Skip to content

Commit c3a769e

Browse files
Merge branch 'main' into zt-overview
2 parents 9515e49 + be43a0c commit c3a769e

File tree

51 files changed

+528
-350
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+528
-350
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,11 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/tutorial-ueba.md",
1000+
"redirect_url": "/defender-cloud-apps/",
1001+
"redirect_document_id": true
9971002
},
9981003
{
9991004
"source_path": "CloudAppSecurityDocs/file-filters.md",

CloudAppSecurityDocs/index.yml

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -94,16 +94,6 @@ landingContent:
9494
- text: Threat response governance actions
9595
url: governance-actions.md
9696

97-
- linkListType: how-to-guide
98-
links:
99-
- text: Use in-browser protection with Microsoft Edge
100-
url: in-browser-protection.md
101-
- text: Investigate behaviors by hunting
102-
url: behaviors.md
103-
- text: Investigate anomaly detection alerts
104-
url: investigate-anomaly-alerts.md
105-
- text: Investigate risky users
106-
url: tutorial-ueba.md
10797

10898
# Card (optional)
10999
- title: Information protection

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -310,8 +310,6 @@ items:
310310
items:
311311
- name: Investigate anomaly detection alerts
312312
href: investigate-anomaly-alerts.md
313-
- name: Investigate risky users
314-
href: tutorial-ueba.md
315313
- name: Respond to threats
316314
items:
317315
- name: Governing connected apps

CloudAppSecurityDocs/tutorial-ueba.md

Lines changed: 0 additions & 131 deletions
This file was deleted.

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: yongrhee
77
manager: deniseb
88
ms.service: defender-endpoint
99
ms.topic: overview
10-
ms.date: 02/28/2024
10+
ms.date: 01/24/2025
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
1313
ms.custom: partner-contribution
@@ -53,6 +53,7 @@ When the client encounters unknown threats, it sends metadata or the file itself
5353
|**Heuristics engine** <br/> Heuristic rules identify file characteristics that have similarities with known malicious characteristics to catch new threats or modified versions of known threats.|**Detonation-based ML engine** <br/> Suspicious files are detonated in a sandbox. Deep learning classifiers analyze the observed behaviors to block attacks.|
5454
|**Emulation engine** <br/> The emulation engine dynamically unpacks malware and examines how they would behave at runtime. The dynamic emulation of the content and scanning both the behavior during emulation and the memory content at the end of emulation defeat malware packers and expose the behavior of polymorphic malware.|**Reputation ML engine** <br/> Domain-expert reputation sources and models from across Microsoft are queried to block threats that are linked to malicious or suspicious URLs, domains, emails, and files. Sources include Windows Defender SmartScreen for URL reputation models and Defender for Office 365 for email attachment expert knowledge, among other Microsoft services through the Microsoft Intelligent Security Graph.|
5555
|**Network engine** <br/> Network activities are inspected to identify and stop malicious activities from threats.|**Smart rules engine** <br/> Expert-written smart rules identify threats based on researcher expertise and collective knowledge of threats.|
56+
|**CommandLine scanning engine** <br/> This engine scans the commandlines of all processes before they execute. If the commandline for a process is found to be malicious it is blocked from execution.|**CommandLine ML engine** <br/> Multiple advanced ML models scan the suspicious commandlines in the cloud. If a commandline is found to be malicious, cloud sends a signal to the client to block the corresponding process from starting.|
5657

5758
For more information, see [Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK&reg; Evaluations: Enterprise](https://www.microsoft.com/security/blog/2023/09/20/microsoft-365-defender-demonstrates-100-percent-protection-coverage-in-the-2023-mitre-engenuity-attck-evaluations-enterprise/).
5859

