Skip to content

Commit b84ca2a

Browse files
authored
Merge branch 'main' into dex-h-update
2 parents 9663973 + 6edd768 commit b84ca2a

File tree

164 files changed

+3783
-5782
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

164 files changed

+3783
-5782
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,11 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1000+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1001+
"redirect_document_id": false
9971002
}
9981003
]
9991004
}

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Microsoft Defender for Identity mapping for [potential lateral movement paths](/
1111

1212
> [!NOTE]
1313
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14-
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
14+
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1515
>
1616
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
1717
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).

ATPDocs/health-alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity health issues
33
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4-
ms.date: 07/09/2024
4+
ms.date: 01/16/2025
55
ms.topic: how-to
66
---
77

@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191191
|----|----|----|----|----|
192192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193193

194+
### Auditing for AD CS servers is not enabled as required
195+
196+
|Alert|Description|Resolution|Severity|Displayed in|
197+
|----|----|----|----|----|
198+
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199+
194200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
195201

196202
| Alert| Description |Resolution|Severity|Displayed in|

ATPDocs/role-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ For more information, see [Custom roles in role-based access control for Microso
2828
> [!NOTE]
2929
> Information included from the [Defender for Cloud Apps activity log](classic-mcas-integration.md#activities) may still contain Defender for Identity data. This content adheres to existing Defender for Cloud Apps permissions.
3030
>
31-
> Exception: If you have configured [Scoped deployment](/defender-cloud-apps/scoped-deployment) for Microsoft Defender for Identity alerts in the Microsoft Defender for Cloud Apps portal, these permissions do not carry over and you will have to explicitly grant the Security operations \ Security data \ Security data basics (read) permissions for the relevant portal users.
31+
> Exception: If you have configured [Scoped deployment](/defender-cloud-apps/scoped-deployment) for Microsoft Defender for Identity alerts in Microsoft Defender for Cloud Apps, these permissions do not carry over and you will have to explicitly grant the Security operations \ Security data \ Security data basics (read) permissions for the relevant portal users.
3232
3333
## Required permissions Defender for Identity in Microsoft Defender XDR
3434

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 25 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,16 @@ This article provides descriptions and instructions for Defender for Cloud Apps
1515

1616
Below is a list of the activity filters that can be applied. Most filters support multiple values as well as *NOT* to provide you with a powerful tool for policy creation.
1717

18-
- Activity ID - Search only for specific activities by their ID. This filter is useful when you connect Microsoft Defender for Cloud Apps to your SIEM (using the SIEM agent) and you want to further investigate alerts within the Defender for Cloud Apps portal.
18+
- Activity ID - Search only for specific activities by their ID. This filter is useful when you connect Microsoft Defender for Cloud Apps to your SIEM (using the SIEM agent) and you want to further investigate alerts using Defender for Cloud Apps.
1919

2020
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
2121
- Activity object ID - the ID of the object (file, folder, user, or app ID).
2222

23-
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contain**, **Equal**, or **Starts with** the specific item.
23+
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contains**, **Equals**, or **Starts with** the specific item.
2424

25+
> [!NOTE]
26+
> Activity-Policy's **Activity object Item** filter supports the **Equals** operator only.
27+
2528
- Action type - Search for a more specific action performed in an app.
2629

2730
- Activity type - Search for the app activity.
@@ -67,41 +70,41 @@ Below is a list of the activity filters that can be applied. Most filters suppor
6770
- Tor exit nodes
6871
- Zscaler
6972

70-
- Impersonated activity Search only for activities that were performed in the name of another user.
73+
- Impersonated activity - Search only for activities that were performed in the name of another user.
7174

7275
- Instance - The app instance where the activity was or wasn't performed.
7376

74-
- Location The country/region from which the activity was performed.
77+
- Location - The country/region from which the activity was performed.
7578

76-
- Matched Policy Search for activities that matched a specific policy that was set in the portal.
79+
- Matched Policy - Search for activities that matched a specific policy that was set in the portal.
7780

