Skip to content

Commit 77c1d0d

Browse files
Merge pull request #3080 from MicrosoftDocs/main
Publish main to live, 03/10/25, 10:30 AM PT
2 parents f1ba4fe + 9ab0fad commit 77c1d0d

13 files changed

+110
-131
lines changed

ATPDocs/role-groups.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ Users that are already [Global Administrators](/entra/identity/role-based-access
1515

1616
For other users, enable and use Microsoft 365 role-based access control (RBAC) to create custom roles and to support more Entra ID roles such as Security operator or Security Reader by default to manage access to Defender for Identity.
1717

18+
> [!IMPORTANT]
19+
>Starting March 2, 2025, new Microsoft Defender for Identity tenants can only configure permissions through Microsoft Defender XDR [Unified Role-Based Access Control (RBAC)](/defender-xdr/manage-rbac). Tenants with roles assigned or exported before this date will retain their current configuration.
20+
1821
When creating your custom roles, make sure that you apply the permissions listed in the following table:
1922

2023
|Defender for Identity access level | Minimum required Microsoft 365 unified RBAC permissions |
@@ -41,15 +44,17 @@ The following table details the specific permissions required for Defender for I
4144
| ------------------- | ---------------------- |
4245
| **Onboard Defender for Identity** (create workspace) | [Security Administrator](/entra/identity/role-based-access-control/permissions-reference) |
4346
| **Configure Defender for Identity settings** | One of the following Microsoft Entra roles:<br>- [Security Administrator](/entra/identity/role-based-access-control/permissions-reference)<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference)<br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read`<br/>- `Authorization and settings/Security settings/All permissions`<br/>- `Authorization and settings/System settings/Read`<br/>- `Authorization and settings/System settings/All permissions` |
44-
|**View Defender for Identity settings** | One of the following Microsoft Entra roles:<br>- [Global Reader](/entra/identity/role-based-access-control/permissions-reference)<br>- [Security Reader](/entra/identity/role-based-access-control/permissions-reference) <br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read` <br/>- `Authorization and settings/System settings/Read`|
47+
|**View Defender for Identity settings** | Microsoft Entra roles:<br>- [Security Reader](/entra/identity/role-based-access-control/permissions-reference) <br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read` <br/>- `Authorization and settings/System settings/Read`|
4548
|**Manage Defender for Identity security alerts and activities** | One of the following Microsoft Entra roles:<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference)<br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Security operations/Security data/Alerts (Manage)`<br/>- `Security operations/Security data /Security data basics (Read)` |
4649
| **View Defender for Identity security assessments** <br> (now part of Microsoft Secure Score) | [Permissions](/microsoft-365/security/defender/microsoft-secure-score#required-permissions) to access Microsoft Secure Score <br> **And** <br> The following [Unified RBAC permissions](#unified-role-based-access-control-rbac): `Security operations/Security data /Security data basics (Read)`|
4750
|**View the Assets / Identities page**|[Permissions](/defender-cloud-apps/manage-admins) to access Defender for Cloud Apps <br> **Or** <br> One of the Microsoft Entra roles required by [Microsoft Defender XDR](/microsoft-365/security/defender/m365d-permissions) |
4851
|**Perform Defender for Identity response actions** |A [custom role](/microsoft-365/security/defender/create-custom-rbac-roles) defined with permissions for **Response (manage)**<br> **Or** <br> One of the following Microsoft Entra roles:<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference) |
4952

50-
5153
## Defender for Identity security groups
5254

55+
> [!IMPORTANT]
56+
> Starting March 2, Defender for Identity will no longer create Microsoft Entra ID security groups. Tenants can still configure the same permissions through Microsoft Defender XDR [Unified Role-Based Access Control (RBAC)](/defender-xdr/manage-rbac)
57+
5358
Defender for Identity provides the following security groups to help manage access to Defender for Identity resources:
5459

5560
- **Azure ATP *(workspace name)* Administrators**

CloudAppSecurityDocs/app-governance-get-started.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,17 @@ Before you start, verify that you satisfy the following prerequisites:
1818
- Microsoft Defender for Cloud Apps must be present in your account as either a standalone product or as part of the various [license](#licensing) packages.
1919

2020
If you aren't already a Defender for Cloud Apps customer, you can [sign up for a free trial](https://www.microsoft.com/security/business/cloud-apps-defender).
21-
21+
2222
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
2323

