Skip to content

Commit 6e5b7b3

Browse files
authored
Merge branch 'main' into maccruz-queryexp
2 parents 1064188 + 6dff897 commit 6e5b7b3

14 files changed

+72
-79
lines changed

CloudAppSecurityDocs/troubleshooting-cloud-discovery.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshooting cloud discovery errors
33
description: This article provides a list of cloud discovery frequent errors and resolution recommendations for each.
4-
ms.date: 05/15/2024
4+
ms.date: 02/19/2025
55
ms.topic: conceptual
66
---
77
# Troubleshooting cloud discovery errors
@@ -18,7 +18,7 @@ If you integrated Microsoft Defender for Endpoint with Defender for Cloud Apps,
1818

1919
|Issue|Resolution|
2020
|----|----|
21-
|**Defender-managed endpoints** reports do not appear in the list|Make sure the devices you're connecting to are Windows 10 version 1809 or later, and that you waited the necessary two hours that it takes before your data is accessible.|
21+
|**Defender-managed endpoints** reports don't appear in the list|Make sure the devices you're connecting to are Windows 10 version 1809 or later, and that you waited the necessary two hours that it takes before your data is accessible.|
2222
|**Discovery reports are empty** |If the endpoint device is behind a forward proxy, you can send logs from your forward proxy using a log collector|
2323

2424
## Log parsing errors
@@ -39,11 +39,11 @@ You can track the processing of cloud discovery logs using the governance log. T
3939

4040
|Issue|Resolution|
4141
|----|----|
42-
|Couldn't connect to the log collector over FTP| 1. Verify that you're using FTP credentials and not SSH credentials. <br />2. Verify that the FTP client you are using is not set to SFTP. |
42+
|Couldn't connect to the log collector over FTP| 1. Verify that you're using FTP credentials and not SSH credentials. <br />2. Verify that the FTP client you're using isn't set to SFTP (Secure File Transfer Protocol). |
4343
|Failed updating collector configuration | 1. Verify that you entered the latest access token. <br />2. Verify in your firewall that the log collector is allowed to initiate outbound traffic on port 443.|
44-
|Logs sent to the collector do not appear in the portal | 1. Check to see if there are failed parsing tasks in the Governance log. <br /> &nbsp;&nbsp;&nbsp;&nbsp;If so, troubleshoot the error with the Log Parsing error table above.<br /> 2. If not, check the data sources and Log collector configuration in the portal. <br /> &nbsp;&nbsp;&nbsp;&nbsp;a. In the Data source page, verify that the name of data source is **NSS** and that it is configured correctly. <br />&nbsp;&nbsp;&nbsp;&nbsp;b. In the Log collectors page, verify that the data source is linked to the right log collector. <br /> 3. Check the local configuration of the on-premises log collector machine. <br />&nbsp;&nbsp;&nbsp;&nbsp;a. Log in to the log collector over SSH and run the collector_config utility.<br/>&nbsp;&nbsp;&nbsp;&nbsp;b. Confirm that your firewall or proxy is sending logs to the log collector using the protocol you defined (Syslog/TCP, Syslog/UDP or FTP) and that it's sending them to the correct port and directory.<br /> &nbsp;&nbsp;&nbsp;&nbsp;c. Run netstat on the machine and verify that it receives incoming connections from your firewall or proxy <br /> 4. Verify that the log collector is allowed to initiate outbound traffic on port 443. |
45-
|Log collector status: Created | The log collector deployment was not completed. Complete the on-premises deployment steps according to the deployment guide.|
46-
|Log collector status: Disconnected | No data received in the last 24 hours from any of the linked data sources. |
44+
|Logs sent to the collector don't appear in the portal | 1. Check to see if there are failed parsing tasks in the Governance log. <br /> &nbsp;&nbsp;&nbsp;&nbsp;If so, troubleshoot the error with the Log Parsing error table above.<br /> 2. If not, check the data sources and Log collector configuration in the portal. <br /> &nbsp;&nbsp;&nbsp;&nbsp;a. In the Data source page, verify that the name of data source is **NSS** and that it's configured correctly. <br />&nbsp;&nbsp;&nbsp;&nbsp;b. In the Log collectors page, verify that the data source is linked to the right log collector. <br /> 3. Check the local configuration of the on-premises log collector machine. <br />&nbsp;&nbsp;&nbsp;&nbsp;a. Log in to the log collector over SSH and run the collector_config utility.<br/>&nbsp;&nbsp;&nbsp;&nbsp;b. Confirm that your firewall or proxy is sending logs to the log collector using the protocol you defined (Syslog/TCP, Syslog/UDP, or FTP) and that it's sending them to the correct port and directory.<br /> &nbsp;&nbsp;&nbsp;&nbsp;c. Run netstat on the machine and verify that it receives incoming connections from your firewall or proxy <br /> 4. Verify that the log collector is allowed to initiate outbound traffic on port 443. |
45+
|Log collector status: Created | The log collector deployment wasn't completed. Complete the on-premises deployment steps according to the deployment guide.|
46+
|Log collector status: Disconnected | If you see this issue, it means no data has been received in the last 24 hours from any of the linked data sources. Contact Microsoft Defender for Cloud Apps support and provide the log files for investigation. Our team analyzes the logs to identify when the last sync occurred and what caused the disconnection. |
4747
|Failed pulling latest collector image| If you get this error during Docker deployment, it could be that you don't have enough memory on the host. To check this, run this command on the host: `docker pull mcr.microsoft.com/mcas/logcollector`. If it returns this error: `failed to register layer: Error processing tar file(exist status 1): write /opt/jdk/jdk1.8.0_152/src.zip: no space left on device` contact your host machine administrator to provide more space.|
4848

