Updates from: 11/10/2022 02:57:36
Category Microsoft Docs article Related commit history on GitHub Change details
compliance Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/alert-policies.md
The tables also indicate the Office 365 Enterprise and Office 365 US Government
|**Suspicious email forwarding activity**|Generates an alert when someone in your organization has autoforwarded email to a suspicious external account. This is an early warning for behavior that may indicate the account is compromised, but not severe enough to restrict the user. Although it's rare, an alert generated by this policy may be an anomaly. It's a good idea to [check whether the user account is compromised](../security/office-365-security/responding-to-a-compromised-email-account.md).|High|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**Suspicious email sending patterns detected**|Generates an alert when someone in your organization has sent suspicious email and is at risk of being restricted from sending email. This is an early warning for behavior that may indicate that the account is compromised, but not severe enough to restrict the user. Although it's rare, an alert generated by this policy may be an anomaly. However, it's a good idea to [check whether the user account is compromised](../security/office-365-security/responding-to-a-compromised-email-account.md).|Medium|Yes|E1/F1/G1, E3/F3/G3, or E5/G5| |**Tenant Allow/Block List entry is about to expire**|Generates an alert when a Tenant Allow/Block List entry is about to be removed. This event is triggered three days prior to expiration date, which is based when the entry was created or last updated. <br/><br/> For blocks, you can extend the expiration date to keep the block in place. For allows, you need to resubmit the item so that our analysts can take another look. However, if the allow has already been graded as a false positive, then the entry will only expire when the system filters have been updated to naturally allow the entry. For more information on events that trigger this alert, see [Manage the Tenant Allow/Block list](../security/office-365-security/tenant-allow-block-list.md).|Informational|No|E5/G5 or Defender for Office 365 P2 add-on subscription|
+|**Suspicious tenant sending patterns observed**|Generates an alert when Suspicious sending patterns have been observed in your organization, which may lead to your organization being blocked from sending emails. Investigate any potentially compromised user and admin accounts, new connectors, or open relays to avoid tenant exceed threshold blocks. For more information about why organizations are blocked, see [Fix email delivery issues for error code 5.7.7xx in Exchange Online](/Exchange/mail-flow-best-practices/non-delivery-reports-in-exchange-online/fix-error-code-5-7-700-through-5-7-750).|High|No|E1/F1/G1, E3/F3/G3, or E5/G5|
|**Tenant restricted from sending email**|Generates an alert when most of the email traffic from your organization has been detected as suspicious and Microsoft has restricted your organization from sending email. Investigate any potentially compromised user and admin accounts, new connectors, or open relays, and then contact Microsoft Support to unblock your organization. For more information about why organizations are blocked, see [Fix email delivery issues for error code 5.7.7xx in Exchange Online](/Exchange/mail-flow-best-practices/non-delivery-reports-in-exchange-online/fix-error-code-5-7-700-through-5-7-750).|High|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**Tenant restricted from sending unprovisioned email**|Generates an alert when too much email is being sent from unregistered domains (also known as _unprovisioned_ domains). Office 365 allows a reasonable amount of email from unregistered domains, but you should configure every domain that you use to send email as an accepted domain. This alert indicates that all users in the organization can no longer send email. For more information about why organizations are blocked, see [Fix email delivery issues for error code 5.7.7xx in Exchange Online](/Exchange/mail-flow-best-practices/non-delivery-reports-in-exchange-online/fix-error-code-5-7-700-through-5-7-750).|High|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**Unusual increase in email reported as phish**<sup>\*</sup>|Generates an alert when there's a significant increase in the number of people in your organization using the Report Message add-in in Outlook to report messages as phishing mail. For more information about this add-in, see [Use the Report Message add-in](https://support.office.com/article/b5caa9f1-cdf3-4443-af8c-ff724ea719d2).|Medium|No|E5/G5 or Defender for Office 365 P2 add-on subscription|
compliance Communication Compliance Investigate Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-investigate-remediate.md
No matter where you start to review alerts or the filtering you configure, the n
After reviewing the message basics, now you can open a message to examine the details and determine further remediation actions. Select a message to view the complete message header and body information. Several different options and views are available to help you decide the proper course of action: -- **Attachments**: This option allows you to examine modern attachments that match policy conditions. Modern attachments content is extracted as text and is viewable on the policy's **Pending** alerts tab. For more information, see the [Communication compliance feature reference](/microsoft-365/compliance/communication-compliance-channels).
+- **Sentiment**: Messages in alerts now include a sentiment evaluation to help investigators quickly prioritize potentially riskier messages to address first. Messages are flagged as *Positive*, *Negative*, or *Neutral* sentiment and are powered by [Azure Cognitive Service for Language](/azure/cognitive-services/language-service/overview). For some organizations, messages with *Positive* sentiment may be determined to be a lower priority, allowing reviewers to spend more time on other message alerts. The message sentiment is displayed in the **Sentiment column** and is enabled in the default view.
