You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-add-users.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,22 +4,22 @@ description: Add users and assign Defender for Business licenses to protect thei
4
4
search.appverid: MET150
5
5
author: siosulli
6
6
ms.author: siosulli
7
-
manager: deniseb
7
+
manager: deniseb
8
8
audience: Admin
9
9
ms.topic: conceptual
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
12
ms.date: 06/19/2024
13
-
ms.collection:
13
+
ms.collection:
14
14
- m365-security
15
15
- tier1
16
16
ms.reviewer: efratka
17
-
f1.keywords: NOCSH
17
+
f1.keywords: NOCSH
18
18
---
19
19
20
20
# Add users and assign licenses in Microsoft Defender for Business
21
21
22
-
As soon as you have signed up for Defender for Business, your first step is to add users and assign licenses. This article describes how to add users and assign licenses, and how to make sure multifactor authentication (MFA) is enabled.
22
+
As soon as you have signed up for Defender for Business, your first step is to add users and assign licenses. This article describes how to add users and assign licenses, and how to make sure multifactor authentication (MFA) is enabled.
23
23
24
24
:::image type="content" source="media/mdb-setup-step2.png" alt-text="Visual depicting step 2 - add users and assign licenses in Defender for Business.":::
25
25
@@ -35,7 +35,7 @@ As soon as you have signed up for Defender for Business, your first step is to a
35
35
-**Domain** Choose the domain for the user's account. For example, if the user's username is `Pat`, and the domain is `contoso.com`, they'll sign in by using `[email protected]`.
36
36
-**Password settings**: Choose whether to use the autogenerated password or to create your own strong password for the user. The user must change their password after 90 days. Or you can choose the option to **Require this user to change their password when they first sign in**. You can also choose whether you want to send the user's password in email when the user is added.
37
37
38
-
4. On the **Assign product licenses** page, select Defender for Business (or Microsoft 365 Business Premium). Then choose **Next**.
38
+
4. On the **Assign product licenses** page, select Defender for Business (or Microsoft 365 Business Premium). Then choose **Next**.
39
39
40
40
If you don't have any licenses available, you can still add a user and buy additional licenses. For more information about adding users, see [Add users and assign licenses at the same time](/Microsoft-365/admin/add-users/add-users).
41
41
@@ -57,7 +57,7 @@ One good way to make sure MFA is enabled for all users is by using [security def
57
57
58
58
:::image type="content" source="media/mdb-azuread-properties.png" alt-text="Screenshot showing Properties and Manage Security Defaults for Microsoft Entra ID." lightbox="media/mdb-azuread-properties.png":::
59
59
60
-
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
60
+
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
61
61
62
62
> [!NOTE]
63
63
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
@@ -71,4 +71,3 @@ One good way to make sure MFA is enabled for all users is by using [security def
71
71
-[Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
72
72
73
73
-[Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-asr.md
+17-21Lines changed: 17 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,31 +1,28 @@
1
1
---
2
-
title: Enable your attack surface reduction rules in Microsoft Defender for Business
3
-
description: Get an overview of attack surface reduction capabilities, including attack surface reduction rules, in Microsoft Defender for Business
2
+
title: Enable your attack surface reduction rules in Microsoft Defender for Business
3
+
description: Get an overview of attack surface reduction capabilities, including attack surface reduction rules, in Microsoft Defender for Business
4
4
author: siosulli
5
5
ms.author: siosulli
6
-
manager: deniseb
7
-
ms.date: 06/07/2024
6
+
manager: deniseb
7
+
ms.date: 07/23/2024
8
8
ms.topic: conceptual
9
9
ms.service: defender-business
10
-
ms.localizationpriority: medium
11
-
ms.collection:
10
+
ms.localizationpriority: medium
11
+
ms.collection:
12
12
- m365-security
13
13
- tier1
14
-
ms.reviewer: efratka
14
+
ms.reviewer: efratka
15
15
search.appverid: MET150
16
-
f1.keywords: NOCSH
16
+
f1.keywords: NOCSH
17
17
audience: Admin
18
18
---
19
19
20
20
# Enable your attack surface reduction rules in Microsoft Defender for Business
21
21
22
-
Your attack surfaces are all the places and ways that your organization's network and devices are vulnerable to cyberthreats and attacks. Unsecured devices, unrestricted access to any URL on a company device, and allowing any type of app or script to run on company devices are all examples of attack surfaces. They leave your company vulnerable to cyberattacks.
