Skip to content

Commit dec6baa

Browse files
committed
Merge branch 'main' into release-preview-sentinel-graph
2 parents 5ae00f0 + ee0f99e commit dec6baa

15 files changed

+254
-30
lines changed

defender-for-cloud-apps/data-protection-policies.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@ The following are examples of file policies that can be created:
4444

4545
* **Sensitive file extension** - Receive an alert about files with specific extensions that are highly exposed. Select the specific extension (for example, crt for certificates) or filename and exclude those files with private sharing level.
4646

47+
## Prerequisites
48+
49+
To set up the first File Policy in a tenant, you need Microsoft Entra **Service Principal** permissions. **Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
50+
51+
4752
## Create a new file policy
4853

4954
To create a new file policy, follow this procedure:
@@ -98,8 +103,6 @@ To create a new file policy, follow this procedure:
98103

99104
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
100105

101-
102-
103106
1. To view file policy matches, files that are suspected to violate the policy, go to **Policies** -> **Policy management**. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
104107

105108
## Limitations

defender-office-365/mdo-email-entity-page.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
author: chrisda
66
ms.author: chrisda
77
manager: bagol
8-
ms.date: 07/07/2025
8+
ms.date: 09/22/2025
99
audience: ITPro
1010
ms.topic: article
1111
ms.service: defender-office-365
@@ -297,7 +297,10 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
297297

298298
If you select an entry in the **Attachments** view by clicking on the **Attachment filename** value, a details flyout opens that contains the following information:
299299

300-
- **Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **File detonation**.
300+
- **Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment and it is identified as malicious through detonation. You can identify these messages in Threat Explorer using the following methods:
301+
- **Detection technology** query filter with the value **File detonation**.
302+
- **Detonation available** indicator in the **Details** column.
303+
- The detonation count shown in the Email Summary Panel.
301304

302305
- **Detonation chain** section: Safe Attachments detonation of a single file can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious file that caused the verdict, and all other files affected by the detonation. These attached files might not be directly present in the email. But, including the analysis is important to determining why the file was found to be malicious.
303306

@@ -378,7 +381,10 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
378381

379382
If you select an entry in the **URL** view by clicking on the **URL** value, a details flyout opens that contains the following information:
380383

381-
- **Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **URL detonation**.
384+
- **Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL and it is identified as malicious through detonation. You can identify these messages in Threat Explorer using the following methods:
385+
- **Detection technology** query filter with the value **URL detonation**.
386+
- **Detonation available** indicator in the **Details** column.
387+
- The detonation count shown in the Email Summary Panel.
382388

383389
- **Detonation chain** section: Safe Links detonation of a single URL can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious URL that caused the verdict, and all other URLs affected by the detonation. These URLs might not be directly present in the email. But, including the analysis is important to determining why the URL was found to be malicious.
384390

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: bagol
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 09/08/2025
11+
ms.date: 09/22/2025
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -27,22 +27,21 @@ appliesto:
2727

2828
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2929

30-
> [!IMPORTANT]
31-
> To allow phishing URLs that are part of non-Microsoft attack simulation training, use the [advanced delivery configuration](advanced-delivery-policy-configure.md) to specify the URLs. Don't use the Tenant Allow/Block List.
32-
3330
You might occasionally disagree with the Microsoft filtering verdict for email messages, Microsoft Teams messages, or Office apps. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative), or a URL might be blocked when it shouldn't have.
3431

3532
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override filtering verdicts. The list is used during mail flow (for email) or time of click (for email, Teams, or Office apps).
3633

37-
Entries for **Domains and email addresses** and **Spoofed senders** apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
38-
3934
The Tenant Allow/Block list is available in the Microsoft Defender portal at <https://security.microsoft.com> **Email & collaboration** \> **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
4035