+- **Attachments**: This option allows you to examine Modern attachments that match policy conditions. Modern attachments content is extracted as text and is viewable on the Pending alerts dashboard for a policy. For more information, see the [Communication compliance feature reference](/microsoft-365/compliance/communication-compliance-channels).
- **Source**: This view is the standard message view commonly seen in most web-based messaging platforms. The header information is formatted in the normal style and the message body supports imbedded graphic files and word-wrapped text. If [optical character recognition (OCR)](/microsoft-365/compliance/communication-compliance-policies#optical-character-recognition-ocr) is enabled for the policy, images containing printed or handwritten text that match policy conditional are viewed as a child item for the associated message in this view. - **Plain text**: Text view that displays a line-numbered text-only view of the message and includes keyword highlighting in messages and attachments for sensitive info type terms, terms identified by built-in classifiers assigned to a policy, or for terms included in a dedicated keyword dictionary assigned to a policy. Keyword highlighting, which is currently available for English language only, can help direct you to the area of interest in long messages and attachments. In some cases, highlighted text might be only in attachments for messages matching policy conditions. Embedded files aren't displayed and the line numbering in this view is helpful for referencing pertinent details among multiple reviewers. - **Conversation**: Available for Microsoft Teams chat messages, this view displays up to five messages before and after an alert message to help reviewers view the activity in the conversational context. This context helps reviewers to quickly evaluate messages and make more informed message resolution decisions. Real-time message additions to conversations are displayed, including all inline images, emojis, and stickers available in Teams. Image or text file attachments to messages aren't displayed. Notifications are automatically displayed for messages that have been edited or for messages that have been deleted from the conversation window. When a message is resolved, the associated conversational messages aren't retained with the resolved message. Conversation messages are available for up to 60 days after the alert message is identified.
compliance Communication Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/communication-compliance-policies.md
The following table outlines the time to detection for supported content types:
For existing policies created before July 31, 2022 it may take up to 24 hours to detect messages and review alerts that match these policies. To reduce the latency for these policies, [copy the existing policy](/microsoft-365/compliance/communication-compliance-policies#copy-a-policy) and create a new policy from the copy. If you don't need to retain any data from the older policy, it can be paused or deleted.
-To identify an older policy, review *Last policy scan* column on the **Policy** page. Older policies will display a full date for the scan while policies created after July 31, 2022 will display *1 hour ago* for the scan. Another option to reduce latency is to wait until December 31, 2022 for your existing policies to be automatically migrated to the new detection criteria.
+To identify an older policy, review *Last policy scan* column on the **Policy** page. Older policies will display a full date for the scan while policies created after July 31, 2022 will display *1 hour ago* for the scan. Another option to reduce latency is to wait until February 28, 2023 for your existing policies to be automatically migrated to the new detection criteria.
## Storage limit notification (preview)
compliance Create Retention Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/create-retention-policies.md
When you've more than one retention policy, and when you also use retention labe
> [!NOTE] > Retention policies support [shared channels](/MicrosoftTeams/shared-channels). When you configure retention settings for the **Teams channel message** location, if a team has any shared channels, they inherit retention settings from their parent team. >
-> Retention policies also support newly created call data records, which are system-generated messages that contain [metadata for meetings and calls](/MicrosoftTeams/ediscovery-investigation#teams-metadata). However, call data records for private channel messages are included in the **Teams chats** location, instead of the **Teams private channel messages** location.
+> Retention policies also support newly created call data records, which are system-generated messages that contain [metadata for meetings and calls](/MicrosoftTeams/ediscovery-investigation#teams-metadata). All call data records are always included with the **Teams chats** location, even call data records for Teams channel messages and Teams private channel messages.
1. From the [Microsoft Purview compliance portal](https://compliance.microsoft.com/), select **Data lifecycle management** > **Microsoft 365** > **Retention Policies**.
For technical details about how retention works for Teams, including what elemen
- When you select **Edit** for the Teams chats location, you might see guests and non-mailbox users. Retention policies aren't designed for these users, so don't select them. -- To include newly created call data records for Teams private channel messages, you must select the **Teams chats** location, instead of the **Teams private channel messages** location.
+- To include newly created call data records for Teams channel messages and Teams private channel messages, you must select the **Teams chats** location, instead of the **Teams channel messages** and **Teams private channel messages** locations.
#### Additional retention policy needed to support Teams
compliance Export Documents From Review Set https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/export-documents-from-review-set.md
If you select this export option, the exported content is organized in the follo
- SharePoint: This folder contains all native content from SharePoint in a native file format. Redacted PDF files can't be included with this option.
