Skip to content

Commit a1ffcde

Browse files
authored
Merge pull request #4819 from sbreingold-ms/wi-482509-new-uae-update
wi-482509-Added-UAE
2 parents f6dace2 + 08dd753 commit a1ffcde

File tree

5 files changed

+28
-19
lines changed

5 files changed

+28
-19
lines changed

defender-endpoint/data-storage-privacy.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: concept-article
1818
search.appverid: met150
19-
ms.date: 05/12/2025
19+
ms.date: 09/03/2025
2020
appliesto:
2121
- Microsoft Defender for Endpoint Plan 1
2222
- Microsoft Defender for Endpoint Plan 2
@@ -43,7 +43,7 @@ Information collected includes file data (file names, sizes, and hashes), proces
4343

4444
Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
4545

46-
This data enables Defender for Endpoint to:
46+
This data lets Defender for Endpoint:
4747

4848
- Proactively identify indicators of attack (IOAs) in your organization
4949
- Generate alerts if a possible attack was detected
@@ -53,20 +53,26 @@ Microsoft doesn't use your data for advertising.
5353

5454
## Data location
5555

56-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
56+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, India, or the United Arab Emirates (UAE). Customer data collected by the service might be stored in: (a) the geolocation of the tenant as identified during provisioning or, (b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
5757

58-
(a) the geo-location of the tenant as identified during provisioning; or
58+
(a) the geolocation of the tenant as identified during provisioning; or
5959

60-
(b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
60+
(b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
6161

62-
## Data Retention
62+
## Data retention
6363

6464
Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal.
6565

6666
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
6767

6868
In the advanced hunting investigation experience, it's accessible via a query for 30 days.
6969

70+
## Data recovery
71+
72+
The Microsoft Defender for Endpoint (MDE) service incorporates a regional disaster recovery strategy aligned with Microsoft's broader resiliency framework. For more information, see [Resiliency and continuity - Microsoft Service Assurance | Microsoft Learn](/compliance/assurance/assurance-resiliency-and-continuity). In the event of a service disruption, all MDE components are designed to fail over to a paired region within the same geographic boundary, thereby maintaining data residency requirements.
73+
74+
However, due to current service limitations in the United Arab Emirates, MDE components that depend on Azure Synapse workloads are supported with zonal resiliency only. At this time, for the workloads, there is no cross-region business continuity and disaster recovery (BCDR) capability available. For more information on Synapse’s disaster recovery capabilities, refer to the official documentation.
75+
7076
## Data sharing for Microsoft Defender for Endpoint
7177

7278
Microsoft Defender for Endpoint shares data, including customer data, among the following Microsoft products, also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.

defender-for-identity/architecture.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.reviewer: morRubin
1111

1212
Microsoft Defender for Identity monitors your domain controllers by capturing and parsing network traffic, leveraging Windows events directly from your domain controllers, and then analyzes the data for attacks and threats.
1313

14-
The following image shows how Defender for Identity is layered over Microsoft Defender XDR, and works together with other Microsoft services and third-party identity providers to monitor traffic coming in from domain controllers and Active Directory servers.
14+
The following image shows how Defender for Identity is layered over Microsoft Defender XDR, and works together with other Microsoft services and non-Microsoft identity providers to monitor traffic coming in from domain controllers and Active Directory servers.
1515

1616
:::image type="content" source="media\diagram-of-the-defender-for-identity-architecture.png" alt-text="Diagram of the Defender for Identity architecture." border="false":::
1717

@@ -29,6 +29,7 @@ Defender for Identity sensors can be directly installed on the following servers
2929
- **Domain controllers**: The sensor directly monitors domain controller traffic, without the need for a dedicated server, or configuration of port mirroring.
3030
- **AD FS / AD CS**: The sensor directly monitors network traffic and authentication events.
3131
- **Defender for Identity cloud service**
32+
3233
Defender for Identity is a cloud-based service that operates on Azure infrastructure and is currently deployed across [multiple regions](/defender-for-identity/privacy-compliance/#data-location).
3334

3435
## Microsoft Defender portal
@@ -40,7 +41,7 @@ Use the Microsoft Defender portal to:
4041
- Manage Defender for Identity sensor configuration settings.
4142
- View data received from Defender for Identity sensors.
4243
- Monitor detected suspicious activities and suspected attacks based on the attack kill chain model.
43-
- **Optional**: The portal can also be configured to send emails and events when security alerts or health issues are detected.
44+
- **Optional**: Configure the portal to send emails and events when it detects security alerts or health issues.
4445

4546
> [!NOTE]
4647
> If no sensor is installed on your Defender for Identity workspace within 60 days, the workspace may be deleted and you'll need to recreate it.
@@ -58,7 +59,7 @@ The Defender for Identity sensor has the following core functionality:
5859
- Transfer relevant data to the Defender for Identity cloud service
5960

