Skip to content

Commit c1e6f8c

Browse files
authored
Merge branch 'main' into docs-editor/evaluate-microsoft-defender-an-1737766073
2 parents 06bb0b0 + f1f45b3 commit c1e6f8c

18 files changed

+161
-65
lines changed

CloudAppSecurityDocs/in-browser-protection.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: In-browser protection with Microsoft Edge for Business | Microsoft Defender for Cloud Apps
33
description: Learn about using in-browser protection with Microsoft Defender for Cloud Apps session policies and Microsoft Edge for Business.
4-
ms.date: 10/31/2024
4+
ms.date: 01/26/2025
55
ms.topic: conceptual
66
#customerIntent: As a Defender for Cloud Apps admin, I want to learn about the user experience with in-browser protection.
77
---
@@ -105,6 +105,8 @@ Administrators who understand the power of Microsoft Edge browser protection can
105105

106106
4. When you're finished on the **Edge for Business protection** page, select **Save**.
107107

108+
:::image type="content" source="media/in-browser-protection/edge-for-business-protection-settings.png" alt-text="Screenshot of Microsoft Edge for business protection settings." lightbox="media/in-browser-protection/edge-for-business-protection-settings.png":::
109+
108110
## Related content
109111

110112
For more information, see [Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md).

CloudAppSecurityDocs/mde-integration.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,13 +65,12 @@ To enable Defender for Endpoint integration with Defender for Cloud Apps:
6565

6666
1. In the [Microsoft Defender portal](https://security.microsoft.com), from the navigation pane, select **Settings** > **Endpoints** > **General** > **Advanced features**.
6767
1. Toggle the **Microsoft Defender for Cloud Apps** to **On**.
68-
1. Select **Apply**.
68+
1. Select **Save preferences**.
6969

7070
>[!NOTE]
7171
> It takes up to two hours after you enable the integration for the data to show up in Defender for Cloud Apps.
7272
>
73-
74-
![Screenshot of the Defender for Endpoint settings.](media/mde-settings.png)
73+
![Screenshot of the Defender for Endpoint settings.](media\turn-on-advanced-features-for-microsoft-defender-for-cloud-apps.png)
7574

7675
To configure the severity for alerts sent to Microsoft Defender for Endpoint:
7776

429 KB
Loading
-100 KB
Binary file not shown.
174 KB
Loading

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -310,8 +310,6 @@ items:
310310
items:
311311
- name: Investigate anomaly detection alerts
312312
href: investigate-anomaly-alerts.md
313-
- name: Investigate risky users
314-
href: tutorial-ueba.md
315313
- name: Respond to threats
316314
items:
317315
- name: Governing connected apps

defender-office-365/configure-junk-email-settings-on-exo-mailboxes.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
description: Admins can learn how to configure the junk email settings in Exchange Online mailboxes. Many of these settings are available to users in Outlook or Outlook on the web.
1818
ms.service: defender-office-365
19-
ms.date: 12/08/2024
19+
ms.date: 01/27/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -172,3 +172,10 @@ As you can see, enabling the **Trust email from my contacts** setting reduces th
172172

173173
- File name: outlk16.opax
174174
- Policy setting: **Trust e-mail from contacts**
175+
176+
> [!IMPORTANT]
177+
> The following button helps identify and resolve issues with the safelist collection in user mailboxes (the Safe Senders list and Bloxked Senders list, which includes individual senders and domains):
178+
>
179+
<div class="nextstepaction">
180+
<p><a href="https://aka.ms/safeblockdiag" data-linktype="external">Run Tests: Mailbox safe/blocked sender list</a></p>
181+
</div>

defender-xdr/auditing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- cx-ti
1818
- cx-dex
1919
search.appverid: met150
20-
ms.date: 10/30/2024
20+
ms.date: 01/14/2025
2121
---
2222

2323
# Auditing
@@ -28,7 +28,7 @@ ms.date: 10/30/2024
2828

2929
As a tenant administrator, you can use Microsoft Purview to search the audit logs for the times Microsoft Defender Experts signed into your tenant and the actions they did there to perform their investigations. You can also search the audit logs for the changes done by your tenant administrators to the Defender Experts settings.
3030

31-
[Audit (Standard)](/microsoft-365/compliance/audit-solutions-overview) is turned on by default for all Microsoft Defender Experts for XDR customers when paid licenses are assigned to the tenant. If you have a trial license, work with your service delivery manager to turn on Audit if it isn't yet.
31+
Auditing is automatically turned on in the Microsoft Defender portal. Features that are audited are logged in the audit log automatically. Auditing can also collect audit logs from GCC environments.
3232

3333
> [!NOTE]
3434
> Make sure you have the right [permissions](/microsoft-365/compliance/audit-log-search#before-you-search-the-audit-log) to search for audit logs.

defender-xdr/microsoft-365-defender-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ To learn more about the services that are part of the Microsoft Defender portal,
3838
- **[Microsoft Security Copilot embedded experience in the Microsoft Defender portal](security-copilot-in-microsoft-365-defender.md)**
3939
- **[Microsoft Defender for IoT enterprise monitoring in the Microsoft Defender portal](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint)**
4040
- **[Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal)**
41+
- **[Microsoft Purview Insider Risk Management alerts in the Microsoft Defender portal](irm-investigate-alerts-defender.md)**
4142

4243
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
4344

defender-xdr/microsoft-365-defender.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ Microsoft Defender XDR helps security teams protect and detect their organizatio
4040
- [**Microsoft Entra ID Protection**](/azure/active-directory/identity-protection/overview-identity-protection)
4141
- [**Microsoft Data Loss Prevention**](/microsoft-365/compliance/dlp-learn-about-dlp)
4242
- [**App Governance**](/defender-cloud-apps/app-governance-manage-app-governance)
43+
- [**Microsoft Purview Insider Risk Management**](/purview/insider-risk-management-solution-overview)
4344

4445
With the integrated Microsoft Defender XDR solution, security professionals can stitch together the threat signals that each of these products receive and determine the full scope and impact of the threat; how it entered the environment, what it's affected, and how it's currently impacting the organization. Microsoft Defender XDR takes automatic action to prevent or stop the attack and self-heal affected mailboxes, endpoints, and user identities.
4546

0 commit comments

Comments
 (0)