Skip to content

Commit da8c3e9

Browse files
authored
Merge branch 'main' into WI432220-new-article-migrate-siem-api-solution
2 parents f8d31b3 + f4c101c commit da8c3e9

16 files changed

+121
-55
lines changed

defender-business/mdb-faq.yml

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: faq
1111
ms.service: defender-business
1212
ms.localizationpriority: medium
13-
ms.date: 03/19/2024
13+
ms.date: 05/20/2025
1414
ms.reviewer: efratka, nehabha
1515
f1.keywords: NOCSH
1616
ms.collection:
@@ -61,10 +61,10 @@ sections:
6161
answer: |
6262
The following table compares server options for Defender for Business customers:
6363
64-
| Server license | Description |
65-
|--|--|
66-
| Microsoft Defender for Business servers | [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers) is an add-on to Defender for Business and Microsoft 365 Business Premium. This offering enables small and medium sized businesses (up to 300 users) to onboard and protect servers and client devices in the [Microsoft Defender portal](https://security.microsoft.com). |
67-
| Microsoft Defender for Servers Plan 1 / Plan 2| [Microsoft Defender for Servers Plan 1/Plan 2](/azure/defender-for-cloud/plan-defender-for-servers) is an enterprise-focused offering that can be purchased with any other Microsoft cloud plan. This offering is part of [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction), and includes advanced threat hunting with six months of data retention and the Microsoft Threat Experts service.<br/><br/>The admin experience for Defender for Cloud resides within the Azure portal ([https://portal.azure.com](https://portal.azure.com)).|
64+
|Server license|Description|
65+
|---|---|
66+
|Microsoft Defender for Business servers|[Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers) is an add-on to Defender for Business and Microsoft 365 Business Premium. This offering enables small and medium sized businesses (up to 300 users) to onboard and protect servers and client devices in the [Microsoft Defender portal](https://security.microsoft.com).|
67+
|Microsoft Defender for Servers Plan 1 / Plan 2|[Microsoft Defender for Servers Plan 1/Plan 2](/azure/defender-for-cloud/plan-defender-for-servers) is an enterprise-focused offering that can be purchased with any other Microsoft cloud plan. This offering is part of [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction), and includes advanced threat hunting with six months of data retention and the Microsoft Threat Experts service.<br/><br/>The admin experience for Defender for Cloud resides within the Azure portal ([https://portal.azure.com](https://portal.azure.com)).|
6868
6969
Adding Defender for Cloud to a tenant that has Defender for Business doesn't change the simplified configuration experience that Defender for Business offers. The functionality in Microsoft Defender for Servers Plan 1 or Plan 2 work with Defender for Business.
7070
@@ -90,7 +90,7 @@ sections:
9090
9191
|OS|Method|Notes|
9292
|---|---|---|
93-
|Windows |[Attack surface reduction rules](/defender-endpoint/attack-surface-reduction-rules-deployment)|On Windows devices, you can configure device control through ASR rules. You'll need [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to set up your ASR rules. Intune is not included in the standalone version of Defender for Business, but you can add it on. Intune is included in [Microsoft 365 Business Premium](/microsoft-365/business-premium). <br/><br/>[ASR capabilities in Defender for Business](mdb-asr.md)|
93+
|Windows|[Attack surface reduction rules](/defender-endpoint/attack-surface-reduction-rules-deployment)|On Windows devices, you can configure device control through ASR rules. You'll need [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to set up your ASR rules. Intune is not included in the standalone version of Defender for Business, but you can add it on. Intune is included in [Microsoft 365 Business Premium](/microsoft-365/business-premium). <br/><br/>[ASR capabilities in Defender for Business](mdb-asr.md)|
9494
|Mac|Jamf or Intune|You can use Jamf or Intune to set up device control on Mac. See [Device Control for macOS](/defender-endpoint/mac-device-control-overview).|
9595
9696
- question: How do I run custom reports with Defender for Business?
@@ -141,25 +141,25 @@ sections:
141141
142142
The following table summarizes some differences between Defender for Business and Defender for Endpoint:
143143
144-
| Capabilities | Defender for Business | Defender for Endpoint Plan 1 | Defender for Endpoint Plan 2 |
145-
|---|---|---|---|
146-
| Centralized management | ✔ | ✔ | ✔ |
147-
| Simplified firewall and antivirus configuration for Windows | ✔ | | |
148-
| Vulnerability management (core capabilities) | ✔ | | ✔ |
149-
| Attack surface reduction | ✔ | ✔ | ✔ |
150-
| Next-generation protection | ✔ | ✔ | ✔ |
151-
| Endpoint detection & response (EDR) | ✔ <br/>(optimized) | | ✔ |
152-
| Automatic attack disruption | ✔ | | ✔ |
153-
| Automated investigation & remediation | ✔ | | ✔ |
154-
| Monthly security summary reporting | ✔ | | ✔ |
155-
| 30 days advanced hunting and six months of data retention in the device timeline | | | ✔ |
156-
| Threat analytics | ✔<br/>(optimized) | | ✔ |
157-
| Cross-platform support <br/>(Mac, iOS, Android)| ✔ | ✔ | ✔ |
158-
| Windows Server and Linux Server <br/>(requires server licenses) | ✔ | ✔ | ✔ |
159-
| Microsoft Threat Experts | | | ✔ |
160-
| Microsoft 365 Lighthouse <br/>(optimized; for CSPs only) | ✔ | ✔ | ✔ |
161-
| Microsoft Defender multi-tenant management | ✔ | ✔ | ✔ |
162-
| APIs | ✔ | ✔ | ✔ |
144+
|Capabilities|Defender for</br>Business|Defender for</br>Endpoint Plan 1|Defender for</br>Endpoint Plan 2|
145+
|---|:---:|:---:|:---:|
146+
|Centralized management|✔|✔|✔|
147+
|Simplified firewall and antivirus configuration for Windows|✔|||
148+
|Vulnerability management (core capabilities)|✔||✔|
149+
|Attack surface reduction|✔|✔|✔|
150+
|Next-generation protection|✔|✔|✔|
151+
|Endpoint detection & response (EDR)|✔ <br/> (optimized)||✔|
152+
|Automatic attack disruption|✔||✔|
153+
|Automated investigation & remediation|✔||✔|
154+
|Monthly security summary reporting|✔||✔|
155+
|30 days advanced hunting <br/> and six months of data retention <br/> in the device timeline|||✔|
156+
|Threat analytics|✔ <br/> (optimized)||✔|
157+
|Cross-platform support <br/> (Mac, iOS/iPadOS, Android)|✔|✔|✔|
158+
|Windows Server and Linux Server <br/> (requires server licenses)|✔|✔|✔|
159+
|Microsoft Threat Experts|||✔|
160+
|Microsoft 365 Lighthouse <br/> (optimized; for CSPs only)|✔|✔|✔|
161+
|Microsoft Defender multi-tenant management|✔|✔|✔|
162+
|APIs|✔|✔|✔|
163163
164164
- question: Can I have a mix of Microsoft endpoint security subscriptions?
165165
answer: |

