You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/behaviors.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
26
26
27
27
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
28
28
29
-
|Alert name |Policy name |
30
-
|---------|---------|
31
-
|**Activity from infrequent country**|Activity from infrequent country/region |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
105
105
106
106
1. Change to root privileges using `sudo -i`.
107
107
108
-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108
+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ The following steps describe the deployment in Ubuntu. The deployment steps for
105
105
export https_proxy='<IP>:<PORT>'
106
106
```
107
107
108
-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108
+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/siem.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ Integrating with your SIEM is accomplished in three steps:
84
84
85
85
### Step 2: Download the JAR file and run it on your server
86
86
87
-
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the [software license terms](https://go.microsoft.com/fwlink/?linkid=862491), download the .zip file and unzip it.
87
+
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the software license terms, download the .zip file and unzip it.
Copy file name to clipboardExpand all lines: defender-endpoint/live-response.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,11 +122,11 @@ The dashboard also gives you access to:
122
122
## Initiate a live response session on a device
123
123
124
124
> [!NOTE]
125
-
> Live response actions initiated from the Device page are not available in the machineactions API.
125
+
> Live response actions initiated from the Device page are not available in the MachineActions API.
126
126
127
-
1. Sign in to Microsoft Defender portal.
127
+
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com).
128
128
129
-
2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
129
+
2. Navigate to **Endpoints** > **Device inventory** and select a device to investigate. The devices page opens.
130
130
131
131
3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
132
132
@@ -235,17 +235,20 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
235
235
236
236
#### To upload a file in the library
237
237
238
-
1. Click **Upload file to library**.
238
+
> [!NOTE]
239
+
> There are restrictions on the characters that can be uploaded to the library. Use alphanumeric characters and some symbols (specifically, `-`, `_`, or `.`).
240
+
241
+
1. Select **Upload file to library**.
239
242
240
-
2.Click**Browse** and select the file.
243
+
2.Select**Browse** and select the file.
241
244
242
245
3. Provide a brief description.
243
246
244
247
4. Specify if you'd like to overwrite a file with the same name.
245
248
246
249
5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
247
250
248
-
6.Click**Confirm**.
251
+
6.Select**Confirm**.
249
252
250
253
7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
251
254
@@ -254,7 +257,7 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
254
257
Anytime during a session, you can cancel a command by pressing CTRL + C.
255
258
256
259
> [!WARNING]
257
-
> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
260
+
> Using this shortcut doesn't stop the command in the agent side. It only cancels the command in the Microsoft Defender portal. So, changing operations such as "remediate" may continue, even if the command is canceled.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -242,6 +242,10 @@ If you hover over a horizontal band in the diagram, you see the number of relate
242
242
243
243
:::image type="content" source="media/mail-flow-status-report-mailflow-view-details.png" alt-text="The Phishing block details in Mailflow view in the Mailflow status report." lightbox="media/mail-flow-status-report-mailflow-view-details.png":::
244
244
245
+
In Defender for Office 365, if you select **Phishing block**\>**General filter**, threat classification results are shown. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
246
+
247
+
:::image type="content" source="media/mail-flow-status-report-mailflow-view-phishing-block-threat-class.png" alt-text="Screenshot of selecting Phishing block, General filter in the Mailflow view of the Mailflow status report." lightbox="media/mail-flow-status-report-mailflow-view-phishing-block-threat-class.png":::
248
+
245
249
The details table below the diagram shows the following information:
246
250
247
251
-**Date (UTC)**
@@ -688,7 +692,7 @@ In the details table below the chart, the following information is available:
688
692
-**Subject**
689
693
-**Sender**
690
694
-**Recipients**
691
-
-**Detection technology**: The same detection technology values from the chart.
695
+
-**Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
692
696
-**Delivery status**
693
697
-**Sender IP**
694
698
-**Tags**: For more information about user tags, see [User tags](user-tags-about.md).
