Skip to content

Commit ad66c7a

Browse files
authored
Merge pull request #3735 from MicrosoftDocs/main
[AutoPublish] main to live - 05/12 10:31 PDT | 05/12 23:01 IST
2 parents 2f1e5c9 + 5180c8c commit ad66c7a

File tree

9 files changed

+44
-18
lines changed

9 files changed

+44
-18
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ ms.topic: how-to
77

88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025.
12+
>
13+
1014
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1115

1216
> [!NOTE]

ATPDocs/whats-new.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,9 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## May 2025
2626

27+
### Local administrators collection (using SAM-R queries) feature will be disabled
28+
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored.
29+
2730
### New Health Issue
2831

2932
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.

CloudAppSecurityDocs/cloud-discovery-policies.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Discovery policies enable you to set alerts that notify you when new apps are de
4444

4545
> [!NOTE]
4646
>
47-
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it may trigger additional alerts for apps that have already been discovered and alerted on.
48-
> - Data from **snapshot reports** do not trigger alerts in app discovery policies.
47+
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it might trigger additional alerts for apps that have already been discovered and alerted on.
48+
> - Data from **snapshot reports** don't trigger alerts in app discovery policies.
4949
5050
For example, if you're interested in discovering risky hosting apps found in your cloud environment, set your policy as follows:
5151

@@ -73,6 +73,11 @@ Defender for Cloud Apps searches all the logs in your cloud discovery for anomal
7373

7474
1. Under **Apply to** choose whether this policy applies **All continuous reports** or **Specific continuous reports**. Select whether the policy applies to **Users**, **IP addresses**, or both.
7575

76+
:::image type="content" source="media/apply-to-continous-reports.png" alt-text="Screenshot showing how to apply file polcies to specific continous reports" lightbox="media/apply-to-continous-reports.png":::
77+
78+
> [!IMPORTANT]
79+
> When you configure an app discovery policy and select **Apply to > All continuous reports**, multiple alerts are generated for each discovery stream, including the global stream which aggregates data from all sources. To control alert volume, select **Apply to > Specific continuous reports** and choose only the relevant streams for your policy.
80+
> Learn more: [Defender for Cloud apps continuous risk assessment reports](set-up-cloud-discovery.md#snapshot-and-continuous-risk-assessment-reports)
7681
1. Select the dates during which the anomalous activity occurred to trigger the alert under **Raise alerts only for suspicious activities occurring after date.**
7782

7883
1. Set a **Daily alert limit** under **Alerts**. Select if the alert is sent as an email. Then provide email addresses as needed.
61.6 KB
Loading

defender-endpoint/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,7 @@
326326
- name: User experiences in Defender for Endpoint on Android
327327
href: android-new-ux.md
328328
- name: User experiences in Defender for Endpoint on iOS
329+
href: ios-new-ux.md
329330
- name: Mobile device resources for Defender for Endpoint
330331
href: mobile-resources-defender-endpoint.md
331332
- name: Configure Defender for Endpoint on Android features

defender-endpoint/data-storage-privacy.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Microsoft Defender for Endpoint data storage and privacy
33
description: Learn about how Microsoft Defender for Endpoint handles privacy and data that it collects.
44
keywords: Microsoft Defender for Endpoint, data storage and privacy, storage, privacy, licensing, geolocation, data retention, data
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 08/20/2024
19+
ms.date: 05/12/2025
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -27,7 +27,6 @@ ms.date: 08/20/2024
2727

2828
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
3130
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3231

3332
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)

defender-vulnerability-management/tvm-security-baselines.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 04/24/2025
15+
ms.date: 05/12/2025
1616
---
1717

1818
# Security baselines assessment
@@ -33,14 +33,14 @@ A security baseline profile is a customized profile that you can create to asses
3333
Security baselines provide support for Center for Internet Security (**CIS)** benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (**STIG)** benchmarks for Windows 10 and Windows Server 2019.
3434

