You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-cloudappevents-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,13 +30,13 @@ ms.date: 05/15/2025
30
30
31
31
The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving accounts and objects in Office 365 and other [cloud apps and services](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
32
32
33
-
## Get access
33
+
## Prerequisites
34
34
35
35
To make sure the `CloudAppEvents` data is populated:
36
36
37
37
1. Go to the Defender portal and select **Settings > Cloud apps > App connectors**.
38
38
39
-
1. In the Microsoft 365 connector portal, select the **Pull activities** checkbox.
39
+
1. In the **Select Microsoft 365 components** page, select the **Microsoft 365 activities** checkbox.
40
40
41
41
For detailed instructions, see: [Connect Microsoft 365 to Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-office-365#prerequisites)
The `CloudAuditEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about cloud audit events for various cloud platforms protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
34
34
35
35
> [!IMPORTANT]
36
36
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
37
37
38
+
This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
39
+
38
40
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
The `CloudProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process events in multicloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine as protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
32
34
33
35
> [!IMPORTANT]
34
36
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
35
37
38
+
This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
39
+
40
+
36
41
For information on other tables in the advanced hunting schema, see the [advanced hunting reference](advanced-hunting-schema-tables.md).
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-oauthappinfo-table.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,14 @@ The `OAuthAppInfo` table in the advanced hunting schema contains information abo
34
34
35
35
The `OAuthAppInfo` table might not include all the app or service principal-related properties that are available on Entra ID. It also does not include data related to Microsoft first-party apps or apps without any OAuth consents. The coverage of the table is based on the existing scope of Microsoft 365-connected apps covered by app governance.
36
36
37
+
## Prerequisities
37
38
39
+
This advanced hunting table is populated by app governance records from Microsoft Defender for Cloud Apps. To turn on app governance, follow the steps in [Turn on app governance](/defender-cloud-apps/app-governance-get-started).
40
+
41
+
If your organization hasn’t deployed Microsoft Defender for Cloud Apps in Microsoft Defender XDR or turned on app governance, queries that use the table aren’t going to work or return any results.
42
+
43
+
44
+
## Schema
38
45
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
Copy file name to clipboardExpand all lines: exposure-management/get-started-exposure-management.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,10 @@ On the Exposure Management > **Overview** dashboard, you can review the overall
19
19
20
20
Use the dashboard as a starting point for a snapshot of organizational posture and exposure, and drill down to details as needed.
21
21
22
+
You can filter the list of affected devices based on their scope, ensuring that data presentation is aligned with your specific needs. The filter selection persists even when switching between Exposure Management experiences, allowing you to maintain you preferred view and focus on specific devices without reapplying filters.
23
+
24
+
Initiative scores will reflect the selected scope, whether defined by the admin or adjusted by the end user, ensuring users see accurate and relevant scores based on their access scope.
25
+
22
26
:::image type="content" source="./media/get-started-exposure-management/exposure-management-overview.png" alt-text="Screenshot of the security exposure management overview page." lightbox="./media/get-started-exposure-management/exposure-management-overview.png":::
23
27
24
28
## Connecting your external security and asset management products
Copy file name to clipboardExpand all lines: exposure-management/initiatives.md
+26-11Lines changed: 26 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,13 @@
1
1
---
2
-
title: Review security initiatives in Microsoft Security Exposure Management
3
-
description: Learn how to work with security Initiatives in Microsoft Security Exposure Management.
2
+
title: Review security initiatives in Security Exposure Management
3
+
description: Learn how to effectively manage and track security initiatives using Microsoft Security Exposure Management to improve your organization's security posture.
4
+
#customer intent: As a security administrator, I want to understand and manage security initiatives so that I can improve my organization's security posture.
4
5
ms.author: dlanger
5
6
author: dlanger
6
-
manager: rayne-wiselman
7
-
ms.topic: overview
7
+
manager: ornat-spodek
8
+
ms.topic: how-to
8
9
ms.service: exposure-management
9
-
ms.date: 11/04/2024
10
+
ms.date: 05/04/2025
10
11
---
11
12
12
13
# Review security initiatives
@@ -21,24 +22,37 @@ ms.date: 11/04/2024
21
22
22
23
## View initiatives page
23
24
25
+
The initiatives page provides detailed insights into your security initiatives and their progress.