78-
- Registered ISP The ISP from which the activity was performed.
81+
- Registered ISP - The ISP from which the activity was performed.
7982

8083
- Source - Search by the source from which the activity was detected. The source can be any of the following:
81-
- App connector - logs coming directly from the app's API connector.
84+
- App connector - Logs coming directly from the app's API connector.
8285
- App connector analysis - Defender for Cloud Apps enrichments based on information scanned by the API connector.
8386

84-
- User The user who performed the activity, which can be filtered into domain, group, name, or organization. In order to filter activities with no specific user, you can use the 'is not set' operator.
87+
- User - The user who performed the activity, which can be filtered into domain, group, name, or organization. In order to filter activities with no specific user, you can use the 'is not set' operator.
8588
- User domain - Search for a specific user domain.
86-
- User organization The organizational unit of the user who performed the activity, for example, all activities performed by EMEA_marketing users. This is only relevant for connected Google Workspace instances using organizational units.
87-
- User group Specific user groups that you can import from connected apps, for example, Microsoft 365 administrators.
89+
- User organization - The organizational unit of the user who performed the activity, for example, all activities performed by EMEA_marketing users. This is only relevant for connected Google Workspace instances using organizational units.
90+
- User group - Specific user groups that you can import from connected apps, for example, Microsoft 365 administrators.
8891
- User name - Search for a specific username. To see a list of users in a specific user group, in the **Activity drawer**, select the name of the user group. Clicking will take you to the Accounts page, which lists all the users in the group. From there, you can drill down into the details of the accounts of specific users in the group.
8992
- The **User group** and **User name** filters can be further filtered by using the **As** filter and selecting the role of the user, which can be any of the following:
9093
- Activity object only - meaning that the user or user group selected didn't perform the activity in question; they were the object of the activity.
9194
- Actor only - meaning that the user or user group performed the activity.
9295
- Any role - Meaning that the user or user group was involved in the activity, either as the person who performed the activity or as the object of the activity.
9396

94-
- User agent The user agent of from with the activity was performed.
97+
- User agent - The user agent of from with the activity was performed.
9598

96-
- User agent tag Built-in user agent tag, for example, all activities from outdated operating systems or outdated browsers.
99+
- User agent tag - Built-in user agent tag, for example, all activities from outdated operating systems or outdated browsers.
97100

98101
## Activity queries
99102

100103
To make investigation even simpler, you can now create custom queries and save them for later use.
101104

102105
1. In the **Activity log** page, use the filters as described above to drill down into your apps as necessary.
103106

104-
:::image type="content" source="media/activity-log-query.png" alt-text="Use filters to make query.":::
107+
:::image type="content" source="media/activity-log-query.png" alt-text="Use filters to make query.":::
105108

106109
1. After you've finished building your query, select the **Save as** button.
107110

@@ -115,23 +118,23 @@ To make investigation even simpler, you can now create custom queries and save t
115118

116119
Defender for Cloud Apps also provides you with **Suggested queries**. Suggested queries provide you with recommended avenues of investigation that filter your activities. You can edit these queries and save them as custom queries. The following are optional suggested queries:
117120

118-
- Admin activities - filters all your activities to display only those activities that involve admins.
121+
- Admin activities - Filters all your activities to display only those activities that involve admins.
119122

120-
- Download activities - filters all your activities to display only those activities that were download activities, including downloading user list as a .csv file, downloading shared content, and downloading a folder.
123+
- Download activities - Filters all your activities to display only those activities that were download activities, including downloading user list as a .csv file, downloading shared content, and downloading a folder.
121124

122-
- Failed log-in - filters all your activities to display only failed sign-in and failed sign-ins via SSO
125+
- Failed log-in - Filters all your activities to display only failed sign-in and failed sign-ins via SSO
123126

