You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
8
8
author: chrisda
9
9
manager: deniseb
10
10
ms.localizationpriority: medium
11
-
ms.date: 03/03/2025
11
+
ms.date: 05/19/2025
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -39,6 +39,23 @@ For more information on what's new with other Microsoft Defender security produc
39
39
-[What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
40
40
-[What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
41
41
42
+
## May 2025
43
+
44
+
- In government cloud environments, :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** replaces the **Message actions** drop down list on the **Email** tab (view) of the details area of the **All email**, **Malware**, or **Phish** views in [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):
45
+
- SecOps personnel can now create tenant-level block entries on URLs and files via the [Tenant Allow/Block List](tenant-allow-block-list-about.md) directly from Threat Explorer.
46
+
- For 100 or fewer messages selected in Threat Explorer, SecOps personnel can take multiple actions on the selected messages from the same page. For example:
47
+
- Purge email messages or propose email remediation.
48
+
- Submit messages to Microsoft.
49
+
- Trigger investigations.
50
+
- Crate block entries in the Tenant Allow/Block List.
51
+
- Actions are contextually based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
52
+
- For 101 or more messages selected, only email purge and propose remediation options are available.
53
+
54
+
> [!TIP]
55
+
> A new panel allows SecOps personnel to look for indicators of compromise at the tenant level, and the block action is readily available.
56
+
57
+
For more information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation) and [Remediate Malicious Email: Manual and automated remediation](remediate-malicious-email-delivered-office-365.md#manual-and-automated-remediation).
58
+
42
59
## March 2025
43
60
44
61
-**User reported messages by third-party add-ins can be sent to Microsoft for analysis**: In [user reported settings](submissions-user-reported-messages-custom-mailbox.md), admins can select **Monitor reported messages in Outlook**\>**Use a non-Microsoft add-in button**. In the **Reported message destination** section, select **Microsoft and my reporting mailbox**, and then provide the email address of the internal Exchange Online mailbox where user-reported messages by the third-party add-in are routed to. Microsoft analyzea these reported messages and provides result on the **User reported** tab of **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ The **Analytics rule wizard** appears. Fill up the required details as described
123
123
124
124
125
125
##### Custom detection rules
126
-
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
126
+
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create custom detection rules](custom-detection-rules.md) for more information.
127
127
128
128
129
129
In both custom detection and analytics rule creation, you can only query data ingested as analytics logs (that is, not as basic logs or auxiliary logs. See [log management plans](/azure/sentinel/log-plans#log-management-plans) to check the different tiers) otherwise the rule creation won't proceed.
@@ -133,3 +133,12 @@ If your Defender XDR data is ingested into Microsoft Sentinel, you have the opti
133
133
134
134
> [!NOTE]
135
135
> If a Defender XDR table is not set up to stream to log analytics in Microsoft Sentinel but is recognized as a standard table in Microsoft Sentinel, an analytics rule can be created successfully but the rule won't run correctly since no data is actually available in Microsoft Sentinel. For these cases, use the custom detection rule wizard instead.
136
+
137
+
## Manage custom analytics and detection rules
138
+
139
+
You can view all your user-defined rules—both custom detection rules and analytics rules—in the **Detection rules** page. Read [Manage custom detections](custom-detection-manage.md) for more details.
140
+
141
+
142
+
143
+
For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
33
+
34
+
> [!TIP]
35
+
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
36
+
37
+
For users who have onboarded a Microsoft Sentinel workspace to the unified Microsoft Defender portal, the custom detection rules list includes [analytics rules](advanced-hunting-defender-use-custom-rules.md#analytics-rules). The following sections also apply to analytics rules unless otherwise indicated.
38
+
39
+
### View existing rules
40
+
41
+
To view your existing custom detection rules and analytics rules, navigate to **Hunting** > **Custom detection rules**.
42
+
43
+
:::image type="content" source="/defender/media/unified-custom-det-list-tb.png" alt-text="Screenshot of the Custom detection rules page in the Microsoft Defender portal." lightbox="/defender/media/unified-custom-det-list.png":::
44
+
45
+
You can filter for any column by going to **Add filter**, selecting the columns you want to filter for, and selecting **Add**. For each of the chosen columns, select the corresponding pill beside **Filters:**, select the columns, then **Apply**.
46
+
47
+
To search for specific rules, go to the search box in the upper right of the page and enter the name or rule ID of the rule you are looking for.
48
+
49
+
For multiworkspace organizations that onboarded multiple workspaces to Microsoft Defender, you can filter for workspaces using the columns **Workspace ID** or **Workspace name**.