4949
## Discovery dashboard errors

defender-xdr/advanced-hunting-datasecuritybehaviors-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,12 @@ For information on other tables in the advanced hunting schema, [see the advance
4747
|-------------|-----------|-------------|
4848
|`Timestamp` | `datetime` | Date and time when the record was generated or updated |
4949
|`BehaviorId` | `string` | Unique identifier for the behavior |
50-
|`ActionType`| `string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management |
50+
|`ActionType`| `string`|Type of behavior. Refer to the catalog of behaviors detected by Microsoft Purview Insider Risk Management. |
5151
|`StartTime`| `datetime` |Date and time of the first activity related to the behavior|
5252
|`EndTime`| `datetime`| Date and time of the last activity related to the behavior|
5353
|`AttackTechniques`| `string`| MITRE ATT&CK techniques associated with the activity that triggered the behavior. Refer to subtechniques in the insider risk management behavior catalog.|
5454
|`Categories`| `string`| Type of threat indicator or breach activity identified by the behavior|
55-
|`ActivityType`| `enum`| Activity category based on categories in Microsoft Purview Insider Risk Management|
55+
|`ActionCategory`| `enum`| Category of action that triggered the event |
5656
|`Description`| `string`| Description of the behavior|
5757
|`ServiceSource`| `string`| Product or service that identified the behavior|
5858
|`DetectionSource`| `string`| Detection technology or sensor that identified the notable component or activity|