124-
- File and folder activities - filters all your activities to display only those involving files and folders. The filter includes uploading, download, and accessing folders, along with creating, deleting, uploading, downloading, quarantining, and accessing files and transferring content.
127+
- File and folder activities - Filters all your activities to display only those involving files and folders. The filter includes uploading, download, and accessing folders, along with creating, deleting, uploading, downloading, quarantining, and accessing files and transferring content.
125128

126-
- Impersonation activities - filters all your activities to display only impersonation activities.
129+
- Impersonation activities - Filters all your activities to display only impersonation activities.
127130

128-
- Password changes and reset requests - filters all your activities to display only those activities that involve password reset, change password, and force a user to change the password on the next sign-in.
131+
- Password changes and reset requests - Filters all your activities to display only those activities that involve password reset, change password, and force a user to change the password on the next sign-in.
129132

130-
- Sharing activities - filters all your activities to display only those activities that involve sharing folders and files, including creating a company link, creating an anonymous link, and granting read/write permissions.
133+
- Sharing activities - Filters all your activities to display only those activities that involve sharing folders and files, including creating a company link, creating an anonymous link, and granting read/write permissions.
131134

132-
- Successful log-in - filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
135+
- Successful log-in - Filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
133136

134-
![query activities.](media/queries-activity.png)
137+
![query activities.](media/queries-activity.png)
135138

136139
Additionally, you can use the suggested queries as a starting point for a new query. First, select one of the suggested queries. Then, make changes as needed and finally select **Save as** to create a new **Saved query**.
137140

CloudAppSecurityDocs/api-tokens-legacy.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.topic: reference
88

99

1010

11-
In order to access the Defender for Cloud Apps API, you have to create an API token and use it in your software to connect to the API. This token will be included in the header when Defender for Cloud Apps makes API requests.
11+
In order to access the Defender for Cloud Apps API, you have to create an API token and use it in your software to connect to the API. This token is included in the header when Defender for Cloud Apps makes API requests.
1212

1313
The API tokens tab enables you to help you manage all the API tokens of your tenant.
1414

1515
## Generate a token
1616

1717
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **System**, select **API tokens**.
1818

19-
1. Select the **Add token** and provide a name to identify the token in the future, and select **Generate**.
19+
1. Select **Add token** and provide a name to identify the token in the future, and select **Generate**.
2020

2121
![Defender for Cloud Apps generates API token.](media/api-token-gen.png)
2222

@@ -26,9 +26,9 @@ The API tokens tab enables you to help you manage all the API tokens of your ten
2626

2727
- **Generated:** Tokens that have never been used.
2828
- **Active:** Tokens that were generated and were used within the past seven days.
29-
- **Inactive:** Tokens that were used but there was no activity in the last seven days.
29+
- **Inactive:** Tokens that were used, but there was no activity in the last seven days.
3030

31-
1. After you generate a new token, you'll be provided with a new URL to use to access the Defender for Cloud Apps portal.
31+
1. After you generate a new token, you'll be provided with a new URL to use to access Defender for Cloud Apps.
3232

3333
![Defender for Cloud Apps API token.](media/generate-api-token.png)
3434

@@ -46,7 +46,7 @@ After a token is revoked, it's removed from the table, and the software that was
4646

4747
> [!NOTE]
4848
>
49-
> - SIEM connectors and log collectors also use API tokens. These tokens should be managed from the log collectors and SIEM agent sections and do not appear in this table.
50-
> - Deprovisioned users API tokens are retained in Defender for Cloud Apps but cannot be used. Any attempt to use them will result in a permission denied response. However, we recommend that such tokens are revoked on the **API tokens** page.
49+
> - SIEM connectors and log collectors also use API tokens. These tokens should be managed from the log collectors and SIEM agent sections and don't appear in this table.
50+
> - Deprovisioned users API tokens are retained in Defender for Cloud Apps but can't be used. Any attempt to use them will result in a permission denied response. However, we recommend that such tokens are revoked on the **API tokens** page.
5151
5252
[!INCLUDE [Open support ticket](includes/support.md)]

0 commit comments

Comments
 (0)