Skip to content

Commit 88c3b94

Browse files
authored
Merge branch 'main' into WI419617-Document-details-for-finding-AD-service-accounts
2 parents a9e9091 + 966140e commit 88c3b94

File tree

13 files changed

+168
-53
lines changed

13 files changed

+168
-53
lines changed

CloudAppSecurityDocs/cloud-discovery-policies.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Discovery policies enable you to set alerts that notify you when new apps are de
4444

4545
> [!NOTE]
4646
>
47-
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it may trigger additional alerts for apps that have already been discovered and alerted on.
48-
> - Data from **snapshot reports** do not trigger alerts in app discovery policies.
47+
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it might trigger additional alerts for apps that have already been discovered and alerted on.
48+
> - Data from **snapshot reports** don't trigger alerts in app discovery policies.
4949
5050
For example, if you're interested in discovering risky hosting apps found in your cloud environment, set your policy as follows:
5151

@@ -73,6 +73,11 @@ Defender for Cloud Apps searches all the logs in your cloud discovery for anomal
7373

7474
1. Under **Apply to** choose whether this policy applies **All continuous reports** or **Specific continuous reports**. Select whether the policy applies to **Users**, **IP addresses**, or both.
7575

76+
:::image type="content" source="media/apply-to-continous-reports.png" alt-text="Screenshot showing how to apply file polcies to specific continous reports" lightbox="media/apply-to-continous-reports.png":::
77+
78+
> [!IMPORTANT]
79+
> When you configure an app discovery policy and select **Apply to > All continuous reports**, multiple alerts are generated for each discovery stream, including the global stream which aggregates data from all sources. To control alert volume, select **Apply to > Specific continuous reports** and choose only the relevant streams for your policy.
80+
> Learn more: [Defender for Cloud apps continuous risk assessment reports](set-up-cloud-discovery.md#snapshot-and-continuous-risk-assessment-reports)
7681
1. Select the dates during which the anomalous activity occurred to trigger the alert under **Raise alerts only for suspicious activities occurring after date.**
7782

7883
1. Set a **Daily alert limit** under **Alerts**. Select if the alert is sent as an email. Then provide email addresses as needed.

CloudAppSecurityDocs/mde-integration.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Integrate Microsoft Defender for Endpoint
33
description: This article describes how to integrate Microsoft Defender for Endpoint with Defender for Cloud Apps for enhanced visibility into Shadow IT and risk management.
4-
ms.date: 06/03/2024
4+
ms.date: 05/12/2025
55
ms.topic: how-to
66
---
77

@@ -18,10 +18,12 @@ This article describes the out-of-the-box integration available between Microsof
1818

1919
- Microsoft Defender for Cloud Apps license
2020

21+
- Devices must be onboarded to [Microsoft Defender for Endpoint](/defender-endpoint/onboard-client)
22+
2123
- One of the following:
2224

2325
- Microsoft Defender for Endpoint with Plan 2
24-
- Microsoft Defender for Business with a premium or standalone license
26+
- Microsoft Defender for Business (standalone or as part of Microsoft 365 Business Premium)
2527

2628
For more information, see [Compare Microsoft endpoint security plans](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2).
2729

61.6 KB
Loading

defender-endpoint/linux-update-mde-linux.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/24/2025
18+
ms.date: 05/12/2025
1919
---
2020

2121
# Schedule an update for Microsoft Defender for Endpoint on Linux
@@ -92,19 +92,19 @@ CRON_TZ=America/Los_Angeles
9292
> #!RHEL and variants (CentOS and Oracle Linux)
9393
>
9494
> ```bash
95-
> 0 6 * * sun [ $(date +%d) -le 15 ] && sudo yum update mdatp -y >> ~/mdatp_cron_job.log
95+
> 0 6 * * sun [ $(date +\%d) -le 15 ] && sudo yum update mdatp -y >> ~/mdatp_cron_job.log
9696
> ```
9797
9898
> #!SLES and variants
9999
>
100100
> ```bash
101-
> 0 6 * * sun [ $(date +%d) -le 15 ] && sudo zypper update mdatp >> ~/mdatp_cron_job.log
101+
> 0 6 * * sun [ $(date +\%d) -le 15 ] && sudo zypper update mdatp >> ~/mdatp_cron_job.log
102102
> ```
103103
104104
> #!Ubuntu and Debian systems
105105
>
106106
> ```bash
107-
> 0 6 * * sun [ $(date +%d) -le 15 ] && sudo apt-get install --only-upgrade mdatp >> ~/mdatp_cron_job.log
107+
> 0 6 * * sun [ $(date +\%d) -le 15 ] && sudo apt-get install --only-upgrade mdatp >> ~/mdatp_cron_job.log
108108
> ```
109109
110110
> [!NOTE]