+> [!NOTE]
+> The *Group* option selected in the review set determines which items are included in the content exported from the review set. If *None* is selected, the exported content only includes the selected or filtered items. If *Group by family* is selected, the exported content includes all items in the family.
+ ### Condensed directory structure - Summary.csv: Includes a summary of the content exported from the review set
compliance Identify A Hold On An Exchange Online Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/identify-a-hold-on-an-exchange-online-mailbox.md
After any type of hold is removed from a mailbox, a *delay hold* is applied. Thi
When a delay hold is placed on the mailbox (when either of the previous properties is set to **True**), the mailbox is still considered to be on hold for an unlimited hold duration, as if the mailbox was on Litigation Hold. After 30 days, the delay hold expires, and Microsoft 365 will automatically attempt to remove the delay hold (by setting the DelayHoldApplied or DelayReleaseHoldApplied property to **False**) so that the hold is removed. After either of these properties are set to **False**, the corresponding items that are marked for removal are purged the next time the mailbox is processed by the Managed Folder Assistant.
+> [!NOTE]
+> If the user account for the mailbox is disabled, the mailbox isn't processed by the Managed Folder Assistant and the delay hold remains after the 30 days have expired.
+ To view the values for the DelayHoldApplied and DelayReleaseHoldApplied properties for a mailbox, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). ```powershell
The Hold Tracking Mailbox Diagnostics logs maintain a history of the holds appli
$ht = Export-MailboxDiagnosticLogs <username> -ComponentName HoldTracking $ht.MailboxLog | Convertfrom-Json ```
+
+> [!NOTE]
+> Hold tracking logs aren't available if the user account has been disabled.
### Review the results of the Mailbox Diagnostics logs
compliance Insider Risk Management Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-activities.md
The **User activity report** for the selected user contains the **User activity*
## Alert dashboard
-Insider risk management alerts are automatically generated by risk indicators that are defined in insider risk management policies. These alerts give compliance analysts and investigators an all-up view of the current risk status and allow your organization to triage and take actions for discovered potential risks. By default, policies generate a certain amount of low, medium, and high severity alerts, but you can [increase or decrease the alert volume](insider-risk-management-settings.md#alert-volume) to suit your needs. Additionally, you can configure the [alert threshold for policy indicators](insider-risk-management-settings.md#indicator-level-settings-preview) when creating a new policy with the policy creation tool.
+Insider risk management alerts are automatically generated by risk indicators that are defined in insider risk management policies. These alerts give compliance analysts and investigators an all-up view of the current risk status and allow your organization to triage and take actions for discovered potential risks. By default, policies generate a certain amount of low, medium, and high severity alerts, but you can [increase or decrease the alert volume](insider-risk-management-settings.md#alert-volume) to suit your needs. Additionally, you can configure the [alert threshold for policy indicators](insider-risk-management-settings.md#indicator-level-settings) when creating a new policy with the policy creation tool.
Check out the [Insider Risk Management Alerts Triage Experience video](https://www.youtube.com/watch?v=KgmpxBLJLPI) for an overview of how alerts provide details, context, and related content for risky activity and how to make your investigation process more effective.
Reviewing, investigating, and acting on potentially risky insider alerts are imp
Becoming overwhelmed with the number of alerts produced by your insider risk management policies could be frustrating. The number of alerts can be quickly addressed with simple steps, depending on the types of alert volume you're receiving. You may be receiving too many valid alerts or have too many stale low-risk alerts. Consider taking the following actions: - **Adjust your insider risk policies**: Selecting and configuring the correct insider risk policy is the most basic method to address the type and volume of alerts. Starting with the appropriate [policy template](insider-risk-management-policies.md#policy-templates) helps focus the types of risk activities and alerts you'll see. Other factors that may impact alert volume are the size of the in-scope user and groups and the content and [channels that are prioritized](insider-risk-management-policies.md#prioritize-content-in-policies). Consider adjusting policies to refine these areas to what is most important for your organization.-- **Modify your insider risk settings**: Insider risk settings include a wide variety of configuration options that can impact the volume and types of alerts you'll receive. These include settings for [policy indicators](insider-risk-management-settings.md#indicators), [indicator thresholds](insider-risk-management-settings.md#indicator-level-settings-preview), and [policy timeframes](insider-risk-management-settings.md#policy-timeframes). Consider configuring [intelligent detections](insider-risk-management-settings.md#intelligent-detections) options to exclude specific file types and sensitive info types, trainable classifiers, define minimum thresholds before activity alerts are reported by your policies, and change the alert volume configuration to a lower setting.
