Skip to content

Commit cce308a

Browse files
authored
Merge branch 'main' into docs-editor/android-intune-1731646455
2 parents ba66ef3 + 7b52556 commit cce308a

File tree

94 files changed

+1211
-369
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

94 files changed

+1211
-369
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/10/2024
18+
ms.date: 11/18/2024
1919
search.appverid: met150
2020
---
2121

@@ -330,6 +330,11 @@ By default the state of this rule is set to block. In most cases, many processes
330330

331331
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
332332

333+
> [!TIP]
334+
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335+
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It is also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled. 
336+
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode is not advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337+
333338
> [!NOTE]
334339
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
335340
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.

defender-endpoint/mac-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: deniseb
66
ms.author: deniseb
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 10/30/2024
9+
ms.date: 11/18/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -41,7 +41,7 @@ For more information on Microsoft Defender for Endpoint on other operating syste
4141

4242
- In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device control's ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS earlier than 14.3.1.
4343

44-
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.0.1 or newer.
44+
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.1 or newer.
4545

4646
## Sequoia support
4747

defender-endpoint/machines-view-overview.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,7 @@ The available device properties to use as filters vary based on the device inven
136136
|**Device subtype**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The subtype value assigned to the device. Enter a value or select an available value (for example, **Video conference**).|
137137
|**Device type**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The type value assigned to the device. Enter a value or select an available value (for example, **Audio and Video**).|
138138
|**Device value**|All|The assigned value of the device. The available values are **High** and **Low**.|
139+
|**Discovery sources**|All|The source reporting on the device.|
139140
|**Exclusion state**|All|The available values are **Not excluded** and **Excluded**. For more information, see [Exclude devices](exclude-devices.md).|
140141
|**Exposure level**|All|The exposure level of the device based on pending security recommendations. The available values are: <ul><li>**High**</li><li>**Medium**</li><li>**Low**: Devices are less vulnerable to exploitation.</li><li>**No data available**: Possible causes for this value include: <ul><li>The device is inactive (stopped reporting for more than 30 days).</li><li>The OS on the device isn't supported. For more information, see [minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md).</li><li>The agent software on the device is stale (unlikely).</li></ul></li></ul>|
141142
|**First seen**|All tabs except **Network devices**|How long ago the device was first seen on the network or when it was first reported by the Microsoft Defender for Endpoint sensor. The available values are **Last 7 days** or **Over 7 days ago**.|
@@ -178,6 +179,7 @@ You can sort the entries by clicking on an available column header. Select :::im
178179
- **OS version**<sup\*</sup>
179180
- **Sensor health state**<sup\*</sup>
180181
- **Onboarding status**<sup\*</sup>
182+
- **Discovery sources**
181183
- **First seen**
182184
- **Last device update**<sup\*</sup>
183185
- **Tags**<sup\*</sup>
@@ -204,6 +206,7 @@ You can sort the entries by clicking on an available column header. Select :::im
204206
- **Criticality level**<sup\*</sup>
205207
- **Sensor health state**<sup\*</sup>
206208
- **Onboarding status**<sup\*</sup>
209+
- **Discovery sources**
207210
- **Last device update**<sup\*</sup>
208211
- **First seen**
209212
- **Tags**<sup\*</sup>
@@ -219,6 +222,7 @@ You can sort the entries by clicking on an available column header. Select :::im
219222
- **Vendor**<sup>\*</sup>
220223
- **Model**<sup>\*</sup>
221224
- **Name**<sup>\*</sup>
225+
- **Discovery sources**
222226
- **Domain**
223227
- **Device type**
224228
- **Device subtype**
@@ -241,6 +245,7 @@ You can sort the entries by clicking on an available column header. Select :::im
241245
- **Model**<sup>\*</sup>
242246
- **Risk level**<sup>\*</sup>
243247
- **Exposure level**<sup>\*</sup>
248+
- **Discovery sources**
244249
- **OS distribution**<sup>\*</sup>
245250
- **OS version**<sup>\*</sup>
246251
- **First seen**
@@ -253,6 +258,7 @@ You can sort the entries by clicking on an available column header. Select :::im
253258
- **Name**<sup>\*</sup>
254259
- **Vendor**<sup>\*</sup>
255260
- **IP**<sup>\*</sup>
261+
- **Discovery sources**
256262
- **MAC address**
257263
- **Risk level**
258264
- **Exposure level**

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 11/07/2024
17+
ms.date: 11/18/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -37,7 +37,7 @@ This article provides instructions on how to run the tool via Live Response on W
3737
- If you require additional logs related to Microsoft Defender Antivirus, then use `..\Tools\MDELiveAnalyzerAV.ps1`.
3838
- If you require [Microsoft Endpoint Data Loss Prevention](/purview/endpoint-dlp-learn-about) related logs, then use `..\Tools\MDELiveAnalyzerDLP.ps1`.
3939
- If you require network and [Windows Filter Platform](/windows-hardware/drivers/network/windows-filtering-platform-architecture-overview) related logs, then use `..\Tools\MDELiveAnalyzerNet.ps1`.
40-
- If you require [Process Monitor](/sysinternals/downloads/procmon) logs, then use `..\Tools\MDELiveAnalyzerDLP.ps1`.
40+
- If you require [Process Monitor](/sysinternals/downloads/procmon) logs, then use `..\Tools\MDELiveAnalyzerAppCompat.ps1`.
4141

