Skip to content

Commit aee5cde

Browse files
Merge branch 'main' into WI361499-restructure-and-categorise-secure-posture-docs
2 parents be9ab1b + 7ec2b7e commit aee5cde

File tree

167 files changed

+1123
-1843
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+1123
-1843
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-endpoint/threat-analytics-analyst-reports.md",
5+
"redirect_url": "/defender-xdr/threat-analytics-analyst-reports",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-endpoint/threat-analytics.md",
10+
"redirect_url": "/defender-xdr/threat-analytics",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "defender-endpoint/configure-microsoft-threat-experts.md",
515
"redirect_url": "/defender-xdr/defender-experts-for-hunting",

.openpublishing.redirection.defender-xdr.json

Lines changed: 46 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,51 @@
259259
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260260
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261261
"redirect_document_id": false
262-
}
262+
},
263+
{
264+
"source_path": "defender-xdr/first-incident-path-phishing.md",
265+
"redirect_url": "/security/operations/incident-response-playbook-phishing",
266+
"redirect_document_id": false
267+
},
268+
{
269+
"source_path": "defender-xdr/first-incident-path-identity.md",
270+
"redirect_url": "/defender-for-identity/manage-security-alerts",
271+
"redirect_document_id": false
272+
},
273+
{
274+
"source_path": "defender-xdr/incident-response-overview.md",
275+
"redirect_url": "/defender-xdr/incidents-overview",
276+
"redirect_document_id": true
277+
},
278+
{
279+
"source_path": "defender-xdr/respond-first-incident-analyze.md",
280+
"redirect_url": "/defender-xdr/investigate-incidents",
281+
"redirect_document_id": true
282+
},
283+
{
284+
"source_path": "defender-xdr/respond-first-incident-365-defender.md",
285+
"redirect_url": "/defender-xdr/manage-incidents",
286+
"redirect_document_id": true
287+
},
288+
{
289+
"source_path": "defender-xdr/export-incidents-queue.md",
290+
"redirect_url": "/defender-xdr/incident-queue",
291+
"redirect_document_id": true
292+
},
293+
{
294+
"source_path": "defender-xdr/respond-first-incident-remediate.md",
295+
"redirect_url": "/defender-xdr/incidents-overview",
296+
"redirect_document_id": false
297+
},
298+
{
299+
"source_path": "defender-xdr/m365d-time-zone.md",
300+
"redirect_url": "/defender-xdr/m365d-enable-faq",
301+
"redirect_document_id": true
302+
},
303+
{
304+
"source_path": "defender-xdr/feedback.md",
305+
"redirect_url": "/defender-xdr/m365d-enable-faq",
306+
"redirect_document_id": false
307+
},
263308
]
264309
}

ATPDocs/deploy/activate-capabilities.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -88,12 +88,16 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
8888

8989
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
9090

91-
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
91+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
9294

9395
> [!NOTE]
9496
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9597
96-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
98+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
99+
100+
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
97101

98102
## Onboarding Confirmation
99103

@@ -104,7 +108,7 @@ To confirm the sensor has been onboarded:
104108
2. Check that the onboarded domain controller is listed.
105109

106110
> [!NOTE]
107-
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
111+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
108112
109113
## Test activated capabilities
110114

@@ -126,7 +130,6 @@ In the Defender portal, select **Identities** > **Dashboard**, and review the de
126130

127131
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
128132

129-
130133
### Confirm entity page details
131134

132135
Confirm that entities, such as domain controllers, users, and groups, are populated as expected.
@@ -139,7 +142,7 @@ In the Defender portal, check for the following details:
139142

140143
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
141144

142-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
145+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
143146

144147
For more information, see [Investigate assets](../investigate-assets.md).
145148

@@ -205,18 +208,20 @@ Test remediation actions on a test user. For example:
205208
206209
1. In the Defender portal, go to the user details page for a test user.
207210
208-
1. From the **Options** menu, select any of the available remediation actions.
211+
2. From the **Options** menu, select any of the available remediation actions.
209212
210-
1. Check Active Directory for the expected activity.
213+
3. Check Active Directory for the expected activity.
211214
212215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
213216
214217
## Deactivate Defender for Identity capabilities on your domain controller
215218
216219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
217220
218-
1. In the Defender portal, select **Settings > Identities > Sensors**.
219-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
221+
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
222+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223+
224+
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
220225
221226
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
222227
186 KB
Loading
144 KB
Loading
169 KB
Loading

