You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/data-storage-privacy.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- essentials-compliance
17
17
ms.topic: concept-article
18
18
search.appverid: met150
19
-
ms.date: 05/12/2025
19
+
ms.date: 09/03/2025
20
20
appliesto:
21
21
- Microsoft Defender for Endpoint Plan 1
22
22
- Microsoft Defender for Endpoint Plan 2
@@ -43,7 +43,7 @@ Information collected includes file data (file names, sizes, and hashes), proces
43
43
44
44
Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
45
45
46
-
This data enables Defender for Endpoint to:
46
+
This data lets Defender for Endpoint:
47
47
48
48
- Proactively identify indicators of attack (IOAs) in your organization
49
49
- Generate alerts if a possible attack was detected
@@ -53,20 +53,26 @@ Microsoft doesn't use your data for advertising.
53
53
54
54
## Data location
55
55
56
-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
56
+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, India, or the United Arab Emirates (UAE). Customer data collected by the service might be stored in: (a) the geolocation of the tenant as identified during provisioning or, (b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
57
57
58
-
(a) the geo-location of the tenant as identified during provisioning; or
58
+
(a) the geolocation of the tenant as identified during provisioning; or
59
59
60
-
(b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
60
+
(b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
61
61
62
-
## Data Retention
62
+
## Data retention
63
63
64
64
Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal.
65
65
66
66
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
67
67
68
68
In the advanced hunting investigation experience, it's accessible via a query for 30 days.
69
69
70
+
## Data recovery
71
+
72
+
The Microsoft Defender for Endpoint (MDE) service incorporates a regional disaster recovery strategy aligned with Microsoft's broader resiliency framework. For more information, see [Resiliency and continuity - Microsoft Service Assurance | Microsoft Learn](/compliance/assurance/assurance-resiliency-and-continuity). In the event of a service disruption, all MDE components are designed to fail over to a paired region within the same geographic boundary, thereby maintaining data residency requirements.
73
+
74
+
However, due to current service limitations in the United Arab Emirates, MDE components that depend on Azure Synapse workloads are supported with zonal resiliency only. At this time, for the workloads, there is no cross-region business continuity and disaster recovery (BCDR) capability available. For more information on Synapse’s disaster recovery capabilities, refer to the official documentation.
75
+
70
76
## Data sharing for Microsoft Defender for Endpoint
71
77
72
78
Microsoft Defender for Endpoint shares data, including customer data, among the following Microsoft products, also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.
Copy file name to clipboardExpand all lines: defender-for-identity/architecture.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.reviewer: morRubin
11
11
12
12
Microsoft Defender for Identity monitors your domain controllers by capturing and parsing network traffic, leveraging Windows events directly from your domain controllers, and then analyzes the data for attacks and threats.
13
13
14
-
The following image shows how Defender for Identity is layered over Microsoft Defender XDR, and works together with other Microsoft services and third-party identity providers to monitor traffic coming in from domain controllers and Active Directory servers.
14
+
The following image shows how Defender for Identity is layered over Microsoft Defender XDR, and works together with other Microsoft services and non-Microsoft identity providers to monitor traffic coming in from domain controllers and Active Directory servers.
15
15
16
16
:::image type="content" source="media\diagram-of-the-defender-for-identity-architecture.png" alt-text="Diagram of the Defender for Identity architecture." border="false":::
17
17
@@ -29,6 +29,7 @@ Defender for Identity sensors can be directly installed on the following servers
29
29
-**Domain controllers**: The sensor directly monitors domain controller traffic, without the need for a dedicated server, or configuration of port mirroring.
30
30
-**AD FS / AD CS**: The sensor directly monitors network traffic and authentication events.
31
31
-**Defender for Identity cloud service**
32
+
32
33
Defender for Identity is a cloud-based service that operates on Azure infrastructure and is currently deployed across [multiple regions](/defender-for-identity/privacy-compliance/#data-location).
33
34
34
35
## Microsoft Defender portal
@@ -40,7 +41,7 @@ Use the Microsoft Defender portal to:
40
41
- Manage Defender for Identity sensor configuration settings.
41
42
- View data received from Defender for Identity sensors.
42
43
- Monitor detected suspicious activities and suspected attacks based on the attack kill chain model.
43
-
-**Optional**: The portal can also be configured to send emails and events when security alerts or health issues are detected.
44
+
-**Optional**: Configure the portal to send emails and events when it detects security alerts or health issues.
44
45
45
46
> [!NOTE]
46
47
> If no sensor is installed on your Defender for Identity workspace within 60 days, the workspace may be deleted and you'll need to recreate it.