26
+
27
+
> [!NOTE]
28
+
> All information shown on the Initiative pages that is related to Endpoints data is based on the user's scope. This includes, initiative scores, metrics progress, and history reasoning.
29
+
24
30
1. Navigate to the [Microsoft Defender portal](https://security.microsoft.com/).
25
31
26
-
1. From the Exposure management section on the navigation bar, select **Exposure insights -> Initiatives** to open the [initiatives](https://security.microsoft.com/exposure-initiatives) page.
32
+
2. From the Exposure management section on the navigation bar, select **Exposure insights -> Initiatives** to open the [initiatives](https://security.microsoft.com/exposure-initiatives) page.
27
33
28
34
:::image type="content" source="./media/initiatives/initiatives-window.png" alt-text="Screenshot of the Security Exposure Management Initiatives window.":::
29
35
30
-
1. At the top of the initiatives page, review the highlighted key initiatives by scrolling and drilling down per your needs.
36
+
3. Use the **Filter by device groups** positioned at the top right corner to refine the filter.
37
+
38
+
:::image type="content" source="media/initiatives/filter-by-dg.png" alt-text="Screenshot of device group filter":::
39
+
40
+
4. Choose the device groups relevant for you, and the iniatives data will be recalculated (only when related to Endpoints data).
31
41
32
-
1. To set an initiative to appear in the top initiative bar in the dashboard or on the initiatives page, select the **star** icon in the initiatives window or **Mark as favorite** in the individual initiative.
42
+
:::image type="content" source="media/initiatives/filter-by-dg-pane.png" alt-text="Screenshot of the filter by device groups side pane.":::
33
43
34
-
1. You can review the following information for all initiatives:
44
+
5. At the top of the initiatives page, review the highlighted key initiatives by scrolling and drilling down per your needs.
45
+
46
+
6. To set an initiative to appear in the top initiative bar in the dashboard or on the initiatives page, select the **star** icon in the initiatives window or **Mark as favorite** in the individual initiative.
47
+
48
+
7. You can review the following information for all initiatives:
35
49
-**14 day change trend graph** highlighting how the initiative score changes over the past 14 days
36
50
-**Initiative name**
37
51
-**Favorite** indicator (toggle on/off) to display in the key initiatives banner
38
52
-**Current score** of the initiative
39
53
-**Programs** or workloads contributing to or required by this initiative
40
54
41
-
1. Select an initiative to open the small overview and then select **Open initiative page** to review or remediate issues. The initiative page includes additional information including:
55
+
8. Select an initiative to open the small overview and then select **Open initiative page** to review or remediate issues. The initiative page includes additional information including:
42
56
- Your target score for the initiative
43
57
- A means to set a custom target score appropriate to your organization's needs
44
58
- Description
@@ -67,7 +81,7 @@ The changes in your score provide you with useful feedback about how well you're
67
81
68
82
## Check history
69
83
70
-
1. Select an initiative to open the small overview and then select **Open initiative page-> History** to view changes over time.
84
+
1. Select an initiative to open the small overview and then select **Open initiative page-> History** to view changes over time.
71
85
72
86
1. Browse to the time table to choose a specific time point to examine.
73
87
1. If needed, filter for specific time points.
@@ -81,6 +95,7 @@ The changes in your score provide you with useful feedback about how well you're
81
95
82
96
1. To review metrics associated with your initiative, select **Exposure insights -> Initiatives-> Security metrics**.
83
97
1. Sort by heading, as needed.
98
+
84
99
1. Select **Exposure insights -> Initiatives-> Security recommendations** to view recommendations related to your initiative.
85
100
86
101
You only see those recommendations that are *currently* applied to assets and active in Microsoft Secure Score or Microsoft Defender for Cloud.
0 commit comments