CloudAppSecurityDocs/tutorial-dlp.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@ Our approach to information protection can be split into the following phases th
7979
1. Under **Inspection method**, choose and configure one of the following classification services:
8080

8181
- **[Data Classification Services](dcs-inspection.md)**: Uses classification decisions you've made across Microsoft 365, Microsoft Purview Information Protection, and Defender for Cloud Apps to provide a unified labeling experience. This is the preferred content inspection method as it provides a consistent and unified experience across Microsoft products.
82-
- **[Built-in DLP](content-inspection-built-in.md)**: Inspects files for sensitive information using our built-in DLP content inspection engine.
8382

8483
1. For highly sensitive files, select **Create an alert** and choose the alerts you require, so that you're informed when there are files with unprotected sensitive information in your organization.
8584
1. Select **Create**.

defender-business/mdb-faq.yml

Lines changed: 38 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ sections:
5555
answer: |
5656
If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). This license is available as an add-on to Microsoft 365 Business Premium and the standalone version of Defender for Business. The Microsoft Defender for Business servers license is priced at $3 per server instance. You can either purchase a license for each onboarded server, or choose to offboard servers from Defender for Business.
5757
58-
If you have more than 60 servers, you'll need to get another license, such as [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers).
58+
If you have more than 60 servers, you'll need to get another license, such as Microsoft Defender for Endpoint Server or Microsoft Defender for Servers Plan 1 or Plan 2. For more information, see [Onboard servers to Microsoft Defender for Endpoint](/defender-endpoint/onboard-server).
5959
6060
- question: What is the difference between Microsoft Defender for Business servers and Microsoft Defender for Servers Plan 1 and Plan 2?
6161
answer: |
@@ -95,9 +95,13 @@ sections:
9595
9696
- question: How do I run custom reports with Defender for Business?
9797
answer: |
98-
Defender for Business uses the Defender for Endpoint APIs. You can use the APIs and a Power BI connector to set up custom reporting. As an example scenario, you could schedule a PowerShell script to generate executive summaries formatted in HTML, and send those summaries via email.
98+
Defender for Business uses the Defender for Endpoint APIs for all the capabilities that are available in Defender for Business. You can use the APIs with a reporting tool. As an example scenario, you can use a Power BI connector and schedule a PowerShell script to generate executive summaries formatted in HTML, and send those summaries via email.
9999
100-
For more information, see [API reference information](/defender-endpoint/api/exposed-apis-create-app-partners). Also see [Microsoft Defender for Business and Microsoft partner resources](mdb-partners.md).
100+
For more information, see the following resources:
101+
102+
- [Overview of management and APIs](/defender-endpoint/api/management-apis)
103+
- [API reference information](/defender-endpoint/api/exposed-apis-create-app-partners)
104+
- [Microsoft Defender for Business and Microsoft partner resources](mdb-partners.md)
101105
102106
- question: I'm a Microsoft partner. Will I be able to manage multiple tenants from one control panel, or will I have to sign in to each tenant individually?
103107
answer: |
@@ -128,19 +132,41 @@ sections:
128132
129133
- question: What are the differences between Defender for Business and Defender for Endpoint Plans 1 and 2?
130134
answer: |
131-
Both Defender for Business and Defender for Endpoint provide strong threat protection capabilities for your company's devices (computers, phones, and tablets, which are also referred to as endpoints). The following table summarizes some key differences between these plans.
135+
[Defender for Business](mdb-overview.md) is designed for small and medium-sized businesses who have up to 300 users. Capabilities in Defender for Business include next-generation protection, attack surface reduction, endpoint detection & response (EDR), and automated investigation and remediation. Defender for Business also features [simplified configuration](mdb-setup-configuration.md) and [device onboarding options](mdb-onboard-devices.md) that streamline the overall setup and configuration process.