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 02/11/2025
7+
ms.date: 05/20/2025
88
ms.topic: conceptual
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -94,12 +94,12 @@ Whether Microsoft Defender Antivirus runs in active mode, passive mode, or is di
9494

9595
The following table summarizes the state of Microsoft Defender Antivirus in several scenarios.
9696

97-
| Antivirus/antimalware solution | Onboarded to Defender for Endpoint? | Microsoft Defender Antivirus state | Smart App Control State |
97+
| Antivirus/antimalware solution | Onboarded to Defender for Endpoint? | Microsoft Defender Antivirus state | Smart App Control State |
9898
|---|---|---|---|
9999
| Microsoft Defender Antivirus | Yes | Active mode | N/A |
100-
| Microsoft Defender Antivirus | No | Active mode | On, Evaluation, or Off |
101-
| A non-Microsoft antivirus/antimalware solution | Yes | Passive mode (automatically) | N/A |
102-
| A non-Microsoft antivirus/antimalware solution | No | Disabled (automatically) | Evaluation or On |
100+
| Microsoft Defender Antivirus | No | Active mode | On, Evaluation, or Off |
101+
| A non-Microsoft antivirus/antimalware solution | Yes | Passive mode (automatically) | Evaluation or On|
102+
| A non-Microsoft antivirus/antimalware solution | No | Disabled (automatically) | N/A or Off|
103103

104104
> [!NOTE]
105105
> Smart App Control is a consumer-only product that's used on new Windows 11 installs. It can run alongside your antivirus software and block apps that are considered to be malicious or untrusted. [Learn more about Smart App Control](https://support.microsoft.com/topic/what-is-smart-app-control-285ea03d-fa88-4d56-882e-6698afdb7003).

