Skip to content

Commit 88c9cb2

Browse files
authored
Merge branch 'main' into mde-sap
2 parents 63efa0c + 3800902 commit 88c9cb2

13 files changed

+79
-23
lines changed

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.localizationpriority: medium
1616
ms.topic: troubleshooting
17-
ms.date: 05/02/2025
17+
ms.date: 05/20/2025
1818
---
1919

2020
# Vulnerability support in Microsoft Defender Vulnerability Management
@@ -33,6 +33,12 @@ This article provides information on inaccuracies that have been reported. You c
3333
3434
The following tables present the relevant vulnerability information organized by month.
3535

36+
## May 2025
37+
38+
| Inaccuracy report ID | Description | Fix date |
39+
|---|---|---|
40+
| 92212 | Fixed inaccuracy in NetData vulnerabilities- CVE-2019-9834, CVE-2023-22496, CVE-2023-22497 & CVE-2024-32019 | 18-May-25 |
41+
3642
## April 2025
3743

3844
| Inaccuracy report ID | Description | Fix date |
@@ -44,9 +50,13 @@ The following tables present the relevant vulnerability information organized by
4450
| 92184 | Fixed inaccurate detections in Amazon Send to Kindle | 23-Apr-25 |
4551
| 91112 | Fixed incorrect detections in Vendor- Jabra | 23-Apr-25 |
4652
| 88590 | Fixed incorrect detections in Vendor- PDF Exchange Editor | 23-Apr-25 |
53+
| 90101 | Fixed bad detections in Vendor- JetBrains | 23-Apr-25 |
4754
| - | Fixed inaccuracy in Mattermost Desktop vulnerability- CVE-2023-5920 | 24-Apr-25 |
4855
| - | Fixed inaccuracy in OpenSSL vulnerabilities- CVE-2024-9143, CVE-2024-13176 & CVE-2024-12797 | 24-Apr-25 |
4956
| 94679 | Fixed inaccuracy in Secure Client by adding 1.0 as invalid version | 29-Apr-25 |
57+
| - | Fixed inaccuracy in VMware Tools vulnerabilities- CVE-2025-31334 & CVE-2024-33899 | 29-Apr-25 |
58+
| 94769 | Fixed inaccuracy in Micro Focus Operations Agent vulnerability- CVE-2024-0622 | 30-Apr-25 |
59+
| 96209 | Fixed inaccuracy in AnyDesk vulnerability- CVE-2024-52940 | 30-Apr-25 |
5060

5161
## March 2025
5262

defender-xdr/advanced-hunting-cloudappevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,13 @@ ms.date: 05/15/2025
3030

3131
The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving accounts and objects in Office 365 and other [cloud apps and services](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
3232

33-
## Get access
33+
## Prerequisites
3434

3535
To make sure the `CloudAppEvents` data is populated:
3636

3737
1. Go to the Defender portal and select **Settings > Cloud apps > App connectors**.
3838

39-
1. In the Microsoft 365 connector portal, select the **Pull activities** checkbox.
39+
1. In the **Select Microsoft 365 components** page, select the **Microsoft 365 activities** checkbox.
4040

4141
For detailed instructions, see: [Connect Microsoft 365 to Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-office-365#prerequisites)
4242

defender-xdr/advanced-hunting-cloudauditevents-table.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,24 +17,26 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 12/29/2023
24+
ms.date: 05/20/2025
2225
---
2326

2427
# CloudAuditEvents (Preview)
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
**Applies to:**
29-
- Microsoft Defender XDR
30-
3131

3232

3333
The `CloudAuditEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about cloud audit events for various cloud platforms protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
3434

3535
> [!IMPORTANT]
3636
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3737
38+
This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
39+
3840
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
3941

4042
| Column name | Data type | Description |

defender-xdr/advanced-hunting-cloudprocessevents-table.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,27 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 11/11/2024
24+
ms.date: 05/20/2025
2225
---
2326

2427
# CloudProcessEvents (Preview)
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
**Applies to:**
29-
- Microsoft Defender XDR
31+
3032

3133
The `CloudProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process events in multicloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine as protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
3234

3335
> [!IMPORTANT]
3436
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3537
38+
This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
39+
40+
3641
For information on other tables in the advanced hunting schema, see the [advanced hunting reference](advanced-hunting-schema-tables.md).
3742

3843
| Column name | Data type | Description |

defender-xdr/advanced-hunting-oauthappinfo-table.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,14 @@ The `OAuthAppInfo` table in the advanced hunting schema contains information abo
3434

3535
The `OAuthAppInfo` table might not include all the app or service principal-related properties that are available on Entra ID. It also does not include data related to Microsoft first-party apps or apps without any OAuth consents. The coverage of the table is based on the existing scope of Microsoft 365-connected apps covered by app governance.
3636

37+
## Prerequisities
3738

39+
This advanced hunting table is populated by app governance records from Microsoft Defender for Cloud Apps. To turn on app governance, follow the steps in [Turn on app governance](/defender-cloud-apps/app-governance-get-started).
40+
41+
If your organization hasn’t deployed Microsoft Defender for Cloud Apps in Microsoft Defender XDR or turned on app governance, queries that use the table aren’t going to work or return any results.
42+
43+
44+
## Schema
3845
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
3946

4047
| Column name | Data type | Description |

defender/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,8 +185,8 @@ conceptualContent:
185185
text: See more
186186
url: /defender-for-iot/
187187

188-
- title: Microsoft's unified security operations platform
189-
summary: End-to-end SecOps with Microsoft Sentinel
188+
- title: Microsoft Sentinel
189+
summary: End-to-end security operations
190190
links:
191191
- url: /unified-secops-platform/overview-unified-security
192192
itemType: overview

exposure-management/get-started-exposure-management.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ On the Exposure Management > **Overview** dashboard, you can review the overall
1919

