href: aggregated-reporting.md
1126+
href: aggregated-reporting.md
1127+
- name: Create custom reports using Power BI
1128+
href: api/api-power-bi.md
11321129
- name: Configure integration with other Microsoft solutions
11331130
items:
11341131
- name: Configure conditional access

defender-endpoint/api/export-firmware-hardware-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ GET /api/machines/HardwareFirmwareInventoryExport
162162
> [!NOTE]
163163
>
164164
> - The files are GZIP compressed & in multiline JSON format.
165-
> - The download URLs are valid for 6 hours.
165+
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
166166
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
167167
> - Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
168168
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.

defender-endpoint/api/export-security-baseline-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ GET /api/machines/BaselineComplianceAssessmentExport
167167
> [!NOTE]
168168
>
169169
> - The files are GZIP compressed & in multiline JSON format.
170-
> - The download URLs are valid for 6 hours.
170+
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
171171
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
172172
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
173173

0 commit comments

Comments
 (0)