defender-xdr/automatic-attack-disruption-exclusions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,11 +116,12 @@ To remove an exclusion:
116116

117117
- Device group exclusions can be configured in the **Device groups** tab. Select the device group you want to configure from the list and choose the appropriate exclusion from the flyout pane. Select **Save** to save the exclusion.
118118

119-
## Opt out of automatic attack disruption
119+
### Opting out of automatic attack disruption
120+
121+
Opting out of attack disruption can greatly increase security risk. Consider [excluding specific entities](automatic-attack-disruption-exclusions.md#review-or-change-automated-response-exclusions-for-assets) instead.
120122

121123
If you must opt out of attack disruption, you can do so by opening a support case in the Microsoft Defender portal with the subject *Attack disruption opt-out*. In your request, please specify that you wish to opt out of attack disruption and include a brief explanation about your decision. This feedback helps us improve the feature and better understand customer needs. By opting out, you'll still receive alerts related to attack disruption but no automated actions are taken.
122124

123-
Opting out of attack disruption can greatly increase security risk. Consider [excluding specific entities](automatic-attack-disruption-exclusions.md#review-or-change-automated-response-exclusions-for-assets) instead.
124125

125126
## See also
126127

unified-secops-platform/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,8 @@
9494
href: mto-requirements.md
9595
- name: View and manage incidents and alerts
9696
href: mto-incidents-alerts.md
97+
- name: View and manage cases
98+
href: mto-manage-cases.md
9799
- name: Advanced hunting
98100
href: mto-advanced-hunting.md
99101
- name: Multitenant devices

unified-secops-platform/cases-overview.md

Lines changed: 47 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Manage cases natively in the Microsoft Defender portal
3-
description: Learn about case management features for unified security operations in the Defender portal.
2+
title: Manage security operations cases natively in the Microsoft Defender portal
3+
description: Learn about the case management capabilities in the Defender portal for managing and standardizing unified security operations.
44
search.appverid: met150
55
ms.service: unified-secops-platform
66
ms.author: yelevin
@@ -14,30 +14,43 @@ ms.collection:
1414
- usx-security
1515
ms.topic: conceptual
1616

17-
# customer intent: As a security operations center business decision maker, I want to learn about the case management tools available in the Microsoft Defender portal so I can unify security tickets, increase visibility, and disrupt attacks in real time across identities, endpoints, email, cloud apps, data in hybrid and multicloud environments.
17+
# customer intent: As a business decision maker for a security operations center, I want to learn about the case management tools available in the Microsoft Defender portal so I can unify security tickets and increase visibility across hybrid, multitenant, and multicloud environments, and disrupt attacks on identities, endpoints, email, cloud apps, and data in real time.
1818
---
1919

20-
# Manage cases natively in the Microsoft Defender portal
20+
# Manage security operations cases natively in the Microsoft Defender portal
2121

22-
Case management is the first installment of new unified security operations (SecOps) capabilities for managing security work in the Microsoft Defender portal.
22+
Microsoft Defender case management is a collection of features and capabilities delivering a unified, security-focused case management experience. This experience is designed for managing unified security operations (SecOps) work natively in the Microsoft Defender portal, without the need for third-party tools. SecOps teams maintain security context, work more efficiently, and respond faster to attacks when they manage case work without leaving the Defender portal.
2323

24-
This initial step toward delivering a unified, security-focused case management experience centralizes rich collaboration, customization, evidence collection, and reporting across SecOps workloads. SecOps teams maintain security context, work more efficiently, and respond faster to attacks when they manage case work without leaving the Defender portal.
24+
The current, introductory phase of the case management rollout centralizes rich collaboration, customization, evidence collection, and reporting across SecOps workloads.
2525

