You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/mdo-threat-classification.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier1
17
17
description: Admins can learn about threat classification in Microsoft Defender for Office 365.
18
18
ms.service: defender-office-365
19
-
ms.date: 01/06/2025
19
+
ms.date: 01/21/2025
20
20
appliesto:
21
21
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- The [Threat protection status report](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-threat-classification-defender-for-office-365)
88
+
- The [Mailflow status report](reports-email-security.md#mailflow-view-for-the-mailflow-status-report)
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-baselines.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- Tier1
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 11/19/2024
15
+
ms.date: 01/21/2025
16
16
---
17
17
18
18
# Security baselines assessment
@@ -49,18 +49,21 @@ Security baselines provide support for Center for Internet Security (**CIS)** be
49
49
4. On the **Baseline profile scope** page set the profile settings such as software, base benchmark (CIS or STIG), and the compliance level and select **Next**.
50
50
5. Select the configurations you want to include in the profile.
51
51
52
-
:::image type="content" source="/defender/media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="/defender/media/defender-vulnerability-management/add_configuration_settings.png":::
52
+
:::image type="content" source="/defender/media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="/defender/media/defender-vulnerability-management/add_configuration_settings.png":::
53
53
54
-
Select **Customize** if you want to change the threshold configuration value for your organization.
54
+
> [!NOTE]
55
+
> Some configurations might not be included in the baseline assessment due to manual checking requirement or the configurations are unsupported. These configurations are marked as needing **Manual check** in the list and these will not be automatically assessed for compliance.
55
56
56
-
:::image type="content" source="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png":::
57
+
Select **Customize** if you want to change the threshold configuration value for your organization.
57
58
59
+
:::image type="content" source="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="/defender/media/defender-vulnerability-management/baselines_customize_configuration.png":::
60
+
58
61
6. Select **Next** to choose the device groups and device tags you want to include in the baseline profile. The profile will be automatically applied to devices added to these groups in the future.
59
62
7. Select **Next** to review the profile.
60
63
8. Select **Submit** to create your profile.
61
64
9. On the final page, select **View profile page** to see the assessment results.
62
65
63
-
> [!NOTE]
66
+
> [!TIP]
64
67
> You can create multiple profiles for the same operating system with various customizations.
65
68
66
69
When you customize a configuration an icon will appear beside it to indicate that it has been customized and is no longer using the recommended value. Select the **reset** button to revert to the recommended value.
0 commit comments