Skip to content

Commit f6f8e57

Browse files
committed
Merge branch 'main' into Teams-chrisda
2 parents 3edcaa5 + d04df21 commit f6f8e57

File tree

61 files changed

+342
-289
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+342
-289
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,17 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5-
5+
6+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
8+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
9+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
10+
611
on:
712
schedule:
8-
- cron: "0 9 1 * *"
13+
- cron: "0 9 1,15-31 * *"
914

10-
# workflow_dispatch:
15+
workflow_dispatch:
1116

1217

1318
jobs:

ATPDocs/deploy/activate-capabilities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,8 @@ The first time you activate Defender for Identity capabilities on your domain co
117117
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
118118

119119
- Investigation features on the [ITDR dashboard](#check-the-itdr-dashboard), [identity inventory](#confirm-entity-page-details), and [identity advanced hunting data](#test-advanced-hunting-tables)
120-
- [Specified security posture recommendations](#test-identity-security-posture-management-ispm-recommendations)
121-
- [Specified alert detections](#test-alert-functionality)
120+
- [Security posture recommendations](#test-identity-security-posture-management-ispm-recommendations)
121+
- [Alert detections](#test-alert-functionality)
122122
- [Remediation actions](#test-remediation-actions)
123123
- [Automatic attack disruption](/microsoft-365/security/defender/automatic-attack-disruption)
124124

ATPDocs/health-alerts.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,15 @@ The Microsoft Defender for Identity **Health issues** page lets you know when th
3232

3333
:::image type="content" source="media/health-issues/close-suppress.png" alt-text="Screenshot of a health issue details pane." lightbox="media/health-issues/close-suppress.png":::
3434

35+
## Health issue status
36+
37+
Health issues in Microsoft Defender for Identity can have different statuses depending on their state and how they're handled.
38+
39+
- **Open:**: The health issue is marked as open.
40+
- **Closed:** A health issue is automatically marked as **Closed** when Microsoft Defender for Identity detects that the underlying issue is resolved. If you have [Azure ATP (workspace name) Administrator](/defender-for-identity/role-groups#defender-for-identity-security-groups) you can also manually close a health issue.
41+
- **Suppressed:** If you have Azure ATP (workspace name) Administrators permissions, you can suppress the health alert for seven days. Suppress a health alert if you're aware of an expected temporary known issue, for example, taking down a machine for maintenance.
42+
43+
For example, if a domain controller is taken offline for maintenance, a "Sensor stopped communicating" alert might be triggered. You can use the API to change the alert status from Open to Suppressed. Once the domain controller is back online, revert the status to Open and let Microsoft Defender for Identity close the alert automatically when the issue is resolved.
3544

3645
## Health issues
3746

@@ -43,7 +52,7 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
4352

4453
|Alert|Description|Resolution|Severity|Displayed in|
4554
|----|----|----|----|----|
46-
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
55+
|The virtual machines that the listed Defender for Identity sensors is installed on has a network configuration mismatch. This issue might affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
4756

4857
### A domain controller is unreachable by a sensor
4958

765 Bytes
Loading

CloudAppSecurityDocs/protect-atlassian.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
88

99

1010

11-
Atlassian is an online collaborative and software development platform (including Confluence, Jira and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
11+
Atlassian is an online collaborative and software development platform (including Confluence, Jira, and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
1212

13-
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities.
13+
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities.
1414

1515
Main threats include:
1616

@@ -68,7 +68,7 @@ For more information, see:
6868
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Atlassian products using the App Connector APIs. This connection gives you visibility into and control over your organization's Atlassian use.
6969

7070
>[!NOTE]
71-
>The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
71+
>The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
7272
7373
### Prerequisites
7474

@@ -116,19 +116,17 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
116116
>[!NOTE]
117117
>
118118
> - The first connection can take up to four hours to get all users and their activities.
119-
> - The activities that will display are the activities that were generated from the moment the connector is connected.
119+
> - The activities displayed are the activities that were generated from the moment the connector is connected.
120120
> - Activities from the "Atlassian Access" audit log are fetched by Defender for Cloud apps. Other activities aren't fetched currently. See [Product Audit Logs](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/).
121121
> - After the connector’s **Status** is marked as **Connected**, the connector is live and works.
122122
123123
### Revoke and renew API keys
124124

