Skip to content

Commit 97861e4

Browse files
committed
Merge branch 'main' into pr/1307
2 parents e8f6b70 + 18ca488 commit 97861e4

File tree

3 files changed

+52
-45
lines changed

3 files changed

+52
-45
lines changed

defender-endpoint/linux-preferences.md

Lines changed: 41 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -861,40 +861,15 @@ The following configuration profile contains entries for all settings described
861861

862862
```JSON
863863
{
864-
"antivirusEngine":{
865-
"enforcementLevel":"real_time",
866-
"behaviorMonitoring": "enabled",
864+
"antivirusEngine":{
865+
"enforcementLevel":"passive",
866+
"behaviorMonitoring": "disabled",
867867
"scanAfterDefinitionUpdate":true,
868868
"scanArchives":true,
869869
"scanHistoryMaximumItems": 10000,
870870
"scanResultsRetentionDays": 90,
871871
"maximumOnDemandScanThreads":2,
872872
"exclusionsMergePolicy":"merge",
873-
"exclusions":[
874-
{
875-
"$type":"excludedPath",
876-
"isDirectory":false,
877-
"path":"/var/log/system.log<EXAMPLE DO NOT USE>"
878-
},
879-
{
880-
"$type":"excludedPath",
881-
"isDirectory":true,
882-
"path":"/run<EXAMPLE DO NOT USE>"
883-
},
884-
{
885-
"$type":"excludedPath",
886-
"isDirectory":true,
887-
"path":"/home/*/git<EXAMPLE DO NOT USE>"
888-
},
889-
{
890-
"$type":"excludedFileExtension",
891-
"extension":".pdf<EXAMPLE DO NOT USE>"
892-
},
893-
{
894-
"$type":"excludedFileName",
895-
"name":"cat<EXAMPLE DO NOT USE>"
896-
}
897-
],
898873
"allowedThreats":[
899874
"<EXAMPLE DO NOT USE>EICAR-Test-File (not a virus)"
900875
],
@@ -904,6 +879,7 @@ The following configuration profile contains entries for all settings described
904879
],
905880
"nonExecMountPolicy":"unmute",
906881
"unmonitoredFilesystems": ["nfs,fuse"],
882+
"enableFileHashComputation": false,
907883
"threatTypeSettingsMergePolicy":"merge",
908884
"threatTypeSettings":[
909885
{
@@ -914,14 +890,49 @@ The following configuration profile contains entries for all settings described
914890
"key":"archive_bomb",
915891
"value":"audit"
916892
}
917-
]
893+
],
894+
"scanFileModifyPermissions":false,
895+
"scanFileModifyOwnership":false,
896+
"scanNetworkSocketEvent":false,
897+
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/<EXAMPLE DO NOT USE>",
898+
"offlineDefintionUpdateFallbackToCloud":false,
899+
"offlineDefinitionUpdate":"disabled"
918900
},
919901
"cloudService":{
920902
"enabled":true,
921903
"diagnosticLevel":"optional",
922904
"automaticSampleSubmissionConsent":"safe",
923905
"automaticDefinitionUpdateEnabled":true,
924-
"proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
906+
"proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/",
907+
"definitionUpdatesInterval":28800
908+
},
909+
"features":{
910+
"moduleLoad":"disabled",
911+
"supplementarySensorConfigurations":{
912+
"enableFilePermissionEvents":"disabled",
913+
"enableFileOwnershipEvents":"disabled",
914+
"enableRawSocketEvent":"disabled",
915+
"enableBootLoaderCalls":"disabled",
916+
"enableProcessCalls":"disabled",
917+
"enablePseudofsCalls":"diabled",
918+
"enableEbpfModuleLoadEvents":"disabled",
919+
"sendLowfiEvents":"disabled"
920+
},
921+
"ebpfSupplementaryEventProvider":"enabled",
922+
"offlineDefinitionUpdateVerifySig": "disabled"
923+
},
924+
"networkProtection":{
925+
"enforcementLevel":"disabled",
926+
"disableIcmpInspection":true
927+
},
928+
"edr":{
929+
"groupIds":"GroupIdExample",
930+
"tags": [
931+
{
932+
"key": "GROUP",
933+
"value": "Tag"
934+
}
935+
]
925936
},
926937
"exclusionSettings":{
927938
"exclusions":[

defender-endpoint/prepare-deployment.md

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.topic: conceptual
1717
ms.subservice: onboard
1818
search.appverid: met150
19-
ms.date: 06/26/2024
19+
ms.date: 09/09/2024
2020
---
2121

2222
# Assign roles and permissions for Microsoft Defender for Endpoint deployment
@@ -38,15 +38,7 @@ The next step when deploying Defender for Endpoint is to assign roles and permis
3838
3939
## Role-based access control
4040

41-
Microsoft recommends using the concept of least privileges. Defender for Endpoint leverages built-in roles within Microsoft Entra ID. Microsoft recommends [review the different roles that are available](/azure/active-directory/roles/permissions-reference) and choose the right one to solve your needs for each persona for this application. Some roles may need to be applied temporarily and removed after the deployment has been completed.
42-
43-
|Personas|Roles|Microsoft Entra role (if necessary)|Assign to|
44-
|---|---|---|---|
45-
|Security Administrator||||
46-
|Security Analyst||||
47-
|Endpoint Administrator||||
48-
|Infrastructure Administrator||||
49-
|Business Owner/Stakeholder||||
41+
