Skip to content

Commit 7d0e5b4

Browse files
authored
Merge pull request #3433 from MicrosoftDocs/main
Published main to live, Wednesday 5:00 PM IST, 04/09
2 parents 374aaa1 + 325f86a commit 7d0e5b4

12 files changed

+66
-53
lines changed

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 1 addition & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Defender for Cloud Apps also provides you with **Suggested queries**. Suggested
135135
- Successful log in - Filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
136136

137137
![query activities.](media/queries-activity.png)
138-
138+
139139
Additionally, you can use the suggested queries as a starting point for a new query. First, select one of the suggested queries. Then, make changes as needed and finally select **Save as** to create a new **Saved query**.
140140

141141
### Query activities six months back
@@ -184,37 +184,6 @@ Reports that include private activities are marked with an Eye icon in the repor
184184

185185
![eye-icon](media/activity-filters-queries/eye-icon-to-indicate-private-report.png)
186186

187-
> [!NOTE]
188-
>Exporting and viewing activity data up to six months back is restricted to specific roles with elevated permissions.
189-
190-
The following roles are supported:
191-
192-
- `INVITED_ADMIN`
193-
194-
- `GLOBAL_ADMINISTRATOR`
195-
196-
- `SECURITY_ADMINISTRATOR`
197-
198-
- `MCAS_ADMINISTRATOR`
199-
200-
- `DISCOVERY_ADMIN`
201-
202-
- `SECURITY_OPERATOR`
203-
204-
- `COMPLIANCE_ADMIN`
205-
206-
- `SECURITY_READER`
207-
208-
- `GLOBAL_READER`
209-
210-
- `URBAC_ROLES_GLOBAL_ADMINISTRATOR`
211-
212-
- `URBAC_ROLES_COMPLIANCE_ADMINISTRATOR`
213-
214-
- `URBAC_ROLES_SECURITY_READER`
215-
216-
- `URBAC_ROLES_SECURITY_OPERATOR`
217-
218187
## Next steps
219188

220189
> [!div class="nextstepaction"]

CloudAppSecurityDocs/attack-paths.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,6 @@ ms.date: 03/23/2025
1010
[Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) helps you to manage your company's attack surface and exposure risk effectively. By combining assets and techniques, [attack paths](/security-exposure-management/review-attack-paths) illustrate the end-to-end paths that attackers can use to move from an entry point within your organization to your critical assets.
1111
Microsoft Defender for Cloud Apps observed an increase in attackers using OAuth applications to access sensitive data in business-critical applications like Microsoft Teams, SharePoint, Outlook, and more. To support investigation and mitigation, these applications are integrated into the attack path and attack surface map views in Microsoft Security Exposure Management.
1212

13-
### Critical Asset Management - Service Principals
14-
15-
Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth permissions. OAuth applications with these permissions are considered high-value assets. If compromised, an attacker can gain high privileges to SaaS applications. To reflect this risk, attack paths treat service principals with these permissions as target goals.
1613

1714
### Prerequisites
1815

@@ -44,21 +41,26 @@ Alternatively, you can use one of the following **Entra ID roles**:
4441
>[!NOTE]
4542
> Currently available in commercial cloud environments only. Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High, DoD, and China Gov.
4643
47-
## View permissions for critical assets
44+
### Critical Asset Management - Service Principals
45+
46+
Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth permissions. OAuth applications with these permissions are considered high-value assets. If compromised, an attacker can gain high privileges to SaaS applications. To reflect this risk, attack paths treat service principals with these permissions as target goals.
47+
48+
#### View permissions for critical assets
4849

4950
To view the full list of permissions, go to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Settings > Microsoft Defender XDR > Rules > Critical asset management.
5051

5152
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Defender XDR portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
5253

53-
> [!NOTE]
54-
> OAuth apps appear in the attack path surface map only when specific conditions are detected.
55-
> For example, an OAuth app may appear in the attack path only if a vulnerable component with an easily exploitable entry point is detected that allows lateral movement to service principals with high privileges.
5654

5755
## Investigation user flow: View attack paths involving OAuth applications
5856

5957
Once you understand which permissions represent high-value targets, use the following steps to investigate how these applications appear in your environment’s attack paths.
6058
For smaller organizations with a manageable number of attack paths, we recommend following this structured approach to investigate each attack path:
6159

60+
> [!NOTE]
61+
> OAuth apps show in the attack path surface map only when specific conditions are detected.
62+
> For example, an OAuth app might appear in the attack path if a vulnerable component with an easily exploitable entry point is detected. This entry point allows lateral movement to service principals with high privileges.
63+
6264
1. Go to Exposure Management > Attack surface > Attack paths.
6365

6466
1. Filter by 'Target type: AAD Service principal'

defender-endpoint/respond-machine-alerts.md

Lines changed: 41 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: diannegali
66
author: diannegali
77
ms.localizationpriority: medium
8-
ms.date: 03/12/2025
8+
ms.date: 04/09/2025
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -291,7 +291,7 @@ Once devices are contained, we recommend investigating and remediating the threa
291291