50
+
51
+
The page lists all the rules with the following run information:
52
+
53
+
-**Last run** - When a rule was last run to check for query matches and generate alerts
54
+
-**Last run status** - Whether a rule ran successfully (for custom detection rules only)
55
+
-**Next run** - The next scheduled run
56
+
-**Status** - Whether a rule has been turned on or off
57
+
58
+
### View rule details, modify rule, and run rule
59
+
60
+
To view comprehensive information about a custom detection rule or an analytics rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
61
+
62
+
:::image type="content" source="/defender/media/custom-detect-rules-view.png" alt-text="Screenshot of the Custom detection rule details page in the Microsoft Defender portal." lightbox="/defender/media/custom-detect-rules-view.png":::
63
+
64
+
You can also take the following actions on the rule from this page:
65
+
66
+
-**Open detection rule page** - opens the detection rule page to view triggered alerts and review actions (for custom detection rules only)
67
+
-**Run** - runs the rule immediately; this also resets the interval for the next run (for custom detection rules only)
68
+
-**Edit** - allows you to modify the rule without changing the query
69
+
-**Modify query** - allows you to edit the query in advanced hunting
70
+
-**Turn on** / **Turn off** - allows you to enable the rule or stop it from running
71
+
-**Delete** - allows you to turn off the rule and remove it
72
+
73
+
#### View and manage triggered alerts
74
+
75
+
In the rule details screen (**Hunting**\>**Custom detections**\>**[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
76
+
77
+
- Manage the alert by setting its status and classification (true or false alert)
78
+
- Link the alert to an incident
79
+
- Run the query that triggered the alert on advanced hunting
80
+
81
+
#### Review actions
82
+
83
+
In the rule details screen (**Hunting**\>**Custom detections**\>**[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
84
+
85
+
> [!TIP]
86
+
> To quickly view information and take action on an item in a table, use the selection column [✓] at the left of the table.
-[Learn the advanced hunting query language](advanced-hunting-query-language.md)
94
+
-[Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)
95
+
-[Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)
@@ -135,6 +135,7 @@ With the query in the query editor, select **Create detection rule** and specify
135
135
-**Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
136
136
-**Recommended actions** - Additional actions that responders might take in response to an alert.
137
137
138
+
138
139
#### Rule frequency
139
140
140
141
When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback period based on the frequency you choose:
@@ -170,7 +171,7 @@ Once you click **Save**, the selected rules' frequency gets updated to Continuou
170
171
You can run a query continuously as long as:
171
172
172
173
- The query references one table only.
173
-
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174
+
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174
175
- The query doesn't use joins, unions, or the `externaldata` operator.
175
176
- The query doesn't include any comments line/information.
176
177
@@ -270,61 +271,16 @@ Only data from devices in the scope will be queried. Also, actions are taken onl
270
271
After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
271
272
272
273
> [!IMPORTANT]
273
-
> Custom detections should be regularly reviewed for efficiency and effectiveness. For guidance on how to optimize your queries, follow the **[Advanced hunting query best practices](advanced-hunting-best-practices.md)**. To make sure you're creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in **[Manage existing custom detection rules](#manage-existing-custom-detection-rules)**.
274
+
> Custom detections should be regularly reviewed for efficiency and effectiveness. For guidance on how to optimize your queries, follow the **[Advanced hunting query best practices](advanced-hunting-best-practices.md)**. To make sure you're creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in **[Manage existing custom detection rules](custom-detection-manage.md)**.
274
275
>
275
276
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
276
277
277
-
## Manage existing custom detection rules
278
-
279
-
You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
280
-
281
-
> [!TIP]
282
-
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
283
-
284
-
### View existing rules
285
-
286
-
To view all existing custom detection rules, navigate to **Hunting** > **Custom detection rules**. The page lists all the rules with the following run information:
287
-
288
-
-**Last run** - When a rule was last run to check for query matches and generate alerts
289
-
-**Last run status** - Whether a rule ran successfully
290
-
-**Next run** - The next scheduled run
291
-
-**Status** - Whether a rule has been turned on or off
292
-
293
-
### View rule details, modify rule, and run rule
294
-
295
-
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
296
-
297
-
:::image type="content" source="/defender/media/custom-detect-rules-view.png" alt-text="Screenshot of the Custom detection rule details page in the Microsoft Defender portal." lightbox="/defender/media/custom-detect-rules-view.png":::
298
278
299
-
You can also take the following actions on the rule from this page:
300
-
301
-
-**Run** - Run the rule immediately. This also resets the interval for the next run.
302
-
-**Edit** - Modify the rule without changing the query.
303
-
-**Modify query** - Edit the query in advanced hunting.
304
-
-**Turn on** / **Turn off** - Enable the rule or stop it from running.
305
-
-**Delete** - Turn off the rule and remove it.
306
-
307
-
### View and manage triggered alerts
308
-
309
-
In the rule details screen (**Hunting**\>**Custom detections**\>**[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
310
-
311
-
- Manage the alert by setting its status and classification (true or false alert)
312
-
- Link the alert to an incident
313
-
- Run the query that triggered the alert on advanced hunting
314
-
315
-
### Review actions
316
-
317
-
In the rule details screen (**Hunting**\>**Custom detections**\>**[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
318
-
319
-
> [!TIP]
320
-
> To quickly view information and take action on an item in a table, use the selection column [✓] at the left of the table.
321
-
322
-
> [!NOTE]
323
-
> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,12 @@ You can also get product updates and important notifications through the [messag
34
34
35
35
36
36
## May 2025
37
+
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
38
+
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
39
+
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
40
+
- You can now view the details pane even for analytics rules.
41
+
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
42
+
37
43
38
44
- (Preview) You can now highlight your security operations achievements and the impact of Microsoft Defender using the **unified security summary**. The unified security summary is available in the Microsoft Defender portal and streamlines the process for SOC teams to generate security reports, saving time usually spent on collecting data from various sources and creating reports. For more information, see [Visualize security impact with the unified security summary](security-summary-report.md).
39
45
- Defender portal users who have onboarded Microsoft Sentinel and have enabled the [User and Entity Behavior Analytics (UEBA)](/azure/sentinel/ueba-reference) can now take advantage of the new unified [`IdentityInfo` table](advanced-hunting-identityinfo-table.md) in advanced hunting. This latest version now includes the largest possible set of fields common to both Defender and Azure portals.
0 commit comments