4242
2. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you need to investigate.
4343

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,8 @@ There are two major factors that determine which policy is applied to a message:
6868

6969
<sup>\*</sup> Defender for Office 365 only.
7070

71-
The priority order matters if you have the same recipient intentionally or unintentionally included in multiple policies, because *only* the first policy of that type (anti-spam, anti-malware, anti-phishing, etc.) is applied to that recipient, regardless of how many other policies that the recipient is included in. There's never a merging or combining of the settings in multiple policies for the recipient. The recipient is unaffected by the settings of the remaining policies of that type.
71+
> [!IMPORTANT]
72+
> The priority order matters if you have the same recipient intentionally or unintentionally included in multiple policies, because *only* the first policy of that type (anti-spam, anti-malware, anti-phishing, etc.) is applied to that recipient, regardless of how many other policies that the recipient is included in. There's never a merging or combining of the settings in multiple policies for the recipient. The recipient is unaffected by the settings of the remaining policies of that type.
7273
7374
For example, the group named "Contoso Executives" is included in the following policies:
7475

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -154,6 +154,8 @@
154154
href: dlp-investigate-alerts-defender.md
155155
- name: Investigate data loss prevention alerts with Microsoft Sentinel
156156
href: dlp-investigate-alerts-sentinel.md
157+
- name: Investigate and respond to container threats
158+
href: investigate-respond-container-threats.md
157159
- name: Alerts
158160
href: investigate-alerts.md
159161
- name: Alert classification playbooks

defender-xdr/activate-defender-rbac.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 09/30/2024
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -29,6 +29,8 @@ search.appverid: met150
2929
- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
32+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
33+
- [Microsoft Security Exposure Management](/security-exposure-management/)
3234

3335
For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new [custom roles](create-custom-rbac-roles.md) or [imported roles](import-rbac-roles.md), you must activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads.
3436

@@ -54,20 +56,19 @@ You can activate your workloads in two ways from the Permissions and roles page:
5456
:::image type="content" source="/defender/media/defender/m365-defender-rbac-activate-workloads1.png" alt-text="Screenshot of the activate workloads page" lightbox="/defender/media/defender/m365-defender-rbac-activate-workloads1.png":::
5557

5658
1. **Activate workloads**
57-
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
58-
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
5959

60-
:::image type="content" source="/defender/media/defender/defender-rbac-select-workload.png" alt-text="Screenshot of the choose workloads to activate screen":::
60+
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
61+
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
62+
63+
:::image type="content" source="/defender/media/defender/defender-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen.":::
6164

6265
> [!NOTE]
6366
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
64-
>
6567
> Microsoft Defender for Cloud is active by default with Microsoft Defender XDR Unified RBAC.
66-
>
67-
> Defender XDR Unified RBAC is automatically active for Secure Score access. Once a custom role with one of the permissions is created, it has an immediate impact on assigned users. There is no need to activate it.
68+
> Defender XDR Unified RBAC is automatically active for Exposure Management access. Once a custom role with one of the Exposure Management permissions is created, it has an immediate impact on assigned users. There is no need to activate it.
6869
>
6970
> To activate Exchange Online permissions in Microsoft Defender XDR Unified RBAC, Defender for Office 365 permissions must be active.
70-
71+
7172
2. **Workload settings**
7273
- Select **Workload settings**.
7374
- This brings you to the Microsoft Defender XDR **Permission and roles** page.

defender-xdr/advanced-hunting-security-copilot.md

Lines changed: 24 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Microsoft Copilot for Security in advanced hunting
3-
description: Learn how Microsoft Copilot for Security advanced hunting (NL2KQL) plugin can generate a KQL query for you.
2+
title: Microsoft Security Copilot in advanced hunting
3+
description: Learn how Microsoft Security Copilot advanced hunting (NL2KQL) plugin can generate a KQL query for you.
44
search.appverid: met150
55
ms.service: defender-xdr
66
ms.subservice: adv-hunting
@@ -27,22 +27,30 @@ appliesto:
2727
- Microsoft Sentinel in the Microsoft Defender portal
2828
---
2929

30-
# Microsoft Copilot for Security in advanced hunting
30+
# Microsoft Security Copilot in advanced hunting
3131

32-
[Microsoft Copilot for Security in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
3332