defender-xdr/advanced-hunting-datasecurityevents-table.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ For information on other tables in the advanced hunting schema, [see the advance
5050
|`DlpPolicyMatchInfo`| `string`| Information around the list of data loss prevention (DLP) policies matching this event|
5151
|`DlpPolicyEnforcementMode`| `int`| Indicates the Data Loss Prevention policy that was enforced; value can be: 0 (None), 1 (Audit), 2 (Warn), 3 (Warn and bypass), 4 (Block), 5 (Allow)|
5252
|`DlpPolicyRuleMatchInfo`| `dynamic`| Details of the data loss prevention (DLP) rules that matched with this event; in JSON array format|
53-
|`FileRenameInfo`|`string`| Details of the file (file name and extension) prior to this event|
53+
|`FileRenameInfo`|`string`| Details of the file (file name and extension) before this event|
5454
|`PhysicalAccessPointId`| `string`| Unique identifier for the physical access point|
5555
|`PhysicalAccessPointName`| `string`| Name of the physical access point|
5656
|`PhysicalAccessStatus` |`string`| Status of physical access, whether it succeeded or failed|
@@ -67,7 +67,7 @@ For information on other tables in the advanced hunting schema, [see the advance
6767
|`Department`|`string`| Name of the department that the account user belongs to|
6868
|`SourceCodeInfo`| `string`| Details of the source code repository involved in the event|
6969
|`CcPolicyMatchInfo`| `dynamic` | Details of the Communications Compliance policy matches for this event; in JSON array format |
70-
|`IPAddress`| `string`| IP addresses of the clients on which the activity was performed; can contain multiple Ips if related to Microsoft Defender for Cloud Apps alerts|
70+
|`IPAddress`| `string`| IP addresses of the clients on which the activity was performed; can contain multiple IPs if related to Microsoft Defender for Cloud Apps alerts|
7171
|`Timestamp`| `datetime`| Date and time when the event was recorded|
7272
|`DeviceSourceLocationType`| `int`| Indicates the type of location where the endpoint signals originated from; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
7373
|`DeviceDestinationLocationType`| `int`| Indicates the type of location where the endpoint signals connected to; values can be: 0 (Unknown), 1 (Local), 2 (Remote), 3 (Removable), 4 (Cloud), 5 (File share)|
@@ -82,8 +82,8 @@ For information on other tables in the advanced hunting schema, [see the advance
8282
|`InternetMessageId`|`string` |Public-facing identifier for the email or Teams message that is set by the sending email system |
8383
|`NetworkMessageId`| `guid`| Unique identifier for the email, generated by Microsoft 365 |
8484
|`EmailSubject`| `string`| Subject of the email|
85-
|`ObjectId`| `string` |Unique identifier of the object that the recorded action was applied to, in case of files it includes the extension|
86-
|`ObjectName`| `string`| Name of the object that the recorded action was applied to, in case of files it includes the extension|
85+
|`ObjectId`| `string` |Unique identifier of the object that the recorded action was applied to, in case of files, it includes the extension|
86+
|`ObjectName`| `string`| Name of the object that the recorded action was applied to, in case of files, it includes the extension|
8787
|`ObjectType`| `string`| Type of object, such as a file or a folder, that the recorded action was applied to|
8888
|`ObjectSize`| `int`| Size of the object in bytes|
8989
|`IsHidden`| `bool`| Indicates whether the user has marked the content as hidden (True) or not (False) |
@@ -102,6 +102,7 @@ For information on other tables in the advanced hunting schema, [see the advance
102102
|`Workload`|`string`| The Microsoft 365 service where the event occurred|
103103
|`IrmActionCategory`| `enum`| A unique enumeration value indicating the activity category in Microsoft Purview Insider Risk Management|
104104
|`SequenceCorrelationId`|`string` |Details of the sequence activity|
105+
|`CloudAppAlertId`|`string` | Unique identifier for the alert in Microsoft Defender for Cloud Apps |
105106

106107

107108
## Related articles

defender-xdr/autoad-results.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
1111
ms.date: 06/19/2024
12-
manager: dansimp
12+
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -19,15 +19,14 @@ ms.custom:
1919
- autoir
2020
- admindeeplinkDEFENDER
2121
ms.reviewer: evaldm, isco
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Details and results of an automatic attack disruption action
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
- Microsoft Defender XDR
30-
3130
When an automatic attack disruption triggers in Microsoft Defender XDR, the details about the risk and the containment status of compromised assets are available during and after the process. You can view the details on the incident page, which provides the full details of the attack and the up-to-date status of associated assets.
3231

3332
## Review the incident graph
@@ -58,16 +57,18 @@ You can use specific queries in [advanced hunting](advanced-hunting-overview.md)
5857
Contain actions triggered by attack disruption are found in the [DeviceEvents table](advanced-hunting-deviceevents-table.md) in advanced hunting. Use the following queries to hunt for these specific contain actions:
5958