@@ -732,6 +736,91 @@ In Defender for Microsoft 365, the following actions are available at the top of
732
736
733
737
On the **Threat protection status** page, the :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
734
738
739
+
### View data by Email \> Phish and Chart breakdown by Threat classification (Defender for Office 365)
740
+
741
+
:::image type="content" source="media/threat-protection-status-report-phishing-threat-classification-view.png" alt-text="The Threat classification view for phishing email in the Threat protection status report." lightbox="media/threat-protection-status-report-phishing-threat-classification-view.png":::
742
+
743
+
Threat classification in Defender for Office 365 uses AI to identify and categorize threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
744
+
745
+
In the **View data by Email \> Phish** view, selecting **Chart breakdown by Threat classification** shows the following information in the chart:
746
+
747
+
-**PII Gathering**
748
+
-**Business intelligence**
749
+
-**Invoice**
750
+
-**Payroll**
751
+
-**Gift card**
752
+
-**Contact establishment**
753
+
-**Task**
754
+
-**None**
755
+
756
+
In the details table below the chart, the following information is available:
757
+
758
+
-**Date**
759
+
-**Subject**
760
+
-**Sender**
761
+
-**Recipients**
762
+
-**Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
763
+
-**Threat classification**: The same threat classification values shown in the chart and described in [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
764
+
-**Delivery status**
765
+
-**Sender IP**
766
+
-**Tags**: For more information about user tags, see [User tags](user-tags-about.md).
767
+
768
+
To see all columns, you likely need to do one or more of the following steps:
769
+
770
+
- Horizontally scroll in your web browser.
771
+
- Narrow the width of appropriate columns.
772
+
- Zoom out in your web browser.
773
+
774
+
Select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
775
+
776
+
-**Date (UTC)****Start date** and **End date**
777
+
-**Detection** section:
778
+
-**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.
779
+
-**Advanced filter**: Phishing signals based on machine learning.
780
+
-**General filter**: Phishing signals based on analyst rules.
781
+
-**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.
782
+
-**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.
783
+
-**Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
784
+
-**Impersonation brand**: Sender impersonation of well-known brands.
785
+
-**Mixed analysis detection**: Multiple filters contributed to the message verdict.
786
+
-**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
787
+
-**Fingerprint matching**: The message closely resembles a previous detected malicious message.
788
+
-**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
789
+
-**URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
790
+
-**Impersonation user**: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
791
+
-**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
792
+
-**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
793
+
-**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
794
+
-**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
795
+
-**Campaign**: Messages identified as part of a [campaign](campaigns.md).
796
+
-**Threat classification**: Leave the value **All** or remove it, double-click in the empty box, and then select an available value.
797
+
-**Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
798
+
-**Evaluation**: **Yes** or **No**.
799
+
-**Protected by**: **MDO** (Defender for Office 365) and **EOP**
800
+
-**Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.
801
+
-**Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).
802
+
-**Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
803
+
-**Policy type**: Select **All** or one of the following values:
804
+
-**Anti-malware**
805
+
-**Safe Attachments**
806
+
-**Anti-phish**
807
+
-**Anti-spam**
808
+
-**Mail flow rule** (transport rule)
809
+
-**Others**
810
+
-**Policy name (details table view only)**: Select **All** or a specific policy.
811
+
-**Recipients (separated by commas)**
812
+
813
+
When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
814
+
815
+
If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
816
+
817
+
The following actions are available at the top of the Email summary panel for the Threat protection status report:
818
+
819
+
- :::image type="icon" source="media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity**: For more information, see [The Email entity page in Microsoft Defender for Office 365](mdo-email-entity-page.md).
820
+
- :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action**: For information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard).
821
+
822
+
On the **Threat protection status** page, the :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
823
+
735
824
### Chart breakdown by Delivery status
736
825
737
826
:::image type="content" source="media/threat-protection-status-report-phishing-delivery-status-view.png" alt-text="The Delivery status view for phishing email and malware email in the Threat protection status report." lightbox="media/threat-protection-status-report-phishing-delivery-status-view.png":::
@@ -754,7 +843,7 @@ In the details table below the chart, the following information is available:
754
843
-**Subject**
755
844
-**Sender**
756
845
-**Recipients**
757
-
-**Detection technology**: The same detection technology values from the chart.
846
+
-**Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
758
847
-**Delivery status**
759
848
-**Sender IP**
760
849
-**Tags**: For more information about user tags, see [User tags](user-tags-about.md).
@@ -811,7 +900,7 @@ In the details table below the chart, the following information is available:
811
900
-**Date**
812
901
-**Attachment filename**
813
902
-**Workload**
814
-
-**Detection technology**: The same detection technology values from the chart.
903
+
-**Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
0 commit comments