34-
Threat hunters or security analysts who aren't yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Copilot for Security then generates a KQL query that corresponds to the request using the advanced hunting data schema.
33+
**Applies to:**
34+
35+
- Microsoft Defender
36+
- Microsoft Defender XDR
37+
38+
## Security Copilot in advanced hunting
39+
40+
[Microsoft Security Copilot in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
41+
42+
Threat hunters or security analysts who aren't yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Security Copilot then generates a KQL query that corresponds to the request using the advanced hunting data schema.
3543

3644
This feature reduces the time it takes to write a hunting query from scratch so that threat hunters and security analysts can focus on hunting and investigating threats.
3745

38-
Users with access to Copilot for Security have access to this capability in advanced hunting.
46+
Users with access to Security Copilot have access to this capability in advanced hunting.
3947

4048
> [!NOTE]
41-
> The advanced hunting capability is also available in the Copilot for Security standalone experience through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
49+
> The advanced hunting capability is also available in the Security Copilot standalone experience through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Security Copilot](/security-copilot/manage-plugins#preinstalled-plugins).
4250
4351
## Try your first request
4452

45-
1. Open the **advanced hunting** page from the navigation bar in the Microsoft Defender portal. The Copilot for Security side pane for advanced hunting appears at the right hand side.
53+
1. Open the **advanced hunting** page from the navigation bar in Microsoft Defender XDR. The Security Copilot side pane for advanced hunting appears at the right hand side.
4654

4755
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-pane.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-pane-big.png":::
4856

@@ -51,11 +59,11 @@ Users with access to Copilot for Security have access to this capability in adva
5159

5260

5361

54-
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Copilot for Security for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
62+
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Security Copilot for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
5563

5664
1. Copilot generates a KQL query from your text instruction or question. While Copilot is generating, you can cancel the query generation by selecting **Stop generating**.
5765

58-
![Screenshot of Copilot for Security in advanced hunting generating a response.](/defender/media/advanced-hunting-security-copilot-generate.png)
66+
![Screenshot of Security Copilot in advanced hunting generating a response.](/defender/media/advanced-hunting-security-copilot-generate.png)
5967

6068

6169
1. Review the generated query. You can then choose to run the query by selecting **Add and run**.
@@ -66,7 +74,7 @@ Users with access to Copilot for Security have access to this capability in adva
6674

6775
If you need to make further tweaks, select **Add to editor**.
6876

69-
![Screenshot of Copilot for Security in advanced hunting showing the Add to editor option.](/defender/media/advanced-hunting-security-copilot-add-editor.png)
77+
![Screenshot of Security Copilot in advanced hunting showing the Add to editor option.](/defender/media/advanced-hunting-security-copilot-add-editor.png)
7078

7179
The generated query appears in the query editor as the last query, where you can edit it before running using the regular **Run query** above the query editor.
7280

@@ -75,23 +83,24 @@ Users with access to Copilot for Security have access to this capability in adva
7583

7684

7785
> [!TIP]
78-
> Providing feedback is an important way to let the Copilot for Security team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
86+
> Providing feedback is an important way to let the Security Copilot team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
7987
8088

81-
In the [Microsoft Defender portal](advanced-hunting-microsoft-defender.md), you can prompt Copilot for Security to generate advanced hunting queries for both Defender XDR and Microsoft Sentinel tables. Not all Microsoft Sentinel tables are currently supported, but support for these tables can be expected in the future.
89+
> [!NOTE]
90+
> In the [unified Microsoft Defender portal](advanced-hunting-microsoft-defender.md), you can prompt Security Copilot to generate advanced hunting queries for both Defender XDR and Microsoft Sentinel tables. Not all Microsoft Sentinel tables are currently supported, but support for these tables can be expected in the future.
8291
8392
## Query sessions
8493

8594
You can start your first session anytime by asking a question in the Copilot side pane in advanced hunting. Your session contains the requests you made using your user account. Closing the side pane or refreshing the advanced hunting page doesn't discard the session. You can still access the generated queries should you need them.
8695

8796
Select the chat bubble icon (**New chat**) to discard the current session.
8897

89-
![Screenshot of Copilot for Security in advanced hunting showing the new chat icon.](/defender/media/advanced-hunting-security-copilot-clear-session.png)
98+
![Screenshot of Security Copilot in advanced hunting showing the new chat icon.](/defender/media/advanced-hunting-security-copilot-clear-session.png)
9099

91100
## Modify settings
92101

93102
Select the ellipses in the Copilot side pane to choose whether or not to automatically add and run the generated query in advanced hunting.
94103

95-
![Screenshot of Copilot for Security in advanced hunting showing the settings ellipses icon.](/defender/media/advanced-hunting-security-copilot-settings.png)
104+
![Screenshot of Security Copilot in advanced hunting showing the settings ellipses icon.](/defender/media/advanced-hunting-security-copilot-settings.png)
96105

97106
Deselecting the **Run generated query automatically** setting gives you the option of running the generated query automatically (**Add and run**) or adding the generated query to the query editor for further modification (**Add to editor**).

0 commit comments

Comments
 (0)