Skip to content

Commit c2aabb1

Browse files
authored
Merge pull request #3604 from MicrosoftDocs/main
[AutoPublish] main to live - 04/28 10:31 PDT | 04/28 23:01 IST
2 parents 1b9a244 + 66b1c00 commit c2aabb1

15 files changed

+82
-80
lines changed

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@ Session policies don't protect external business-to-business (B2B) collaboration
5454
## Session Controls with Non-Interactive Tokens
5555
Some applications utilize non-interactive access tokens to facilitate seamless redirection between apps within the same suite or realm. When one application is onboarded to Conditional Access App Control and the other is not, session controls may not be enforced as expected. For example, if the Teams client retrieves a non-interactive token for SharePoint Online (SPO), it can initiate an active session in SPO without prompting the user for reauthentication. As a result, the session control mechanism cannot intercept or enforce policies on these sessions. To ensure consistent enforcement, it's recommended to onboard all relevant applications, such as Teams, alongside SPO.
5656

57+
## IPv6 limitations
58+
Access and session policies support IPv4 only. If a request is made over IPv6, IP-based policy rules are not applied. This limitation applies when using both reverse proxy and Edge in-browser protection.
59+
5760
## Limitations for sessions that the reverse proxy serves
5861

5962
The following limitations apply only on sessions that the reverse proxy serves. Users of Microsoft Edge can benefit from in-browser protection instead of using the reverse proxy, so these limitations don't affect them.
@@ -98,6 +101,7 @@ The following table lists example results when you define the **Block upload of
98101

99102
The following limitations apply only on sessions that are served with Edge in-browser protection.
100103

104+
101105
### Deep link is lost when user switches to Edge by clicking 'Continue in Edge'
102106

103107
A user who starts a session in a browser other than Edge, is prompted to switch to Edge by clicking the ‘Continue in Edge’ button.

CloudAppSecurityDocs/troubleshooting-proxy-url.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ For example, Contoso protects its environment using conditional access app contr
2020
So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see the DNS entry or certificate because Contoso does.
2121

2222
> [!NOTE]
23-
> You may also see the following domains in the transparency logs:
23+
> You might also see the following domains in the transparency logs:
2424
>
2525
> - `*.admin-rs-mcas.ms`
2626
> - `*.rs-mcas.ms`
@@ -39,11 +39,12 @@ So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see t
3939
> - `*.admin-mcas-gov-df.ms`
4040
> - `*.mcas-gov-df.ms`
4141
42+
4243
## Here's why you see `*.mcas.ms`, `*.mcas-gov.us`, or `*.mcas-gov.ms` in your URL
4344

4445
This kind of URL is expected and indicates that your organization applies extra security controls to protect business-critical data.
4546

46-
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs and cookies relating to cloud apps that you use.
47+
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs, and cookies relating to cloud apps that you use.
4748

4849
So when you try accessing a cloud app such as Salesforce, SharePoint Online, or AWS, you notice that its URL is suffixed with `.mcas.ms`, `.mcas-gov.us`, or `.mcas-gov.ms`. For example, when using the XYZ app, the URL you're used to seeing changes from `XYZ.com` to `XYZ.com.mcas.ms`.
4950

@@ -52,10 +53,11 @@ If the URL doesn't exactly match one of the replacement patterns, such as `<app_
5253
If you don't recognize the remaining portion of the URL, such as **myurl.com**.mcas.ms, as associated with any of your business apps, we recommend that you investigate the issue further and consider blocking the URL to avoid any potential security risks.
5354

5455
> [!NOTE]
55-
> Microsoft Edge users benefit from in-browser protection, and are not redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56+
> Microsoft Edge users benefit from in-browser protection, and aren't redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
5657
5758
## Related content
5859