2626
<a name="what-is-case-management-preview"></a>
2727

2828
## What is case management?
2929

30-
Case management enables you to manage SecOps cases natively in the Defender portal. Here's the initial set of scenarios and features supported.
30+
Case management enables you to manage SecOps cases natively in the Defender portal. Even in its initial stages, SecOps teams are demonstrating the following use cases for case management:
3131

32-
- Define your own case workflow with custom status values
33-
- Assign tasks to collaborators and configure due dates
34-
- Handle escalations and complex cases by linking multiple incidents to a case
35-
- Manage access to your cases using RBAC
32+
- Responding to security events that span multiple incidents.
33+
34+
- Managing threat hunting.
35+
36+
- Tracking IoCs and threat actors.
37+
38+
- Tracking detection logic that needs tuning.
39+
40+
The following specific capabilities and features support these use cases and scenarios:
41+
42+
- Create and track your SecOps related cases in one place with the new **Cases** page.
43+
- [Define your own case workflow by configuring custom status values](#customize-status).
44+
- [Improve collaboration, quality, and accountability by assigning tasks and due dates](#tasks).
45+
- [Handle escalations and complex cases by linking multiple incidents to a case](#link-incidents).
46+
- [Manage access to your cases using RBAC](#requirements).
47+
- [Add rich-text comments to provide links, tables, and formatting to the activity log (in Preview)](#activity-log).
48+
- [Upload attachments to store files like documents, CSVs, and encrypted zip files containing malware samples (in Preview)](#attachments).
49+
- [Manage cases in multiple tenants via the multitenant management portal (in Preview)](mto-manage-cases.md).
3650

3751
As we build on this foundation of case management, we're prioritizing these additional robust capabilities as we evolve this solution:
3852

3953
- Automation
40-
- Multi-tenant support
4154
- More evidence to add
4255
- Workflow customization
4356
- More Defender portal integrations
@@ -50,8 +63,8 @@ For more information, see [Connect Microsoft Sentinel to the Defender portal](mi
5063

5164
Use Defender XDR unified RBAC or Microsoft Sentinel roles to grant access to case management features.
5265

53-
| Cases feature | Microsoft Defender XDR Unified RBAC | Microsoft Sentinel role |
54-
|---|---|---|
66+
| Cases feature | Microsoft Defender Unified RBAC | Microsoft Sentinel role |
67+
| ------------- | ------------------------------- | ----------------------- |
5568
| View only</br>- case queue</br>- case details</br>- tasks</br>- comments</br>- case audits | Security operations > Security data basics (read)| Microsoft Sentinel Reader |
5669
| Create and Manage</br>- cases and case tasks</br>- assign</br>- update status</br>- link and unlink incidents | Security operations > Alerts (manage) | Microsoft Sentinel Responder |
5770
| Customize case status options | Authorization and setting > Core Security settings (manage)| Microsoft Sentinel Contributor |
@@ -62,27 +75,27 @@ For more information, see [Microsoft Defender XDR Unified role-based access cont
6275

6376
To start using case management, select **Cases** in the Defender portal to access the case queue. Filter, sort, or search your cases to find what you need to focus on.
6477

65-
:::image type="content" source="media/cases-overview/cases-queue-view.png" alt-text="Screenshot of case queue.":::
78+
:::image type="content" source="media/cases-overview/cases-queue-view.png" alt-text="Screenshot of the cases queue in the Defender portal.":::
6679

6780
The maximum allowed per tenant is 100,000 cases.
6881

6982
## Case details
7083

7184
Each case has a page which allows analysts to manage the case and displays important details.
7285

73-
In the following example, a threat hunter is investigating a hypothetical "Burrowing" attack that consists of multiple MITRE ATT&CK techniques and IoCs.
86+
In the following example, a threat hunter is investigating a hypothetical "Burrowing" attack that consists of multiple MITRE ATT&CK&reg; techniques and indicators of compromise (IoCs).
7487

