Skip to content

Commit b32edaf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into WI480553-update-ms-date-ms-reviewer
2 parents 58245d0 + 3a2b9d5 commit b32edaf

29 files changed

+576
-255
lines changed

ATPDocs/remediation-actions.md

Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -35,34 +35,30 @@ To perform any of the [supported actions](#supported-actions), you need to:
3535

3636
The following Defender for Identity actions can be performed on Identities:
3737

38-
- **Disable user in Active Directory** - This temporarily prevents a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
38+
| Remediation Action | Description | Scope |
39+
| ------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
40+
|Disable user | This temporarily prevents a user from signing in. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network. | Active Directory, Entra ID and Okta
41+
|Enable user | Enable a user to sign in. | Active Directory, Entra ID and Okta
42+
|Revoke all Users' sessions | Revoke a user's active sessions. | Entra ID and Okta
43+
|Confirm user compromised | The user's risk level is set to High | Entra ID
44+
| Reset user password| This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts| Active Directory
45+
|Deactivate user in Okta | This action can be used when a non-legit malicious account was detected, to deactivate the account permanently | Okta
46+
| Set user risk to High/Medium/Low |Set one user risk scoring to one of the defined levels. This action will only be available if [Risk Scoring](https://help.okta.com/en-us/Content/Topics/Security/Security_Risk_Scoring.htm) feature is enabled | Okta
3947

40-
- **Reset user password** - This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
41-
42-
- **Mark User Compromised** - The user's risk level is set to High.
43-
44-
- **Suspend User in Entra ID** - Block new sign-ins and access to cloud resources.
45-
46-
- **Require User to Sign In Again** - Revoke a user's active sessions.
47-
48-
- **Suspend User in Okta** - Temporarily disables a user account. This action can be used when a legit user account was found to be compromised and needed to be disabled.
49-
50-
- **Deactivate User in Okta** - This action can be used when a non-legit malicious account was detected, to deactivate the account permanently.
5148

5249
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
5350

5451
## Roles and Permissions
5552

56-
| Action | XDR RBAC permissions |
57-
| ------------------------------------- | ------------------------------------------------------------ |
58-
|Mark User Compromised | - Global Administrator <br> - Security Administrator|
59-
|Suspend User in Entra ID | - Global Administrator |
60-
|Require User to Sign In Again | - Global Administrator <br>|
61-
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
62-
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
63-
| Suspend User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
64-
| Deactivate User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
65-
53+
| Remediation Action | Active Directory |Entra ID | Okta |
54+
|--|--|--|--|
55+
| Disable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
56+
| Enable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
57+
| Revoke all Users' sessions |N\A | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
58+
| Confirm user compromised |N\A | - Global Administrator <br> -Security Administrator | N/A|
59+
| Reset user password | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | N\A | N\A
60+
| Deactivate user in Okta | N\A | N\A | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
61+
| Set User risk to High/Medium/Low | N\A | N\A | A custom role defined with permissions for Response (manage) or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
6662

6763
## Related videos
6864

ATPDocs/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,14 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## August 2025
2727

28+
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
29+
30+
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
31+
32+
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
33+
34+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
35+
2836

2937
### New security assessment: Remove inactive service accounts (Preview)
3038

CloudAppSecurityDocs/attest-your-app.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: Mravela 
1010

1111
Microsoft Defender for Cloud Apps enables you to attest your app, so that you make sure that the compliance and security details we use to rate your app in our cloud app catalog are up to date.
1212

13-
Whether your app is already listed in the cloud app catalog, or it's new, submit a [self-attestation questionnaire](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4CRHM-U7CtKpJma_QJAnSlUMEpLQzBaQ1hWNDMxUEhRNFI3Q0FZUkdWRC4u). For details on the self-attestation process, contact casfeedback@microsoft.com.
13+
Whether your app is already listed in the cloud app catalog, or it's new, submit a [self-attestation questionnaire](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4CRHM-U7CtKpJma_QJAnSlUMEpLQzBaQ1hWNDMxUEhRNFI3Q0FZUkdWRC4u). For details on the self-attestation process, contact mscac@microsoft.com.
1414

