You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/predefined-classification-rules-and-levels.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlanger
6
6
manager: rayne-wiselman
7
7
ms.topic: reference
8
8
ms.service: exposure-management
9
-
ms.date: 11/16/2024
9
+
ms.date: 03/16/2025
10
10
---
11
11
12
12
# Predefined classifications
@@ -103,6 +103,13 @@ Current asset types are:
103
103
| Yammer Administrator | Identity | High | Identities in this role can manage all aspects of the Yammer service. |
104
104
| Authentication Extensibility Administrator | Identity | High | Identities in this role can customize sign in and sign up experiences for users by creating and managing custom authentication extensions. |
105
105
| Lifecycle Workflows Administrator | Identity | High | Identities in this role create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Microsoft Entra ID. |
106
+
| Senior Executive (Technology) | Identity | Very High | Identities with this classification belong to senior executives in the field of Technology. |
107
+
| Senior Executive (Finance) | Identity | Very High | Identities with this classification belong to senior executives in the field of Finance. |
108
+
| Senior Executive (Operations) | Identity | Very High | Identities with this classification belong to senior executives in the field of Operations. |
109
+
| Senior Executive (Marketing) | Identity | Very High | Identities with this classification belong to senior executives in the field of Marketing. |
110
+
| Senior Executive (Information) | Identity | Very High | Identities with this classification belong to senior executives in the field of Information. |
111
+
| Senior Executive (Execution) | Identity | Very High | Identities with this classification belong to senior executives in the field of Execution. |
112
+
| Senior Executive (Human Resources) | Identity | Very High | Identities with this classification belong to senior executives in the field of Human Resources. |
| Senior Executive (Technology) | This rule applies to identities classified as senior executives in the field of Technology. |
36
+
| Senior Executive (Finance) | This rule applies to identities classified as senior executives in the field of Finance. |
37
+
| Senior Executive (Operations) | This rule applies to identities classified as senior executives in the field of Operations. |
38
+
| Senior Executive (Marketing) | This rule applies to identities classified as senior executives in the field of Marketing. |
39
+
| Senior Executive (Information) | This rule applies to identities classified as senior executives in the field of Information. |
40
+
| Senior Executive (Execution) | This rule applies to identities classified as senior executives in the field of Execution. |
41
+
| Senior Executive (Human Resources) | This rule applies to identities classified as senior executives in the field of Resources. |
35
42
| Security Operations Admin User | This rule applies to security operations admin users that configure, manage, monitor, and respond to threats within the organization. |
36
43
37
44
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
38
45
46
+
## February 2025
47
+
39
48
### New predefined classifications
40
49
41
50
The following predefined classification rules were added to the critical assets list:
@@ -45,7 +54,6 @@ The following predefined classification rules were added to the critical assets
45
54
| Azure Key Vault with high number of operations | This rule identifies and classifies Azure Key Vaults that experience a high volume of operations, indicating their criticality within the cloud environment. |
46
55
| Security Operations Admin Device | This rule applies to critical devices used to configure, manage, and monitor the security within an organization are vital for security operations administration and are at high risk of cyber threats. They require top-level security measures to prevent unauthorized access. |
47
56
48
-
49
57
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
0 commit comments