4136
For usage and configuration instructions, see the following articles:
4237

4338
- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
39+
- Entries apply to the MAIL FROM address (also known as the `5321.MailFrom` address, P1 sender, or envelope sender), not the From address (also known as the `5322.From` address or P2 sender). For more information about these addresses, see [Why internet email needs authentication](email-authentication-about.md#why-internet-email-needs-authentication).
40+
- Entries apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios.
41+
- Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
4442
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4543
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
44+
- To allow phishing URLs from non-Microsoft attack simulation training, don't use URL allow entries in the Tenant Allow/Block List. Use the [advanced delivery policy](advanced-delivery-policy-configure.md) to specify the URLs.
4645
- **IP addresses**: [Allow or block IPv6 addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
4746
- **Teams domains**: [Block domains in Microsoft Teams using the Tenant Allow/Block List](tenant-allow-block-list-teams-domains-configure.md).
4847

exposure-management/Qualys-data-connector.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,6 @@ To establish a connection with Qualys in Exposure Management, follow these steps
4848

4949
Qualys connector retrieves data on compute devices, including machines and virtual machines, and vulnerability findings from Qualys on those assets. It also retrieves some networking data to identify those devices.
5050

51-
Only devices that were modified in the last 90 days are retrieved, based on assessing the "modified" field in the Qualys asset.
52-
5351
| **Category** | **Properties** |
5452
|-------------------------|--------------------------------------------------------------------------------|
5553
| **Assets/devices** | - Gateway address<br>- FQDN<br>- IP address<br>- MAC address<br>- OS information<br>- Qualys criticality data |
@@ -72,4 +70,14 @@ Here are some common issues that might arise when configuring the Qualys Connect
7270

7371
## Next steps
7472

75-
[Getting value from your data connectors](value-data-connectors.md).
73+
After configuring the Qualys data connector:
74+
75+
- [Review your attack surface map](enterprise-exposure-map.md) to see Qualys data
76+
- [Explore security recommendations](security-recommendations.md)
77+
- [Set up security initiatives](initiatives.md) to track remediation progress
78+
79+
## Related articles
80+
81+
- [Data connectors overview](overview-data-connectors.md)
82+
- [Configure data connectors](configure-data-connectors.md)
83+
- [Getting value from your data connectors](value-data-connectors.md)

exposure-management/Rapid7-data-connector.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,6 @@ To establish a connection with Rapid7 in Exposure Management, follow these steps
3131

3232
Exposure Management retrieves data on compute devices from Rapid7, including machines and virtual machines. It also retrieves vulnerabilities reported by Rapid7 on those devices.
3333

34-
Only devices that were actively scanned in the last 90 days are retrieved, based on assessing the "last_scan_end" field in the Rapid7 asset.
35-
3634
| Category | Properties |
3735
|------------------------|----------------------------------------------------------------------------|
3836
| **Assets/devices, and data per each identifier** | - Rapid7 ID<br>- Hostname<br>- IP address<br>- mac Address<br>- OS information<br>- Rapid7 risk score<br>- Tags<br>- Rapid7 criticality data<br>- Cloud platform |
@@ -54,4 +52,14 @@ Here are some common issues that might arise when configuring the Rapid7 Connect
5452

5553
## Next steps
5654

57-
[Getting value from your data connectors](value-data-connectors.md).
55+
After configuring the Rapid7 data connector:
56+
57+
- [Review your attack surface map](enterprise-exposure-map.md) to see Rapid7 data
58+
- [Explore security recommendations](security-recommendations.md)
59+
- [Set up security initiatives](initiatives.md) to track remediation progress
60+
61+
## Related articles
62+
63+
- [Data connectors overview](overview-data-connectors.md)
64+
- [Configure data connectors](configure-data-connectors.md)
65+
- [Getting value from your data connectors](value-data-connectors.md)

exposure-management/ServiceNow-data-connector.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,6 @@ To establish a connection with ServiceNow in Exposure Management, follow these s
4040

4141
Exposure Management currently retrieves data on devices, their business application association, and business criticality. Additional data is also retrieved that helps identify the device, such as network adapter information and OS data.
4242

43-
Only devices that were active in the last 90 days are retrieved, based on assessing the "sys_updated_on" field in the ServiceNow CI.
44-
4543
The following fields are ingested via the connector:
4644

4745
| **Category** | **Properties** |
@@ -69,4 +67,14 @@ Here are some common issues that might arise when configuring the ServiceNow Con
6967

