You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-gp.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
36
36
37
37
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
38
38
39
-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
39
+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
40
40
41
41
1. Select the operating system.
42
42
@@ -179,7 +179,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
179
179
180
180
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
181
181
182
-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
182
+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Offboarding**.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-vdi.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,6 +94,7 @@ The following steps guide you through onboarding VDI devices and highlight steps
94
94
> [!NOTE]
95
95
> When using the 'Single entry for each device' onboarding method for non-persistent VDI environments, ensure that the Onboard-NonPersistentMachine.ps1 script is executed only after the virtual machine has received its final hostname and completed its final reboot.<br>
96
96
> For example, if your VDI provisioning process includes multiple reboots or configuration stages after the VM is cloned from a master image, delay the script execution until the last reboot is complete and final machine name is assigned.<br> Running the script too early may result in duplicate device entries or inconsistent onboarding to Microsoft Defender for Endpoint.
97
+
> The script `Onboard-NonPersistentMachine.ps1` is not signed, and administrators will need to use an approved method to run this in a restricted environment if PowerShell's execution policy is restricted. Example "-ExecutionPolicy Bypass".
Copy file name to clipboardExpand all lines: defender-endpoint/onboarding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ If you're onboarding devices in the Microsoft Defender portal, follow these step
37
37
38
38
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
39
39
40
-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40
+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
41
41
42
42
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
Copy file name to clipboardExpand all lines: defender-endpoint/preferences-setup.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ appliesto:
23
23
# Configure general Defender for Endpoint settings
24
24
25
25
26
-
Use the **Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
26
+
Use the **System > Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This article provides information about new features and important product updat
26
26
## November 2025
27
27
28
28
- (Preview) The **Vulnerability Management** section in the Microsoft Defender portal is now located under **Exposure management**. This change is part of the vulnerability management integration to Microsoft Security Exposure Management, which significantly expands the scope and capabilities of the platform. [Learn more](#microsoft-defender-vulnerability-management-and-microsoft-security-exposure-management-integration).
29
-
- (Preview) **Microsoft Secure Score now includes new recommendations** to help organizations proactively prevent common endpoint attack techniques.
29
+
- (GA) **Microsoft Secure Score now includes new recommendations** to help organizations proactively prevent common endpoint attack techniques.
30
30
-**Require LDAP client signing** and **Require LDAP server signing** - help ensure integrity of directory requests so attackers can't tamper with or manipulate group memberships or permissions in transit.
31
31
-**Encrypt LDAP client traffic** - prevents exposure of credentials and sensitive user information by enforcing encrypted communication instead of clear-text LDAP.
32
32
-**Enforce LDAP channel binding** - prevents man-in-the-middle relay attacks by ensuring the authentication is cryptographically tied to the TLS session. If the TLS channel changes, the bind fails, stopping credential replay.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-devicetvmsecureconfigurationassessment-table.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ appliesto:
21
21
- Microsoft Defender XDR
22
22
- Microsoft Sentinel in the Microsoft Defender portal
23
23
ms.topic: reference
24
-
ms.date: 03/28/2025
24
+
ms.date: 11/27/2025
25
25
---
26
26
27
27
# DeviceTvmSecureConfigurationAssessment
@@ -48,8 +48,8 @@ For information on other tables in the advanced hunting schema, see [the advance
48
48
|`ConfigurationCategory`|`string`| Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls |
49
49
|`ConfigurationSubcategory`|`string`| Subcategory or subgrouping to which the configuration belongs. In many cases, string describes specific capabilities or features. |
50
50
|`ConfigurationImpact`|`real`| Rated impact of the configuration to the overall configuration score (1-10) |
51
-
|`IsCompliant`|`boolean`| Indicates whether the configuration or policy is properly configured <br /> * A value of 1 is Compliant<br /> * A value of 0 is Not Compliant|
52
-
|`IsApplicable`|`boolean`| Indicates whether the configuration or policy applies to the device <br /> * A value of 1 is Applicable<br /> * A value of 0 is Not Applicable |
51
+
|`IsCompliant`|`boolean`| Indicates whether the configuration or policy is properly configured <br /> * A value of True is Compliant<br /> * A value of False is Not Compliant|
52
+
|`IsApplicable`|`boolean`| Indicates whether the configuration or policy applies to the device <br /> * A value of True is Applicable<br /> * A value of False is Not Applicable |
53
53
|`Context`|`dynamic`| Additional contextual information about the configuration or policy |
54
54
|`IsExpectedUserImpact`|`boolean`| Indicates whether there will be user impact if the configuration or policy is applied |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-schema-changes.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ appliesto:
21
21
- Microsoft Defender XDR
22
22
- Microsoft Sentinel in the Microsoft Defender portal
23
23
ms.topic: reference
24
-
ms.date: 11/04/2025
24
+
ms.date: 11/27/2025
25
25
---
26
26
27
27
# Advanced hunting schema - Naming changes
@@ -38,10 +38,12 @@ Naming changes are automatically applied to queries that are saved in Microsoft
38
38
- Queries that are saved elsewhere outside Microsoft Defender XDR
39
39
40
40
## November 2025
41
+
- The Boolean field values in advanced hunting results will change from numeric (`1` and `0`) to textual (`True` and `False`) on January 25, 2026. While your queries and custom detection rules won't be affected by this change, you might want to update your automated processes (for example, scripts, playbooks, or integrations) parsing these values.