22
+
Your attack surfaces are all the places and ways that your organization's network and devices are vulnerable to cyberthreats and attacks. Unsecured devices, unrestricted access to any URL on a company device, and allowing any type of app or script to run on company devices are all examples of attack surfaces. They leave your company vulnerable to cyberattacks.
23
23
24
24
To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
25
25
26
-
> [!NOTE]
27
-
> Intune is not included in the standalone version of Defender for Business, but it can be added on.
28
-
29
26
## Standard protection ASR rules
30
27
31
28
There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:
@@ -48,7 +45,7 @@ These rules help protect your network and devices but shouldn't cause disruption
48
45
3. Set up your policy as follows:
49
46
50
47
1. Specify a name and description, and then choose **Next**.
51
-
48
+
52
49
2. For at least the following three rules, set each one to **Block**:
53
50
54
51
-**Block credential stealing from the Windows local security authority subsystem**
@@ -89,18 +86,17 @@ To learn more about attack surface reduction rules, see the following articles:
89
86
90
87
Attack surface reduction rules are available in Defender for Business. The following table summarizes attack surface reduction capabilities in Defender for Business. Notice how other capabilities, such as next-generation protection and web content filtering, work together with your attack surface reduction capabilities.
91
88
92
-
|Capability|How to set it up|
93
-
|:---|:---|
94
-
|**Attack surface reduction rules** <br/> Prevent specific actions that are commonly associated with malicious activity to run on Windows devices.|[Enable your standard protection attack surface reduction rules](#standard-protection-asr-rules) (section in this article).|
95
-
|**Controlled folder access** <br/>Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation.|[Set up controlled folder access policy in Microsoft Defender for Business](mdb-controlled-folder-access.md).|
96
-
|**Network protection** <br/>Network protection prevents people from accessing dangerous domains through applications on their Windows and Mac devices. Network protection is also a key component of [Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md).|Network protection is already enabled by default when devices are onboarded to Defender for Business and [next-generation protection policies in Defender for Business](mdb-next-generation-protection.md) are applied. Your default policies are configured to use recommended security settings.|
97
-
|**Web protection** <br/>Web protection integrates with web browsers and works with network protection to protect against web threats and unwanted content. Web protection includes web content filtering and web threat reports.|[Set up Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md).|
98
-
|**Firewall protection** <br/>Firewall protection determines what network traffic is permitted to flow to or from your organization's devices.|Firewall protection is already enabled by default when devices are onboarded to Defender for Business and [firewall policies in Defender for Business](mdb-firewall.md) are applied.|
89
+
|Capability|How to set it up|
90
+
|---|---|
91
+
|**Attack surface reduction rules** <br/> Prevent specific actions that are commonly associated with malicious activity to run on Windows devices.|[Enable your standard protection attack surface reduction rules](#standard-protection-asr-rules) (section in this article).|
92
+
|**Controlled folder access** <br/>Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation.|[Set up controlled folder access policy in Microsoft Defender for Business](mdb-controlled-folder-access.md).|
93
+
|**Network protection** <br/>Network protection prevents people from accessing dangerous domains through applications on their Windows and Mac devices. Network protection is also a key component of [Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md).|Network protection is already enabled by default when devices are onboarded to Defender for Business and [next-generation protection policies in Defender for Business](mdb-next-generation-protection.md) are applied. Your default policies are configured to use recommended security settings.|
94
+
|**Web protection** <br/>Web protection integrates with web browsers and works with network protection to protect against web threats and unwanted content. Web protection includes web content filtering and web threat reports.|[Set up Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md).|
95
+
|**Firewall protection** <br/>Firewall protection determines what network traffic is permitted to flow to or from your organization's devices.|Firewall protection is already enabled by default when devices are onboarded to Defender for Business and [firewall policies in Defender for Business](mdb-firewall.md) are applied.|
99
96
100
97
## Next steps
101
98
102
99
-[Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).