75-
:::image type="content" source="media/cases-overview/case-details.png" alt-text="Screenshot of case details." lightbox="media/cases-overview/case-details-large.png":::
88+
:::image type="content" source="media/cases-overview/case-details.png" alt-text="Screenshot of the case details page in the Defender portal." lightbox="media/cases-overview/case-details-large.png":::
7689

7790
Manage the following case details to describe, prioritize, assign, and track work:
7891

7992
| Displayed case feature | Manage case options | Default value |
8093
|:---|:---|:---|
81-
| Priority| `Very low`, `Low`, `Medium`, `High`, `Critical` | none |
82-
| Status | Set by analysts, customizable by admins | Default statuses are `New`, `Open`, and `Closed`</br>Default value is `New`|
83-
| Assigned to | A single user in the tenant | none |
84-
| Description | Rich text | none |
85-
| Case details | Case ID | Case IDs start at 1000 and aren't purged. Use custom statuses and filters to archive cases. Case numbers are automatically set.|
94+
| **Priority** | `Very low`, `Low`, `Medium`, `High`, `Critical` | none |
95+
| **Status** | Set by analysts, customizable by admins | Default statuses are `New`, `Open`, and `Closed`</br>Default value is `New`|
96+
| **Assigned to** | A single user in the tenant | none |
97+
| **Description** | Plain text | none |
98+
| **Case details** | Case ID | Case IDs start at 1000 and aren't purged. Use custom statuses and filters to archive cases. Case numbers are automatically set.|
8699
| | Created by</br>Created on</br>Last updated by</br>Last updated on | automatically set |
87100
| | Due on</br>Linked incidents | none |
88101

@@ -101,7 +114,8 @@ Following the burrowing attack case creation example, the SOC admins configured
101114
Add tasks to manage granular components of your cases. Each task comes with its own name, status, priority, owner, and due date. With this information, you always know who is accountable to complete which task and by what time. The task description summarizes the work to do and some space for describing the progress. Closing notes provide more context about the outcome of completed tasks.
102115

103116
:::image type="content" source="media/cases-overview/add-task-small.png" alt-text="Screenshot showing the task pane with tasks populated for the case and statuses available." lightbox="media/cases-overview/add-task.png":::
104-
</br>*Image shows the following task statuses available: New, In progress, Failed, Partially completed, Skipped, Completed*
117+
118+
*Image shows the following task statuses available: New, In progress, Failed, Partially completed, Skipped, Completed*
105119

106120
### Link incidents
107121

@@ -123,8 +137,17 @@ Need to write down notes, or that key detection logic to pass along? Create rich
123137

124138
Audit events are automatically added to the activity log of the case and the latest events are shown at the top. Change the filter if you need to focus on comments or audit history.
125139

140+
### Attachments
141+
142+
Share reports, emails, screenshots, log files, and more, all centralized in the **Attachments** tab of a case. Ensure you have all the necessary information to make quick and accurate decisions in your security investigations.
143+
144+
:::image type="content" source="media/cases-overview/case-attachments.png" alt-text="Screenshot of the details of the Attachments tab of a case.":::
145+
146+
To add attachments to your case, go to the **Case details** page, select the **Attachments** tab, select **Upload**, select your file, and wait for the upload to complete. Once uploaded, the file is scanned in the background for malware. When the scan is complete, anyone with access to the case can download the file. If the file you want to upload is actually a malware sample, you can wrap it in a password-protected ZIP file.
147+
126148
## Related content
127149

128150
- [Microsoft Sentinel blog - Improve SecOps collaboration with case management](https://techcommunity.microsoft.com/blog/MicrosoftSentinelBlog/improve-secops-collaboration-with-case-management/4369044)
129-
- [Microsoft Defender Experts for Hunting](/defender-xdr/defender-experts-for-hunting)
130151
- [Microsoft Sentinel in the Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal)
152+
- [View and manage cases across multiple tenants in the Microsoft Defender multitenant portal](mto-manage-cases.md)
153+
- [Microsoft Defender multitenant management](mto-overview.md)
49.1 KB
Loading
121 KB
Loading
39.5 KB
Loading

0 commit comments

Comments
 (0)