292292
3. On the contain device popup, type a comment, and select **Confirm**.
293293

294-
:::image type="content" alt-text="Screenshot of the contain device menu item." source="/defender/media/defender-endpoint/contain_device_popup.png" lightbox="/defender/media/defender-endpoint/contain_device_popup.png":::
294+
:::image type="content" alt-text="Screenshot of the contain device menu item." source="/defender/media/defender-endpoint/contain_device_popup.png" lightbox="/defender/media/defender-endpoint/contain_device_popup.png":::
295295

296296
> [!IMPORTANT]
297297
> Containing a large number of devices might cause performance issues on Defender for Endpoint-onboarded devices. To prevent any issues, Microsoft recommends containing up to 100 devices at any given time.
@@ -307,19 +307,53 @@ A device can also be contained from the device page by selecting **Contain devic
307307
308308
> [!IMPORTANT]
309309
>
310-
> - If a contained device changes its IP address, then all Microsoft Defender for Endpoint onboarded devices will recognize this and start blocking communications with the new IP address. The original IP address will no longer be blocked (It may take up to 5 mins to see these changes).
311-
> - In cases where the contained device's IP is used by another device on the network, there will be a warning while containing the device, with a link to advanced hunting (with a pre-populated query). This will provide visibility to the other devices using the same IP to help you make a conscious decision if you'd like to continue with containing the device.
312-
> - In cases where the contained device is a network device, a warning will appear with a message that this may cause network connectivity issues (for example, containing a router that is acting as a default gateway). At this point, you'll be able to choose whether to contain the device or not.
310+
> - If a contained device changes its IP address, all Microsoft Defender for Endpoint onboarded devices recognize this and start blocking communications with the new IP address. The original IP address is no longer be blocked (It may take up to 5 minutes to see these changes).
311+
> - In cases where the contained device's IP is used by another device on the network, a warning while containing the device with a link to advanced hunting (with a pre-populated query) is displayed. This provides visibility to other devices using the same IP to help you make a conscious decision if you'd like to continue containing the device.
312+
> - In cases where the contained device is a network device, a warning appears with a message that containment can cause network connectivity issues (for example, containing a router that is acting as a default gateway). At this point, you're able to choose whether to contain the device or not.
313313
314314
After you contain a device, if the behavior isn't as expected, verify the Base Filtering Engine (BFE) service is enabled on the Defender for Endpoint onboarded devices.
315315

316316
### Stop containing a device
317317

318-
You'll be able to stop containing a device at any time.
318+
You're be able to stop containing a device at any time.
319319

320320
1. Select the device from the **Device inventory** or open the device page.
321321

322-
2. Select **Release from containment** from the action menu. This action will restore this device's connection to the network.
322+
2. Select **Release from containment** from the action menu. This action restores the device's connection to the network.
323+
324+
### Contain IP addresses of undiscovered devices
325+
326+
> [!IMPORTANT]
327+
> Some information in this article relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
328+
329+
Defender for Endpoint can also contain IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint. The capability to contain an IP address prevents attackers from spreading attacks to other non-compromised devices. Containing an IP address results in Defender for Endpoint-onboarded devices blocking incoming and outgoing communication with devices using the contained IP address
330+
331+
> [!NOTE]
332+
> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Defender for Endpoint Windows 10, Windows 2012 R2, Windows 2016, and Windows Server 2019+ devices.
333+
334+
Containing an IP address associated with undiscovered devices or devices not onboarded to Defender for Endpoint is done automatically through [automatic attack disruption](/defender-xdr/automatic-attack-disruption). The Contain IP policy automatically blocks a malicious IP address when Defender for Endpoint detects the IP address to be associated with an undiscovered device or a device not onboarded.
335+
336+
A message indicating that the action is applied appears on the applicable incident, device, or IP page. Here’s an example.
337+
338+
:::image type="content" source="/defender/media/defender-endpoint/contain-ip-attack-disrupt-small.png" alt-text="Highlighting a contained IP address in the incident graph." lightbox="/defender/media/defender-endpoint/contain-ip-attack-disrupt.png":::
339+
340+
After an IP address is contained, you can view the action in the History view of the Action Center. You can see when the action occurred and identify the IP addresses that were contained.
341+
342+
:::image type="content" source="/defender/media/defender-endpoint/contain-ip-action-center-small.png" alt-text="View the contained IP address in the Action center." lightbox="/defender/media/defender-endpoint/contain-ip-action-center.png":::
343+
344+
If a contained IP address is part of an incident, an indicator is present on the [incident graph](/defender-xdr/investigate-incidents#attack-story) and on the incident's [evidence and response](/defender-xdr/investigate-incidents#evidence-and-response) tab. Here’s an example.
345+
346+
:::image type="content" source="/defender/media/defender-endpoint/contain-ip-evidence-small.png" alt-text="Highlighting a contained IP address in the Evidence and response tab of an incident." lightbox="/defender/media/defender-endpoint/contain-ip-evidence.png":::
347+
348+
You can stop an IP address' containment at any time. To stop containment, select the **Contain IP** action in the **Action Center**. In the flyout, select **Undo**. This action restores the IP address’ connection to the network.
349+
350+
### Containing critical assets
351+
352+
When a critical asset is compromised and used to spread threats within an organization, stopping the spread can be challenging because these assets must continue to function to avoid productivity loss. Defender for Endpoint addresses this by granularly containing the critical asset, preventing the spread of the attack while ensuring the asset remains operational for business continuity.
353+
354+
Through automatic attack disruption, Defender for Endpoint incriminates a malicious device, identifies the role of the device to apply a matching policy to automatically contain a critical asset. The granular containment is done by blocking only specific ports and communication directions.
355+
356+
You can identify critical assets by the **critical asset** tag on the device or IP page. Device containment currently supports critical asset types like domain controllers, DNS servers, and DHCP servers.
323357