103
100
-[Use your vulnerability management dashboard](mdb-view-tvm-dashboard.md)
104
101
-[View and manage incidents](mdb-view-manage-incidents.md)
Copy file name to clipboardExpand all lines: defender-business/mdb-attack-disruption.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,19 @@
1
1
---
2
-
title: Automatic attack disruption in Microsoft Defender for Business
3
-
description: Learn about automatic attack disruption in Microsoft Defender for Business
2
+
title: Automatic attack disruption in Microsoft Defender for Business
3
+
description: Learn about automatic attack disruption in Microsoft Defender for Business
4
4
author: siosulli
5
5
ms.author: siosulli
6
-
manager: deniseb
6
+
manager: deniseb
7
7
ms.date: 06/07/2024
8
8
ms.topic: conceptual
9
9
ms.service: defender-business
10
-
ms.localizationpriority: medium
11
-
ms.collection:
10
+
ms.localizationpriority: medium
11
+
ms.collection:
12
12
- m365-security
13
13
- tier1
14
-
ms.reviewer: efratka
14
+
ms.reviewer: efratka
15
15
search.appverid: MET150
16
-
f1.keywords: NOCSH
16
+
f1.keywords: NOCSH
17
17
audience: Admin
18
18
---
19
19
@@ -29,18 +29,19 @@ Automatic attack disruption is designed to:
29
29
30
30
- Contain advanced attacks that are in progress;
31
31
- Limit the impact and progression of attacks on your business assets (like devices); and
32
-
- Provide more time for your IT/security team to remediate an attack fully.
32
+
- Provide more time for your IT/security team to remediate an attack fully.
33
33
34
34
Automatic attack disruption uses insights from Microsoft security researchers and advanced AI models to counteract the complexities of advanced attacks. It limits a threat actor's progress early on and dramatically reduces the overall impact of an attack, from associated costs to loss of productivity. See some examples at the [Microsoft Security Blog](https://aka.ms/ContainUserSecBlog).
35
35
36
-
With automatic attack disruption, as soon as a human-operated attack is detected on a device, steps are taken immediately to contain the affected device and user accounts on the device. An incident is created in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). There, your IT/security team can view details about the risk and containment status of compromised assets during and after the process. An **Incident** page provides details about the attack and up-to-date status of affected assets.
36
+
With automatic attack disruption, as soon as a human-operated attack is detected on a device, steps are taken immediately to contain the affected device and user accounts on the device. An incident is created in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). There, your IT/security team can view details about the risk and containment status of compromised assets during and after the process. An **Incident** page provides details about the attack and up-to-date status of affected assets.
37
37
38
38
Automated response actions include:
39
39
40
40
- Containing a device by blocking incoming/outgoing communication
41
41
- Containing a user account by disconnecting current user connections at the device level
42
42
43
43
> [!IMPORTANT]
44
+
>
44
45
> - To view information about a detected advanced attack, you must have an appropriate role, such as Security Reader or Security Administrator assigned.
45
46
> - To take remediation actions, release a contained device/user, or re-enable a user account, you must have the Security Administrator role assigned.
46
47
> - See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
Disrupted incidents include a tag for `Attack Disruption` and the specific threat type identified (such as ransomware). If your IT/security team receives [incident email notifications](mdb-email-notifications.md), these tags also appear in the emails.
64
65
65
-
When an incident is disrupted, highlighted text appears below the incident title. Contained devices or user accounts are listed with a label that indicates their status.
66
+
When an incident is disrupted, highlighted text appears below the incident title. Contained devices or user accounts are listed with a label that indicates their status.
66
67
67
68
## Track attack disruption actions in the Action center
68
69
@@ -78,6 +79,6 @@ For more information, see [Review remediation actions in the Action center](mdb-
78
79
79
80
## How to get automatic attack disruption
80
81
81
-
Automatic attack disruption is built into Defender for Business; you don't have to explicitly turn on these capabilities. It's important to [onboard all your organization's devices](mdb-onboard-devices.md) (computers, phones, and tablets) to Defender for Business so that they're protected as soon as possible.
82
+
Automatic attack disruption is built into Defender for Business; you don't have to explicitly turn on these capabilities. It's important to [onboard all your organization's devices](mdb-onboard-devices.md) (computers, phones, and tablets) to Defender for Business so that they're protected as soon as possible.
82
83
83
-
Additionally, sign up to receive [preview features](/defender-xdr/preview) so that you get the latest and greatest capabilities as soon as they're available.
84
+
Additionally, sign up to receive [preview features](/defender-xdr/preview) so that you get the latest and greatest capabilities as soon as they're available.
0 commit comments