6061

61-
Defender for Identity sensor reads events locally, without the need to purchase and maintain additional hardware or configurations. The Defender for Identity sensor also supports Event Tracing for Windows (ETW) which provides the log information for multiple detections. ETW-based detections include Suspected DCShadow attacks attempted using domain controller replication requests and domain controller promotion.
62+
Defender for Identity sensor reads events locally, without the need to purchase and maintain additional hardware or configurations. The Defender for Identity sensor also supports Event Tracing for Windows (ETW), which provides the log information for multiple detections. ETW-based detections include Suspected DCShadow attacks attempted using domain controller replication requests and domain controller promotion.
6263

6364
### Domain synchronizer process
6465

defender-for-identity/privacy-compliance.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article describes how Microsoft Defender for Identity collects data in a ma
1717

1818
Microsoft Defender for Identity monitors information generated from your organization's Active Directory, network activities, and event activities to detect suspicious activity. The monitored activity information enables Defender for Identity to help you determine the validity of each potential threat and correctly triage and respond.
1919

20-
For more information see: [Microsoft Defender for Identity monitored activities](monitored-activities.md).
20+
For more information, see: [Microsoft Defender for Identity monitored activities](monitored-activities.md).
2121

2222
## Data location
2323

@@ -29,18 +29,18 @@ Defender for Identity operates in the Microsoft Azure data centers in the follow
2929
- India (Central India, South India)
3030
- North America (East US, West US, West US2)
3131
- Switzerland (Switzerland North, Switzerland West)
32+
- United Arab Emirates (UAE North and UAE Central)
3233
- United Kingdom (UK South)
33-
- United Arab Emirates (North and Central)
3434

3535
Customer data collected by the service might be stored as follows:
3636

37-
- Your workspace is automatically created in data center that's geographically closest to your Microsoft Entra ID. Once created, Defender for Identity workspaces can't be moved to another data center. Your workspace's data center is listed in the Microsoft Defender portal, under **Settings** > **Identity** > **About** > **Geolocation**.
37+
- Your workspace is automatically created in the data center that's geographically closest to your Microsoft Entra ID. Once created, Defender for Identity workspaces can't be moved to another data center. Your workspace's data center is listed in the Microsoft Defender portal, under **Settings** > **Identity** > **About** > **Geolocation**.
3838

3939
- A geographic location as defined by the data storage rules of an online service, if the online service is used by Defender for Identity to process such data.
4040

4141
## Data retention
4242

43-
Data from Microsoft Defender for Identity is retained for 180 days, visible across the portal.
43+
Microsoft Defender for Identity retains data for 180 days, which is visible across the portal.
4444

4545
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
4646

defender-xdr/data-privacy.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.topic: concept-article
1919
search.appverid:
2020
- MOE150
2121
- MET150
22-
ms.date: 04/25/2025
22+
ms.date: 08/24/2025
2323
appliesto:
2424
- Microsoft Defender XDR
2525
---
@@ -32,20 +32,21 @@ Microsoft Defender XDR integrates with several different Microsoft security serv
3232

3333
## Collected data
3434

35-
Customer data collected from integrated services includes *processed data*, such as incidents and alerts, and *configuration data*, such as connector settings, rules and so on.
35+
Customer data collected from integrated services includes *processed data*, such as incidents and alerts, and *configuration data*, such as connector settings, rules, and so on.
3636

3737
## Data storage location
3838

39-
Microsoft Defender XDR operations in Microsoft Azure data centers in the following geographical regions:
39+
Microsoft Defender XDR operates in Microsoft Azure data centers in the following geographical regions:
4040

4141
- **European Union**: North Europe and West Europe
4242
- **United Kingdom**: UK South and UK West
4343
- **United States**: East US 2 and Central US
4444
- **Australia**: Australia East and Australia Southeast
4545
- **Switzerland**: Switzerland North and Switzerland West
4646
- **India**: Central India and South India
47+
- **UAE**: UAE North and UAE Central
4748

48-
Once created, the Microsoft Defender XDR tenant isn't movable to a different region. Your geographical region is shown in the Microsoft Defender portal, under **Settings > Microsoft Defender XDR > Account**.
49+
Once created, the Microsoft Defender XDR tenant can't be moved to a different region. Your geographical region is shown in the Microsoft Defender portal, under **Settings > Microsoft Defender XDR > Account**.
4950

5051
Customer data stored by integrated services might also be stored in the following locations:
5152

includes/improve-request-performance.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,19 @@ ms.author: itsela
66
author: itsela-ms
77
ms.localizationpriority: medium
88
manager: dansimp
9-
ms.date: 08/12/2024
9+
ms.date: 08/24/2025
1010
audience: ITPro
1111
ms.collection: M365-security-compliance
1212
ms.topic: article
1313
---
1414

1515
> [!TIP]
16-
> For better performance, you can use server closer to your geo location:
16+
> For better performance, use a server closer to your geolocation:
1717
>
1818
> - us.api.security.microsoft.com
1919
> - eu.api.security.microsoft.com
2020
> - uk.api.security.microsoft.com
2121
> - au.api.security.microsoft.com
2222
> - swa.api.security.microsoft.com
2323
> - ina.api.security.microsoft.com
24+
> - aea.api.security.microsoft.com

0 commit comments

Comments
 (0)