Skip to content

Commit d842b8b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into patch-1
2 parents 1931edd + f213b9d commit d842b8b

File tree

76 files changed

+1612
-937
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+1612
-937
lines changed

ATPDocs/whats-new.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,22 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## December 2024
26+
27+
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
28+
29+
Defender for Identity has added the new **Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)** recommendation in Microsoft Secure Score.
30+
31+
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019), which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
32+
33+
The new recommendation is added to other AD CS-related recommendations. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
34+
35+
For more information, see:
36+
37+
- [Security assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)](https://go.microsoft.com/fwlink/?linkid=2296922)
38+
39+
- [Microsoft Defender for Identity's security posture assessments](security-assessment.md)
40+
2541
## October 2024
2642

2743
### MDI is expanding coverage with new 10 Identity posture recommendations (preview)
@@ -532,6 +548,7 @@ This version includes improvements and bug fixes for cloud services and the Defe
532548

533549
- [What is Microsoft Defender for Identity?](what-is.md)
534550
- [Frequently asked questions](technical-faq.yml)
551+
535552
- [Defender for Identity prerequisites](prerequisites.md)
536553
- [Defender for Identity capacity planning](capacity-planning.md)
537554
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -141,10 +141,6 @@ These policies look for activities within a single session with respect to the b
141141

142142
* This detection identifies users that failed multiple login attempts in a single session with respect to the baseline learned, which could indicate on a breach attempt.
143143

144-
### Data exfiltration to unsanctioned apps
145-
146-
* This policy is automatically enabled to alert you when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.
147-
148144
### Multiple delete VM activities
149145

150146
* This policy profiles your environment and triggers alerts when users delete multiple VMs in a single session, relative to the baseline in your organization. This might indicate an attempted breach.

CloudAppSecurityDocs/api-entities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Entities API
33
description: This article provides information about using the Entities API.
4-
ms.date: 01/29/2023
4+
ms.date: 11/28/2024
55
ms.topic: reference
66
---
77
# Entities API
@@ -32,7 +32,7 @@ The following table describes the supported filters:
3232
| entity | entity pk | eq, neq | Filter entities with specific entities pks. If a user is selected, this filter also returns all of the user's accounts. Example: `[{ "id": "entity-id", "inst": 0 }]` |
3333
| userGroups |string | eq, neq | Filter entities by their associated group IDs |
3434
| app | integer | eq, neq | Filter entities using services with the specified SaaS ID for example: 11770 |
35-
| instance | integer | eq, neq | Filter entities using services with the specified Appstances (SaaS ID and Instance ID), for example: 11770, 1059065 |
35+
| instance | integer | eq, neq | Filter entities using services with the specified app instances (SaaS ID and Instance ID). For example: 11770, 1059065 |
3636
| isExternal | boolean | eq | The entity's affiliation. Possible values include:<br /><br />**true**: External<br />**false**: Internal<br />**null**: No value |
3737
| domain | string | eq, neq, isset, isnotset | The entity's related domain |
3838
| organization | string | eq, neq, isset, isnotset | Filter entities with the specified organization unit |

CloudAppSecurityDocs/file-filters.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,15 @@ To provide data protection, Microsoft Defender for Cloud Apps gives you visibili
1111

1212
> [!IMPORTANT]
1313
> Starting **September 1, 2024**, we'll be phasing out the **Files** **page** from Microsoft Defender for Cloud Apps. Core functionalities of the Files page will be available on the **Cloud apps > Policies > Policy Management** page. We recommend using the Policy Management page to investigate files and to create, modify, and filter Information Protection policies and Malware files. For more information, see [File policies in Microsoft Defender for Cloud Apps](data-protection-policies.md).
14+
>
15+
16+
>[!NOTE]
17+
> **Query Size Limitation in Files Policy Filters and "Edit and Preview Results"**
18+
>
19+
> - When creating or editing a file policy, or when using the "Edit and preview results" option, there is a query size limitation. This limitation ensures optimal performance and prevents system overload.
20+
> - If your query exceeds the allowed size, you may need to refine your criteria or use other filters to fit within the acceptable limits. For example, if the policy involves "collaborators" criteria that includes the group "everyone" or "everyone except external users" it may cause a failure due to query size limitation.
21+
> - Please note that if the query exceeds the size limitation, the system will not specify which filter caused the failure.
22+
1423
## Enable file monitoring
1524

1625
To enable file monitoring for Defender for Cloud Apps, first turn on file monitoring in the **Settings** area. In the Microsoft Defender portal, select **Settings** > **Cloud Apps** > **Information Protection** > **Files** > **Enable file monitoring** > **Save**.