132136
133-
| Subscription | Description |
134-
|--|--|
135-
| Defender for Business | [Defender for Business](mdb-overview.md) is designed for small and medium-sized businesses who have up to 300 users. Capabilities in Defender for Business include next-generation protection, attack surface reduction, endpoint detection & response (EDR), and automated investigation and remediation. <br/><br/>Defender for Business also features [simplified configuration](mdb-setup-configuration.md) and [device onboarding options](mdb-onboard-devices.md) that streamline the overall setup and configuration process. |
136-
| Defender for Endpoint | [Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) is an enterprise endpoint security platform designed to help organizations prevent, detect, investigate, and respond to advanced threats. <br/><br/>Defender for Endpoint Plan 1 includes next-generation protection and attack surface reduction capabilities. <br/><br/>Defender for Endpoint Plan 2 extends Plan 1 capabilities with threat and vulnerability management, EDR, automated investigation & remediation, threat hunting, and six months of data retention. |
137+
[Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) is an enterprise endpoint security platform designed to help organizations prevent, detect, investigate, and respond to advanced threats.
137138
139+
- Defender for Endpoint Plan 1 includes next-generation protection and attack surface reduction capabilities.
140+
- Defender for Endpoint Plan 2 extends Plan 1 capabilities with core vulnerability management capabilities, EDR, automated investigation & remediation, threat hunting, and six months of data retention.
141+
142+
The following table summarizes some differences between Defender for Business and Defender for Endpoint:
143+
144+
| Capabilities | Defender for Business | Defender for Endpoint Plan 1 | Defender for Endpoint Plan 2 |
145+
|---|---|---|---|
146+
| Centralized management | ✔ | ✔ | ✔ |
147+
| Simplified firewall and antivirus configuration for Windows | ✔ | | |
148+
| Vulnerability management (core capabilities) | ✔ | | ✔ |
149+
| Attack surface reduction | ✔ | ✔ | ✔ |
150+
| Next-generation protection | ✔ | ✔ | ✔ |
151+
| Endpoint detection & response (EDR) | ✔ <br/>(optimized) | | ✔ |
152+
| Automatic attack disruption | ✔ | | ✔ |
153+
| Automated investigation & remediation | ✔ | | ✔ |
154+
| Monthly security summary reporting | ✔ | | ✔ |
155+
| 30 days advanced hunting and six months of data retention in the device timeline | | | ✔ |
156+
| Threat analytics | ✔<br/>(optimized) | | ✔ |
157+
| Cross-platform support <br/>(Mac, iOS, Android)| ✔ | ✔ | ✔ |
158+
| Windows Server and Linux Server <br/>(requires server licenses) | ✔ | ✔ | ✔ |
159+
| Microsoft Threat Experts | | | ✔ |
160+
| Microsoft 365 Lighthouse <br/>(optimized; for CSPs only) | ✔ | | |
161+
| Microsoft Defender multi-tenant management | ✔ | ✔ | ✔ |
162+
| APIs | ✔ | ✔ | ✔ |
163+
138164
- question: Can I have a mix of Microsoft endpoint security subscriptions?
139165
answer: |
140-
In general, mixed-licensing scenarios aren't supported in Defender for Business or Microsoft 365 Business Premium.
141-
142-
If you're using the standalone version of Defender for Business, and you add Defender for Endpoint Plan 2 to your tenant, your experience defaults to the Defender for Business experience. However, if you have enough Defender for Endpoint Plan 2 for all users in your tenant, you can contact support and change your experience to the Defender for Endpoint Plan 2 experience. In this case, you're no longer using your Defender for Business licenses, and the simplified configuration experience in Defender for Business changes to advanced settings in Defender for Endpoint.
143-
166+
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in Microsoft 365 E5 Security) defaults to the Defender for Business experience.
167+
168+
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add Microsoft 365 E5 Security for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or Microsoft 365 E5 Security), and then contact Microsoft Support to request the switch for your tenant.
169+
144170
For more information, see [Manage your subscription settings](mdb-manage-subscription.md).
145171
146172
For more information about licenses and product terms, see [Licensing and product terms for Microsoft 365 subscriptions](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA).

0 commit comments

Comments
 (0)