2424

2525
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden, or United Arab Emirates.
2626

27+
> [!IMPORTANT]
28+
> Connect to Microsoft 365 connector to get visibility into activities and specific resources accessed by OAuth apps in the Microsoft Defender XDR advanced hunting blade. This will enhance your ability to investigate and respond to certain threat detection policy alerts generated by app governance.
29+
>
30+
> Learn how to [connect to the Microsoft 365 connector](/defender-cloud-apps/protect-office-365).
31+
2732
## Turn on app governance
2833

2934
If your organization satisfies the [prerequisites](#prerequisites), go to [Microsoft Defender XDR > Settings > Cloud Apps > App governance](https://security.microsoft.com/cloudapps/settings) and select **Use app governance**. For example:

CloudAppSecurityDocs/release-notes.md

Lines changed: 0 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -19,69 +19,6 @@ For more information on what's new with other Microsoft Defender security produc
1919

2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

22-
## February 2025
23-
24-
### Enhanced Visibility into OAuth Apps Connected to Microsoft 365 - General Availability
25-
26-
Defender for Cloud Apps users who use app governance will be able to gain visibility into the origin of OAuth apps connected to Microsoft 365. You can filter and monitor apps that have external origins, to proactively review such apps and improve the security posture of the organization.
27-
28-
The new *Permissions filter and export capabilities allow you to quickly identify apps with specific permissions to access Microsoft 365.
29-
30-
You can now get granular insights into data accessed by apps using legacy EWS API alongside Microsoft Graph. The enhanced coverage of data usage insights enable you to get deeper visibility into apps accessing emails using legacy EWS API.
31-
32-
We're also expanding the coverage of privilege level feature for all popular Microsoft first-party API permissions. The enhanced coverage of privilege level classification enables you to view and monitor apps with powerful permissions into legacy and other non-Graph APIs that have access to Microsoft 365.
33-
34-
For more information, see [detailed insights into OAuth apps](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
35-
36-
### Enhanced alert source accuracy
37-
38-
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
39-
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
40-
41-
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
42-
43-
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0&preserve-view=true)
44-
45-
### Network requirement updates
46-
47-
Microsoft Defender for Cloud Apps has improved its security and performance. Network information in firewalls and additional third-party services must be updated to comply with the new standards. To ensure uninterrupted access to our portals and services you must apply these changes by March 27, 2025.
48-
49-
New CDN domains have been added and must be included in firewall rules to allow outbound traffic on port 443:
50-
- cdn.cloudappsecurity.com
51-
- cdn-discovery.cloudappsecurity.com
52-
53-
To connect to third-party apps and enable Defender for Cloud Apps, use the following IP addresses:
54-
55-
|Data center|IP addresses|DNS name|
56-
|----|----|----|
57-
|US1|13.64.26.88, 13.64.29.32, 13.80.125.22, 13.91.91.243, 40.74.1.235, 40.74.6.204, 51.143.58.207, 52.137.89.147, 52.183.75.62, 23.101.201.123, 20.228.186.154|\*.us.portal.cloudappsecurity.com|
58-
|US2|13.80.125.22, 20.36.222.59, 20.36.222.60, 40.74.1.235, 40.74.6.204, 51.143.58.207, 52.137.89.147, 52.183.75.62, 52.184.165.82, 20.15.114.156, 172.202.90.196|\*.us2.portal.cloudappsecurity.com|
59-
|US3|13.80.125.22, 40.74.1.235, 40.74.6.204, 40.90.218.196, 40.90.218.198, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.3.226.231, 4.255.218.227|*.us3.portal.cloudappsecurity.com|
60-
|EU1|13.80.125.22, 40.74.1.235, 40.74.6.204, 40.119.154.72, 51.143.58.207, 52.137.89.147, 52.157.238.58, 52.174.56.180, 52.183.75.62, 20.71.203.39, 137.116.224.49|\*.eu.portal.cloudappsecurity.com|
61-
|EU2|13.80.125.22, 40.74.1.235, 40.74.6.204, 40.81.156.154, 40.81.156.156, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.0.210.84, 20.90.9.64|*.eu2.portal.cloudappsecurity.com|
62-
|Gov US1|13.72.19.4, 52.227.143.223|*.us1.portal.cloudappsecurity.us|
63-
|GCC| 52.227.23.181, 52.227.180.126| *.us1.portal.cloudappsecuritygov.com |
64-
65-
66-
For **US Government GCC High** customers:
67-
68-
||IP addresses|DNS name|
69-
|----|----|----|
70-
|**Session controls**|US Gov Arizona: 52.244.144.65, 52.244.43.90, 52.244.43.225, 52.244.215.117, 52.235.134.195, 52.126.54.167, 52.126.55.65 <br /><br />US Gov Virginia: 13.72.27.223, 13.72.27.219, 13.72.27.220, 13.72.27.222, 20.141.230.137, 52.235.179.167, 52.235.184.112|\*.mcas-gov.us<br/>\*.admin-mcas-gov.us|
71-
|**Access controls**|US Gov Arizona: 52.244.215.83, 52.244.212.197, 52.127.2.97, 52.126.54.254, 52.126.55.65 <br /><br />US Gov Virginia: 13.72.27.216, 13.72.27.215, 52.127.50.130, 52.235.179.123, 52.245.252.18, 52.245.252.131, 52.245.252.191, 52.245.253.12, 52.245.253.58, 52.245.253.229, 52.245.254.39, 52.245.254.51, 52.245.254.212, 52.245.254.245, 52.235.184.112, 52.235.184.112|\*.access.mcas-gov.us<br/>\*.access.cloudappsecurity.us|
72-
|**SAML proxy**|US Gov Arizona: 20.140.49.129, 52.126.55.65<br /><br />US Gov Virginia: 52.227.216.80, 52.235.184.112|\*.saml.cloudappsecurity.us|
73-
74-
For **US Government GCC** customers:
75-
76-
||IP addresses|DNS name|
77-
|----|----|----|
78-
|**Session controls**|US Gov Arizona: 52.235.147.86, 52.126.49.55, 52.126.48.233 <br /><br /> US Gov Virginia: 52.245.225.0, 52.245.224.229, 52.245.224.234, 52.245.224.228, 20.141.230.215, 52.227.10.254, 52.126.48.233, 52.227.3.207 | \*.mcas-gov.ms<br/>\*.admin-mcas-gov.ms|
79-
|**Access controls** |US Gov Arizona: 52.127.2.97, 52.235.143.220, 52.126.48.233 <br /><br />US Gov Virginia: 52.245.224.235, 52.245.224.227, 52.127.50.130, 52.245.222.168, 52.245.222.172, 52.245.222.180, 52.245.222.209, 52.245.223.38, 52.245.223.72, 52.245.223.177, 52.245.223.181, 52.245.223.182, 52.245.223.190, 23.97.12.140, 52.227.3.207 | \*.access.mcas-gov.ms|
80-
|**SAML proxy** |US Gov Arizona: 52.126.48.233 <br /> US Gov Virginia: 52.227.216.80, 52.126.48.233, 52.227.3.207 | \*.saml.cloudappsecuritygov.com|
81-
82-
To stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Cloud Apps services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
83-
84-
8522
## November 2024
8623

