Skip to content

Commit e3d6e7c

Browse files
authored
Merge pull request #2104 from MicrosoftDocs/main
Published main to live, Wednesday 10:30 AM PST, 12/04
2 parents 60785ce + 951b7de commit e3d6e7c

8 files changed

+12
-11
lines changed

ATPDocs/security-assessment-edit-misconfigured-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured certificate templates ACL (ESC4) (Preview)
8+
# Security assessment: Edit misconfigured certificate templates ACL (ESC4)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured certificate template ACL** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-ca-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/14/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured Certificate Authority ACL (ESC7) (Preview)
8+
# Security assessment: Edit misconfigured Certificate Authority ACL (ESC7)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured certificate authority ACL** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-enrollment-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured enrollment agent certificate template (ESC3) (Preview)
8+
# Security assessment: Edit misconfigured enrollment agent certificate template (ESC3)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured enrollment agent certificate template** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-owner.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/14/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured certificate templates owner (ESC4) (Preview)
8+
# Security assessment: Edit misconfigured certificate templates owner (ESC4)
99

1010
This article provides an overview of Microsoft Defender for Identity's **Misconfigured certificate templates owner (ESC4)** security posture assessment report.
1111

ATPDocs/security-assessment-edit-overly-permissive-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2) (Preview)
8+
# Security assessment: Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2)
99

1010
This article describes Microsoft Defender for Identity's **Overly permissive certificate template with privileged EKU** security posture assessment report.
1111

ATPDocs/security-assessment-enforce-encryption-rpc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Enforce encryption for RPC certificate enrollment interface (ESC11) (Preview)
8+
# Security assessment: Enforce encryption for RPC certificate enrollment interface (ESC11)
99

1010
This article describes Microsoft Defender for Identity's **Enforce encryption for RPC certificate enrollment** security posture assessment report.
1111

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn how to use Attack simulation training to run simulated phishing and password attacks in their Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
2121
ms.service: defender-office-365
22-
ms.date: 08/14/2024
22+
ms.date: 12/04/2024
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2525
---
@@ -65,7 +65,7 @@ Watch this short video to learn more about Attack simulation training.
6565

6666
- There are no corresponding PowerShell cmdlets for Attack simulation training.
6767

68-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, POL, QAT, SGP, SWE, TWN and ZAF.
68+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, NZL, POL, QAT, SGP, SWE, TWN and ZAF.
6969

7070
> [!NOTE]
7171
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.

defender-xdr/advanced-hunting-deviceinfo-table.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: reference
21-
ms.date: 01/16/2024
21+
ms.date: 12/04/2024
2222
---
2323

2424
# DeviceInfo
@@ -39,7 +39,7 @@ For information on other tables in the advanced hunting schema, [see the advance
3939

4040
| Column name | Data type | Description |
4141
|-------------|-----------|-------------|
42-
| `Timestamp` | `datetime` | Date and time when the event was recorded |
42+
| `Timestamp` | `datetime` | Last date and time recorded for the device |
4343
| `DeviceId` | `string` | Unique identifier for the device in the service |
4444
| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
4545
| `ClientVersion` | `string` | Version of the endpoint agent or sensor running on the device |
@@ -89,8 +89,9 @@ You can use the following sample query to get the latest state of a device:
8989
```kusto
9090
// Get latest information on user/device
9191
DeviceInfo
92+
| extend IngestionTime = ingestion_time()
9293
| where DeviceName == "example" and isnotempty(OSPlatform)
93-
| summarize arg_max(Timestamp, *) by DeviceId
94+
| summarize arg_max(IngestionTime, *) by DeviceId
9495
```
9596

9697
## Related topics

0 commit comments

Comments
 (0)