Skip to content

Commit 85342a7

Browse files
Merge branch 'main' into patch-3
2 parents 341ff86 + d97c663 commit 85342a7

27 files changed

+287
-225
lines changed

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 55 additions & 57 deletions
Large diffs are not rendered by default.

CloudAppSecurityDocs/dcs-inspection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ Microsoft Defender for Cloud Apps enables you to natively use the Microsoft Data
1313
>[!NOTE]
1414
> This feature is currently available in the US, Europe, Australia, India, Canada, Japan, and APAC.
1515
16+
>[!NOTE]
17+
> To enable the Data Classification Service option in File Policies, the "Microsoft 365" App Connector is required.
18+
1619
## Enable content inspection with Data Classification Services
1720

1821
You can set the **Inspection method** to use the **Microsoft Data Classification Service** with no additional configuration required. This option is useful when creating a data leak prevention policy for your files in Microsoft Defender for Cloud Apps.

CloudAppSecurityDocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,13 @@
4444
"ms.service": "defender-for-cloud-apps",
4545
"ms.suite": "ems",
4646
"contributors_to_exclude": [
47-
"beccarobins"
47+
"beccarobins",
48+
"rjagiewich",
49+
"claydetels19",
50+
"garycentric",
51+
"padmagit77",
52+
"aditisrivastava07",
53+
"Ruchika-mittal01"
4854
]
4955
},
5056
"fileMetadata": {},

CloudAppSecurityDocs/network-requirements.md

Lines changed: 7 additions & 7 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Anyone who is interested can contribute to the articles. When you contribute, yo
1010

1111
### Quickly update an article using GitHub.com
1212

13-
Contributors who make infrequent or small updates can edit the file directly on GitHub.com without installing any software. This article shows you how. [This two-minute video](https://www.microsoft.com/videoplayer/embed/RE1XQTG) also covers how to contribute.
13+
Contributors who make infrequent or small updates can edit the file directly on GitHub.com without installing any software. This article shows you how. [This two-minute video](https://learn-video.azurefd.net/vod/player?id=b5167c5a-9c69-499b-99ac-e5467882bc92) also covers how to contribute.
1414

1515
> [!TIP]
1616
> To edit an article, you need to get to it on the GitHub.com backend. If you're already on the GitHub.com page of the article, you're starting at step 4.

defender-business/docfx.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,16 +51,19 @@
5151
"searchScope": ["Microsoft Defender Business"],
5252
"contributors_to_exclude": [
5353
"dstrome",
54-
"shdyas",
54+
"shydas",
5555
"rjagiewich",
56-
"American-Dipper",
56+
"American-Dipper",
5757
"claydetels19",
5858
"jborsecnik",
59-
"v-stchambers",
59+
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
6262
"alekyaj",
63-
"beccarobins"
63+
"beccarobins",
64+
"padmagit77",
65+
"aditisrivastava07",
66+
"Ruchika-mittal01"
6467
]
6568
},
6669
"fileMetadata": {},

defender-endpoint/api/get-assessment-software-vulnerabilities.md

Lines changed: 47 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -94,29 +94,29 @@ GET /api/machines/SoftwareVulnerabilitiesByMachine
9494
9595
<br>
9696

97-
Property (ID)|Data type|Description|Example of a returned value
98-
:---|:---|:---|:---
99-
CveId|String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.|CVE-2020-15992
100-
CvssScore|String|The CVSS score of the CVE.|6.2
101-
DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
102-
DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
103-
DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
104-
ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
105-
FirstSeenTimestamp|String|First time this product CVE was seen on the device.|2020-11-03 10:13:34.8476880
106-
ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!
107-
LastSeenTimestamp|String|Last time the software was reported on the device.|2020-11-03 10:13:34.8476880
108-
OSPlatform|String|Platform of the operating system running on the device. This property indicates specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
109-
RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers
110-
RecommendationReference|String|A reference to the recommendation ID related to this software.|va-_-microsoft-_-silverlight
111-
RecommendedSecurityUpdate (optional)|String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates
112-
RecommendedSecurityUpdateId (optional)|String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961
113-
RegistryPaths|Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MicrosoftSilverlight"]
114-
SecurityUpdateAvailable|Boolean|Indicates whether a security update is available for the software.| Possible values are true or false.
115-
SoftwareName|String|Name of the software product.|Chrome
116-
SoftwareVendor|String|Name of the software vendor.|Google
117-
SoftwareVersion|String|Version number of the software product.|81.0.4044.138
118-
VulnerabilitySeverityLevel|String|Severity level assigned to the security vulnerability based on the CVSS score.|Medium
119-
|
97+
|Property (ID)|Data type|Description|Example of a returned value|
98+
|:---|:---|:---|:---|
99+
|CveId|String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.|CVE-2020-15992|
100+
|CvssScore|Double|The CVSS score of the CVE.|6.2|
101+
|DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1|
102+
|DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com|
103+
|DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]|
104+
|ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit|
105+
|FirstSeenTimestamp|String|First time this product CVE was seen on the device.|2020-11-03 10:13:34.8476880|
106+
|ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!|
107+
|LastSeenTimestamp|String|Last time the software was reported on the device.|2020-11-03 10:13:34.8476880|
108+
|OSPlatform|String|Platform of the operating system running on the device. This property indicates specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11|
109+
|RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers|
110+
|RecommendationReference|String|A reference to the recommendation ID related to this software.|va-_-microsoft-_-silverlight|
111+
|RecommendedSecurityUpdate (optional)|String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates|
112+
|RecommendedSecurityUpdateId (optional)|String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961|
113+
|RegistryPaths|Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MicrosoftSilverlight"]|
114+
|SecurityUpdateAvailable|Boolean|Indicates whether a security update is available for the software.| Possible values are true or false.|
115+
|SoftwareName|String|Name of the software product.|Chrome|
116+
|SoftwareVendor|String|Name of the software vendor.|Google|
117+
|SoftwareVersion|String|Version number of the software product.|81.0.4044.138|
118+
|VulnerabilitySeverityLevel|String|Severity level assigned to the security vulnerability based on the CVSS score.|Medium|
119+
|||||
120120

