Skip to content

Commit d934177

Browse files
Merge pull request #851 from MicrosoftDocs/main
publish main to live 3:30 PM 6/27/24
2 parents fd123d1 + a32a4fa commit d934177

14 files changed

+240
-193
lines changed

defender-xdr/activate-defender-rbac.md

Lines changed: 22 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 06/13/2024
15+
ms.date: 06/27/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -30,7 +30,7 @@ search.appverid: met150
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
3232

33-
For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new [custom roles](create-custom-rbac-roles.md) or [imported roles](import-rbac-roles.md) you must activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads.
33+
For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new [custom roles](create-custom-rbac-roles.md) or [imported roles](import-rbac-roles.md), you must activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads.
3434

3535
<a name='activate-microsoft-365-defender-unified-rbac'></a>
3636

@@ -43,6 +43,7 @@ The following steps guide you on how to activate the Microsoft Defender XDR Unif
4343

4444
> [!IMPORTANT]
4545
> You must be a Global Administrator or Security Administrator in Microsoft Entra ID to perform this task. For more information on permissions, see [Permission pre-requisites](manage-rbac.md#permissions-prerequisites).
46+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4647
4748
### Activate from the Permissions and roles page
4849

@@ -53,26 +54,23 @@ You can activate your workloads in two ways from the Permissions and roles page:
5354
:::image type="content" source="/defender/media/defender/m365-defender-rbac-activate-workloads1.png" alt-text="Screenshot of the activate workloads page" lightbox="/defender/media/defender/m365-defender-rbac-activate-workloads1.png":::
5455

5556
1. **Activate workloads**
56-
- Select **Activate workloads** on the banner above the list of roles.
57-
- This will bring you directly to the **Activate workloads** screen.
58-
- You must activate each workload one by one. Once you select the individual toggle, you'll activate (or deactivate) that workload.
57+
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
58+
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
5959

60-
:::image type="content" source="/defender/media/defender/m365-defender-rbac-activate-workload-selection1.png" alt-text="Screenshot of the choose workloads to activate screen" lightbox="/defender/media/defender/m365-defender-rbac-activate-workload-selection1.png":::
60+
:::image type="content" source="/defender/media/defender/m365-defender-rbac-activate-workload-selection1.png" alt-text="Screenshot of the choose workloads to activate screen" lightbox="/defender/media/defender/m365-defender-rbac-activate-workload-selection1.png":::
6161

62-
> [!NOTE]
63-
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
64-
65-
> [!NOTE]
66-
> Microsoft Defender for Cloud is active by default with Microsoft Defender XDR Unified RBAC.
67-
68-
> [!NOTE]
69-
> To activate Exchange Online permissions in Microsoft Defender XDR Unified RBAC, Defender for Office 365 permissions must be active.
62+
> [!NOTE]
63+
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
64+
>
65+
> Microsoft Defender for Cloud is active by default with Microsoft Defender XDR Unified RBAC.
66+
>
67+
> To activate Exchange Online permissions in Microsoft Defender XDR Unified RBAC, Defender for Office 365 permissions must be active.
7068
7169
2. **Workload settings**
7270
- Select **Workload settings**.
7371
- This brings you to the Microsoft Defender XDR **Permission and roles** page.
7472
- Select the toggle for the workload you want to activate.
75-
- Select Activate on the confirmation message.
73+
- Select **Activate** on the confirmation message.
7674

7775
You have now successfully activated (or deactivated) that workload.
7876

@@ -83,11 +81,16 @@ You have now successfully activated (or deactivated) that workload.
8381
Follow these steps to activate your workloads directly in Microsoft Defender XDR settings:
8482

8583
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
84+
8685
2. In the navigation pane, select **Settings**.
86+
8787
3. Select **Microsoft Defender XDR**.
88+
8889
4. Select **Permissions and roles**. This brings you to the **Activate workloads** page.
90+
8991
5. Select the toggle for the workload you want to activate.
90-
6. Select Activate on the confirmation message.
92+
93+
6. Select **Activate** on the confirmation message.
9194

9295
You have now successfully activated (or deactivated) that workload.
9396

@@ -100,11 +103,12 @@ You have now successfully activated (or deactivated) that workload.
100103

101104
You can deactivate Microsoft Defender XDR Unified RBAC and revert to the individual RBAC models from Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365 (Exchange Online Protection).
102105

103-
To Deactivate the workloads, repeat the steps above and select the workloads you want to deactivate. The status will be set to **Not Active**.
106+
To Deactivate the workloads, repeat the steps above and select the workloads you want to deactivate. The status is set to **Not Active**.
104107

