You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -520,9 +520,6 @@ For technical support, contact the software vendor.
520
520
521
521
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
522
522
523
-
> [!NOTE]
524
-
> This rule blocks DLP policy tips and ToolTips in Outlook. This rule applies to Outlook and Outlook.com only.
525
-
526
523
Intune name: `Process creation from Office communication products (beta)`
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/data-protection-policies.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,9 @@ The following are examples of file policies that can be created:
46
46
47
47
## Prerequisites
48
48
49
-
To set up the first File Policy in a tenant, you need Microsoft Entra **Service Principal** permissions. **Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
49
+
To set up the first File Policy in a tenant, you need:
50
+
- Microsoft Entra **Service Principal** permissions. <br>
51
+
**Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
50
52
51
53
52
54
## Create a new file policy
@@ -79,7 +81,7 @@ To create a new file policy, follow this procedure:
79
81
80
82
1. Under the **Select user groups** filter, select either **all file owners**, **file owners from selected user groups** or **all file owners excluding selected groups**. Then select the relevant user groups to determine which users and groups should be included in the policy.
81
83
82
-
1. Select the **Content inspection method**. We recommend using the [**Data Classification Services**](content-inspection.md).
84
+
1. Select the **Content inspection method**. We recommend using the [**Data Classification Services**](content-inspection.md).
83
85
84
86
Once content inspection is enabled, you can choose to use preset expressions or to search for other customized expressions.
85
87
@@ -94,16 +96,17 @@ To create a new file policy, follow this procedure:
94
96
95
97
-**Create an alert for each matching event with the policy's severity**
96
98
-**Send an alert as email**
97
-
-**Daily alert limit per policy**. Note that governance actions are not impacted by the daily alert limit.
99
+
-**Daily alert limit per policy**. Governance actions aren't impacted by the daily alert limit.
98
100
-**Send alerts to Power Automate**
99
-
-
101
+
100
102
1. Choose the **Governance** actions you want Defender for Cloud Apps to take when a match is detected. Be careful when you set governance actions, they could lead to irreversible loss of access permissions to your files.
101
103
102
-
1. Once you've created your policy, you can view it by filtering for the **File policy** type. You can always edit a policy, calibrate its filters, or change the automated actions. The policy is automatically enabled upon creation and starts scanning your cloud files immediately. We recommended narrowing down the filters using multiple search fields to get the files that you want to work with, . The narrower the filters, the better. You can use the **Edit and preview results** button next to the filters.
104
+
1. Once you've created your policy, you can view it by filtering for the **File policy** type. You can always edit a policy, calibrate its filters, or change the automated actions. The policy is automatically enabled upon creation and starts scanning your cloud files immediately. We recommended narrowing down the filters using multiple search fields to get the files that you want to work with. The narrower the filters, the better. You can use the **Edit and preview results** button next to the filters.
103
105
104
-
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
106
+
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
105
107
106
-
1. To view file policy matches, files that are suspected to violate the policy, go to **Policies** -> **Policy management**. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
108
+
109
+
1. To view file policy matches, go to **Policies** -> **Policy management**. Here you can see files that are suspected to violate the policy. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
107
110
108
111
## Limitations
109
112
@@ -193,6 +196,7 @@ Below is a list of the file filters that can be applied:
193
196
> [!NOTE]
194
197
> - This filter doesn't support files that were shared with a group, only with specific users.
195
198
> - This filter doesn't support files shared with a specific user through a shared link for SharePoint and OneDrive.
199
+
> - When files are uploaded to SharePoint, OneDrive, etc., the **Collaborator > Domains** field automatically includes the domain of the file owner. If you use the **Any from domain** filter with the **does not contain** condition to exclude your organization's domain, files owned by users in your domain may be ignored by the policy.
196
200
197
201
-**Entire organization** – If the entire organization has access to the file.
198
202
@@ -216,7 +220,7 @@ Labels include:
216
220
-**Microsoft Purview Information Protection** - Requires integration with Microsoft Purview Information Protection.
217
221
-**Defender for Cloud Apps** - Provides more insight into the files it scans. For each file scanned by Defender for Cloud Apps DLP, you can know if inspection was blocked because the file is encrypted or corrupted. For example, you can set up policies to alert and quarantine password-protected files that are shared externally.
218
222
-**Azure RMS encrypted** – Files whose content wasn't inspected because they have an Azure RMS encryption set.
219
-
-**Password encrypted** – Files whose content wasn't inspected because they're password protected by the user.
223
+
-**Password encrypted** – Files whose content wasn't inspected because they were password protected by the user.
220
224
-**Corrupt file** – Files whose content wasn't inspected because their contents couldn't be read.
221
225
222
226
-**File type** – Defender for Cloud Apps scans the file to determine whether the true file type matches the MIME type received (see table) from the service. This scan is for files that are relevant for data scan (documents, images, presentations, spreadsheets, text, and zip/archive files). The filter works per file/folder type. For example, *All folders that are ...* or *All spreadsheet files that are...*
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/siem-sentinel.md
+19-2Lines changed: 19 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,30 @@
1
1
---
2
2
title: Microsoft Sentinel integration
3
3
description: This article provides information integrating Microsoft Sentinel with Defender for Cloud Apps.