CloudAppSecurityDocs/protect-egnyte.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your Egnyte environment (Preview) | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your Egnyte app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/05/2023
4+
ms.date: 12/12/2024
55
ms.topic: how-to
66
---
77
# How Defender for Cloud Apps helps protect your Egnyte environment
@@ -77,9 +77,9 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
7777
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7878

7979
>[!NOTE]
80-
>Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice.
81-
>To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token).
82-
>Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
80+
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
81+
>
82+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
8383
8484
## Next steps
8585

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/26/2023
4+
ms.date: 12/12/2024
55
ms.topic: how-to
66
---
77

@@ -45,7 +45,8 @@ In Secure Score, select **Recommended actions** and filter by **Product** = **Se
4545

4646
For more information, see:
4747
- [Security posture management for SaaS apps](security-saas.md)
48-
- [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
48+
- [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score
49+
)
4950

5051
## Control ServiceNow with built-in policies and policy templates
5152

@@ -154,11 +155,11 @@ For more information, see the [ServiceNow product documentation](https://docs.se
154155
1. Establish an internal procedure to ensure that the connection remains alive. A couple of days before the expected expiration of the refresh token lifespan.
155156
Revoke to the old refresh token. We don't recommend keeping old keys for security reasons.
156157

157-
1. On the ServiceNow pane, search for System OAuth, and then select Manage Tokens.
158+
1. On the ServiceNow pane, search for **System OAuth**, and then select **Manage Tokens**.
158159

159160
1. Select the old token from the list according to the OAuth name and expiration date.
160161

161-
1. Select Revoke Access > Revoke.
162+
1. Select **Revoke Access > Revoke**.
162163
163164
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
164165

@@ -181,7 +182,7 @@ Revoke to the old refresh token. We don't recommend keeping old keys for securit
181182

182183
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
183184

184-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
185+
After connecting ServiceNow, you'll receive events for 1 hour prior to connection.
185186

186187
### Legacy ServiceNow connection
187188

@@ -210,7 +211,7 @@ To connect ServiceNow with Defender for Cloud Apps, you must have admin-level pe
210211

211212
1. Select **Connect**.
212213
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
213-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
214+
After connecting ServiceNow, you'll receive events for one hour prior to connection.
214215

215216
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
216217

defender-business/mdb-onboard-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 06/19/2024
12+
ms.date: 12/12/2024
1313
ms.reviewer: efratka, nehabha, muktaagarwal
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -274,7 +274,7 @@ After a device is enrolled in Intune, you can add it to a device group. [Learn m
274274
## Servers
275275

276276
> [!NOTE]
277-
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
277+
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
278278
279279
Choose the operating system for your server:
280280

defender-endpoint/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -137,9 +137,10 @@
137137
- name: Migrating devices to streamlined method
138138
href: migrate-devices-streamlined.md
139139

140-
- name: Onboarding Windows Client
140+
- name: Onboard client devices
141+
href: onboard-client.md
141142
items:
142-
- name: Onboarding Windows Client overview
143+
- name: Onboarding Windows client overview
143144
href: onboard-windows-client.md
144145
- name: Defender for Endpoint plug-in for WSL
145146
href: mde-plugin-wsl.md
@@ -158,7 +159,8 @@
158159
- name: Onboard previous versions of Windows
159160
href: onboard-downlevel.md
160161

161-
- name: Onboarding Windows Server
162+
- name: Onboard server devices
163+
href: onboard-server.md
162164
items:
163165
- name: Onboarding Windows Server overview
164166
href: onboard-windows-server.md
@@ -285,7 +287,7 @@
285287
href: linux-schedule-scan-mde.md
286288
- name: Schedule antivirus scan in Defender for Endpoint on Linux
287289
href: schedule-antivirus-scan-in-mde.md
288-
- name: Schedule an update of the Microsoft Defender for Endpoint (Linux)
290+
- name: Schedule an update for Microsoft Defender for Endpoint on Linux
289291
href: linux-update-MDE-Linux.md
290292
- name: Configure eBPF-based sensor
291293
href: linux-support-ebpf.md

defender-endpoint/android-configure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ For more information about how to set up Defender for Endpoint on Android and Co
3737

3838
> [!NOTE]
3939
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
40+
>
41+
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.
4042
4143
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
4244

0 commit comments

Comments
 (0)