41
42
42
-
The [`AADSignInEventsBeta`](advanced-hunting-aadsignineventsbeta-table.md) and [`AADSpnSignInEventsBeta`](advanced-hunting-aadspnsignineventsbeta-table.md) tables are being replaced by [`EntraIdSignInEvents`](advanced-hunting-entraidsigninevents-table.md) and [`EntraIdSpnSignInEvents`](advanced-hunting-entraidspnsigninevents-table.md), respectively. These changes are being made to remove the former tables' preview status and to align them with the existing product branding.
43
43
44
-
The `EntraIdSignInEvents` and `EntraIdSpnSignInEvents` tables are now available. The legacy `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` tables will remain in the schema for 30 days to allow time for updating your queries. Your custom detections will be updated automatically and won't require any changes. On December 9, 2025, `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` will be removed from the schema.
44
+
- The [`AADSignInEventsBeta`](advanced-hunting-aadsignineventsbeta-table.md) and [`AADSpnSignInEventsBeta`](advanced-hunting-aadspnsignineventsbeta-table.md) tables are being replaced by [`EntraIdSignInEvents`](advanced-hunting-entraidsigninevents-table.md) and [`EntraIdSpnSignInEvents`](advanced-hunting-entraidspnsigninevents-table.md), respectively. These changes are being made to remove the former tables' preview status and to align them with the existing product branding.
45
+
46
+
The `EntraIdSignInEvents` and `EntraIdSpnSignInEvents` tables are now available. The legacy `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` tables will remain in the schema for 30 days to allow time for updating your queries. Your custom detections will be updated automatically and won't require any changes. On December 9, 2025, `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` will be removed from the schema.
45
47
46
48
## September 2025
47
49
@@ -60,7 +62,7 @@ The `DeviceTvmSoftwareInventoryVulnerabilities` table has been deprecated. Repla
60
62
61
63
## February 2021
62
64
63
-
1. In the [EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md) and [EmailEvents](advanced-hunting-emailevents-table.md) tables, the `MalwareFilterVerdict` and `PhishFilterVerdict` columns have been replaced by the `ThreatTypes` column. The `MalwareDetectionMethod` and `PhishDetectionMethod` columns were also replaced by the `DetectionMethods` column. This streamlining allows us to provide more information under the new columns. The mapping is provided below.
65
+
- In the [EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md) and [EmailEvents](advanced-hunting-emailevents-table.md) tables, the `MalwareFilterVerdict` and `PhishFilterVerdict` columns have been replaced by the `ThreatTypes` column. The `MalwareDetectionMethod` and `PhishDetectionMethod` columns were also replaced by the `DetectionMethods` column. This streamlining allows us to provide more information under the new columns. The mapping is provided below.
64
66
65
67
| Table name | Original column name | New column name | Reason for change
66
68
|--|--|--|--|
@@ -70,11 +72,11 @@ The `DeviceTvmSoftwareInventoryVulnerabilities` table has been deprecated. Repla
70
72
|`EmailEvents`|`MalwareFilterVerdict` <br>`PhishFilterVerdict`|`ThreatTypes`| Include more threat types |
71
73
72
74
73
-
2. In the `EmailAttachmentInfo` and `EmailEvents` tables, the `ThreatNames` column was added to give more information about the email threat. This column contains values like Spam or Phish.
