Skip to content

Commit b3b431b

Browse files
Merge branch 'main' into wi-502580-batch-3-defender-xdr-image-reorg
2 parents 2e2d475 + a913ef9 commit b3b431b

38 files changed

+205
-71
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -520,9 +520,6 @@ For technical support, contact the software vendor.
520520

521521
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
522522

523-
> [!NOTE]
524-
> This rule blocks DLP policy tips and ToolTips in Outlook. This rule applies to Outlook and Outlook.com only.
525-
526523
Intune name: `Process creation from Office communication products (beta)`
527524

528525
Configuration Manager name: Not available

defender-for-cloud-apps/data-protection-policies.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,9 @@ The following are examples of file policies that can be created:
4646

4747
## Prerequisites
4848

49-
To set up the first File Policy in a tenant, you need Microsoft Entra **Service Principal** permissions. **Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
49+
To set up the first File Policy in a tenant, you need:
50+
- Microsoft Entra **Service Principal** permissions. <br>
51+
**Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
5052

5153

5254
## Create a new file policy
@@ -79,7 +81,7 @@ To create a new file policy, follow this procedure:
7981

8082
1. Under the **Select user groups** filter, select either **all file owners**, **file owners from selected user groups** or **all file owners excluding selected groups**. Then select the relevant user groups to determine which users and groups should be included in the policy.
8183

82-
1. Select the **Content inspection method**. We recommend using the [**Data Classification Services**](content-inspection.md).
84+
1. Select the **Content inspection method**. We recommend using the [**Data Classification Services**](content-inspection.md).
8385

8486
Once content inspection is enabled, you can choose to use preset expressions or to search for other customized expressions.
8587

@@ -94,16 +96,17 @@ To create a new file policy, follow this procedure:
9496

9597
- **Create an alert for each matching event with the policy's severity**
9698
- **Send an alert as email**
97-
- **Daily alert limit per policy**. Note that governance actions are not impacted by the daily alert limit.
99+
- **Daily alert limit per policy**. Governance actions aren't impacted by the daily alert limit.
98100
- **Send alerts to Power Automate**
99-
-
101+
100102
1. Choose the **Governance** actions you want Defender for Cloud Apps to take when a match is detected. Be careful when you set governance actions, they could lead to irreversible loss of access permissions to your files.
101103

102-
1. Once you've created your policy, you can view it by filtering for the **File policy** type. You can always edit a policy, calibrate its filters, or change the automated actions. The policy is automatically enabled upon creation and starts scanning your cloud files immediately. We recommended narrowing down the filters using multiple search fields to get the files that you want to work with, . The narrower the filters, the better. You can use the **Edit and preview results** button next to the filters.
104+
1. Once you've created your policy, you can view it by filtering for the **File policy** type. You can always edit a policy, calibrate its filters, or change the automated actions. The policy is automatically enabled upon creation and starts scanning your cloud files immediately. We recommended narrowing down the filters using multiple search fields to get the files that you want to work with. The narrower the filters, the better. You can use the **Edit and preview results** button next to the filters.
103105

104-
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
106+
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
105107

106-
1. To view file policy matches, files that are suspected to violate the policy, go to **Policies** -> **Policy management**. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
108+
109+
1. To view file policy matches, go to **Policies** -> **Policy management**. Here you can see files that are suspected to violate the policy. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
107110

108111
## Limitations
109112

@@ -193,6 +196,7 @@ Below is a list of the file filters that can be applied:
193196
> [!NOTE]
194197
> - This filter doesn't support files that were shared with a group, only with specific users.
195198
> - This filter doesn't support files shared with a specific user through a shared link for SharePoint and OneDrive.
199+
> - When files are uploaded to SharePoint, OneDrive, etc., the **Collaborator > Domains** field automatically includes the domain of the file owner. If you use the **Any from domain** filter with the **does not contain** condition to exclude your organization's domain, files owned by users in your domain may be ignored by the policy.
196200
197201
- **Entire organization** – If the entire organization has access to the file.
198202

@@ -216,7 +220,7 @@ Labels include:
216220
- **Microsoft Purview Information Protection** - Requires integration with Microsoft Purview Information Protection.
217221
- **Defender for Cloud Apps** - Provides more insight into the files it scans. For each file scanned by Defender for Cloud Apps DLP, you can know if inspection was blocked because the file is encrypted or corrupted. For example, you can set up policies to alert and quarantine password-protected files that are shared externally.
218222
- **Azure RMS encrypted** – Files whose content wasn't inspected because they have an Azure RMS encryption set.
219-
- **Password encrypted** – Files whose content wasn't inspected because they're password protected by the user.
223+
- **Password encrypted** – Files whose content wasn't inspected because they were password protected by the user.
220224
- **Corrupt file** – Files whose content wasn't inspected because their contents couldn't be read.
221225

222226
- **File type** – Defender for Cloud Apps scans the file to determine whether the true file type matches the MIME type received (see table) from the service. This scan is for files that are relevant for data scan (documents, images, presentations, spreadsheets, text, and zip/archive files). The filter works per file/folder type. For example, *All folders that are ...* or *All spreadsheet files that are...*

defender-for-cloud-apps/siem-sentinel.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,30 @@
11
---
22
title: Microsoft Sentinel integration
33
description: This article provides information integrating Microsoft Sentinel with Defender for Cloud Apps.
4-
ms.date: 01/29/2023
4+
ms.date: 10/29/2025
55
ms.topic: how-to
66
ms.reviewer: Naama-Goldbart
77
---
8-
# Microsoft Sentinel integration (Preview)
98

