Skip to content

Commit b00d412

Browse files
authored
Merge branch 'main' into docs-editor/mde-security-settings-manageme-1747877571
2 parents b0c3572 + 80b6f6f commit b00d412

25 files changed

+303
-97
lines changed

ATPDocs/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,14 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## May 2025
2626

27+
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)
28+
Defender for Identity now supports deploying its new sensor on Domain Controllers without requiring Defender for Endpoint onboarding. This simplifies sensor activation and expands deployment flexibility. [Learn more](deploy/activate-capabilities.md).
29+
30+
31+
### Improved Visibility into Defender for Identity New Sensor Eligibility in the Activation page
32+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify non-eligible servers and take action to update and onboard them for enhanced identity protection.
33+
34+
2735
### Local administrators collection (using SAM-R queries) feature will be disabled
2836
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
2937

CloudAppSecurityDocs/discovered-apps.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,9 @@ You also might want to identify specific app instances that are in use by invest
6666
:::image type="content" source="media/discovered-apps/subdomains-image.png" alt-text="Subdomain filter.":::
6767

6868
> [!NOTE]
69-
> Deep dives into discovered apps are supported only only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
69+
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
7070
>
71-
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalogue, the subdomain is tagged as **Other**.
71+
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalog, the subdomain is tagged as **Other**.
7272
7373
## Discover resources and custom apps
7474

@@ -102,6 +102,9 @@ The best way to get an overview of Shadow IT use across your organization is by
102102
1. From the **Cloud discovery** page, select **Actions** > **Generate Cloud Discovery executive report**.
103103

104104
1. Optionally, change the report name, and then select **Generate**.
105+
106+
> [!NOTE]
107+
> The executive summary report is revamped to a 6-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
105108
106109
## Exclude entities
107110

@@ -154,7 +157,7 @@ We recommend deleting cloud discovery data in the following cases:
154157
- If many users or IP addresses recently started working again after being offline for some time, their activity is identified as anomalous and might give you false positive violations.
155158

156159
> [!IMPORTANT]
157-
> Make sure you want to delete data before doing so. This action is irreversbile and deletes **all** cloud discovery data in the system.
160+
> Make sure you want to delete data before doing so. This action is irreversible and deletes **all** cloud discovery data in the system.
158161
>
159162
160163
**To delete cloud discovery data**:
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
title: Migrate to Supported API Solutions
3+
description: This article describes how to transition from the legacy Defender for Cloud Apps SIEM agent to supported APIs.
4+
ms.date: 05/19/2025
5+
ms.topic: article
6+
---
7+
8+
# Migrate from Defender for Cloud Apps SIEM agent to supported APIs
9+
10+
Transitioning from the legacy [Defender for Cloud Apps SIEM agent ](siem.md) to supported APIs enables continued access to enriched activities and alerts data. While the APIs might not have exact one-to-one mappings to the legacy Common Event Format (CEF) schema, they provide comprehensive, enhanced data through integration across multiple Microsoft Defender workloads.
11+
12+
## Recommended APIs for migration
13+
14+
> To ensure continuity and access to data currently available through Microsoft Defender for Cloud Apps SIEM agents, we recommend transitioning to the following supported APIs:
15+
>
16+
> - For alerts and activities, see: [Microsoft Defender XDR Streaming API](/defender-xdr/streaming-api).
17+
> - For Microsoft Entra ID Protection logon events, see [IdentityLogonEvents](/defender-xdr/advanced-hunting-identitylogonevents-table) table in the advanced hunting schema.
18+
> - For Microsoft Graph Security Alerts API, see: [List alerts_v2](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
19+
> - To view Microsoft Defender for Cloud Apps alerts data in the Microsoft Defender XDR incidents API, see [Microsoft Defender XDR incidents APIs and the incidents resource type](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
20+
21+
## Field Mapping from Legacy SIEM to Supported APIs
22+
23+
The table below compares the legacy SIEM agent’s CEF fields to the nearest equivalent fields in the Defender XDR Streaming API (advanced hunting event schema) and the Microsoft Graph Security Alerts API.
24+
25+
26+
| CEF Field (MDA SIEM) | Description | Defender XDR Streaming API (CloudAppEvents/AlertEvidence/AlertInfo) | Graph Security Alerts API (v2) |
27+
|---------------------------------------|-------------------------------------------------------------|--------------------------------------------------------------------------------------------------|----------------------------------------------------------------|
28+
| `start` | Activity or alert timestamp | `Timestamp` | `firstActivityDateTime` |
29+
| `end` | Activity or alert timestamp | None | `lastActivityDateTime` |
30+
| `rt` | Activity or alert timestamp | `createdDateTime` | `createdDateTime` / `lastUpdateDateTime` / `resolvedDateTime` |
31+
| `msg` | Alert or activity description as shown in the portal in a human readable format | The closest structured fields that contribute to a similar description: `actorDisplayName`, `ObjectName`, `ActionType`, `ActivityType` | `description` |
32+
| `suser` | Activity or alert subject user | `AccountObjectId`, `AccountId`, `AccountDisplayName` | See `userEvidence` resource type |
33+
| `destinationServiceName` | Activity or alert from the originating app (for example, SharePoint, Box) | `CloudAppEvents > Application` | See `cloudApplicationEvidence` resource type |
34+
| `cs<X>Label`, `cs<X>` | Alert or activity dynamic fields (for example, target user, object) | `Entities`, `Evidence`, `additionalData`, `ActivityObjects` | Various `alertEvidence` resource types |
35+
| `EVENT_CATEGORY_*` | High-level activity category | `ActivityType` / `ActionType` | `category` |
36+
| `<name>` | Matched policy name | `Title`, `alertPolicyId` | `Title`, `alertPolicyId` |
37+
| `<ACTION>` (Activities) | Specific activity type | `ActionType` | N/A |
38+
| `externalId` (Activities) | Event ID | `ReportId` | N/A |
39+
| `requestClientApplication` (activities)| User agent of the client device in activities | `UserAgent` | N/A |
40+
| `Dvc` (activities) | Client device IP | `IPAddress` | N/A |
41+
| `externalId` (Alert) | Alert ID | `AlertId` | `id` |
42+
| `<alert type>` | Alert type (for example, ALERT_CABINET_EVENT_MATCH_AUDI) | - | - |
43+
| `Src` / `c6a1` (alerts) | Source IP | `IPAddress` | `ipEvidence` resource type |
44+
45+
46+
## Related content
47+
48+
- [Generic SIEM integration](siem.md)
49+
- [Microsoft Sentinel integration (Preview)](siem-sentinel.md)

