Skip to content

Commit ab8748f

Browse files
committed
Merge branch 'main' into v-smandalika-9477468
2 parents 9845371 + 0949fd1 commit ab8748f

File tree

48 files changed

+301
-166
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+301
-166
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,30 @@ For more information on what's new with other Microsoft Defender security produc
2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

2222

23+
## October 2024
24+
25+
### New anomaly data in advanced hunting CloudAppEvents table
26+
27+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.
28+
The new columns are designed to assist you to better __identify uncommon activities__ that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
29+
30+
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
31+
32+
### New Conditional Access app control / inline data in advanced hunting CloudAppEvents table
33+
34+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
35+
Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
36+
37+
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
38+
39+
### New data in advanced hunting CloudAppEvents table - OAuthAppId
40+
41+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new _OAuthAppId_ column for queries and detection rules.
42+
43+
Using _OAuthAppId_ allows the queries that consider specific OAuth applications, making queries and detection rules more accurate.
44+
45+
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
46+
2347
## September 2024
2448

2549
### Enforce Edge in-browser when accessing business apps
@@ -28,7 +52,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
2852
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
2953

3054
For more information see:
31-
[Enforce Edge in-browser protection when accessing business apps](https://learn.microsoft.com/defender-cloud-apps/in-browser-protection#enforce-edge-in-browser-when-accessing-business-apps)
55+
[Enforce Edge in-browser protection when accessing business apps](/defender-cloud-apps/in-browser-protection)
3256

3357
### Connect Mural to Defender for Cloud Apps (Preview)
3458

@@ -146,7 +170,7 @@ Microsoft Defender for Cloud Apps log collector now supports [Azure Kubernetes S
146170

147171
For more information, see [Configure automatic log upload using Docker on Azure Kubernetes Service (AKS)](discovery-kubernetes.md).
148172

149-
### New Conditional Access app control / inline data for the advanced hunting CloudAppEvents table
173+
### New Conditional Access app control / inline data for the advanced hunting CloudAppEvents table (Preview)
150174

151175
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules. Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
152176

@@ -224,7 +248,7 @@ Automatic log collection is supported using a Docker container on multiple opera
224248

225249
For more information, see [Configure automatic log upload using Podman](discovery-linux-podman.md).
226250

227-
### New anomaly data for the advanced hunting CloudAppEvents table
251+
### New anomaly data for the advanced hunting CloudAppEvents table (Preview)
228252

229253
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules. Using this data helps to rule out false positives and find anomalies.
230254

defender-endpoint/endpoint-attack-notifications.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,10 @@ ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15+
ms.custom: cx-ean
1516
ms.subservice: edr
1617
search.appverid: met150
17-
ms.date: 08/15/2024
18+
ms.date: 10/30/2024
1819
---
1920

2021
# Endpoint Attack Notifications

defender-endpoint/evaluate-mda-using-mde-security-settings-management.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,10 @@ ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15+
ms.custom: cx-ean
1516
ms.subservice: edr
1617
search.appverid: met150
17-
ms.date: 05/13/2024
18+
ms.date: 10/30/2024
1819
---
1920

2021
# Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)

defender-endpoint/machines-view-overview.md

Lines changed: 176 additions & 84 deletions
Large diffs are not rendered by default.

defender-endpoint/malware/trojans-malware.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ Trojans can come in many different varieties, but generally they do the followin
4343

4444
Use the following free Microsoft software to detect and remove it:
4545

46-
- [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) for Windows 10 and Windows 8.1, or [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for previous versions of Windows.
47-
46+
- [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) for Windows 10 and 11.
4847
- [Microsoft Safety Scanner](../safety-scanner-download.md)
4948

5049
For more general tips, see [prevent malware infection](prevent-malware-infection.md).

defender-endpoint/malware/unwanted-software.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,9 +45,7 @@ To prevent unwanted software infection, download software only from official web
4545

4646
Use [Microsoft Edge](/microsoft-edge/deploy/index) when browsing the internet. Microsoft Edge includes additional protections that effectively block browser modifiers that can change your browser settings. Microsoft Edge also blocks known websites hosting unwanted software using [Windows Defender SmartScreen](/microsoft-edge/deploy/index) (also used by Internet Explorer).
4747

48-
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
49-
50-
Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
48+
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10 and 11. It provides real-time protection against threats and detects and removes known unwanted software.
5149

5250
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
5351

defender-endpoint/malware/worms-malware.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,6 @@ This image shows how a worm can quickly spread through a shared USB drive.
4949

5050
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
5151

52-
Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
53-
5452
In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
5553

5654
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
648 Bytes
Loading

defender-endpoint/safety-scanner-download.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Microsoft Safety Scanner is a scan tool designed to find and remove malware from
4040

4141
- Safety Scanner is a portable executable and doesn't appear in the Windows Start menu or as an icon on the desktop. Note where you saved this download.
4242

43-
- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security) or [Microsoft Security Essentials on Windows 7](https://support.microsoft.com/help/14210/security-essentials-download). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
43+
- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
4444

4545
## System requirements
4646

@@ -60,7 +60,6 @@ For more information about the Safety Scanner, see the support article on [how t
6060

6161
- [Troubleshooting Safety Scanner](https://support.microsoft.com/help/2520970/how-to-troubleshoot-an-error-when-you-run-the-microsoft-safety-scanner)
6262
- [Microsoft Defender Antivirus](https://www.microsoft.com/windows/comprehensive-security)
63-
- [Microsoft Security Essentials](https://support.microsoft.com/help/14210/security-essentials-download)
6463
- [Removing difficult threats](https://support.microsoft.com/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malware)
6564
- [Submit file for malware analysis](https://www.microsoft.com/wdsi/filesubmission)
6665
- [Microsoft antimalware and threat protection solutions](microsoft-defender-endpoint.md)

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -631,7 +631,7 @@ sections:
631631
632632
- Engine Version: Antimalware Engine version
633633
634-
NOTE: Whenever Microsoft Defender Antivirus, Microsoft Security Essentials, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it restores the following system settings and services that might have been changed by the malware:
634+
Note: Whenever Microsoft Defender Antivirus, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it restores the following system settings and services that might have been changed by the malware:
635635
636636
- Default Internet Explorer or Microsoft Edge setting
637637

0 commit comments

Comments
 (0)