1515
Follow the service attributes described below to successfully complete the submission of the questionnaire:
1616

@@ -22,7 +22,7 @@ Follow the service attributes described below to successfully complete the submi
2222
| Headquarters | General | Country code | Close list - provided in questionnaire | The country/region of the provider's headquarters.|
2323
| Data center| General | Country code array* | Close list - provided in questionnaire (Multi selection) | The country/region in which your data center resides (can be multiple locations) |
2424
| Hosting company | General | String | Free text | The name of the company that provides server hosting for the app. |
25-
| Founded | General | Integer | YYYY (no later than 2019) | The year in which the provider was founded. |
25+
| Founded | General | Integer | YYYY (no later than 2025) | The year in which the provider was founded. |
2626
| Holding | General | String | Private, Public | Displays whether the provider is a publicly or privately held company |
2727
| App domain | General | URL array* | Free text | The list of specific domains that are used to interact with the service. For example, 'teams.microsoft.com' for Microsoft Teams and not the generic domain 'microsoft.com'. |
2828
| Terms of service | General | URL | Free text | Does this app provide a set of regulations that users must agree to follow in order to use the app? |
@@ -32,7 +32,7 @@ Follow the service attributes described below to successfully complete the submi
3232
| Data types | General | String | Close list - provided in questionnaire | Which data types can be uploaded by the user to the app?|
3333
| Homepage | General | URL | Free text | The provider's home page URL. |
3434
| Disaster recovery plan | General | Boolean | True, False | Does this app have a disaster recovery plan that includes a backup and restore strategy? |
35-
| Latest breach | Security | Date | MMM-dd-YYYY | Most recent incident in which sensitive, protected, or confidential data owned by the app was viewed, stolen, or used by an individual unauthorized to do so. |
35+
| Latest breach | Security | Date | MM-dd-YYYY | Most recent incident in which sensitive, protected, or confidential data owned by the app was viewed, stolen, or used by an individual unauthorized to do so. |
3636
| Data-at-rest encryption method | Security | String | Close list - provided in questionnaire | The type of encryption of data-at-rest performed on the app. |
3737
| Multifactor authentication | Security | Boolean | True, False | Does this app support multifactor authentication solutions? |
3838
| IP address restriction | Security | Boolean | True, False | Does this app support restriction of specific IP addresses by the app? |
@@ -41,7 +41,7 @@ Follow the service attributes described below to successfully complete the submi
4141
| Data audit trail | Security | Boolean | True, False | Does this app support availability of a data audit trail in the app? |
4242
| User can upload data | Security | Boolean | True, False | Does this app support user uploaded data? |
4343
| Data classification | Security | Boolean | True, False | Does this app enable the option for classification of the data uploaded to the app? |
44-
| Remember password | Security | Boolean | True, False | Does this app enable the option for remembering and saving user passwords in the app? |
44+
| Remember password | Security | Boolean | True, False, N/A | Does this app enable the option for remembering and saving user passwords in the app? |
4545
| User-roles support | Security | Boolean | True, False | Does this app support distribution of users by roles and levels of permission? |
4646
| File sharing | Security | Boolean | True, False | Does this app include features that allow file sharing between users? |
4747
| Supports SAML | Security | Boolean | True, False | Does this app support the SAML standard for exchanging authentication and authorization data? |
@@ -62,12 +62,12 @@ Follow the service attributes described below to successfully complete the submi
6262
| ISO 27001 | Compliance | Boolean | True, False | Is this app ISO 27001 certified, a certificate given to companies upholding internationally recognized guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization? |
6363
| ITAR | Compliance | Boolean | True, False, N/A | Does this app comply with ITAR, regulations controlling the export and import of defense-related articles and services found on the US Munitions List? |
6464
| SOC 1 | Compliance | Boolean | True, False, N/A | Does this app comply with SOC 1, reporting on controls at a service organization which are relevant to user entities' internal control over financial reporting? |
65-
| SOC 2 | Compliance | Boolean | True, False | Does this app comply with SOC 2, reporting on non-financial processing based on one or more of the Trust service criteria on security, privacy, availability, confidentiality, and processing integrity? |
66-
| SOC 3 | Compliance | Boolean | True, False | Does this app comply with SOC 3, reporting based on the Trust service criteria, that may be distributed freely and only contain management's assertion that they have met the requirements of the chosen criteria? |
65+
| SOC 2 | Compliance | Boolean | True, False, N/A | Does this app comply with SOC 2, reporting on non-financial processing based on one or more of the Trust service criteria on security, privacy, availability, confidentiality, and processing integrity? |
66+
| SOC 3 | Compliance | Boolean | True, False, N/A | Does this app comply with SOC 3, reporting based on the Trust service criteria, that may be distributed freely and only contain management's assertion that they have met the requirements of the chosen criteria? |
6767
| SOX | Compliance | Boolean | True, False, N/A | Does this app comply with SOX, US legislation aimed at protecting shareholders and the general public from accounting errors and frauds, as well as improving the accuracy of corporate disclosures? |