324358
## Contain user from the network
325359

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,10 @@ For more information on what's new with other Microsoft Defender security produc
4646
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4747
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4848

49+
## April 2025
50+
51+
- (Preview) **Contain IP addresses of undiscovered devices**: Containing IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint is now in preview. Containing an IP address prevents attackers from spreading attacks to other non-compromised devices. See [Contain IP addresses of undiscovered devices](respond-machine-alerts.md#contain-ip-addresses-of-undiscovered-devices) for more information.
52+
4953
## February 2025
5054

5155
- (GA) **Aggregated reporting in Microsoft Defender for Endpoint** is now generally available. For more information, see [Aggregated reporting in Microsoft Defender for Endpoint](aggregated-reporting.md).

defender-xdr/automatic-attack-disruption.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 09/11/2024
21+
ms.date: 02/20/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
---
@@ -61,15 +61,16 @@ Investigations are integral to monitoring our signals and the attack threat land
6161

6262
Automatic attack disruption uses Microsoft-based XDR response actions. Examples of these actions are:
6363

64-
- [Device contain](/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.
64+
- [Device contain](/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.
65+
- In addition, Defender for Endpoint automatically contains malicious IP addresses associated with undiscovered/not onboarded devices to block any lateral movement and encryption activity to other Defender for Endpoint-onboarded/discovered devices. It does this through its **[Contain IP](/defender-endpoint/respond-machine-alerts#contain-ip-addresses-of-undiscovered-devices)** (Preview) policy. Moreover, [compromised critical assets' IP addresses are also automatically contained](/defender-endpoint/respond-machine-alerts#containing-critical-assets) with specific blocking mechanisms to stop the spread of an attack while avoiding productivity loss.
6566

6667
- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The disable user action behaves differently depending on how the user is hosted in your environment.
6768
- When the user account is hosted in Active Directory: Defender for Identity triggers the disable user action on domain controllers running the Defender for Identity agent.
6869
- When the user account is hosted in Active Directory and is synced on Microsoft Entra ID: Defender for Identity triggers the disable user action via onboarded domain controllers. Attack disruption also disables the user account on the Entra ID synced account.
69-
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disables the user account on the Entra ID synced account.
70-
71-
> [!NOTE]
72-
> Disabling the user account in Microsoft Entra ID is not dependent on the deployment of Microsoft Defender for Identity.
70+
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disable the user account on the Entra ID synced account.
71+
72+
> [!NOTE]
73+
> Disabling the user account in Microsoft Entra ID is not dependent on the deployment of Microsoft Defender for Identity.
7374
7475
- [Contain user](/defender-endpoint/respond-machine-alerts#contain-user-from-the-network) - based on Microsoft Defender for Endpoint's capability, this response action automatically contains suspicious identities temporarily to help block any lateral movement and remote encryption related to incoming communication with Defender for Endpoint's onboarded devices.
7576

@@ -123,5 +124,4 @@ For more information, see [view attack disruption details and results](autoad-re
123124
- [View details and results](autoad-results.md)
124125
- [Get email notifications for response actions](m365d-response-actions-notifications.md)
125126

126-
127127
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,11 @@ You can also get product updates and important notifications through the [messag
3434

3535

3636
## April 2025
37+
38+
- (Preview) **Contain IP addresses of undiscovered devices**: Containing IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint is now in preview. Containing an IP address prevents attackers from spreading attacks to other non-compromised devices. See [Contain IP addresses of undiscovered devices](automatic-attack-disruption.md#automated-response-actions) for more information.
39+
3740
- (Preview) The [OAuthAppInfo](advanced-hunting-oauthappinfo-table.md) table is now available for preview in advanced hunting. The table contains information about Microsoft 365-connected OAuth applications registered with Microsoft Entra ID and available in the Defender for Cloud Apps app governance capability.
41+
3842
- The `OnboardingStatus` and `NetworkAdapterDnsSuffix` columns are now available in the [`DeviceNetworkInfo`](advanced-hunting-devicenetworkinfo-table.md) table in advanced hunting.
3943

4044

31.9 KB
Loading
78.7 KB
Loading
163 KB
Loading
356 KB
Loading

0 commit comments

Comments
 (0)