Microsoft recommends using the concept of least privileges. Defender for Endpoint leverages built-in roles within Microsoft Entra ID. [Review the different roles available](/azure/active-directory/roles/permissions-reference) and choose the right one to solve your needs for each persona for this application. Some roles may need to be applied temporarily and removed after the deployment has been completed.
5042

5143
Microsoft recommends using [Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure) to manage your roles to provide additional auditing, control, and access review for users with directory permissions.
5244

@@ -62,11 +54,11 @@ You can find details on permission guidelines here: [Create roles and assign the
6254

6355
The following example table serves to identify the Cyber Defense Operations Center structure in your environment that will help you determine the RBAC structure required for your environment.
6456

65-
|Tier|Description|Permission Required|
57+
|Tier|Description|Permissions required|
6658
|---|---|---|
67-
|Tier 1|**Local security operations team / IT team** <br/><br/> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.||
68-
|Tier 2|**Regional security operations team** <br/><br/> This team can see all the devices for their region and perform remediation actions.|View data|
69-
|Tier 3|**Global security operations team** <br/><br/> This team consists of security experts and is authorized to see and perform all actions from the portal.|View data <br/><br/> Alerts investigation Active remediation actions <br/><br/> Alerts investigation Active remediation actions <br/><br/> Manage portal system settings <br/><br/> Manage security settings|
59+
|Tier 1|**Local security operations team / IT team** <br/><br/> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.|View data|
60+
|Tier 2|**Regional security operations team** <br/><br/> This team can see all the devices for their region and perform remediation actions.|View data <br/><br/> Alerts investigation <br/><br/> Active remediation actions <br/><br/>|
61+
|Tier 3|**Global security operations team** <br/><br/> This team consists of security experts and is authorized to see and perform all actions from the portal.|View data <br/><br/> Alerts investigation <br/><br/> Active remediation actions <br/><br/> Manage portal system settings <br/><br/> Manage security settings|
7062

7163
## Next step
7264

defender-xdr/whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,11 @@ For more information on what's new with other Microsoft Defender security produc
2929

3030
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3131

32+
## September 2024
33+
34+
- [Microsoft Defender Threat Intelligence](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti) customers can now view the [latest featured threat intelligence articles](/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal#featured-threat-intelligence-articles-widget) in the Microsoft Defender portal home page. The **Intel explorer** page now also has an [article digest](/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal#article-digest) that notifies them of the number of new Defender TI articles that were published since they last accessed the Defender portal.
35+
- [Microsoft Defender XDR Unified RBAC permissions](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added to submit inquiries and view responses from [Microsoft Defender Experts](experts-on-demand.md). You can also [view responses](experts-on-demand.md#where-to-view-responses-from-defender-experts) to inquires submitted to Ask Defender Experts through your listed email addresses when submitting your inquiry or in the Defender portal by navigating to **Reports** > **Defender Experts messages**.
36+
3237
## August 2024
3338

3439
- (Preview) Microsoft Sentinel data is now available with Defender XDR data in Microsoft Defender multitenant management. Only one Microsoft Sentinel workspace per tenant is currently supported in the Microsoft unified security operations platform. So, Microsoft Defender multitenant management shows security information and event management (SIEM) data from one Microsoft Sentinel workspace per tenant. For more information, see [Microsoft Defender multitenant management](mto-overview.md) and [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal).
@@ -67,7 +72,6 @@ You can also get product updates and important notifications through the [messag
6772

6873
- (Preview) You can now filter your Microsoft Defender for Cloud alerts by the associated **alert subscription ID** in the Incidents and Alerts queues. For more information, see [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).
6974

70-
7175
- (GA) You can now **[filter your results](advanced-hunting-query-results.md#filter-results)** in advanced hunting so you can narrow down your investigation on specific data you want to focus on.
7276

7377
## May 2024

0 commit comments

Comments
 (0)