4
-
ms.date: 01/29/2023
4
+
ms.date: 10/29/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: Naama-Goldbart
7
7
---
8
-
# Microsoft Sentinel integration (Preview)
9
8
9
+
# Microsoft Sentinel integration (Preview)
10
10
11
+
> [!IMPORTANT]
12
+
> **Deprecation Notice: Microsoft Defender for Cloud Apps SIEM Agents**
13
+
>
14
+
> As part of our ongoing convergence process across Microsoft Defender workloads, Microsoft Defender for Cloud Apps SIEM agents will be deprecated starting **November 2025**.
15
+
>
16
+
>
17
+
> Existing Microsoft Defender for Cloud Apps SIEM agents will continue to function as is until that time. As of June 19, 2025, **no new SIEM agents can be configured**, but [Microsoft Sentinel](siem-sentinel.md) agent integration (Preview), will remain supported and can still be added.
18
+
>
19
+
> We recommend transitioning to APIs that support the management of activities and alerts data from multiple workloads.
20
+
> These APIs enhance security monitoring and management and offer additional capabilities using data from multiple Microsoft Defender workloads.
21
+
>
22
+
> To ensure continuity and access to data currently available through Microsoft Defender for Cloud Apps SIEM agents, we recommend transitioning to the following supported APIs:
23
+
>
24
+
> - For alerts and activities, see: [Microsoft Defender XDR Streaming API](/defender-xdr/streaming-api).
25
+
> - For Microsoft Entra ID Protection logon events, see [IdentityLogonEvents](/defender-xdr/advanced-hunting-identitylogonevents-table) table in the advanced hunting schema.
26
+
> - For Microsoft Graph Security Alerts API, see: [List alerts_v2](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
27
+
> - To view Microsoft Defender for Cloud Apps alerts data in the Microsoft Defender XDR incidents API, see [Microsoft Defender XDR incidents APIs and the incidents resource type](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
11
28
12
29
You can integrate Microsoft Defender for Cloud Apps with Microsoft Sentinel (a scalable, cloud-native SIEM and SOAR) to enable centralized monitoring of alerts and discovery data. Integrating with Microsoft Sentinel allows you to better protect your cloud applications while maintaining your usual security workflow, automating security procedures, and correlating between cloud-based and on-premises events.
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ The [unified sensor](/defender-for-identity/deploy/activate-sensor) provides enh
36
36
37
37
## September 2025
38
38
39
-
### Unlock additional security value in the unified agent (Preview)
39
+
### Unlock additional security value in the unified agent
40
40
Get enhance protection by applying the ‘Unified sensor RPC audit’ tag to your V3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
41
41
42
42
### Identity posture recommendations view on the identity page (preview)
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,6 +108,9 @@ For editable queries, more options are available:
108
108
109
109
## Create custom analytics and detection rules
110
110
111
+
>[!IMPORTANT]
112
+
> [**Custom detections**](custom-detections-overview.md) is now the best way to create new rules across Microsoft Sentinel SIEM Microsoft Defender XDR. With custom detections, you can reduce ingestion costs, get unlimited real-time detections, and benefit from seamless integration with Defender XDR data, functions, and remediation actions with automatic entity mapping. For more information, read [this blog](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/custom-detections-are-now-the-unified-experience-for-creating-detections-in-micr/4463875).
113
+
111
114
To help discover threats and anomalous behaviors in your environment, you can create customized detection rules. There are two kinds:
112
115
- Analytics rules - to generate detections from rules that query data that is ingested through Microsoft Sentinel
113
116
- Custom detection rules - to generate detections from rules that query data from Defender XDR or from both Microsoft Sentinel and Defender XDR
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-microsoft-defender.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ ms.topic: concept-article
23
23
appliesto:
24
24
- Microsoft Defender XDR
25
25
- Microsoft Sentinel in the Microsoft Defender portal
26
-
ms.date: 09/08/2025
26
+
ms.date: 10/30/2025
27
27
---
28
28
29
29
# Advanced hunting with Microsoft Sentinel data in Microsoft Defender portal
@@ -88,10 +88,8 @@ In the unified portal, in addition to viewing the schema column names and descri
88
88
- The Microsoft Sentinel `SecurityAlert` table is replaced by `AlertInfo` and `AlertEvidence` tables, which both contain all the data on alerts. While SecurityAlert isn't available in the schema tab, you can still use it in queries using the advanced hunting editor. This provision is made so as not to break existing queries from Microsoft Sentinel that use this table.
89
89
- Guided hunting mode and take actions capabilities are supported for Defender XDR data only.
90
90
- Custom detections have the following limitations:
91
-
- Custom detections aren't available for KQL queries that don't include Defender XDR data.
92
91
- Near real-time detection frequency isn't available for detections that include Microsoft Sentinel data.
93
92
- Custom functions that were created and saved in Microsoft Sentinel aren't supported.
94
-
- Defining entities from Sentinel data isn't yet supported in custom detections.
95
93
- Bookmarks aren't supported in the advanced hunting experience. They're supported in the **Microsoft Sentinel > Threat management > Hunting** feature. Alternatively, you can use the [Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident) feature to link query results to new or existing incidents.
96
94
- If you're streaming Defender XDR tables to Log Analytics, there might be a difference between the`Timestamp` and `TimeGenerated` columns. In case the data arrives to Log Analytics after 48 hours, it's being overridden upon ingestion to `now()`. Therefore, to get the actual time the event happened, we recommend relying on the `Timestamp` column.
97
95
- When prompting [Security Copilot](advanced-hunting-security-copilot.md) for advanced hunting queries, you might find that not all Microsoft Sentinel tables are currently supported. However, support for these tables can be expected in the future.
0 commit comments