defender-office-365/mdo-deployment-guide.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
ms.custom:
1919
description: Learn how to get started with the initial deployment and configuration of Microsoft Defender for Office 365.
2020
ms.service: defender-office-365
21-
ms.date: 02/24/2025
21+
ms.date: 05/20/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -315,7 +315,17 @@ In general, it's easier to create blocks than allows, because unnecessary allow
315315

316316
- **Allow**:
317317

318-
- You can't create allow entries for **domains and email addresses**, **files**, and **URLs** directly on the corresponding tabs in the Tenant Allow/Block List. Instead, you use the **Submissions** page to report the item to Microsoft. As you report the item to Microsoft, you can select to allow the item, which creates a corresponding temporary allow entry in the Tenant Allow/Block list.
318+
- You can create allow entries for **domains and email addresses** and **URLs** on the corresponding tabs in the Tenant Allow/Block List to override the following verdicts:
319+
- Bulk
320+
- Spam
321+
- High confidence spam
322+
- Phishing (not high confidence phishing)
323+
324+
- You can't create allow entries directly in the Tenant Allow/Block List for the following items:
325+
- Malware or high confidence phishing verdicts for **domains and email addresses** or **URLs**.
326+
- Any verdicts for **files**.
327+
328+
Instead, you use the **Submissions** page to report the items to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this message**, **Allow this URL**, or **Allow this file** to create a corresponding temporary allow entry in the Tenant Allow/Block list.
319329

320330
- Messages allowed by [spoof intelligence](anti-spoofing-spoof-intelligence.md) are shown on the **Spoof intelligence** page. If you change a block entry to an allow entry, the sender becomes a manual allow entry on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also proactively create allow entries for not yet encountered spoofed senders on the **Spoofed senders** tab.
321331

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.localizationpriority: medium
1616
ms.topic: troubleshooting
17-
ms.date: 05/02/2025
17+
ms.date: 05/20/2025
1818
---
1919

2020
# Vulnerability support in Microsoft Defender Vulnerability Management
@@ -33,6 +33,12 @@ This article provides information on inaccuracies that have been reported. You c
3333
3434
The following tables present the relevant vulnerability information organized by month.
3535

36+
## May 2025
37+
38+
| Inaccuracy report ID | Description | Fix date |
39+
|---|---|---|
40+
| 92212 | Fixed inaccuracy in NetData vulnerabilities- CVE-2019-9834, CVE-2023-22496, CVE-2023-22497 & CVE-2024-32019 | 18-May-25 |
41+
3642
## April 2025
3743

3844
| Inaccuracy report ID | Description | Fix date |
@@ -44,9 +50,13 @@ The following tables present the relevant vulnerability information organized by
4450
| 92184 | Fixed inaccurate detections in Amazon Send to Kindle | 23-Apr-25 |
4551
| 91112 | Fixed incorrect detections in Vendor- Jabra | 23-Apr-25 |
4652
| 88590 | Fixed incorrect detections in Vendor- PDF Exchange Editor | 23-Apr-25 |
53+
| 90101 | Fixed bad detections in Vendor- JetBrains | 23-Apr-25 |
4754
| - | Fixed inaccuracy in Mattermost Desktop vulnerability- CVE-2023-5920 | 24-Apr-25 |
4855
| - | Fixed inaccuracy in OpenSSL vulnerabilities- CVE-2024-9143, CVE-2024-13176 & CVE-2024-12797 | 24-Apr-25 |
4956
| 94679 | Fixed inaccuracy in Secure Client by adding 1.0 as invalid version | 29-Apr-25 |
57+
| - | Fixed inaccuracy in VMware Tools vulnerabilities- CVE-2025-31334 & CVE-2024-33899 | 29-Apr-25 |
58+
| 94769 | Fixed inaccuracy in Micro Focus Operations Agent vulnerability- CVE-2024-0622 | 30-Apr-25 |
59+
| 96209 | Fixed inaccuracy in AnyDesk vulnerability- CVE-2024-52940 | 30-Apr-25 |
5060

5161
## March 2025
5262

defender-xdr/advanced-hunting-cloudappevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,13 @@ ms.date: 05/15/2025
3030

3131
The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving accounts and objects in Office 365 and other [cloud apps and services](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
3232

33-
## Get access
33+
## Prerequisites
3434

3535
To make sure the `CloudAppEvents` data is populated:
3636

3737
1. Go to the Defender portal and select **Settings > Cloud apps > App connectors**.
3838

