Skip to content

Commit dfcad76

Browse files
authored
Merge branch 'main' into diannegali-gohuntexport
2 parents c3b7c6e + ef9172c commit dfcad76

11 files changed

+81
-31
lines changed

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
77
manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
10-
ms.date: 09/10/2024
10+
ms.date: 11/11/2024
1111
ms.collection:
1212
- m365-security
1313
- tier2
@@ -117,6 +117,8 @@ After you have onboarded devices, [run a detection test](run-detection-test.md).
117117

118118
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is a central location where you can view onboarded devices, security recommendations, detected threats, alerts, and more. To get started, see [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal).
119119

120+
> [!IMPORTANT]
121+
> If you decide not to renew your trial or purchase a subscription, make sure to offboard devices before your trial expires.
120122
121123
## See also
122124

defender-endpoint/device-discovery-faq.md

Lines changed: 51 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier3
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 03/23/2021
18+
ms.date: 11/12/2024
1919
---
2020

2121
# Device discovery frequently asked questions
@@ -65,11 +65,54 @@ The discovery engine distinguishes between network events that are received in t
6565
## What protocols are you capturing and analyzing?
6666

6767
By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
68-
ARP, CDP, DHCP, DHCPv6, IP (headers), LLDP, LLMNR, mDNS, MNDP, MSSQL, NBNS, SSDP, TCP (SYN headers), UDP (headers), WSD
68+
69+
- ARP
70+
- CDP
71+
- DHCP
72+
- DHCPv6
73+
- IP (headers)
74+
- LLDP
75+
- LLMNR
76+
- mDNS
77+
- MNDP
78+
- MSSQL
79+
- NBNS
80+
- SSDP
81+
- TCP (SYN headers)
82+
- UDP (headers)
83+
- WSD
6984

7085
## Which protocols do you use for active probing in Standard discovery?
7186
When a device is configured to run Standard discovery, exposed services are being probed by using the following protocols:
72-
ARP, FTP, HTTP, HTTPS, ICMP, LLMNR, NBNS, RDP, SIP, SMTP, SNMP, SSH, Telnet, UPNP, WSD, SMB, NBSS, IPP, PJL, RPC, mDNS, DHCP, AFP, CrestonCIP, IphoneSync, WinRM, VNC, SLP, LDAP
87+
88+
- AFP
89+
- ARP
90+
- DHCP
91+
- FTP
92+
- HTTP
93+
- HTTPS
94+
- ICMP
95+
- IphoneSync
96+
- IPP
97+
- LDAP
98+
- LLMNR
99+
- mDNS
100+
- NBNS
101+
- NBSS
102+
- PJL
103+
- RDP
104+
- RPC
105+
- SIP
106+
- SLP
107+
- SMB
108+
- SMTP
109+
- SNMP
110+
- SSH
111+
- Telnet
112+
- UPNP
113+
- VNC
114+
- WinRM
115+
- WSD
73116

74117
In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
75118

@@ -88,9 +131,10 @@ As device discovery uses passive methods to discover devices in the network, any
88131

89132
Devices will actively be probed when changes in device characteristics are observed to make sure the existing information is up to date (typically, devices probed no more than once in a three-week period)
90133

91-
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
134+
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it. What should I do?
92135

93136
The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
137+
94138
`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps1`
95139

96140
## What is the amount of traffic being generated by the Standard discovery active probe?
@@ -101,13 +145,13 @@ Active probing can generate up to 50Kb of traffic between the onboarded device a
101145

102146
You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
103147

104-
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
148+
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
105149

106150
## Can I onboard unmanaged devices that were found?
107151

108152
Yes. You can onboard unmanaged devices manually. Unmanaged endpoints in your network introduce vulnerabilities and risks to your network. Onboarding them to the service can increase the security visibility on them.
109153

110-
## I've noticed that unmanaged device health state is always "Active", why is that?
154+
## I've noticed that unmanaged device health state is always "Active". Why is that?
111155

112156
Temporarily, unmanaged device health state is "Active" during the standard retention period of the device inventory, regardless of their actual state.
113157

@@ -138,4 +182,5 @@ The device discovery capabilities have been built to only discover and identify
138182
### You can exclude network lures from active probing
139183

140184
Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
185+
141186
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Watch this short video to learn more about Attack simulation training.
6565

6666
- There are no corresponding PowerShell cmdlets for Attack simulation training.
6767

68-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, and ZAF.
68+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, TWN and ZAF.
6969

7070
> [!NOTE]
7171
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,10 @@ This article describes how admins can manage entries for email senders in the Mi
5555

5656
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
5757
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
58-
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
58+
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) in the **Exchange admin center** at <https://admin.exchange.microsoft.com> \> **Roles** \> **Admin Roles**:
5959
- *Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
6060
- **Organization Management** or **Security Administrator** (Security admin role).
61-
- **Security Operator** (Tenant AllowBlockList Manager).
61+
- **Security Operator** (Tenant AllowBlockList Manager role)
6262
- *Read-only access to the Tenant Allow/Block List*: Membership in one of the following role groups:
6363
- **Global Reader**
6464
- **Security Reader**

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ For editable functions, more options are available when you select the vertical
4343
- **Edit details** – opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)
4444
- **Delete** – deletes the function
4545