6059
- Device contain actions:
61-
```Kusto
62-
DeviceEvents
63-
| where ActionType contains "ContainedDevice"
64-
```
60+
61+
```Kusto
62+
DeviceEvents
63+
| where ActionType contains "ContainedDevice"
64+
```
6565

6666
- User contain actions:
67-
```Kusto
68-
DeviceEvents
69-
| where ActionType contains "ContainedUser"
70-
```
67+
68+
```Kusto
69+
DeviceEvents
70+
| where ActionType contains "ContainedUser"
71+
```
7172

7273
### Hunt for disable user account actions
7374

defender-xdr/automatic-attack-disruption.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,28 +7,26 @@ f1.keywords:
77
ms.author: diannegali
88
author: diannegali
99
ms.localizationpriority: medium
10-
manager: dansimp
10+
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
1515
- usx-security
1616
- usx-security
17-
ms.topic: conceptual
17+
ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150
2121
ms.date: 09/11/2024
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Automatic attack disruption in Microsoft Defender XDR
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- Microsoft Defender XDR
31-
3230
Microsoft Defender XDR correlates millions of individual signals to identify active ransomware campaigns or other sophisticated attacks in the environment with high confidence. While an attack is in progress, Defender XDR disrupts the attack by automatically containing compromised assets that the attacker is using through automatic attack disruption.
3331

3432
Automatic attack disruption limits lateral movement early on and reduces the overall impact of an attack, from associated costs to loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online.
@@ -105,7 +103,7 @@ The Defender XDR user experience now includes additional visual cues to ensure v
105103

106104
- A tag titled *Attack Disruption* appears next to affected incidents
107105

108-
1. On the incident page:
106+
2. On the incident page:
109107

110108
- A tag titled *Attack Disruption*
111109
- A yellow banner at the top of the page that highlights the automatic action taken
@@ -121,7 +119,7 @@ For more information, see [view attack disruption details and results](autoad-re
121119

122120
## Next steps
123121

124-
- [Configuring automatic attack disruption in Microsoft Defender XDR](configure-attack-disruption.md)
122+
- [Configure automatic attack disruption](configure-attack-disruption.md)
125123
- [View details and results](autoad-results.md)
126124
- [Get email notifications for response actions](m365d-response-actions-notifications.md)
127125

defender-xdr/configure-deception.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure the deception capability in Microsoft Defender XDR
3-
description: Learn how to create, edit, and delete deception rules in Microsoft Defender XDR.
3+
description: Learn how to create, edit, and delete deception rules in the Microsoft Defender portal.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -12,21 +12,20 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15-
ms.topic: conceptual
15+
ms.topic: how-to
1616
search.appverid:
1717
- MOE150
1818
- MET150
1919
ms.date: 01/12/2024
20+
appliesto:
21+
- Microsoft Defender XDR
22+
#customer intent: As a security analyst, I want to learn how to configure the deception capability so that I can protect my organization from high-impact attacks that use human-operated lateral movement.
2023
---
2124

2225
# Configure the deception capability in Microsoft Defender XDR
2326

2427
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2528

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
3029
> [!NOTE]
3130
> The built-in [deception](deception-overview.md) capability in Microsoft Defender XDR covers all Windows clients onboarded to Microsoft Defender for Endpoint. Learn how to onboard clients to Defender for Endpoint in [Onboard to Microsoft Defender for Endpoint](/defender-endpoint/onboarding).
3231

defender-xdr/custom-detection-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,11 +123,11 @@ With the query in the query editor, select **Create detection rule** and specify
123123

124124
- **Detection name** - Name of the detection rule; should be unique
125125
- **Frequency** -Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
126-
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique.
126+
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
127127
- **Severity** - Potential risk of the component or activity identified by the rule.
128128
- **Category** - Threat component or activity identified by the rule.
129129
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
130-
- **Description** - More information about the component or activity identified by the rule.
130+
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
131131
- **Recommended actions** - Additional actions that responders might take in response to an alert.
132132

133133
#### Rule frequency

0 commit comments

Comments
 (0)