60+
- [Known limitations in Conditional Access app control](caac-known-issues.md)
5961
- [Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md)
6062
- [Troubleshooting access and session controls for admin users](troubleshooting-proxy.md)
61-
- [Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
63+
- [Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)

defender-vulnerability-management/TOC.yml

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
- name: Discover devices and explore inventories
2626
items:
2727
- name: Device inventory
28-
href: /defender-endpoint/machines-view-overview
28+
href: /defender-endpoint/machines-view-overview?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
2929
- name: Assign device value
3030
href: tvm-assign-device-value.md
3131
- name: Explore inventories
@@ -95,75 +95,75 @@
9595
- name: Assessments of vulnerabilities and secure configurations
9696
items:
9797
- name: Export assessment methods and properties
98-
href: /defender-endpoint/api/get-assessment-methods-properties
98+
href: /defender-endpoint/api/get-assessment-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
9999
- name: Export secure configuration assessment
100-
href: /defender-endpoint/get-assessment-secure-config
100+
href: /defender-endpoint/get-assessment-secure-config?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
101101
- name: Export software inventory assessment
102-
href: /defender-endpoint/api/get-assessment-software-inventory
102+
href: /defender-endpoint/api/get-assessment-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
103103
- name: Export software vulnerabilities assessment
104-
href: /defender-endpoint/api/get-assessment-software-vulnerabilities
104+
href: /defender-endpoint/api/get-assessment-software-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
105105
- name: Export non-product code software inventory assessment
106-
href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory
106+
href: /defender-endpoint/api/get-assessment-non-cpe-software-inventory?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
107107
- name: Certificate inventory
108108
items:
109109
- name: Export certificate inventory assessment
110-
href: /defender-endpoint/export-certificate-inventory-assessment
110+
href: /defender-endpoint/export-certificate-inventory-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
111111
- name: Authenticated scans
112112
items:
113113
- name: Authenticated scan methods and properties
114-
href: /defender-endpoint/get-authenticated-scan-properties
114+
href: /defender-endpoint/get-authenticated-scan-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
115115
- name: Get all scan definitions
116-
href: /defender-endpoint/api/get-all-scan-definitions
116+
href: /defender-endpoint/api/get-all-scan-definitions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
117117
- name: Add, delete or update a scan definition
118-
href: /defender-endpoint/api/add-a-new-scan-definition
118+
href: /defender-endpoint/api/add-a-new-scan-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
119119
- name: Get all scan agents
120-
href: /defender-endpoint/api/get-all-scan-agents
120+
href: /defender-endpoint/api/get-all-scan-agents?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
121121
- name: Get scan agent Id
122-
href: /defender-endpoint/api/get-agent-details
122+
href: /defender-endpoint/api/get-agent-details?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
123123
- name: Get scan history by definition
124-
href: /defender-endpoint/api/get-scan-history-by-definition
124+
href: /defender-endpoint/api/get-scan-history-by-definition?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
125125
- name: Get scan history by session
126-
href: /defender-endpoint/api/get-scan-history-by-session
126+
href: /defender-endpoint/api/get-scan-history-by-session?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
127127
- name: Browser extensions
128128
items:
129129
- name: Export browser extensions assessment
130-
href: /defender-endpoint/api/get-assessment-browser-extensions
130+
href: /defender-endpoint/api/get-assessment-browser-extensions?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
131131
- name: Get browser extensions permission information
132-
href: /defender-endpoint/api/get-browser-extensions-permission-info
132+
href: /defender-endpoint/api/get-browser-extensions-permission-info?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
133133
- name: Information gathering
134134
items:
135135
- name: Export information gathering assessment
136-
href: /defender-endpoint/get-assessment-information-gathering
136+
href: /defender-endpoint/get-assessment-information-gathering?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
137137
- name: Hardware and Firmware
138138
items:
139139
- name: Export hardware and firmware inventory assessment
140-
href: /defender-endpoint/api/export-firmware-hardware-assessment
140+
href: /defender-endpoint/api/export-firmware-hardware-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
141141
- name: Machine
142142
items:
143143
- name: Get installed software
144-
href: /defender-endpoint/get-installed-software
144+
href: /defender-endpoint/get-installed-software?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
145145
- name: Get discovered vulnerabilities
146-
href: /defender-endpoint/get-discovered-vulnerabilities
146+
href: /defender-endpoint/get-discovered-vulnerabilities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
147147
- name: Get security recommendations
148-
href: /defender-endpoint/get-security-recommendations
148+
href: /defender-endpoint/get-security-recommendations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
149149
- name: Get missing KBs
150-
href: /defender-endpoint/get-missing-kbs-machine
150+
href: /defender-endpoint/get-missing-kbs-machine?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
151151
- name: Remediation activity
152152
items:
153153
- name: Remediation activity methods and properties
154-
href: /defender-endpoint/get-remediation-methods-properties
154+
href: /defender-endpoint/get-remediation-methods-properties?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
155155
- name: Get one remediation activity by ID
156-
href: /defender-endpoint/get-remediation-one-activity
156+
href: /defender-endpoint/get-remediation-one-activity?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
157157
- name: List all remediation activities
158-
href: /defender-endpoint/get-remediation-all-activities
158+
href: /defender-endpoint/get-remediation-all-activities?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
159159
- name: Security baselines
160160
items:
161161
- name: Export security baselines assessment
162-
href: /defender-endpoint/export-security-baseline-assessment
162+
href: /defender-endpoint/export-security-baseline-assessment?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
163163
- name: List security baselines assessment profiles
164-
href: /defender-endpoint/get-security-baselines-assessment-profiles
164+
href: /defender-endpoint/get-security-baselines-assessment-profiles?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
165165
- name: List security baselines assessment configurations
166-
href: /defender-endpoint/get-security-baselines-assessment-configurations
166+
href: /defender-endpoint/get-security-baselines-assessment-configurations?toc=/defender-vulnerability-management/TOC.json&bc=/defender-vulnerability-management/breadcrumb/toc.json
167167
- name: Frequently asked questions
168168
href: defender-vulnerability-management-faq.md
169169
- name: Vulnerability support in Defender Vulnerability Management

