Skip to content

Commit e6fb8dc

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into transition
2 parents 58e10df + 9791d9c commit e6fb8dc

File tree

8 files changed

+26
-70
lines changed

8 files changed

+26
-70
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1111

1212
> [!NOTE]
13-
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
13+
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
1414
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1515
>
1616
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.

CloudAppSecurityDocs/connector-platform.md

Lines changed: 0 additions & 60 deletions
This file was deleted.

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 04/28/2025
4+
ms.date: 05/05/2025
55
ms.topic: how-to
66
---
77

@@ -97,6 +97,7 @@ Defender for Cloud Apps supports the following ServiceNow versions:
9797
- Kingston
9898
- London
9999
- Utah
100+
- Yokohama
100101
:::column-end:::
101102
:::column:::
102103
- Madrid

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,6 @@ items:
6262
- name: Overview
6363
displayName: connect apps
6464
href: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
65-
- name: Custom connectors with the open app connector platform
66-
href: ./connector-platform.md
6765
- name: Asana
6866
href: protect-asana.md
6967
- name: Atlassian

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ In Microsoft 365 organizations with mailboxes in Exchange Online or standalone E
3434

3535
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
3636

37-
Entries for **Domains and email addresses** and **Spoofed senders** apply to internal messages sent within the organization. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
37+
Entries for **Domains and email addresses** and **Spoofed senders** apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
3838

3939
The Tenant Allow/Block list is available in the Microsoft Defender portal at <https://security.microsoft.com> **Email & collaboration** \> **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
4040

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- Tier1
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 02/08/2025
17+
ms.date: 05/02/2025
1818
---
1919

2020
# Microsoft Defender Vulnerability Management frequently asked questions
@@ -118,6 +118,18 @@ Currently Windows is supported, but coverage will be expanded to more operating
118118

119119
For details on the full list of capabilities across Microsoft Defender Vulnerability Management and Defender for Endpoint, see [Defender Vulnerability Management Capabilities](defender-vulnerability-management-capabilities.md).
120120

121+
### What happens to CVEs that are marked as "won't fix"?
122+
123+
Defender Vulnerability Management currently filters out CVEs marked as "Won't Fix", particularly on Linux platforms, from vulnerability recommendations and security score calculations. This design choice was implemented to reduce noise from non-actionable issues and improve signal-to-noise ratio for security teams.
124+
125+
Certain Linux distributions, such as RHEL, include large numbers of CVEs labeled as "Won't Fix" due to platform-specific or architectural decisions. These CVEs were previously displayed in the Microsoft Defender portal, but they caused confusion and inflated the recommendations list and exposure score. As a result, these were intentionally removed following internal review and Data Subject Rights (DSR) requests.
126+
127+
Here's what to expect:
128+
129+
- "Won't Fix" CVEs are not shown in the [Microsoft Defender portal](https://security.microsoft.com).
130+
- These CVEs are excluded from vulnerability recommendations and scoring.
131+
- There is no current workaround to view them in the product experience.
132+
121133
### Can customers buy only one capability?
122134

123135
Microsoft Defender Vulnerability Management is available as a vulnerability management solution comprised of multiple premium capabilities.

defender-vulnerability-management/tvm-dashboard-insights.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: concept-article
1515
search.appverid: met150
16-
ms.date: 03/06/2025
16+
ms.date: 05/02/2025
1717
---
1818

1919
# Microsoft Defender Vulnerability Management dashboard
@@ -31,15 +31,15 @@ Defender vulnerability management provides both security administrators and secu
3131
- Invaluable device vulnerability context during incident investigations
3232
- Built-in remediation processes through Microsoft Intune and Microsoft Endpoint Configuration Manager
3333

34-
You can use Defender Vulnerability Management dashboard in the Microsoft Defender portal to:
34+
You can use Defender Vulnerability Management dashboard in the [Microsoft Defender portal](https://security.microsoft.com) to:
3535

3636
- View your exposure score and Microsoft Secure Score for Devices, along with top security recommendations, software vulnerability, remediation activities, and exposed devices
3737
- Correlate EDR insights with endpoint vulnerabilities and process them
3838
- Select remediation options to triage and track the remediation tasks
3939
- Select exception options and track active exceptions
4040

4141
> [!NOTE]
42-
> Devices that aren't active in the last 30 days aren't factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices.
42+
> Devices that aren't active in the last 30 days aren't factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices. In addition, CVEs marked as "won't fix" are not shown in the Microsoft Defender portal, and they're not included in vulnerability recommendations or scoring.
4343
4444
Watch this video for a quick overview of what is in the Defender Vulnerability Management dashboard.
4545

0 commit comments

Comments
 (0)