CloudAppSecurityDocs/release-notes.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,18 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2929

3030
## May 2025
3131

32+
### Changes to Microsoft Defender for Cloud Apps SIEM agent availability
33+
34+
As part of our ongoing convergence process across Microsoft Defender workloads, [Microsoft Defender for Cloud Apps SIEM agents](siem.md) will be deprecated starting November 2025.
35+
36+
To ensure continuity and access to data currently available through Microsoft Defender for Cloud Apps SIEM agents, we recommend transitioning to the following supported APIs:
37+
- For alerts and activities, see: [Microsoft Defender XDR Streaming API](/defender-xdr/streaming-api).
38+
- For Microsoft Entra ID Protection logon events, see [IdentityLogonEvents](/defender-xdr/advanced-hunting-identitylogonevents-table) table in the advanced hunting schema.
39+
- For Microsoft Graph Security Alerts API, see: [List alerts_v2](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
40+
- To view Microsoft Defender for Cloud Apps alerts data in the Microsoft Defender XDR incidents API, see [Microsoft Defender XDR incidents APIs and the incidents resource type](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
41+
42+
For detailed guidance see: [Migrate from Defender for Cloud Apps SIEM agent to supported APIs](migrate-to-supported-api-solutions.md)
43+
3244
### New and improved Cloud App Catalog page
3345

3446
The Cloud app catalog page has been revamped to meet security standards. The new design includes improved navigation, making it easier for you to discover and manage your cloud applications.

CloudAppSecurityDocs/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,8 @@ items:
315315
- name: Governing connected apps
316316
href: governance-actions.md
317317
displayName: governance actions
318+
- name: Integrate with SIEM and API solutions
319+
items:
318320
- name: Manage events with SIEM solutions
319321
items:
320322
- name: Integrate with Microsoft Sentinel
@@ -323,6 +325,8 @@ items:
323325
href: siem.md
324326
- name: Troubleshooting SIEM solutions
325327
href: troubleshooting-siem.md
328+
- name: Migrate from SIEM agents to supported API solutions
329+
href: migrate-to-supported-api-solutions.md
326330
- name: Customize alert automation with Power Automate
327331
items:
328332
- name: Customize alert automation with Power Automate

defender-endpoint/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -160,8 +160,6 @@
160160
items:
161161
- name: Onboard servers through Defender for Endpoint's experience
162162
href: onboard-server.md
163-
- name: Defender for Endpoint on Windows Server with SAP
164-
href: mde-sap-windows-server.md
165163
- name: Onboard Windows devices using Configuration Manager
166164
href: configure-endpoints-sccm.md
167165
- name: Onboard Windows devices using Group Policy
@@ -172,6 +170,12 @@
172170
href: configure-endpoints-vdi.md
173171
- name: Direct onboarding with Defender for Cloud
174172
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
173+
- name: Defender for Endpoint on Windows Server with SAP
174+
href: mde-sap-windows-server.md
175+
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
176+
href: mde-linux-deployment-on-sap.md
177+
- name: Use custom detection rules to protect SAPXPG
178+
href: mde-sap-custom-detection-rules.md
175179
- name: Defender for Endpoint on macOS
176180
items:
177181
- name: Deploy Defender for Endpoint on macOS
@@ -275,8 +279,6 @@
275279
href: linux-install-manually.md
276280
- name: Direct onboarding with Defender for Cloud
277281
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
278-
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
279-
href: mde-linux-deployment-on-sap.md
280282
- name: Configure Defender for Endpoint on Linux
281283
items:
282284
- name: Configure security policies and settings

defender-endpoint/edr-block-mode-faqs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
- partner-contribution
1616
ms.topic: faq
1717
ms.collection: m365-security
18-
ms.date: 03/04/2025
18+
ms.date: 05/22/2025
1919

2020
title: Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)
2121
summary: |
@@ -38,7 +38,7 @@ sections:
3838
- question: |
3939
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
4040
answer: |
41-
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. However, there are scenarios where EDR in block mode might be beneficial, such as if Microsoft Defender Antivirus is misconfigured, or if [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) is not enabled. In such cases, EDR in block mode can automatically remediate detections like PUA.
41+
No, Microsoft recommends disabling EDR in block mode, when the primary antivirus software on the system is Microsoft Defender Antivirus. The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product.
4242
4343
- question: |
4444
Will EDR in block mode affect a user's antivirus protection?

0 commit comments

Comments
 (0)