46-
### Use arg() operator for Azure Resource Graph queries (Preview)
46+
### Use arg() operator for Azure Resource Graph queries
4747
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
4848

4949
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.

defender-xdr/breadcrumb/toc.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@
99
- name: Microsoft Defender XDR
1010
tocHref: /defender-for-identity/
1111
topicHref: /defender-xdr/index
12+
- name: Microsoft Defender XDR
13+
tocHref: /unified-secops-platform/
14+
topicHref: /defender-xdr/index
1215

1316
## Azure override
1417
- name: 'Microsoft Defender'
@@ -18,4 +21,3 @@
1821
- name: 'Microsoft Defender XDR'
1922
tocHref: /azure/sentinel/
2023
topicHref: /defender-xdr/index
21-

defender-xdr/whats-new.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,12 @@ You can also get product updates and important notifications through the [messag
3333

3434
- (GA) Microsoft Defender XDR customers can now export incident data to PDF. Use the exported data to easily capture and share incident data to other stakeholders. For details, see **[Export incident data to PDF](manage-incidents.md#export-incident-data-to-pdf)**.
3535
- (GA) The [***go hunt***](investigate-incidents.md#go-hunt) action from the attack story graph and the **last update time** column in the [incident queue](incident-queue.md#incident-queue) are now generally available.
36+
- (GA) The `arg()` operator in [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries) in Microsoft Defender portal is now generally available. Users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources, and no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if already in Microsoft Defender.
3637

3738
## October 2024
3839

3940
- [Microsoft Unified RBAC roles](experts-on-demand.md#required-permissions-for-using-ask-defender-experts) are added with new permission levels for Microsoft Threat Experts customers to use Ask Defender experts capability.
40-
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries-preview), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
41+
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-arg-operator-for-azure-resource-graph-queries), Microsoft Defender portal users can now use the *arg()* operator for Azure Resource Graph queries to search over Azure resources. You no longer need to go to Log Analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
4142

4243
## September 2024
4344

@@ -341,7 +342,7 @@ The security operations team can view all actions pending approval, and the stip
341342

342343
## June 2021
343344

344-
- (Preview) [View reports per threat tags](threat-analytics.md#view- reports-by-category)
345+
- (Preview) [View reports per threat tags](threat-analytics.md#view-reports-by-category)
345346

346347
Threat tags help you focus on specific threat categories and review the most relevant reports.
347348

exposure-management/exposure-insights-overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,12 @@ Security Exposure Management provides initiatives that currently include:
5151
5252
### Initiative elements
5353

54-
**Element** | **Goal** | **Details**
55-
--- | --- | ---
56-
**Initiative** | Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.| Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/> The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.
57-
**Metric** | Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.| Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.
58-
**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. | All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/> Within initiatives, recommendations are assigned a compliance state.
59-
**Events** | Events help you to monitor initiative changes. | Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.
54+
|**Element** | **Goal** | **Details**|
55+
|--- | --- | ---|
56+
|**Initiative** |Initiatives help you to gather security projects that have similar resources and workloads, and to assess and remediate the security posture of each project.|Each security initiative provides an all-up score that provides a fast measure of how strong security posture is for the initiative at the current point in time.<br/><br/>The all-up score also provides a target score indicator, the number of critical assets affected, and shows how the score has moved over the last 24 hours.|
57+
|**Metric** |Metrics in security initiatives help you to measure exposure risk for different areas within the initiative.|Each metric gathers together one or more recommendations for similar assets.<br/><br/>Metrics can be associated with one or more initiatives.<br/><br/>**Important**: Threat analytics initiatives don't have metrics. They have recommendations only.|
58+
|**Recommendations** |Security recommendations help you to understand the compliance state for a specific security initiative. |All security initiatives have recommendations associated with them.<br/><br/>Recommendations can be associated with one or more initiatives.<br/><br/>Within initiatives, recommendations are assigned a compliance state.|
59+
|**Events** |Events help you to monitor initiative changes. |Events notify you when there's a drop in an all-up initiative score or metric score, indicating that exposure risk grew.|
6060

6161
## Working with initiatives
6262

671 KB
Loading

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Current asset types are:
6464
| Partner Tier2 Support | Identity | Very High | Identities in this role can reset passwords for all users (including Global Administrators), update credentials for applications, create and delete users, and create OAuth2 permission grants. This role has been deprecated and will be removed from Microsoft Entra ID in the future. Don't use - not intended for general use. |
6565
| Password Administrator | Identity | Very High | Identities in this role can reset passwords for nonadministrators and Password Administrators. |
6666
| Privileged Authentication Administrator | Identity | Very High | Identities in this role can view, set, and reset authentication method information for any user (admin or nonadmin). |
67-
| Privileged Role Administrator | Identity | High | Identities in this role can manage role assignments in Microsoft Entra ID, and all aspects of Privileged Identity Management. |
67+
| Privileged Role Administrator | Identity | Very High | Identities in this role can manage role assignments in Microsoft Entra ID, and all aspects of Privileged Identity Management. |
6868
| Security Administrator | Identity | High | Identities in this role can read security information and reports, and manage configuration in Microsoft Entra ID and Office 365. |
6969
| Security Operator | Identity | High | Identities in this role can create and manage security events. |
7070
| Security Reader | Identity | High | Identities in this role can read security information and reports in Microsoft Entra ID and Office 365. |

0 commit comments

Comments
 (0)