39-
1. In the Microsoft 365 connector portal, select the **Pull activities** checkbox.
39+
1. In the **Select Microsoft 365 components** page, select the **Microsoft 365 activities** checkbox.
4040

4141
For detailed instructions, see: [Connect Microsoft 365 to Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-office-365#prerequisites)
4242

defender-xdr/advanced-hunting-cloudauditevents-table.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,24 +17,26 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 12/29/2023
24+
ms.date: 05/20/2025
2225
---
2326

2427
# CloudAuditEvents (Preview)
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
**Applies to:**
29-
- Microsoft Defender XDR
30-
3131

3232

3333
The `CloudAuditEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about cloud audit events for various cloud platforms protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
3434

3535
> [!IMPORTANT]
3636
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3737
38+
This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
39+
3840
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
3941

4042
| Column name | Data type | Description |

defender-xdr/advanced-hunting-cloudprocessevents-table.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,27 @@ ms.collection:
1717
ms.custom:
1818
- cx-ti
1919
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
2023
ms.topic: reference
21-
ms.date: 11/11/2024
24+
ms.date: 05/20/2025
2225
---
2326

2427
# CloudProcessEvents (Preview)
2528

2629
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2730

28-
**Applies to:**
29-
- Microsoft Defender XDR
31+
3032

3133
The `CloudProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process events in multicloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine as protected by the organization's [Microsoft Defender for Cloud](/azure/defender-for-cloud/concept-integration-365#advanced-hunting-in-xdr). Use this reference to construct queries that return information from this table.
3234

3335
> [!IMPORTANT]
3436
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3537
38+
This advanced hunting table is populated by records from Microsoft Defender for Cloud. If your organization doesn't have Microsoft Defender for Cloud, queries that use the table aren’t going to work or return any results. For more information about prerequisites in integrating Defender for Cloud with Defender XDR, read [Microsoft Defender XDR integration](/azure/defender-for-cloud/concept-integration-365).
39+
40+
3641
For information on other tables in the advanced hunting schema, see the [advanced hunting reference](advanced-hunting-schema-tables.md).
3742

3843
| Column name | Data type | Description |

defender-xdr/advanced-hunting-oauthappinfo-table.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,14 @@ The `OAuthAppInfo` table in the advanced hunting schema contains information abo
3434

3535
The `OAuthAppInfo` table might not include all the app or service principal-related properties that are available on Entra ID. It also does not include data related to Microsoft first-party apps or apps without any OAuth consents. The coverage of the table is based on the existing scope of Microsoft 365-connected apps covered by app governance.
3636

37+
## Prerequisities
3738

39+
This advanced hunting table is populated by app governance records from Microsoft Defender for Cloud Apps. To turn on app governance, follow the steps in [Turn on app governance](/defender-cloud-apps/app-governance-get-started).
40+
41+
If your organization hasn’t deployed Microsoft Defender for Cloud Apps in Microsoft Defender XDR or turned on app governance, queries that use the table aren’t going to work or return any results.
42+
43+
44+
## Schema
3845
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
3946

4047
| Column name | Data type | Description |

defender/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,8 +185,8 @@ conceptualContent:
185185
text: See more
186186
url: /defender-for-iot/
187187

188-
- title: Microsoft's unified security operations platform
189-
summary: End-to-end SecOps with Microsoft Sentinel
188+
- title: Microsoft Sentinel
189+
summary: End-to-end security operations
190190
links:
191191
- url: /unified-secops-platform/overview-unified-security
192192
itemType: overview

exposure-management/get-started-exposure-management.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ On the Exposure Management > **Overview** dashboard, you can review the overall
1919

2020
Use the dashboard as a starting point for a snapshot of organizational posture and exposure, and drill down to details as needed.
2121

22+
You can filter the list of affected devices based on their scope, ensuring that data presentation is aligned with your specific needs. The filter selection persists even when switching between Exposure Management experiences, allowing you to maintain you preferred view and focus on specific devices without reapplying filters.
23+
24+
Initiative scores will reflect the selected scope, whether defined by the admin or adjusted by the end user, ensuring users see accurate and relevant scores based on their access scope.
25+
2226
:::image type="content" source="./media/get-started-exposure-management/exposure-management-overview.png" alt-text="Screenshot of the security exposure management overview page." lightbox="./media/get-started-exposure-management/exposure-management-overview.png":::
2327

2428
## Connecting your external security and asset management products

0 commit comments

Comments
 (0)