125125
1. Microsoft recommends using short lived keys or tokens for connecting apps as a security best practice.
126126
1. We recommend refreshing the Atlassian API key every 6 months as a best practice. To refresh the key, revoke the existing API key and generate a new key.
127-
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration and select **Revoke**.
127+
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration, and select **Revoke**.
128128
1. Recreate an API key in the Atlassian admin portal with the steps described above.
129-
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector:
130-
131-
![Edit connector.](media/atlassian-edit-connector.png)
129+
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector.
132130

133131
1. Enter the new generated new **API key** and select **Connect Atlassian**.
134132
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
@@ -148,13 +146,13 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
148146

149147
## Rate limits and limitations
150148

151-
- **Rate limits** include 1000 requests per minute (per API key/connector instance).
149+
- **Rate limits** include 1,000 requests per minute (per API key/connector instance).
152150

153151
For more information about the Atlassian API limitation, see [Atlassian admin REST APIs](https://developer.atlassian.com/cloud/admin/about/#about-the-cloud-admin-rest-apis).
154152

155153
- **Limitations** include:
156154

157-
- Activities will be shown in Defender for Cloud Apps only for users with a verified domain.
155+
- Activities are shown in Defender for Cloud Apps only for users with a verified domain.
158156

159157
- The API key has a maximum expiration period of one year. After one year, you'll need to create another API key from the Atlassian Admin portal and replace it for the old API Key in the Defender for Cloud Apps console.
160158

CloudAppSecurityDocs/protect-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99

1010

11-
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
11+
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
1212

1313
Connecting Azure to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, and unusual deletions of VMs.
1414

@@ -74,7 +74,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
7474
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7575

7676
> [!NOTE]
77-
> After connecting Azure, data will be pulled. You will see data from then onwards.
77+
> After connecting to Azure, data will be pulled. You'll see data from then onwards.
7878
7979
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
8080

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -550,6 +550,8 @@
550550
href: onboarding-endpoint-configuration-manager.md
551551
- name: Onboarding using Microsoft Intune
552552
href: onboarding-endpoint-manager.md
553+
- name: Deploy Microsoft Defender for Endpoint prerelease builds on Android devices
554+
href: mobile-pretest-android.md
553555

554556
- name: Migration guides
555557
items:

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 03/21/2025
18+
ms.date: 04/18/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -28,6 +28,17 @@ ms.date: 03/21/2025
2828

2929
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

31+
#### Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks
32+
33+
April 2025
34+
35+
**Setup a secure environment to test prerelease builds of Defender for Endpoint on Android**. Learn the steps on how to set up your environment for prerelease testing of Defender for Endpoint on Android. These steps are for Android devices that are onboarded to Microsoft Defender for Endpoint through the following methods:
36+
37+
- Android Enterprise scenarios
38+
- Mobile Application Mangement (MAM) enrollment scenarios
39+
40+
For more information, see [Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks](mobile-pretest-android.md).
41+
3142
#### Defender for Endpoint on Android now supports Android 10 as the minimum version
3243

3344
February 2025

defender-endpoint/device-discovery-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ By default, all onboarded devices running on Windows 10 version 1809 or later, W
7878
- `DHCPv6`
7979
- `IP` (headers)
8080
- `LLDP`
81-
- LL`MNR
81+
- `LLMNR`
8282
- `mDNS`
8383
- `MNDP`
8484
- `MSSQL`

defender-endpoint/linux-whatsnew.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: List of major changes for Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
55
ms.author: ewalsh
66
author: emmwalshh
7-
ms.reviewer: kumasumit, gopkr
7+
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 04/08/2025
9+
ms.date: 04/18/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,9 +43,9 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46-
### April-2025 Build: 101.25022.0001 | Release version: 30.125022.0001.0
46+
### April-2025 Build: 101.25022.0002 | Release version: 30.125022.0001.0
4747

48-
|Build: |**101.25022.0001** |
48+
|Build: |**101.25022.0002** |
4949
|-------------------|----------------------|
5050
|Released: |**April 07, 2025** |
5151
|Published: |**April 07, 2025** |

0 commit comments

Comments
 (0)