9+
# Microsoft Sentinel integration (Preview)
1010

11+
> [!IMPORTANT]
12+
> **Deprecation Notice: Microsoft Defender for Cloud Apps SIEM Agents**
13+
>
14+
> As part of our ongoing convergence process across Microsoft Defender workloads, Microsoft Defender for Cloud Apps SIEM agents will be deprecated starting **November 2025**.
15+
>
16+
>
17+
> Existing Microsoft Defender for Cloud Apps SIEM agents will continue to function as is until that time. As of June 19, 2025, **no new SIEM agents can be configured**, but [Microsoft Sentinel](siem-sentinel.md) agent integration (Preview), will remain supported and can still be added.
18+
>
19+
> We recommend transitioning to APIs that support the management of activities and alerts data from multiple workloads.
20+
> These APIs enhance security monitoring and management and offer additional capabilities using data from multiple Microsoft Defender workloads.
21+
>
22+
> To ensure continuity and access to data currently available through Microsoft Defender for Cloud Apps SIEM agents, we recommend transitioning to the following supported APIs:
23+
>
24+
> - For alerts and activities, see: [Microsoft Defender XDR Streaming API](/defender-xdr/streaming-api).
25+
> - For Microsoft Entra ID Protection logon events, see [IdentityLogonEvents](/defender-xdr/advanced-hunting-identitylogonevents-table) table in the advanced hunting schema.
26+
> - For Microsoft Graph Security Alerts API, see: [List alerts_v2](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
27+
> - To view Microsoft Defender for Cloud Apps alerts data in the Microsoft Defender XDR incidents API, see [Microsoft Defender XDR incidents APIs and the incidents resource type](/graph/api/security-list-alerts_v2?view=graph-rest-1.0&tabs=http&preserve-view=true)
1128
1229
You can integrate Microsoft Defender for Cloud Apps with Microsoft Sentinel (a scalable, cloud-native SIEM and SOAR) to enable centralized monitoring of alerts and discovery data. Integrating with Microsoft Sentinel allows you to better protect your cloud applications while maintaining your usual security workflow, automating security procedures, and correlating between cloud-based and on-premises events.
1330

defender-for-identity/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The [unified sensor](/defender-for-identity/deploy/activate-sensor) provides enh
3636

3737
## September 2025
3838

39-
### Unlock additional security value in the unified agent (Preview)
39+
### Unlock additional security value in the unified agent
4040
Get enhance protection by applying the ‘Unified sensor RPC audit’ tag to your V3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
4141

4242
### Identity posture recommendations view on the identity page (preview)

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,9 @@ For editable queries, more options are available:
108108

109109
## Create custom analytics and detection rules
110110

111+
>[!IMPORTANT]
112+
> [**Custom detections**](custom-detections-overview.md) is now the best way to create new rules across Microsoft Sentinel SIEM Microsoft Defender XDR. With custom detections, you can reduce ingestion costs, get unlimited real-time detections, and benefit from seamless integration with Defender XDR data, functions, and remediation actions with automatic entity mapping. For more information, read [this blog](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/custom-detections-are-now-the-unified-experience-for-creating-detections-in-micr/4463875).
113+
111114
To help discover threats and anomalous behaviors in your environment, you can create customized detection rules. There are two kinds:
112115
- Analytics rules - to generate detections from rules that query data that is ingested through Microsoft Sentinel
113116
- Custom detection rules - to generate detections from rules that query data from Defender XDR or from both Microsoft Sentinel and Defender XDR

defender-xdr/advanced-hunting-microsoft-defender.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.topic: concept-article
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
26-
ms.date: 09/08/2025
26+
ms.date: 10/30/2025
2727
---
2828

2929
# Advanced hunting with Microsoft Sentinel data in Microsoft Defender portal
@@ -88,10 +88,8 @@ In the unified portal, in addition to viewing the schema column names and descri
8888
- The Microsoft Sentinel `SecurityAlert` table is replaced by `AlertInfo` and `AlertEvidence` tables, which both contain all the data on alerts. While SecurityAlert isn't available in the schema tab, you can still use it in queries using the advanced hunting editor. This provision is made so as not to break existing queries from Microsoft Sentinel that use this table.
8989
- Guided hunting mode and take actions capabilities are supported for Defender XDR data only.
9090
- Custom detections have the following limitations:
91-
- Custom detections aren't available for KQL queries that don't include Defender XDR data.
9291
- Near real-time detection frequency isn't available for detections that include Microsoft Sentinel data.
9392
- Custom functions that were created and saved in Microsoft Sentinel aren't supported.
94-
- Defining entities from Sentinel data isn't yet supported in custom detections.
9593
- Bookmarks aren't supported in the advanced hunting experience. They're supported in the **Microsoft Sentinel > Threat management > Hunting** feature. Alternatively, you can use the [Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident) feature to link query results to new or existing incidents.
9694
- If you're streaming Defender XDR tables to Log Analytics, there might be a difference between the`Timestamp` and `TimeGenerated` columns. In case the data arrives to Log Analytics after 48 hours, it's being overridden upon ingestion to `now()`. Therefore, to get the actual time the event happened, we recommend relying on the `Timestamp` column.
9795
- When prompting [Security Copilot](advanced-hunting-security-copilot.md) for advanced hunting queries, you might find that not all Microsoft Sentinel tables are currently supported. However, support for these tables can be expected in the future.

0 commit comments

Comments
 (0)