2020
Use the dashboard as a starting point for a snapshot of organizational posture and exposure, and drill down to details as needed.
2121

22+
You can filter the list of affected devices based on their scope, ensuring that data presentation is aligned with your specific needs. The filter selection persists even when switching between Exposure Management experiences, allowing you to maintain you preferred view and focus on specific devices without reapplying filters.
23+
24+
Initiative scores will reflect the selected scope, whether defined by the admin or adjusted by the end user, ensuring users see accurate and relevant scores based on their access scope.
25+
2226
:::image type="content" source="./media/get-started-exposure-management/exposure-management-overview.png" alt-text="Screenshot of the security exposure management overview page." lightbox="./media/get-started-exposure-management/exposure-management-overview.png":::
2327

2428
## Connecting your external security and asset management products

exposure-management/initiatives.md

Lines changed: 26 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
---
2-
title: Review security initiatives in Microsoft Security Exposure Management
3-
description: Learn how to work with security Initiatives in Microsoft Security Exposure Management.
2+
title: Review security initiatives in Security Exposure Management
3+
description: Learn how to effectively manage and track security initiatives using Microsoft Security Exposure Management to improve your organization's security posture.
4+
#customer intent: As a security administrator, I want to understand and manage security initiatives so that I can improve my organization's security posture.
45
ms.author: dlanger
56
author: dlanger
6-
manager: rayne-wiselman
7-
ms.topic: overview
7+
manager: ornat-spodek
8+
ms.topic: how-to
89
ms.service: exposure-management
9-
ms.date: 11/04/2024
10+
ms.date: 05/04/2025
1011
---
1112

1213
# Review security initiatives
@@ -21,24 +22,37 @@ ms.date: 11/04/2024
2122

2223
## View initiatives page
2324

25+
The initiatives page provides detailed insights into your security initiatives and their progress.
26+
27+
> [!NOTE]
28+
> All information shown on the Initiative pages that is related to Endpoints data is based on the user's scope. This includes, initiative scores, metrics progress, and history reasoning.
29+
2430
1. Navigate to the [Microsoft Defender portal](https://security.microsoft.com/).
2531

26-
1. From the Exposure management section on the navigation bar, select **Exposure insights -> Initiatives** to open the [initiatives](https://security.microsoft.com/exposure-initiatives) page.
32+
2. From the Exposure management section on the navigation bar, select **Exposure insights -> Initiatives** to open the [initiatives](https://security.microsoft.com/exposure-initiatives) page.
2733

2834
:::image type="content" source="./media/initiatives/initiatives-window.png" alt-text="Screenshot of the Security Exposure Management Initiatives window.":::
2935

30-
1. At the top of the initiatives page, review the highlighted key initiatives by scrolling and drilling down per your needs.
36+
3. Use the **Filter by device groups** positioned at the top right corner to refine the filter.
37+
38+
:::image type="content" source="media/initiatives/filter-by-dg.png" alt-text="Screenshot of device group filter":::
39+
40+
4. Choose the device groups relevant for you, and the iniatives data will be recalculated (only when related to Endpoints data).
3141

32-
1. To set an initiative to appear in the top initiative bar in the dashboard or on the initiatives page, select the **star** icon in the initiatives window or **Mark as favorite** in the individual initiative.
42+
:::image type="content" source="media/initiatives/filter-by-dg-pane.png" alt-text="Screenshot of the filter by device groups side pane.":::
3343

34-
1. You can review the following information for all initiatives:
44+
5. At the top of the initiatives page, review the highlighted key initiatives by scrolling and drilling down per your needs.
45+
46+
6. To set an initiative to appear in the top initiative bar in the dashboard or on the initiatives page, select the **star** icon in the initiatives window or **Mark as favorite** in the individual initiative.
47+
48+
7. You can review the following information for all initiatives:
3549
- **14 day change trend graph** highlighting how the initiative score changes over the past 14 days
3650
- **Initiative name**
3751
- **Favorite** indicator (toggle on/off) to display in the key initiatives banner
3852
- **Current score** of the initiative
3953
- **Programs** or workloads contributing to or required by this initiative
4054

41-
1. Select an initiative to open the small overview and then select **Open initiative page** to review or remediate issues. The initiative page includes additional information including:
55+
8. Select an initiative to open the small overview and then select **Open initiative page** to review or remediate issues. The initiative page includes additional information including:
4256
- Your target score for the initiative
4357
- A means to set a custom target score appropriate to your organization's needs
4458
- Description
@@ -67,7 +81,7 @@ The changes in your score provide you with useful feedback about how well you're
6781

6882
## Check history
6983

70-
1. Select an initiative to open the small overview and then select **Open initiative page-> History** to view changes over time.
84+
1. Select an initiative to open the small overview and then select **Open initiative page-> History** to view changes over time.
7185

7286
1. Browse to the time table to choose a specific time point to examine.
7387
1. If needed, filter for specific time points.
@@ -81,6 +95,7 @@ The changes in your score provide you with useful feedback about how well you're
8195

8296
1. To review metrics associated with your initiative, select **Exposure insights -> Initiatives-> Security metrics**.
8397
1. Sort by heading, as needed.
98+
8499
1. Select **Exposure insights -> Initiatives-> Security recommendations** to view recommendations related to your initiative.
85100

86101
You only see those recommendations that are *currently* applied to assets and active in Microsoft Secure Score or Microsoft Defender for Cloud.
-184 KB
Loading
148 KB
Loading

0 commit comments

Comments
 (0)