@@ -58,7 +59,7 @@ The Defender for Identity sensor has the following core functionality:
58
59
- Transfer relevant data to the Defender for Identity cloud service
59
60
60
61
61
-
Defender for Identity sensor reads events locally, without the need to purchase and maintain additional hardware or configurations. The Defender for Identity sensor also supports Event Tracing for Windows (ETW) which provides the log information for multiple detections. ETW-based detections include Suspected DCShadow attacks attempted using domain controller replication requests and domain controller promotion.
62
+
Defender for Identity sensor reads events locally, without the need to purchase and maintain additional hardware or configurations. The Defender for Identity sensor also supports Event Tracing for Windows (ETW), which provides the log information for multiple detections. ETW-based detections include Suspected DCShadow attacks attempted using domain controller replication requests and domain controller promotion.
Copy file name to clipboardExpand all lines: defender-for-identity/privacy-compliance.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article describes how Microsoft Defender for Identity collects data in a ma
17
17
18
18
Microsoft Defender for Identity monitors information generated from your organization's Active Directory, network activities, and event activities to detect suspicious activity. The monitored activity information enables Defender for Identity to help you determine the validity of each potential threat and correctly triage and respond.
19
19
20
-
For more information see: [Microsoft Defender for Identity monitored activities](monitored-activities.md).
20
+
For more information, see: [Microsoft Defender for Identity monitored activities](monitored-activities.md).
21
21
22
22
## Data location
23
23
@@ -29,18 +29,18 @@ Defender for Identity operates in the Microsoft Azure data centers in the follow
- United Arab Emirates (UAE North and UAE Central)
32
33
- United Kingdom (UK South)
33
-
- United Arab Emirates (North and Central)
34
34
35
35
Customer data collected by the service might be stored as follows:
36
36
37
-
- Your workspace is automatically created in data center that's geographically closest to your Microsoft Entra ID. Once created, Defender for Identity workspaces can't be moved to another data center. Your workspace's data center is listed in the Microsoft Defender portal, under **Settings** > **Identity** > **About** > **Geolocation**.
37
+
- Your workspace is automatically created in the data center that's geographically closest to your Microsoft Entra ID. Once created, Defender for Identity workspaces can't be moved to another data center. Your workspace's data center is listed in the Microsoft Defender portal, under **Settings** > **Identity** > **About** > **Geolocation**.
38
38
39
39
- A geographic location as defined by the data storage rules of an online service, if the online service is used by Defender for Identity to process such data.
40
40
41
41
## Data retention
42
42
43
-
Data from Microsoft Defender for Identity is retained for 180 days, visible across the portal.
43
+
Microsoft Defender for Identity retains data for 180 days, which is visible across the portal.
44
44
45
45
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
Copy file name to clipboardExpand all lines: defender-xdr/data-privacy.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.topic: concept-article
19
19
search.appverid:
20
20
- MOE150
21
21
- MET150
22
-
ms.date: 04/25/2025
22
+
ms.date: 08/24/2025
23
23
appliesto:
24
24
- Microsoft Defender XDR
25
25
---
@@ -32,20 +32,21 @@ Microsoft Defender XDR integrates with several different Microsoft security serv
32
32
33
33
## Collected data
34
34
35
-
Customer data collected from integrated services includes *processed data*, such as incidents and alerts, and *configuration data*, such as connector settings, rules and so on.
35
+
Customer data collected from integrated services includes *processed data*, such as incidents and alerts, and *configuration data*, such as connector settings, rules, and so on.
36
36
37
37
## Data storage location
38
38
39
-
Microsoft Defender XDR operations in Microsoft Azure data centers in the following geographical regions:
39
+
Microsoft Defender XDR operates in Microsoft Azure data centers in the following geographical regions:
40
40
41
41
-**European Union**: North Europe and West Europe
42
42
-**United Kingdom**: UK South and UK West
43
43
-**United States**: East US 2 and Central US
44
44
-**Australia**: Australia East and Australia Southeast
45
45
-**Switzerland**: Switzerland North and Switzerland West
46
46
-**India**: Central India and South India
47
+
-**UAE**: UAE North and UAE Central
47
48
48
-
Once created, the Microsoft Defender XDR tenant isn't movable to a different region. Your geographical region is shown in the Microsoft Defender portal, under **Settings > Microsoft Defender XDR > Account**.
49
+
Once created, the Microsoft Defender XDR tenant can't be moved to a different region. Your geographical region is shown in the Microsoft Defender portal, under **Settings > Microsoft Defender XDR > Account**.
49
50
50
51
Customer data stored by integrated services might also be stored in the following locations:
0 commit comments