105-
If you deactivate a workload, the roles created and edited within Microsoft Defender XDR Unified RBAC won't be effective and you'll return to using the previous permissions model. This will remove any access that users assigned these roles have.
108+
If you deactivate a workload, the roles created and edited within Microsoft Defender XDR Unified RBAC are no longer in effect, and the previous permissions model is used instead.
106109

107110
## Next steps
108111

109112
- [Edit or delete roles](edit-delete-rbac-roles.md)
113+
110114
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-limits.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: conceptual
18-
ms.date: 04/03/2024
18+
ms.date: 06/27/2024
1919
---
2020

2121
# Use the advanced hunting query resource report
@@ -35,8 +35,8 @@ Refer to the following table to understand existing quotas and usage parameters.
3535
|--|--|--|--|
3636
| Data range | 30 days | Every query | Each query can look up data from up to the past 30 days. |
3737
| Result set | 30,000 rows | Every query | Each query can return up to 30,000 records. |
38-
| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it does not complete within 10 minutes, the service displays an error.
39-
| CPU resources | Based on tenant size | Every 15 minutes | The [portal displays an error](advanced-hunting-errors.md) whenever a query runs and the tenant has consumed over 10% of allocated resources. Queries are blocked if the tenant has reached 100% until after the next 15-minute cycle. |
38+
| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it doesn't complete within 10 minutes, the service displays an error.
39+
| CPU resources | Based on tenant size | Every 15 minutes | The [portal displays an error](advanced-hunting-errors.md) whenever a query runs and the tenant consumes over 10% of allocated resources. Queries are blocked if the tenant reaches 100% until after the next 15-minute cycle. |
4040

4141
> [!NOTE]
4242
> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)
@@ -58,12 +58,15 @@ The report can be accessed in two ways:
5858

5959
:::image type="content" source="/defender/media/ah-query-resources/reports-general-query-resources.png" alt-text="view the query resources report in the Reports section" lightbox="/defender/media/ah-query-resources/reports-general-query-resources.png":::
6060

61-
All users can access the reports, however, only the Microsoft Entra global admin, Microsoft Entra security admin, and Microsoft Entra security reader roles can see queries done by all users in all interfaces. Any other user can only see:
61+
All users can access the reports; however, only the Microsoft Entra Global Administrator, Microsoft Entra Security Administrator, and Microsoft Entra Security Reader roles can see queries done by all users in all interfaces. Any other user can only see:
6262

6363
- Queries they ran via the portal
6464
- Public API queries they ran themselves and not through the application
6565
- Custom detections they created
6666

67+
> [!IMPORTANT]
68+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
69+
6770
### Query resource report contents
6871

6972
By default, the report table displays queries from the last day, and is sorted by Resource usage, to help you easily identify which queries consumed the highest amount of CPU resources.
@@ -87,7 +90,7 @@ The query resources report contains all queries that ran, including detailed res
8790

8891
Queries with high resource usage or a long query time can probably be optimized to prevent throttling via this interface.
8992

90-
The graph displays resource usage over time per interface. You can easily identify excessive usage and click the spikes in the graph to filter the table accordingly. Once you select an entry in the graph, the table is filtered to that specific date.
93+
The graph displays resource usage over time per interface. You can easily identify excessive usage and select the spikes in the graph to filter the table accordingly. Once you select an entry in the graph, the table is filtered to that specific date.
9194

9295
You can identify the queries that used the most resources on that day and take action to improve them – by [applying query best practices](advanced-hunting-best-practices.md) or educating the user who ran the query or created the rule to take query efficiency and resources into consideration. For guided mode, the user needs to [switch to advanced mode](advanced-hunting-query-builder-details.md#switch-to-advanced-mode-after-building-a-query) to edit the query.
9396

@@ -100,9 +103,10 @@ The graph supports two views:
100103

101104
This means that, for instance, if on a specific day you ran two queries, one used 50% of your resources and one used 100%, the average daily use value would show 75%, while the top daily use would show 100%.
102105

103-
## Related topics
106+
## Related articles
104107

105108
- [Advanced hunting best practices](advanced-hunting-best-practices.md)
106109
- [Handle advanced hunting errors](advanced-hunting-errors.md)
107110
- [Advanced hunting overview](advanced-hunting-overview.md)
111+
108112
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-take-action.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier1
1717
ms.topic: conceptual
18-
ms.date: 02/16/2024
18+
ms.date: 06/27/2024
1919
---
2020