@@ -97,6 +98,6 @@ We focus on every industry.
9798

9899
### Do your detection/protection require a human analyst?
99100

100-
When you're pen-testing, you should demand where no human analysts are engaged on detect/protect, to see how the actual antivirus engine (prebreach) efficacy truly is, and a separate one where human analysts are engaged.You can add [Microsoft Defender Experts for XDR](/defender-xdr/dex-xdr-overview) a managed extended detection and response service to augment your SOC.
101+
When you're pen-testing, you should demand where no human analysts are engaged on detect/protect, to see how the actual antivirus engine (prebreach) efficacy truly is, and a separate one where human analysts are engaged. You can add [Microsoft Defender Experts for XDR](/defender-xdr/dex-xdr-overview) a managed extended detection and response service to augment your SOC.
101102

102103
The ***continuous iterative enhancement*** each of these engines to be increasingly effective at catching the latest strains of malware and attack methods. These enhancements show up in consistent [top scores in industry tests](/defender-xdr/top-scoring-industry-tests), but more importantly, translate to [threats and malware outbreaks](https://www.microsoft.com/security/blog/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/) stopped and [more customers protected](https://www.microsoft.com/security/blog/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise/).

defender-endpoint/api/export-firmware-hardware-assessment.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 01/08/2025
18+
ms.date: 01/22/2025
1919
---
2020

2121
# Export Hardware and firmware assessment inventory per device
@@ -153,12 +153,16 @@ Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability
153153
GET /api/machines/HardwareFirmwareInventoryExport
154154
```
155155

156-
### 2.4 Properties (JSON response)
156+
### 2.4 Parameters
157+
158+
- `sasValidHours`: The number of hours that the download URLs are valid for. Maximum is 6 hours.
159+
160+
### 2.5 Properties (JSON response)
157161

158162
> [!NOTE]
159163
>
160-
> - The files are gzip compressed & in multiline Json format.
161-
> - The download URLs are only valid for 1 hour.
164+
> - The files are GZIP compressed & in multiline JSON format.
165+
> - The download URLs are valid for 6 hours.
162166
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
163167
> - Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
164168
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
@@ -169,15 +173,15 @@ Property (ID)|Data type|Description
169173
|GeneratedTime|DateTime|The time the export was generated.
170174

171175

172-
## 2.5 Examples
176+
## 2.6 Examples
173177

174-
### 2.5.1 Request example
178+
### 2.6.1 Request example
175179

176180
```http
177181
GET https://api.security.microsoft.com/api/machines/HardwareFirmwareInventoryExport
178182
```
179183

180-
### 2.5.2 Response example
184+
### 2.6.2 Response example
181185

182186
```json
183187
{

defender-endpoint/api/export-security-baseline-assessment.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 01/08/2025
18+
ms.date: 01/22/2025
1919
---
2020

2121
# Export security baselines assessment per device
@@ -158,12 +158,16 @@ Returns all security baselines assessments for all devices, on a per-device basi
158158
GET /api/machines/BaselineComplianceAssessmentExport
159159
```
160160

161-
### 2.4 Properties (via files)
161+
### 2.4 Parameters
162+
163+
- `sasValidHours`: The number of hours that the download URLs are valid for. Maximum is 6 hours.
164+
165+
### 2.5 Properties (via files)
162166

163167
> [!NOTE]
164168
>
165-
> - The files are gzip compressed & in multiline Json format.
166-
> - The download URLs are only valid for 1 hours.
169+
> - The files are GZIP compressed & in multiline JSON format.
170+
> - The download URLs are valid for 6 hours.
167171
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
168172
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
169173

@@ -172,15 +176,15 @@ Property (ID)|Data type|Description
172176
|Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization.
173177
|GeneratedTime|String|The time that the export was generated.
174178

175-
## 2.5 Examples
179+
## 2.6 Examples
176180

177-
### 2.5.1 Request example
181+
### 2.6.1 Request example
178182

179183
```http
180184
GET https://api.securitycenter.microsoft.com/api/machines/BaselineComplianceAssessmentExport
181185
```
182186

183-
### 2.5.2 Response example
187+
### 2.6.2 Response example
184188

185189
```json
186190
{

0 commit comments

Comments
 (0)