You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+37-9Lines changed: 37 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,11 +19,39 @@ For more information on what's new with other Microsoft Defender security produc
19
19
20
20
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
21
21
22
+
## February 2025
23
+
24
+
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
25
+
26
+
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
27
+
28
+
- cdn.cloudappsecurity.com
29
+
- cdn-discovery.cloudappsecurity.com
30
+
31
+
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access'.
32
+
33
+
- To use Defender for Cloud Apps in the Microsoft Defender portal, make sure you add outbound port 443 for all IP addresses and DNS names listed in our documentation to your firewall's allowlist.
34
+
35
+
- To connect to third-party apps, enable Defender for Cloud Apps to connect from the following IP addresses, also available in our documentation:
36
+
37
+
-**US1**: - 23.101.201.123 - 20.228.186.154
38
+
39
+
-**US2**: - 20.15.114.156 - 172.202.90.196
40
+
41
+
-**US3**: - 20.3.226.231 - 4.255.218.227
42
+
43
+
-**EU1**: - 20.71.203.39 - 137.116.224.49
44
+
45
+
-**EU2**: - 20.0.210.84 - 20.90.9.64
46
+
47
+
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, and 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
48
+
22
49
## November 2024
23
50
24
51
### Internal Session Controls application notice
25
-
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
26
-
Please ensure there is no CA policy restricting access to this application.
52
+
53
+
The Enterprise application 'Microsoft Defender for Cloud Apps – Session Controls' is used internally by the Conditional Access App Control service.
54
+
Ensure there's no CA policy restricting access to this application.
27
55
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
28
56
29
57
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
@@ -73,13 +101,13 @@ For more information, see [OAuth app data usage insights on app governance](/def
73
101
### New anomaly data in advanced hunting CloudAppEvents table
74
102
75
103
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.
76
-
The new columns are designed to assist you to better __identify uncommon activities__that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
104
+
The new columns are designed to assist you to better __identify uncommon activities__that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
77
105
78
106
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
79
107
80
108
### New Conditional Access app control / inline data in advanced hunting CloudAppEvents table
81
109
82
-
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
110
+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
83
111
Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
84
112
85
113
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
@@ -100,8 +128,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
100
128
101
129
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
102
130
103
-
For more information see:
104
-
[Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps)
131
+
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
105
132
106
133
### Connect Mural to Defender for Cloud Apps (Preview)
107
134
@@ -140,7 +167,7 @@ Use the feedback mechanisms at the top and bottom of each documentation page to
140
167
141
168
### Large scale export of Activity logs (Preview)
142
169
143
-
A new user experience dedicated to providing users the option to export from “activity log” page up to six months back or up to 100K events.
170
+
A new user experience dedicated to providing users the option to export from 'activity log' page up to six months back or up to 100K events.
144
171
145
172
You can filter the results using time range and various other filters and even hide private activities.
146
173
@@ -151,11 +178,12 @@ For more information, see [Export activities six months back](activity-filters-q
151
178
152
179
Customize the Microsoft Defender for Cloud Apps(MDA) block experience for apps that are blocked using Cloud Discovery.
153
180
154
-
You can set up a custom redirect URL on block pages
181
+
You can set up a custom redirect URL on block pages:
182
+
155
183
- To educate and redirect end users to organization acceptable use policy
156
184
- To guide end users on steps to follow to secure an exception for block
157
185
158
-
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page)
186
+
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page).
159
187
160
188
161
189
### In-browser protection for macOS users and newly supported policies (Preview)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/tutorial-shadow-it.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,6 +101,3 @@ The nature of cloud apps means that they're updated daily and new apps appear al
101
101
102
102
[!INCLUDE [Open support ticket](includes/support.md)]
103
103
104
-
## Learn more
105
-
106
-
- Try our interactive guide: [Discover and manage cloud app usage with Microsoft Defender for Cloud Apps](https://mslearn.cloudguides.com/guides/Discover%20and%20manage%20cloud%20app%20usage%20with%20Microsoft%20Cloud%20App%20Security)
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-schema-tables.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,9 +62,9 @@ The following reference lists all the tables in the schema. Each table name link
62
62
|**[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** (Preview) | Alerts from Microsoft Defender for Cloud Apps (not available for GCC) |
63
63
|**[CloudAppEvents](advanced-hunting-cloudappevents-table.md)**| Events involving accounts and objects in Office 365 and other cloud apps and services |
64
64
|**[CloudAuditEvents](advanced-hunting-cloudauditevents-table.md)** (Preview)| Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud |
65
+
|**[CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md)** (Preview)| Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers |
65
66
|**[DataSecurityBehaviors](advanced-hunting-datasecuritybehaviors-table.md)** (Preview)| Insights about potentially suspicious user behaviors that violate user-defined or default policies configured in the Microsoft Purview suite of solutions|
66
67
|**[DataSecurityEvents](advanced-hunting-datasecurityevents-table.md)** (Preview)| Information about user activities that violate user-defined or default policies in the Microsoft Purview suite of solutions |
67
-
|**[CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md)** (Preview)| Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers |
68
68
|**[DeviceBaselineComplianceAssessment](advanced-hunting-devicebaselinecomplianceassessment-table.md)** (Preview) | Baseline compliance assessment snapshot, which indicates the status of various security configurations related to baseline profiles on devices |
69
69
|**[DeviceBaselineComplianceAssessmentKB](advanced-hunting-devicebaselinecomplianceassessmentkb-table.md)** (Preview) | Information about various security configurations used by baseline compliance to assess devices |
70
70
|**[DeviceBaselineComplianceProfiles](advanced-hunting-devicebaselinecomplianceprofiles-table.md)** (Preview) | Baseline profiles used for monitoring device baseline compliance |
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,8 @@ You can also get product updates and important notifications through the [messag
37
37
- (Preview) IP addresses can now be excluded from automated responses in attack disruption. This feature allows you to exclude specific IPs from automated containment actions triggered by attack disruption. For more information, see [Exclude assets from automated responses in automatic attack disruption](automatic-attack-disruption-exclusions.md).