6868
| SP 800-53 | Compliance | Boolean | True, False | Does this app comply with SP80053, recommended security controls for federal information systems and organizations? |
6969
| SSAE 16 | Compliance | Boolean | True, False, N/A | Does this app comply with the SSAE 16 standard for auditing a service organization's internal compliance controls and reporting processes? |
70-
| PCI DSS version | Compliance | String | 1, 2, 3, 3.1, 3.2, N/A | The version of the PCI-DSS protocol supported by this app. |
70+
| PCI DSS version | Compliance | String | 4.0, 3.2.1, N/A | The version of the PCI-DSS protocol supported by this app. |
7171
| ISO 27018 | Compliance | Boolean | True, False, N/A | Does this app comply with ISO 27018, which establishes commonly accepted controls and guidelines for processing and protecting Personally Identifiable Information (PII) in a public cloud computing environment? |
7272
| GLBA | Compliance | Boolean | True, False, N/A | Does this app comply with the Gramm-Leach-Bliley Act (GLBA), which requires financial institutions to establish standards for protecting the security and confidentiality of customers' personal information? |
7373
| FedRAMP level | Compliance | String | High, Moderate, Low, Li-SaaS | The level of the FedRAMP-compliant solution provided by this app. |
@@ -77,14 +77,14 @@ Follow the service attributes described below to successfully complete the submi
7777
| COBIT | Compliance | Boolean | True, False | Does this app comply with COBIT, which sets best practices for the governance and control of information systems and technology, and aligns IT with business principles? |
7878
| COPPA | Compliance | Boolean | True, False, N/A | Does this app comply with COPPA, which defines requirements on website and online services operators that provide content to children under 13 years of age? |
7979
| FERPA | Compliance | Boolean | True, False, N/A | Does this app comply with FERPA, a federal law that protects the privacy of student education records? |
80-
| GAPP | Compliance | Boolean | True, False, N/A | Does this app comply with GAPP, a collection of commonly followed rules that address privacy risks in an organization? |
80+
| GAPP | Compliance | Boolean | True, False| Does this app comply with GAPP, a collection of commonly followed rules that address privacy risks in an organization? |
8181
| HITRUST CSF | Compliance | Boolean | True, False, N/A | Does this app comply with HITRUST CSF, a set of controls that harmonizes the requirements of information security regulations and standards? |
82-
| Jericho Forum Commandments | Compliance | Boolean | True, False | Does this app follow Jericho Forum Commandments, a set if principles to be observed when architecting systems for secure operation in de-perimeterized environments? |
83-
| ISO 27002 | Compliance | Boolean | True, False, N/A | Does this app comply with ISO 27002, which establishes common guidelines for organizational information security standards and information security management practices? |
82+
| Jericho Forum Commandments | Compliance | Boolean | True, False | Does this app follow Jericho Forum Commandments, a set of principles to be observed when architecting systems for secure operation in de-perimeterized environments? |
83+
| ISO 27002 | Compliance | Boolean | True, False| Does this app comply with ISO 27002, which establishes common guidelines for organizational information security standards and information security management practices? |
8484
| FFIEC | Compliance | Boolean | True, False, N/A | Does this app comply with the Federal Financial Institutions Examination Council's guidance on the risk management controls necessary to authenticate services in an Internet banking environment? |
85-
| Data ownership | Legal | Boolean | True, False | Does this app fully preserve the user's ownership of uploaded data? |
86-
| DMCA | Legal | Boolean | True, False | Does this app comply with the Digital Millennium Copyright Act (DMCA), which criminalizes any attempt to unlawfully access copyrighted material? |
87-
| Data retention policy | Legal | Boolean | True, False | What is the app's policy for user data retention after account termination? |
85+
| Data ownership | Legal | Boolean | True, False, N/A | Does this app fully preserve the user's ownership of uploaded data? |
86+
| DMCA | Legal | Boolean | True, False, N/A | Does this app comply with the Digital Millennium Copyright Act (DMCA), which criminalizes any attempt to unlawfully access copyrighted material? |
87+
| Data retention policy | Legal | String | Deleted immediately, Within 2 weeks, Within 1 month, Within 3 months, Within more than 3 months, Retained| What is the app's policy for user data retention after account termination? |
8888
| GDPR readiness statement | Legal | URL | Free text | A link to your website, when relevant, relating how this provider plans to handle GDPR compliance. |
8989
| GDPR - Right to erasure | Legal | Boolean | True, False, N/A | Does this app stop processing and delete an individual's personal data upon request? |
9090
| GDPR - Report data breaches | Legal | Boolean | True, False, N/A | Does this app report data breaches to supervisory authorities and individuals affected by the breach, within 72 hours of breach detection? |

CloudAppSecurityDocs/discovered-apps.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,7 @@ The best way to get an overview of Shadow IT use across your organization is by
112112

113113
> [!NOTE]
114114
> The executive summary report is revamped to a six-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
115+
> Starting September 1, 2025, the Cloud Discovery Alerts data point will no longer be included in the Executive Summary Report.
115116
116117
## Exclude entities
117118

0 commit comments

Comments
 (0)