8724
### Internal Session Controls application notice

defender-endpoint/attack-surface-reduction-rules-deployment-operationalize.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,17 @@ ms.localizationpriority: medium
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
10-
ms.reviewer: sugamar
10+
ms.reviewer: sugamar, yongrhee
1111
manager: deniseb
1212
ms.custom: asr
1313
ms.topic: conceptual
1414
ms.collection:
15-
- m365-security
16-
- m365solution-asr-rules
17-
- highpri
18-
- tier1
19-
- mde-asr
20-
ms.date: 08/29/2023
15+
- m365-security
16+
- m365solution-asr-rules
17+
- highpri
18+
- tier1
19+
- mde-asr
20+
ms.date: 03/10/2025
2121
search.appverid: met150
2222
---
2323

defender-endpoint/attack-surface-reduction-rules-deployment-plan.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,17 @@ ms.localizationpriority: medium
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
10-
ms.reviewer: sugamar
10+
ms.reviewer: sugamar, yongrhee
1111
manager: deniseb
1212
ms.custom: asr
1313
ms.topic: conceptual
1414
ms.collection:
15-
- m365-security
16-
- m365solution-asr-rules
17-
- highpri
18-
- tier1
19-
- mde-asr
20-
ms.date: 12/18/2022
15+
- m365-security
16+
- m365solution-asr-rules
17+
- highpri
18+
- tier1
19+
- mde-asr
20+
ms.date: 03/10/2025
2121
search.appverid: met150
2222
---
2323

0 commit comments

Comments
 (0)