Skip to content

Commit cc689d3

Browse files
authored
Merge branch 'main' into patch-2
2 parents 11bb68b + 624fb0e commit cc689d3

5 files changed

+31
-17
lines changed

defender-office-365/air-about.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
10-
ms.date: 06/09/2023
10+
ms.date: 10/22/2024
1111
ms.localizationpriority: medium
1212
search.appverid:
1313
- MET150
@@ -79,7 +79,9 @@ In addition, make sure to review your organization's [alert policies](alert-poli
7979

8080
## Which alert policies trigger automated investigations?
8181

82-
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
82+
Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. If these alerts are disabled or replaced by custom alerts, AIR isn't triggered.
83+
84+
The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
8385

8486
|Alert|Severity|How the alert is generated|
8587
|---|---|---|

defender-office-365/attack-simulation-training-faq.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,10 @@ A: Several options are available to target users:
256256
- Include all users (currently available to organizations with less than 40,000 users).
257257
- Choose specific users.
258258
- Select users from a CSV file (one email address per line).
259-
- Microsoft Entra group-based targeting.
259+
- Microsoft Entra group-based targeting. The following group types are supported:
260+
- Microsoft 365 Groups (static and dynamic)
261+
- Distribution groups (static only)
262+
- Mail-enabled security groups (static only)
260263

261264
We find that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
262265

@@ -282,7 +285,7 @@ Managing a large CSV file or adding many individual recipients can be cumbersome
282285
> [!TIP]
283286
> Currently, shared mailboxes aren't supported in Attack simulation training. Simulations should target user mailboxes or groups containing user mailboxes.
284287
>
285-
> Distribution groups are expanded and the list of users is generated at the time of saving the simulation or simulation automation.
288+
> Groups are expanded and the list of users is generated at the time of saving the simulation, simulation automation, or training campaign.
286289
287290
### Q: Are the limits for the number of simulations that can be deployed during a specific time interval?
288291

defender-office-365/attack-simulation-training-simulation-automations.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 08/26/2024
15+
ms.date: 10/23/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -191,7 +191,12 @@ On the **Target users** page, select who receives the simulation. Use the follow
191191

192192
- **Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the simulation, choose one of the following options:
193193

194-
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. **Dynamic distribution groups are not supported**. The following search tools are available:
194+
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. The following group types are supported:
195+
- Microsoft 365 Groups (static and dynamic)
196+
- Distribution groups (static only)
197+
- Mail-enabled Security groups (static only)
198+
199+
The following search tools are available:
195200

196201
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
197202
- Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name** and **Email**.

defender-office-365/attack-simulation-training-training-campaigns.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn how to create training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 08/14/2024
15+
ms.date: 10/23/2024
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -105,21 +105,25 @@ On the **Target users** page, select who receives the Training campaign. Use the
105105
106106
- **Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the Training campaign, choose one of the following options:
107107

108-
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to include in the Training campaign. **Dynamic distribution groups are not supported**. The following search tools are available:
108+
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to include in the Training campaign. The following group types are supported:
109+
- Microsoft 365 Groups (static and dynamic)
110+
- Distribution groups (static only)
111+
- Mail-enabled security groups (static only)
109112

110-
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
113+
The following search tools are available:
111114

112-
- Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name**, **Email**, **Job title**, and **Type**.
113-
- Type less than three characters or no characters and then press the ENTER key. No users are shown in the **User list** section, but you can type three or more characters in the **Search** box to search for users and groups.
115+
- **Search for users or groups**: If you click in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
116+
- Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name**, **Email**, **Job title**, and **Type**.
117+
- Type less than three characters or no characters and then press the ENTER key. No users are shown in the **User list** section, but you can type three or more characters in the **Search** box to search for users and groups.
114118

115-
The number of results appears in the **Selected (0/x) users** label.
119+
The number of results appears in the **Selected (0/x) users** label.
116120

117-
> [!TIP]
118-
> Selecting **Add filters** clears and replaces any results the **User list** section with the **Filter users by categories**.
121+
> [!TIP]
122+
> Selecting **Add filters** clears and replaces any results the **User list** section with the **Filter users by categories**.
119123
120-
When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
124+
When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
121125

122-
Select **Add x users** to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
126+
Select **Add x users** to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
123127

124128
- **Filter users by categories**: Use the following options:
125129

defender-office-365/message-headers-eop-mdo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The individual fields and values are described in the following table.
5656
|Field|Description|
5757
|---|---|
5858
|`ARC`|The `ARC` protocol has the following fields: <ul><li>`AAR`: Records the content of the **Authentication-results** header from DMARC.</li><li>`AMS`: Includes cryptographic signatures of the message.</li><li>`AS`: Includes cryptographic signatures of the message headers. This field contains a tag of a chain validation called `"cv="`, which includes the outcome of the chain validation as **none**, **pass**, or **fail**.</li></ul>|
59-
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BIMP`: Brand impersonation<sup>\*</sup></li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`BIMP`: Brand impersonation</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
59+
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BIMP`: Brand impersonation<sup>\*</sup></li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
6060
|`CIP:[IP address]`|The connecting IP address. You can use this IP address in the IP Allow List or the IP Block List. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).|
6161
|`CTRY`|The source country/region as determined by the connecting IP address, which might not be the same as the originating sending IP address.|
6262
|`DIR`|The Directionality of the message: <ul><li>`INB`: Inbound message.</li><li>`OUT`: Outbound message.</li><li>`INT`: Internal message.</li></ul>|

0 commit comments

Comments
 (0)