7068
## Next steps
7169

72-
[Getting value from your data connectors](value-data-connectors.md).
70+
After configuring the ServiceNow data connector:
71+
72+
- [Review your attack surface map](enterprise-exposure-map.md) to see ServiceNow data
73+
- [Explore security recommendations](security-recommendations.md)
74+
- [Set up security initiatives](initiatives.md) to track remediation progress
75+
76+
## Related articles
77+
78+
- [Data connectors overview](overview-data-connectors.md)
79+
- [Configure data connectors](configure-data-connectors.md)
80+
- [Getting value from your data connectors](value-data-connectors.md)

exposure-management/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,12 @@
4646
items:
4747
- name: ServiceNow
4848
href: ServiceNow-data-connector.md
49+
- name: Cloud Security data connectors
50+
items:
51+
- name: Wiz
52+
href: wiz-data-connector.md
53+
- name: Palo Alto Prisma
54+
href: palo-alto-prisma-data-connector.md
4955
- name: Vulnerability Management data connectors
5056
items:
5157
- name: Qualys

exposure-management/Tenable-data-connector.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ To establish a connection with Tenable in Exposure Management, follow these step
4444

4545
Exposure Management retrieves data on compute devices from Tenable, including machines and virtual machines. It also retrieves some networking data to identify those devices.
4646

47-
Only devices that were modified in the last 90 days are retrieved, based on assessing the "updated_at" field in the Tenable asset.
48-
4947
Exposure Management also retrieves vulnerability findings from Tenable on those assets.
5048

5149
The vulnerability data retrieved for Tenable is applicable to CVEs only, and not other types of vulnerabilities or misconfigurations. Tenable shows total vulnerability counts that include other non-CVE misconfigurations as well, so these counts aren't applicable to the numbers of vulnerabilities ingested to Exposure Management.
@@ -77,4 +75,14 @@ Here are some common issues that might arise when configuring the Tenable Connec
7775

7876
## Next steps
7977

80-
[Getting value from your data connectors](value-data-connectors.md).
78+
After configuring the Tenable data connector:
79+
80+
- [Review your attack surface map](enterprise-exposure-map.md) to see Tenable data
81+
- [Explore security recommendations](security-recommendations.md)
82+
- [Set up security initiatives](initiatives.md) to track remediation progress
83+
84+
## Related articles
85+
86+
- [Data connectors overview](overview-data-connectors.md)
87+
- [Configure data connectors](configure-data-connectors.md)
88+
- [Getting value from your data connectors](value-data-connectors.md)

exposure-management/configure-data-connectors.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 11/06/2024
9+
ms.date: 09/21/2025
1010
---
1111

1212
# Configure your data connectors
@@ -30,6 +30,11 @@ To view the status of the connectors, you can use one of the following roles:
3030
- Global Reader (read permissions)
3131
- Security Reader (read permissions)
3232

33+
You can also use [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac) with the following permissions:
34+
- **Exposure Management (read)** for read-only access to Exposure Management experiences
35+
- **Exposure Management (manage)** for full access to manage Exposure Management experiences
36+
- **Core security settings (manage)** for connecting or changing vendor configurations (located under Authorization and settings category)
37+
3338
You can find more details about the permission levels here, [Prerequisites, and support](prerequisites.md).
3439

3540
## Establish a connection
@@ -42,8 +47,8 @@ To establish a connection with any of the supported external products, follow th
4247
- [Qualys VM](Qualys-data-connector.md)
4348
- [Rapid7 VM](Rapid7-data-connector.md)
4449
- [Tenable](Tenable-data-connector.md)
45-
- Wiz (coming soon)
46-
- Palo Alto (coming soon)
50+
- [Wiz](wiz-data-connector.md)
51+
- [Palo Alto Prisma](palo-alto-prisma-data-connector.md)
4752

4853
2. Go to **Data Connectors** in the Exposure Management navigation.
4954
3. Select **Connect** on the selected data connector from the external connectors catalog.
@@ -81,4 +86,4 @@ Select the external data connector you want to configure and follow the steps to
8186

8287
- [CMDB data connectors](ServiceNow-data-connector.md)
8388
- [Vulnerability management data connectors](Qualys-data-connector.md)
84-
- Cloud security data connectors (coming soon)
89+
- [Cloud security data connectors](wiz-data-connector.md)
-47.4 KB
Loading

0 commit comments

Comments
 (0)