defender-xdr/m365d-action-center.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 5/9/2024
11+
ms.date: 4/28/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:
@@ -40,11 +40,6 @@ The unified Action center ([https://security.microsoft.com/action-center](https:
4040

4141
:::image type="content" source="/defender/media/m3d-action-center-unified.png" alt-text="The unified Action center in the Microsoft Defender portal." lightbox="/defender/media/m3d-action-center-unified.png":::
4242

43-
For example:
44-
45-
- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
46-
- If you were already using the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).
47-
4843
The unified Action center brings together remediation actions across Microsoft Defender for Endpoint and Microsoft Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
4944

5045
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
@@ -59,20 +54,20 @@ You can use the unified Action center if you have appropriate permissions and on
5954
You can navigate to the list of actions pending approval in two different ways:
6055

6156
- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or
62-
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.
57+
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) homepage, in the Automated investigation & response card, select **View pending actions**.
6358

6459
## Using the Action center
6560

6661
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
6762

68-
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**.
63+
2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card in the homepage, select **View pending actions**.
6964

7065
3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
7166

7267
|Tab|Description|
7368
|---|---|
74-
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
75-
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
69+
|**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (like Quarantine file). <br/><br/> Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner.|
70+
|**History**|Serves as an audit log for actions that were taken, such as: <ul><li>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were taken on suspicious or malicious email messages, files, or URLs</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by your antivirus protection</li></ul> <br/><br/> Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)).|
7671

7772
4. You can customize, sort, filter, and export data in the Action center.
7873

defender-xdr/m365d-autoir-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: View and manage actions in the Action center
3-
description: Use the Action center to view and manage remediation actions
3+
description: Use the Action center in the Microsoft Defender portal to view and manage remediation actions for affected assets.
44
search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
77
- NOCSH
88
ms.author: diannegali
99
author: diannegali
1010
ms.localizationpriority: medium
11-
ms.date: 11/25/2024
11+
ms.date: 04/28/2025
1212
manager: deniseb
1313
audience: ITPro
1414
ms.collection:

0 commit comments

Comments
 (0)