121121
### 1.6 Examples
122122

@@ -384,30 +384,30 @@ Each returned record contains all the data from the full export software vulnera
384384

385385
****
386386

387-
Property (ID)|Data type|Description|Example of returned value
388-
:---|:---|:---|:---
389-
CveId |String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.|CVE-2020-15992
390-
CvssScore|String|The CVSS score of the CVE.|6.2
391-
DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
392-
DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
393-
DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
394-
EventTimestamp|String|The time this delta event was found.|2021-01-11T11:06:08.291Z
395-
ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
396-
FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.|2020-11-03 10:13:34.8476880
397-
ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!
398-
LastSeenTimestamp|String|Last time the CVE was seen on the device.|2020-11-03 10:13:34.8476880
399-
OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
400-
RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers
401-
RecommendationReference|string|A reference to the recommendation ID related to this software.|va--microsoft--silverlight
402-
RecommendedSecurityUpdate |String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates
403-
RecommendedSecurityUpdateId |String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961
404-
RegistryPaths |Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome"]
405-
SoftwareName|String|Name of the software product.|Chrome
406-
SoftwareVendor|String|Name of the software vendor.|Google
407-
SoftwareVersion|String|Version number of the software product.|81.0.4044.138
408-
Status|String|**New** (for a new vulnerability introduced on a device) (1) **Fixed** (if this vulnerability doesn't exist anymore on the device, which means it was remediated). (2) **Updated** (if a vulnerability on a device changed. The possible changes are: CVSS score, exploitability level, severity level, DiskPaths, RegistryPaths, RecommendedSecurityUpdate). |Fixed
409-
VulnerabilitySeverityLevel|String|Severity level that is assigned to the security vulnerability and is based on the CVSS score.|Medium
410-
|
387+
|Property (ID)|Data type|Description|Example of returned value|
388+
|:---|:---|:---|:---|
389+
|CveId |String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.|CVE-2020-15992|
390+
|CvssScore|Double|The CVSS score of the CVE.|6.2|
391+
|DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1|
392+
|DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com|
393+
|DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]|
394+
|EventTimestamp|String|The time this delta event was found.|2021-01-11T11:06:08.291Z|
395+
|ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit|
396+
|FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.|2020-11-03 10:13:34.8476880|
397+
|ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!|
398+
|LastSeenTimestamp|String|Last time the CVE was seen on the device.|2020-11-03 10:13:34.8476880|
399+
|OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11|
400+
|RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers|
401+
|RecommendationReference|string|A reference to the recommendation ID related to this software.|va--microsoft--silverlight|
402+
|RecommendedSecurityUpdate |String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates|
403+
|RecommendedSecurityUpdateId |String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961|
404+
|RegistryPaths |Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome"]|
405+
|SoftwareName|String|Name of the software product.|Chrome|
406+
|SoftwareVendor|String|Name of the software vendor.|Google|
407+
|SoftwareVersion|String|Version number of the software product.|81.0.4044.138|
408+
|Status|String|**New** (for a new vulnerability introduced on a device) (1) **Fixed** (if this vulnerability doesn't exist anymore on the device, which means it was remediated). (2) **Updated** (if a vulnerability on a device changed. The possible changes are: CVSS score, exploitability level, severity level, DiskPaths, RegistryPaths, RecommendedSecurityUpdate). |Fixed|
409+
|VulnerabilitySeverityLevel|String|Severity level that is assigned to the security vulnerability and is based on the CVSS score.|Medium|
410+
|||||
411411

412412
#### Clarifications
413413

defender-endpoint/docfx.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,17 @@
5353
"dstrome",
5454
"shdyas",
5555
"rjagiewich",
56-
"American-Dipper",
5756
"claydetels19",
57+
"American-Dipper",
5858
"jborsecnik",
5959
"v-stchambers",
60-
"Stacyrch140",
60+
"Stacyrch140",
6161
"garycentric",
6262
"alekyaj",
63-
"beccarobins"
63+
"beccarobins",
64+
"padmagit77",
65+
"aditisrivastava07",
66+
"Ruchika-mittal01"
6467
]
6568
},
6669
"fileMetadata": {},

0 commit comments

Comments
 (0)