38
38
39
39
- (Preview) The `PrivilegedEntraPimRoles` column is available for preview in the advanced hunting [IdentityInfo](advanced-hunting-identityinfo-table.md) table.
40
-
- (GA) You can now view how Security Copilot came up with the query suggestion in its responses in Microsoft Defender advanced hunting. Select **See the logic behind the query** below the query text to validate that the query aligns with your intent and needs, even if you don't have an expert-level understanding of KQL.
40
+
- (GA) You can now view how Security Copilot came up with the query suggestion in its [responses](advanced-hunting-security-copilot.md#try-your-first-request) in Microsoft Defender advanced hunting. Select **See the logic behind the query** below the query text to validate that the query aligns with your intent and needs, even if you don't have an expert-level understanding of KQL.
41
+
41
42
42
43
43
44
## January 2025
@@ -50,9 +51,9 @@ You can also get product updates and important notifications through the [messag
50
51
51
52
-**Defender Boxed** is available for a limited time in January and July of each year. This series of slides highlights your organization's security successes, improvements, and response actions in the Microsoft Defender portal for the past six months/year. To learn how you can share your security operations team's achievements, see [Defender Boxed](incident-queue.md#defender-boxed).
52
53
53
-
- (GA) **Advanced hunting context panes** are now available in custom detection experiences. This allows you to access the advanced hunting feature without leaving your current workflow.
54
+
- (GA) **Advanced hunting context panes** are now available in custom detection experiences. This improvement allows you to access the advanced hunting feature without leaving your current workflow.
54
55
- For incidents and alerts generated by custom detections, you can select **Run query** to explore the results of the related custom detection.
55
-
- In the custom detection wizard's *Set rule logic* step, you can select **View query results** to verify the results of the query you are about to set.
56
+
- In the custom detection wizard's *Set rule logic* step, you can select **View query results** to verify the results of the query you're about to set.
56
57
57
58
- (GA) The **[Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident)** feature in Microsoft Defender advanced hunting now allows linking of Microsoft Sentinel query results. In both the Microsoft Defender unified experience and in [Defender XDR advanced hunting](advanced-hunting-link-to-incident.md), you can now specify whether an entity is an impacted asset or related evidence.
58
59
@@ -63,7 +64,7 @@ You can also get product updates and important notifications through the [messag
63
64
- (GA) [Content distribution via tenant groups in multitenant management](/unified-secops-platform/mto-tenantgroups) is now generally available. Create tenant groups to manage content across tenants in multitenant management in Microsoft Defender XDR.
64
65
- Microsoft Defender Experts for XDR now offers [scoped coverage](defender-experts-scoped-coverage.md) for customers who wish to define a specific set of devices and/or users, based on geography, subsidiary, or function, for which they'd like Defender Experts to provide support.
65
66
- (Preview) The [Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident) feature in Microsoft Defender advanced hunting now allows linking of Microsoft Sentinel query results. In both the Microsoft Defender unified experience and in [Defender XDR advanced hunting](advanced-hunting-link-to-incident.md), you can now specify whether an entity is an impacted asset or related evidence.
66
-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries-preview), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
67
+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries-preview), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you're already in Microsoft Defender.
67
68
- New documentation library for Microsoft's unified security operations platform. Find centralized documentation about [Microsoft's unified SecOps platform in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). Microsoft's unified SecOps platform brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI into the Defender portal. Learn about the features and functionality available with Microsoft's unified SecOps platform, then start to plan your deployment.
68
69
- (GA) In advanced hunting, you can now add your frequently used schema tables, functions, queries, and detection rules in the **[Favorites](advanced-hunting-query-results.md#add-items-to-favorites)** sections under each tab for quicker access.
69
70
@@ -81,7 +82,7 @@ You can also get product updates and important notifications through the [messag
81
82
## October 2024
82
83
83
84
-[Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
84
-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the `arg()` operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
85
+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the `arg()` operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you're already in Microsoft Defender.
85
86
86
87
## September 2024
87
88
@@ -91,7 +92,7 @@ You can also get product updates and important notifications through the [messag
91
92
-[Microsoft Defender XDR Unified RBAC permissions](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added to submit inquiries and view responses from [Microsoft Defender Experts](experts-on-demand.md). You can also [view responses](experts-on-demand.md#where-to-view-responses-from-defender-experts) to inquires submitted to Ask Defender Experts through your listed email addresses when submitting your inquiry or in the Defender portal by navigating to **Reports** > **Defender Experts messages**.
92
93
- (GA) **Advanced hunting context panes** are now available in more experiences. This allows you to access the advanced hunting feature without leaving your current workflow.
93
94
- For incidents and alerts generated by analytics rules, you can select **Run query** to explore the results of the related analytics rule.
94
-
- In the analytics rule wizard's *Set rule logic* step, you can select **View query results** to verify the results of the query you are about to set.
95
+
- In the analytics rule wizard's *Set rule logic* step, you can select **View query results** to verify the results of the query you're about to set.
95
96
- In the [query resources report](advanced-hunting-limits.md#find-resource-heavy-queries), you can view any of the queries by selecting the three dots on the query row and selecting **Open in query editor**.
96
97
- For device entities involved in incidents or alerts, **Go hunt** is also available as one of the options after selecting the three dots on the device side panel.
0 commit comments