2121
# Take action on advanced hunting query results
@@ -34,7 +34,12 @@ You can quickly contain threats or address compromised assets that you find in [
3434

3535
## Required permissions
3636

37-
To take action on devices through advanced hunting, you need a role in Microsoft Defender for Endpoint with [permissions to submit remediation actions on devices](/windows/security/threat-protection/microsoft-defender-atp/user-roles#permission-options). If you can't take action, contact a global administrator about getting the following permission:
37+
To take action on devices through advanced hunting, you need a role in Microsoft Defender for Endpoint with [permissions to submit remediation actions on devices](/windows/security/threat-protection/microsoft-defender-atp/user-roles#permission-options).
38+
39+
> [!IMPORTANT]
40+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
41+
42+
If you can't take action, contact a Global Administrator about getting the following permission:
3843

3944
*Active remediation actions > Threat and vulnerability management - Remediation handling*
4045

@@ -54,9 +59,9 @@ To learn more about how these response actions are performed through Microsoft D
5459

5560
### Quarantine files
5661

57-
You can deploy the *quarantine* action on files so that they are automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine:
62+
You can deploy the *quarantine* action on files so that they're automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine:
5863

59-
- `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that was affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.
64+
- `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that's affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.
6065
- `InitiatingProcessSHA1`: In most advanced hunting tables, this column refers to the file responsible for initiating the recorded action. For example, if a child process was launched, this initiator file would be part of the parent process.
6166
- `SHA256`: This column is the SHA-256 equivalent of the file identified by the `SHA1` column.
6267
- `InitiatingProcessSHA256`: This column is the SHA-256 equivalent of the file identified by the `InitiatingProcessSHA1` column.
@@ -66,19 +71,19 @@ To learn more about how quarantine actions are taken and how files can be restor
6671
> [!NOTE]
6772
> To locate files and quarantine them, the query results should also include `DeviceId` values as device identifiers.
6873
69-
To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard will guide you through the process of selecting and then submitting your preferred actions.
74+
To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard guides you through the process of selecting and then submitting your preferred actions.
7075

7176
:::image type="content" source="media/take-action-multiple.png" alt-text="Screenshot of the take actions option in the Microsoft Defender portal." lightbox="media/take-action-multiple.png":::
7277

7378
## Take various actions on emails
7479

7580
Apart from device-focused remediation steps, you can also take some actions on emails from your query results. Select the records you want to take action on, select **Take actions**, then under **Choose actions**, select your choice from the following:
7681

77-
- `Move to mailbox folder` - select this to move the email messages to Junk, Inbox, or Deleted items folder
82+
- `Move to mailbox folder` - select this action to move the email messages to Junk, Inbox, or Deleted items folder
7883

7984
:::image type="content" source="media/advanced-hunting-take-actions-email.png" alt-text="Screenshot of the option Take actions in the Microsoft Defender portal." lightbox="media/advanced-hunting-take-actions-email.png":::
8085

81-
- `Delete email` - select this to move email messages to the Deleted items folder (**Soft delete**) or delete them permanently (**Hard delete**)
86+
- `Delete email` - select this action to move email messages to the Deleted items folder (**Soft delete**) or delete them permanently (**Hard delete**)
8287

8388
Selecting **Soft delete** also automatically soft deletes the messages from the sender's Sent Items folder if the sender is in the organization.
8489

@@ -94,7 +99,6 @@ Apart from device-focused remediation steps, you can also take some actions on e
9499
| project NetworkMessageId,RecipientEmailAddress, EmailDirection, SenderFromAddress, LatestDeliveryAction,LatestDeliveryLocation
95100
```
96101

97-
98102
You can also provide a remediation name and a short description of the action taken to easily track it in the action center history. You can also use the Approval ID to filter for these actions in the action center. This ID is provided at the end of the wizard:
99103

100104
:::image type="content" source="media/choose-email-actions-entities.png" alt-text="take actions wizard showing choose actions for entities" lightbox="media/choose-email-actions-entities.png":::
@@ -108,11 +112,12 @@ Each action is individually recorded in the [action center](m365d-action-center.
108112
> [!NOTE]
109113
> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
110114
111-
## Related topics
115+
## Related articles
112116

113117
- [Advanced hunting overview](advanced-hunting-overview.md)
114118
- [Learn the query language](advanced-hunting-query-language.md)
115119
- [Work with query results](advanced-hunting-query-results.md)
116120
- [Understand the schema](advanced-hunting-schema-tables.md)
117121
- [Action center overview](m365d-action-center.md)
122+
118123
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)