75
+
- In the `EmailAttachmentInfo` and `EmailEvents` tables, the `ThreatNames` column was added to give more information about the email threat. This column contains values like Spam or Phish.
74
76
75
-
3. In the [DeviceInfo](advanced-hunting-deviceinfo-table.md) table, the `DeviceObjectId` column was replaced by the `AadDeviceId` column based on customer feedback.
77
+
- In the [DeviceInfo](advanced-hunting-deviceinfo-table.md) table, the `DeviceObjectId` column was replaced by the `AadDeviceId` column based on customer feedback.
76
78
77
-
4. In the [DeviceEvents](advanced-hunting-deviceevents-table.md) table, several ActionType names were modified to better reflect the description of the action. Details of the changes can be found below.
79
+
- In the [DeviceEvents](advanced-hunting-deviceevents-table.md) table, several ActionType names were modified to better reflect the description of the action. Details of the changes can be found below.
78
80
79
81
| Table name | Original ActionType name | New ActionType name | Reason for change
Copy file name to clipboardExpand all lines: defender-xdr/preview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,6 @@ If you already have preview features turned on and you're a Microsoft Defender f
64
64
65
65
:::image type="content" source="media/preview-features-settings.png" alt-text="Screenshot of the preview features settings.":::
66
66
67
-
If you don't yet have preview features turned on, manage Defender for Business and Defender for Endpoint preview features from the **Settings > Endpoints > Advanced features > Preview features** page, and Defender for Cloud Apps preview features from the **Settings > Cloud Apps > General > Preview features** page.
67
+
If you don't yet have preview features turned on, manage Defender for Business and Defender for Endpoint preview features from the **System > Settings > Endpoints > Advanced features > Preview features** page, and Defender for Cloud Apps preview features from the **Settings > Cloud Apps > General > Preview features** page.
- Every action taken on a security recommendation helps to reduce exposure and risk, improve security posture, and directly influence its related security initiatives and metrics
114
114
- Use the new filtering capabilities to focus on specific domains (Cloud, Devices, etc.) or issue types (misconfigurations, vulnerabilities, etc.)
115
115
116
-
### Secure Score integration
116
+
### Secure score integration
117
117
118
-
[Microsoft Secure Score](/defender-xdr/microsoft-secure-score) helps organizations to plan and improve overall security posture using the secure score as a tracking metric. With the integration of Defender for Cloud in the Defender portal, Security Exposure Management now presents both traditional Secure Score and new Cloud secure scores side-by-side for comprehensive posture management.
118
+
Secure score helps organizations to plan and improve overall security posture using the secure score as a tracking metric. With the integration of Defender for Cloud in the Defender portal, Security Exposure Management now presents both traditional **Microsoft Secure Score** and new **Cloud Secure Score** side-by-side for comprehensive posture management.
119
119
120
-
#### Unified Secure Score experience
120
+
#### Unified secure score experience
121
121
122
-
-**Traditional Secure Score**: Covers Microsoft 365 assets and remains as in Microsoft Defender Vulnerability Management (MDVM)
123
-
-**Cloud Security Score**: A new score (sometimes called "Cloud Security Initiative") for Azure, AWS, and GCP resources, providing cloud-specific posture metrics
122
+
-**[Microsoft Secure Score](/defender-xdr/microsoft-secure-score)**: A score that covers device, identities, SaaS apps, and data, providing an overall organizational posture metric
123
+
-**[Cloud Secure Score](/azure/defender-for-cloud/secure-score-security-controls?pivots=defender-portal)**: A score for Azure, AWS, and GCP resources, providing cloud-specific posture metric
124
124
-**Side-by-side visibility**: Both scores are now accessible within MSEM, giving a combined view of organizational posture across different domains
125
-
-**Integrated recommendations**: Secure Score recommendations are integrated into the unified Recommendations Catalog alongside cloud and other security recommendations
126
125
127
126
#### How Security Exposure Management uses Secure Score
0 commit comments