Skip to content

Commit e1d02dc

Browse files
authored
Merge branch 'main' into 190a1007-553f-4c81-a3f6-2a5638b560c6_3
2 parents ec03e52 + 3af0cb7 commit e1d02dc

6 files changed

+22
-25
lines changed

ATPDocs/alerts-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
9898
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
9999
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
100100
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
101-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
102101
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
103102

104103
> [!NOTE]

ATPDocs/reconnaissance-discovery-alerts.md

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -173,25 +173,6 @@ None
173173
|MITRE attack technique | [Account Discovery (T1087)](https://attack.mitre.org/techniques/T1087/), [Indirect Command Execution (T1202)](https://attack.mitre.org/techniques/T1202/), [Permission Groups Discovery (T1069)](https://attack.mitre.org/techniques/T1069/) |
174174
|MITRE attack sub-technique | [Domain Account (T1087.002)](https://attack.mitre.org/techniques/T1087/002/), [Domain Groups (T1069.002)](https://attack.mitre.org/techniques/T1069/002/) |
175175

176-
## Honeytoken was queried via SAM-R (external ID 2439)
177-
178-
**Severity**: Low
179-
180-
**Description**:
181-
182-
User reconnaissance is used by attackers to map the directory structure and target privileged accounts for later steps in their attack. The Security Account Manager Remote (SAM-R) protocol is one of the methods used to query the directory to perform this type of mapping.
183-
In this detection, Microsoft Defender for Identity will trigger this alert for any reconnaissance activities against a pre-configured [honeytoken user](entity-tags.md)
184-
185-
**Learning period**:
186-
187-
None
188-
189-
**MITRE**:
190-
191-
|Primary MITRE tactic |[Discovery (TA0007)](https://attack.mitre.org/tactics/TA0007/) |
192-
|---------|---------|
193-
|MITRE attack technique | [Account Discovery (T1087)](https://attack.mitre.org/techniques/T1087/)|
194-
|MITRE attack sub-technique | [Domain Account (T1087.002)](https://attack.mitre.org/techniques/T1087/002/)|
195176

196177
## Honeytoken was queried via LDAP (external ID 2429)
197178

CloudAppSecurityDocs/editions-cloud-app-security-o365.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@ Office 365 Cloud App Security includes threat detection based on user activity l
2626

2727
|Capability|Feature|Microsoft Defender for Cloud Apps|Office 365 Cloud App Security|
2828
|----|----|----|----|
29-
|Cloud discovery|Discovered apps |31,000 + cloud apps |750+ cloud apps with similar functionality to Office 365|
29+
|App Governance|App Governance|Yes||
30+
|Cloud discovery|Discovered apps |34,000 + cloud apps |750+ cloud apps with similar functionality to Office 365|
3031
||Deployment for discovery analysis|<li> Manual upload <br> <li> Automated upload - Log collector and API <br> <li> Native Defender for Endpoint integration |Manual log upload|
3132
||Log anonymization for user privacy|Yes||
3233
||Access to full cloud app catalog|Yes||
@@ -52,3 +53,4 @@ Office 365 Cloud App Security includes threat detection based on user activity l
5253
Read about the basics in [Getting started with Defender for Cloud Apps](./get-started.md).
5354

5455
[!INCLUDE [Open support ticket](includes/support.md)]
56+
"

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,14 +47,19 @@ This article describes how admins can manage entries for email senders in the Mi
4747

4848
- For blocking inbound and outbound email from a domain, any subdomains in that domain, and any email addresses in that domain, create the block entry using the syntax: `*.TLD`, where `TLD` can be any top-level domain, internal domain, or email address domain.
4949

50-
- For blocking inbound and outbound email from a sudomain in a domain and any email addresses in that subdomain, create the block entry using the syntax: `*.SD1.TLD`, `*.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, etc. for internal domains and email address domains.
50+
- For blocking inbound and outbound email from a subdomain in a domain and any email addresses in that subdomain, create the block entry using the syntax: `*.SD1.TLD`, `*.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, etc. for internal domains and email address domains.
5151

5252
- For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.
5353

5454
- An entry should be active within 5 minutes.
5555

5656
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57-
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
57+
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
58+
- *Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
59+
- **Authorization and settings/Security settings/Detection tuning (manage)**
60+
- *Read-only access to the Tenant Allow/Block List*:
61+
- **Authorization and settings/Security settings/Read-only**.
62+
- **Authorization and settings/Security settings/Core Security settings (read)**.
5863
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
5964
- *Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
6065
- **Organization Management** or **Security Administrator** (Security admin role).

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,12 @@ This article describes how admins can manage entries for files in the Microsoft
5454
- An entry should be active within 5 minutes.
5555

5656
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57-
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Exchange Online permissions** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
57+
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
58+
- *Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
59+
- **Authorization and settings/Security settings/Detection tuning (manage)**
60+
- *Read-only access to the Tenant Allow/Block List*:
61+
- **Authorization and settings/Security settings/Read-only**.
62+
- **Authorization and settings/Security settings/Core Security settings (read)**.
5863
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
5964
- _Add and remove entries from the Tenant Allow/Block List_: Membership in one of the following role groups:
6065
- **Organization Management** or **Security Administrator** (Security admin role).

defender-office-365/tenant-allow-block-list-ip-addresses-configure.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,12 @@ This article describes how admins can manage entries for IPv6 addresses in the M
5252
- An entry should be active within 5 minutes.
5353

5454
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
55-
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Exchange Online permissions** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
55+
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell):
56+
- *Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
57+
- **Authorization and settings/Security settings/Detection tuning (manage)**
58+
- *Read-only access to the Tenant Allow/Block List*:
59+
- **Authorization and settings/Security settings/Read-only**.
60+
- **Authorization and settings/Security settings/Core Security settings (read)**.
5661
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
5762
- _Add and remove entries from the Tenant Allow/Block List_: Membership in one of the following role groups:
5863
- **Organization Management** or **Security Administrator** (Security admin role).

0 commit comments

Comments
 (0)