Skip to content

Commit b077655

Browse files
authored
Merge branch 'main' into WI364634-remove-the-word-portal-correct-to-defender-for-cloud-apps
2 parents 2138334 + a2e87a5 commit b077655

File tree

184 files changed

+3476
-5430
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

184 files changed

+3476
-5430
lines changed

ATPDocs/health-alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity health issues
33
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4-
ms.date: 07/09/2024
4+
ms.date: 01/16/2025
55
ms.topic: how-to
66
---
77

@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191191
|----|----|----|----|----|
192192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193193

194+
### Auditing for AD CS servers is not enabled as required
195+
196+
|Alert|Description|Resolution|Severity|Displayed in|
197+
|----|----|----|----|----|
198+
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199+
194200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
195201

196202
| Alert| Description |Resolution|Severity|Displayed in|

ATPDocs/microsoft-365-security-center-mdi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The following table lists the changes in navigation between Microsoft Defender f
106106

107107
For more information, see:
108108

109-
- [Related videos for Microsoft Defender for Identity](https://www.microsoft.com/videoplayer/embed/RE4HcEU)
109+
- [Related videos for Microsoft Defender for Identity](https://learn-video.azurefd.net/vod/player?id=f4589332-7b78-40f0-b456-b896851a5aae)
110110
- [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)
111111
- [Microsoft Defender for Identity](/defender-for-identity/)
112112

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ Below is a list of the activity filters that can be applied. Most filters suppor
2020
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
2121
- Activity object ID - the ID of the object (file, folder, user, or app ID).
2222

23-
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contain**, **Equal**, or **Starts with** the specific item.
23+
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contains**, **Equals**, or **Starts with** the specific item.
2424

25+
> [!NOTE]
26+
> Activity-Policy's **Activity object Item** filter supports the **Equals** operator only.
27+
2528
- Action type - Search for a more specific action performed in an app.
2629

2730
- Activity type - Search for the app activity.

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Use app governance to create OAuth policies for apps connected to Microsoft 365,
1717

1818
<br>
1919

20-
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4YU37]
20+
>[!VIDEO https://learn-video.azurefd.net/vod/player?id=b10dbf02-9f56-4f37-8c68-8221be5b4aea]
2121
2222
<a name='create-oauth-app-policies-for-azure-ad'></a>
2323

CloudAppSecurityDocs/app-governance-manage-app-governance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Cyber attacks have become increasingly sophisticated in the ways they exploit th
1111

1212
To understand the potential risks and stop these types of attacks, you need to gain clear visibility into your organization’s app compliance posture. You need to be able to quickly identify when an app exhibits anomalous behaviors and respond when these behaviors present risks to your environment, data, and users. <br><br>
1313

14-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4S7sp]
14+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=ed7ad7f7-58dc-4a09-ace3-e1d6b8f55353]
1515
1616
## App governance features
1717

CloudAppSecurityDocs/app-governance-predefined-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description: Get started learning about predefined app policies.
1010
App governance contains a set of out of the box policies to detect anomalous app behaviors. These policies are activated by default, but you can deactivate them if you choose to.<br>
1111
<br>
1212

13-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4YpJN]
13+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=22872b35-18aa-424d-bec7-3f77869a5e47]
1414
1515
## Working with predefined policies
1616

CloudAppSecurityDocs/app-governance-secure-apps-app-hygiene-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ These features enable automatic control over these apps and provide extra app be
1717

1818
Watch this video for a brief explanation of these features:
1919

20-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWWYEm]
20+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=d22073a4-555a-413a-8e01-fc0f42d97f6f]
2121
2222
## App insights
2323

CloudAppSecurityDocs/behaviors.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
2626

2727
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
2828

29-
|Alert name |Policy name |
30-
|---------|---------|
31-
|**Activity from infrequent country** |Activity from infrequent country/region  |
32-
|**Impossible travel activity** |Impossible travel |
33-
|**Mass delete** |Unusual file deletion activity (by user) |
34-
|**Mass download** |Unusual file download (by user) |
35-
|**Mass share** |Unusual file share activity (by user) |
36-
|**Multiple delete VM activities** |Multiple delete VM activities |
37-
|**Multiple failed login attempts** |Multiple failed sign-in attempts |
38-
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |
39-
|**Multiple VM creation activities** |Multiple VM creation activities |
40-
|**Suspicious administrative activity** |Unusual administrative activity (by user) |
41-
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |
42-
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |
43-
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |
44-
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |
29+
|Alert name |Policy name |ActionType (Hunting)|
30+
|---------|---------|---------|
31+
|**Activity from infrequent country** |Activity from infrequent country/region  |ActivityFromInfrequentCountry|
32+
|**Impossible travel activity** |Impossible travel |ImpossibleTravelActivity|
33+
|**Mass delete** |Unusual file deletion activity (by user) |MassDelete|
34+
|**Mass download** |Unusual file download (by user) |MassDownload|
35+
|**Mass share** |Unusual file share activity (by user) |MassShare|
36+
|**Multiple delete VM activities** |Multiple delete VM activities |MultipleDeleteVmActivities|
37+
|**Multiple failed login attempts** |Multiple failed sign-in attempts |MultipleFailedLoginAttempts|
38+
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |MultiplePowerBiReportSharingActivities|
39+
|**Multiple VM creation activities** |Multiple VM creation activities |MultipleVmCreationActivities|
40+
|**Suspicious administrative activity** |Unusual administrative activity (by user) |SuspiciousAdministrativeActivity|
41+
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |SuspiciousImpersonatedActivity|
42+
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |SuspiciousOauthAppFileDownloadActivities|
43+
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |SuspiciousPowerBiReportSharing|
44+
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |UnusualAdditionOfCredentialsToAnOauthApp|
4545

4646

4747
## Defender for Cloud Apps' transition from alerts to behaviors

CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
105105

106106
1. Change to root privileges using `sudo -i`.
107107

108-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
109109

110110
#### [CentOS](#tab/centos)
111111

CloudAppSecurityDocs/discovery-docker-ubuntu.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The following steps describe the deployment in Ubuntu. The deployment steps for
105105
export https_proxy='<IP>:<PORT>'
106106
```
107107

108-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
109109

110110
### [CentOS](#tab/centos)
111111

0 commit comments

Comments
 (0)