Skip to content

Commit eff04d1

Browse files
authored
Merge branch 'main' into docs-editor/troubleshoot-asr-1743427400
2 parents af58508 + c96aa09 commit eff04d1

File tree

8 files changed

+99
-90
lines changed

8 files changed

+99
-90
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ permissions:
55

66
on:
77
schedule:
8-
- cron: "0 */12 * * *"
8+
- cron: "0 9 1 * *"
99

10-
workflow_dispatch:
10+
# workflow_dispatch:
1111

1212

1313
jobs:
@@ -21,6 +21,6 @@ jobs:
2121
"ExampleBranch1",
2222
"ExampleBranch2"
2323
]'
24-
ReportOnly: true
24+
ReportOnly: false
2525
secrets:
2626
AccessToken: ${{ secrets.GITHUB_TOKEN }}

ATPDocs/identity-inventory.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,16 @@ There are several options you can choose from to customize the identities list v
3636

3737
- Apply filters.
3838

39-
- Search for an identity by name or full UPN, Sid and Object ID.
39+
- Search for an identity by name or full UPN, SID and Object ID.
4040

4141
- Export the list to a CSV file.
4242

4343
- Copy list link with the included filters configured.
4444

45-
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
45+
> [!NOTE]
46+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
47+
48+
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
4649

4750
### Identity details
4851

@@ -120,7 +123,7 @@ You can use this information to help you prioritize devices for security posture
120123

121124
### Navigate to the Identity inventory page
122125

123-
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
126+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Assets** > **Identities**. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
124127

125128
### Related Articles
126129

ATPDocs/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ For more information, see: [Investigate and protect Service Accounts | Microsoft
4444

4545
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
4646

47-
### Enhanced Identity Inventory (Preview)
47+
### Enhanced Identity Inventory
4848

4949
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
5050
The updated Identities Inventory page now includes the following tabs:

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 71 additions & 64 deletions
Large diffs are not rendered by default.

defender-office-365/responding-to-a-compromised-email-account.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ search.appverid:
2424
- MET150
2525
description: Learn how to recognize and respond to a compromised email account using tools available in Microsoft 365.
2626
ms.service: defender-office-365
27-
ms.date: 03/19/2025
27+
ms.date: 03/31/2025
2828
appliesto:
2929
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
3030
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -146,22 +146,16 @@ This step immediately invalidates any active access using the stolen credentials
146146
Connect-MgGraph -Scopes User.RevokeSessions.All
147147
```
148148

149-
4. To store the details of the user account in the variable named `$user`, replace \<UPN\> with the user's account (user principal name or UPN), and then run the following command:
149+
4. Replace \<UPN\> with the user's account (user principal name or UPN), and then run the following command:
150150

151-
```powershell
152-
$user = Get-MgUser -Search UserPrincipalName:'<UPN>' -ConsistencyLevel Eventual
153-
```
154-
155-
For example:
156-
157-
```powershell
158-
$user = Get-MgUser -Search UserPrincipalName:'[email protected]' -ConsistencyLevel Eventual
159-
```
151+
```powershell
152+
Revoke-MgUserSignInSession -UserId <UPN>
153+
```
160154

161-
5. Revoke the user's sign-in sessions by running the following command:
155+
For example:
162156

163157
```powershell
164-
Revoke-MgUserSignInSession -UserId $user.Id
158+
Revoke-MgUserSignInSession -UserId [email protected]
165159
```
166160

167161
For more information, see [Revoke user access in an emergency in Microsoft Entra ID](/entra/identity/users/users-revoke-access).

defender-office-365/submissions-teams.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom:
1717
description: "Admins can configure whether users can report malicious message in Microsoft Teams."
1818
ms.service: defender-office-365
19-
ms.date: 03/13/2025
19+
ms.date: 03/31/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -28,7 +28,7 @@ appliesto:
2828

2929
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report malicious messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
3030

31-
Users can report messages in Teams from chats, standard channels and meeting conversations. Users can only report messages as malicious.
31+
Users can report messages in Teams from chats, standard channels, and meeting conversations. Users can only report messages as malicious.
3232

3333
> [!NOTE]
3434
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).

unified-secops-platform/cases-overview.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,9 @@ Case management is the first installment of new capabilities for managing securi
2323

2424
This initial step toward delivering a unified, security-focused case management experience centralizes rich collaboration, customization, evidence collection, and reporting across SecOps workloads. SecOps teams maintain security context, work more efficiently, and respond faster to attacks when they manage case work without leaving the Defender portal.
2525

26-
> [!IMPORTANT]
27-
> Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
26+
<a name="what-is-case-management-preview"></a>
2827

29-
## What is case management (Preview)?
28+
## What is case management?
3029

3130
Case management enables you to manage SecOps cases natively in the Defender portal. Here's the initial set of scenarios and features supported.
3231

@@ -45,7 +44,7 @@ As we build on this foundation of case management, we're prioritizing these addi
4544

4645
## Requirements
4746

48-
Case management is available in the Defender portal, and to use it, you must have a Microsoft Sentinel workspace connected. There's no access to cases from the Azure portal.
47+
Case management is available in the Defender portal, and to use it, you must have a Microsoft Sentinel workspace connected. Cases are accessible only from the Defender portal; you can't see them in the Azure portal.
4948

5049
For more information, see [Connect Microsoft Sentinel to the Defender portal](microsoft-sentinel-onboard.md).
5150

unified-secops-platform/whats-new.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,12 @@ ms.topic: concept-article
2020

2121
This article lists recent features added into Microsoft's unified SecOps platform within the Microsoft Defender portal, and new features in related services that provide an enhanced user experience in the platform.
2222

23+
## April 2025
24+
25+
### Case management now generally available
26+
27+
The Microsoft Defender portal's case management feature is now generally available. For more information on this feature, see the preview announcement [Manage SecOps work natively with case management (Preview)](#case-management-preview) in the January 2025 section below.
28+
2329
## January 2025
2430

2531
- [Unified threat intelligence](#unified-threat-intelligence)

0 commit comments

Comments
 (0)