You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+17Lines changed: 17 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,22 @@ For more information, see also:
22
22
23
23
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
24
24
25
+
## December 2024
26
+
27
+
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
28
+
29
+
Defender for Identity has added the new **Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)** recommendation in Microsoft Secure Score.
30
+
31
+
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019), which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
32
+
33
+
The new recommendation is added to other AD CS-related recommendations. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
34
+
35
+
For more information, see:
36
+
37
+
-[Security assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)](https://go.microsoft.com/fwlink/?linkid=2296922)
38
+
39
+
-[Microsoft Defender for Identity's security posture assessments](security-assessment.md)
40
+
25
41
## October 2024
26
42
27
43
### MDI is expanding coverage with new 10 Identity posture recommendations (preview)
@@ -532,6 +548,7 @@ This version includes improvements and bug fixes for cloud services and the Defe
532
548
533
549
-[What is Microsoft Defender for Identity?](what-is.md)
534
550
-[Frequently asked questions](technical-faq.yml)
551
+
535
552
-[Defender for Identity prerequisites](prerequisites.md)
536
553
-[Defender for Identity capacity planning](capacity-planning.md)
537
554
-[Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,10 +141,6 @@ These policies look for activities within a single session with respect to the b
141
141
142
142
* This detection identifies users that failed multiple login attempts in a single session with respect to the baseline learned, which could indicate on a breach attempt.
143
143
144
-
### Data exfiltration to unsanctioned apps
145
-
146
-
* This policy is automatically enabled to alert you when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.
147
-
148
144
### Multiple delete VM activities
149
145
150
146
* This policy profiles your environment and triggers alerts when users delete multiple VMs in a single session, relative to the baseline in your organization. This might indicate an attempted breach.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-entities.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Entities API
3
3
description: This article provides information about using the Entities API.
4
-
ms.date: 01/29/2023
4
+
ms.date: 11/28/2024
5
5
ms.topic: reference
6
6
---
7
7
# Entities API
@@ -32,7 +32,7 @@ The following table describes the supported filters:
32
32
| entity | entity pk | eq, neq | Filter entities with specific entities pks. If a user is selected, this filter also returns all of the user's accounts. Example: `[{ "id": "entity-id", "inst": 0 }]`|
33
33
| userGroups |string | eq, neq | Filter entities by their associated group IDs |
34
34
| app | integer | eq, neq | Filter entities using services with the specified SaaS ID for example: 11770 |
35
-
| instance | integer | eq, neq | Filter entities using services with the specified Appstances (SaaS ID and Instance ID), for example: 11770, 1059065 |
35
+
| instance | integer | eq, neq | Filter entities using services with the specified app instances (SaaS ID and Instance ID). For example: 11770, 1059065 |
36
36
| isExternal | boolean | eq | The entity's affiliation. Possible values include:<br /><br />**true**: External<br />**false**: Internal<br />**null**: No value |
37
37
| domain | string | eq, neq, isset, isnotset | The entity's related domain |
38
38
| organization | string | eq, neq, isset, isnotset | Filter entities with the specified organization unit |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/file-filters.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,15 @@ To provide data protection, Microsoft Defender for Cloud Apps gives you visibili
11
11
12
12
> [!IMPORTANT]
13
13
> Starting **September 1, 2024**, we'll be phasing out the **Files****page** from Microsoft Defender for Cloud Apps. Core functionalities of the Files page will be available on the **Cloud apps > Policies > Policy Management** page. We recommend using the Policy Management page to investigate files and to create, modify, and filter Information Protection policies and Malware files. For more information, see [File policies in Microsoft Defender for Cloud Apps](data-protection-policies.md).
14
+
>
15
+
16
+
>[!NOTE]
17
+
> **Query Size Limitation in Files Policy Filters and "Edit and Preview Results"**
18
+
>
19
+
> - When creating or editing a file policy, or when using the "Edit and preview results" option, there is a query size limitation. This limitation ensures optimal performance and prevents system overload.
20
+
> - If your query exceeds the allowed size, you may need to refine your criteria or use other filters to fit within the acceptable limits. For example, if the policy involves "collaborators" criteria that includes the group "everyone" or "everyone except external users" it may cause a failure due to query size limitation.
21
+
> - Please note that if the query exceeds the size limitation, the system will not specify which filter caused the failure.
22
+
14
23
## Enable file monitoring
15
24
16
25
To enable file monitoring for Defender for Cloud Apps, first turn on file monitoring in the **Settings** area. In the Microsoft Defender portal, select **Settings** > **Cloud Apps** > **Information Protection** > **Files** > **Enable file monitoring** > **Save**.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-egnyte.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Protect your Egnyte environment (Preview) | Microsoft Defender for Cloud Apps
3
3
description: Learn how about connecting your Egnyte app to Defender for Cloud Apps using the API connector.
4
-
ms.date: 12/05/2023
4
+
ms.date: 12/12/2024
5
5
ms.topic: how-to
6
6
---
7
7
# How Defender for Cloud Apps helps protect your Egnyte environment
@@ -77,9 +77,9 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
77
77
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
78
78
79
79
>[!NOTE]
80
-
>Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice.
81
-
>To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token).
82
-
>Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
80
+
>-Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
81
+
>
82
+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
## Control ServiceNow with built-in policies and policy templates
51
52
@@ -154,11 +155,11 @@ For more information, see the [ServiceNow product documentation](https://docs.se
154
155
1. Establish an internal procedure to ensure that the connection remains alive. A couple of days before the expected expiration of the refresh token lifespan.
155
156
Revoke to the old refresh token. We don't recommend keeping old keys for security reasons.
156
157
157
-
1. On the ServiceNow pane, search for System OAuth, and then select Manage Tokens.
158
+
1. On the ServiceNow pane, search for **System OAuth**, and then select **Manage Tokens**.
158
159
159
160
1. Select the old token from the list according to the OAuth name and expiration date.
160
161
161
-
1. Select Revoke Access > Revoke.
162
+
1. Select **Revoke Access > Revoke**.
162
163
163
164
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
164
165
@@ -181,7 +182,7 @@ Revoke to the old refresh token. We don't recommend keeping old keys for securit
181
182
182
183
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
183
184
184
-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
185
+
After connecting ServiceNow, you'll receive events for 1 hour prior to connection.
185
186
186
187
### Legacy ServiceNow connection
187
188
@@ -210,7 +211,7 @@ To connect ServiceNow with Defender for Cloud Apps, you must have admin-level pe
210
211
211
212
1. Select **Connect**.
212
213
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
213
-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
214
+
After connecting ServiceNow, you'll receive events for one hour prior to connection.
214
215
215
216
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-onboard-devices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: overview
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 06/19/2024
12
+
ms.date: 12/12/2024
13
13
ms.reviewer: efratka, nehabha, muktaagarwal
14
14
f1.keywords: NOCSH
15
15
ms.collection:
@@ -274,7 +274,7 @@ After a device is enrolled in Intune, you can add it to a device group. [Learn m
274
274
## Servers
275
275
276
276
> [!NOTE]
277
-
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
277
+
> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,8 @@ For more information about how to set up Defender for Endpoint on Android and Co
37
37
38
38
> [!NOTE]
39
39
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
40
+
>
41
+
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.
40
42
41
43
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
0 commit comments