3535
> [!NOTE]
36-
> The benchmarks currently only support Group Policy Object (GPO) configurations and not Microsoft Configuration Manager (Intune).
36+
> - The benchmarks currently only support Group Policy Object (GPO) configurations and not Microsoft Configuration Manager (Intune).</br>
37+
> - Security baseline assessment is not supported on non-English Windows system locale.</br>
38+
> - Security baseline assessment is not supported when DFSS (Dynamic Fair Share Scheduling) is enabled on Windows Server 2012 R2.</br>
39+
> - For security baseline assessment to be successful, **PowerShell Constrained Language Mode** must be set to **off** on your devices.
3740
3841
> [!TIP]
3942
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
4043
41-
> [!NOTE]
42-
> Security baseline assessment is not supported when DFSS (Dynamic Fair Share Scheduling) is enabled on Windows Server 2012 R2.
43-
4444
## Get started with security baselines assessment
4545

4646
1. Go to **Vulnerability management** > **Baselines assessment** in the [Microsoft Defender portal](https://security.microsoft.com).
@@ -74,9 +74,6 @@ Useful icons to be aware of:
7474

7575
![Not using the default value](/defender/media/defender-vulnerability-management/customized_value.png) - This configuration has been customized and is not using the default value.
7676

77-
> [!NOTE]
78-
> For security baseline assessment to be successful, **PowerShell Constrained Language Mode** must be set to **off** on your devices.
79-
8077
## Security baselines assessment overview
8178

8279
On the security baselines assessment overview page you can view device compliance, profile compliance, top failing devices and top misconfigured devices.

defender-xdr/alert-policies.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -344,4 +344,12 @@ Here are some tasks you can perform to manage alerts.
344344
- The name (and link) of the corresponding alert policy.
345345
- The incident where the alert is aggregated.
346346
347-
- [**Tune an alert**](investigate-alerts.md#tune-an-alert): You can set properties, conditions, and actions to hide or resolve an alert.
347+
- **[Tune an alert](investigate-alerts.md#tune-an-alert)**: You can set properties, conditions, and actions to hide or resolve an alert.
348+
- **Change the severity level for an alert policy**
349+
350+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) using credentials for an administrator account in your Microsoft 365 organization.
351+
2. Navigate to **Email & Collaboration > Policies & rules** page, then select **Alerts policy**.
352+
3. Select the policy you want to update from the list. In the **Actions** column, select the three dots then select **Edit**.
353+
4. In the **Edit Policy** pane, select the dropdown menu to adjust the **Severity** level. If applicable, you can also modify the **Trigger settings** for the policy.
354+
5. Select **Next** to proceed to rest of the steps.
355+
6. Select **Submit** to apply the new changes to the policy, then select **Done** to finish editing.

unified-secops-platform/mto-advanced-hunting.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ Multiple workspaces per tenant are supported in multitenant Advanced hunting as
3232

3333
Advanced hunting in multitenant organizations returns up to 50,000 records in total. For more information about service limits in advanced hunting, read [Understand advanced hunting quotas](/defender-xdr/advanced-hunting-limits#understand-advanced-hunting-quotas-and-usage-parameters).
3434

35+
36+
3537
## Run cross-tenant queries
3638

3739
You can run any query that you already have access to in the multitenant management **Advanced hunting** page.
@@ -72,8 +74,6 @@ You can run any query that you already have access to in the multitenant managem
7274
To learn more about advanced hunting in Microsoft Defender XDR, read [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
7375

7476

75-
76-
7777
## Run cross-workspace queries (Preview)
7878

7979
To run queries across multiple workspaces in the same tenant, use the [workspace( ) expression](/azure/azure-monitor/logs/cross-workspace-query#query-across-log-analytics-workspaces-using-workspace), with the workspace identifier as the argument in your query to refer to a table in a different workspace.
@@ -98,8 +98,17 @@ For more information, see [Query multiple workspaces](/azure/sentinel/extend-sen
9898
> [!NOTE]
9999
> If you have tables with the same name but different schemas in multiple workspaces and want to use them in the same query, you should use the workspace operator to uniquely identify the table that you need.
100100
101+
## View schema tables
102+
103+
You can view the [advanced hunting schema tables](/defender-xdr/advanced-hunting-schema-tables) in the left pane inside the advanced hunting page under the **Schema** tab.
104+
105+
The schema list is a unified view of all tables from all your tenants regardless of the tenant selected in the upper right tenant selector.
106+
107+
This could mean that some tables that appear here might only be available for query in some tenants, like custom Microsoft Sentinel tables.
108+
109+
110+
## View and manage custom detection rules
101111

102-
## Custom detection rules
103112

104113
You can also manage custom detection rules from multiple tenants in the custom detection rules page.
105114

0 commit comments

Comments
 (0)