+- **Modify your insider risk settings**: Insider risk settings include a wide variety of configuration options that can impact the volume and types of alerts you'll receive. These include settings for [policy indicators](insider-risk-management-settings.md#indicators), [indicator thresholds](insider-risk-management-settings.md#indicator-level-settings), and [policy timeframes](insider-risk-management-settings.md#policy-timeframes). Consider configuring [intelligent detections](insider-risk-management-settings.md#intelligent-detections) options to exclude specific file types and sensitive info types, trainable classifiers, define minimum thresholds before activity alerts are reported by your policies, and change the alert volume configuration to a lower setting.
- **Enable inline alert customization (preview)**: Enabling [inline alert customization](/microsoft-365/compliance/insider-risk-management-settings#inline-alert-customization-preview) allows analysts and investigators to quickly edit policies when reviewing alerts. They can update thresholds for activity detection with Microsoft recommendations, configure custom thresholds, or choose to ignore the type of activity that created the alert. If this is not enabled, then only users assigned to the *Insider Risk Management* role group can use inline alert customization. - **Bulk deletion of alerts where applicable**: It may help save triage time for your analysts and investigators to immediately [dismiss multiple alerts](insider-risk-management-activities.md#dismiss-multiple-alerts-preview) at once. You can select up to 400 alerts to dismiss at one time.
Modern workplace users often have a wide variety of responsibilities and demands
- **Focus analyst and investigator efforts on the highest risk alerts first**. Depending on your policies, you may be capturing user activities and generating alerts with varying degrees of potential impact to your risk mitigation efforts. [Filter alerts](insider-risk-management-activities.md#filter-alerts-on-the-alert-dashboard) by severity and prioritize *High severity* alerts. - **Assign users as analysts and investigators**. Having the right user assigned to the proper roles is an important part of the insider risk alert review process. Make sure you've assigned the appropriate users to the *Insider Risk Management Analysts* and *Insider Risk Management Investigators* role groups. -- **Use automated insider risk features to help discover the highest risk activities**. Insider risk management [sequence detection](insider-risk-management-policies.md#sequence-detection-preview) and [cumulative exfiltration detection](insider-risk-management-policies.md#cumulative-exfiltration-detection-preview) features can help you quickly discover harder to find risks in your organization. Consider fine-tuning your [risk score boosters](insider-risk-management-settings.md#indicators), [file activity detection](insider-risk-management-settings.md#file-activity-detection), [domains](insider-risk-management-settings.md#domains), and the minimum [indicator threshold settings](insider-risk-management-settings.md#indicator-level-settings-preview) for your policies.
+- **Use automated insider risk features to help discover the highest risk activities**. Insider risk management [sequence detection](insider-risk-management-policies.md#sequence-detection-preview) and [cumulative exfiltration detection](insider-risk-management-policies.md#cumulative-exfiltration-detection-preview) features can help you quickly discover harder to find risks in your organization. Consider fine-tuning your [risk score boosters](insider-risk-management-settings.md#indicators), [file activity detection](insider-risk-management-settings.md#file-activity-detection), [domains](insider-risk-management-settings.md#domains), and the minimum [indicator threshold settings](insider-risk-management-settings.md#indicator-level-settings) for your policies.
compliance Insider Risk Management Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings.md
Insider risk management settings apply to all insider risk management policies,
- [Microsoft Teams (preview)](#microsoft-teams-preview) - [Analytics](#analytics) - [Admin notifications](#admin-notifications)
+- [Inline alert customization](#inline-alert-customization)
Before you get started and create insider risk management policies, it's important to understand these settings and choose setting levels best for the compliance needs for your organization.
Once done and endpoint is onboarded, it should be visible under the **Devices**
macOS devices (Catalina 10.15 or later) can be onboarded into Microsoft 365 to support insider risk management policies using either Intune or JAMF Pro. For more information and configuration guidance, see [Onboard macOS devices into Microsoft 365 overview (preview)](device-onboarding-macos-overview.md).
-### Indicator level settings (preview)
+### Indicator level settings
When creating a policy using the policy wizard, you can configure how the daily number of risk events should influence the risk score for insider risk alerts. These indicator settings help you control how the number of occurrences of risk events in your organization should affect the risk score, and so the associated alert severity, for these events. If you prefer, you can also choose to keep the default event threshold levels recommended by Microsoft for all enabled indicators.
To delete a standalone keyword to exclude, complete the following steps:
Insider risk management alert information is exportable to security information and event management (SIEM) and security orchestration automated response (SOAR) solutions by using the [Office 365 Management Activity API schema](/office/office-365-management-api/office-365-management-activity-api-schema#security-and-compliance-alerts-schema). You can use the Office 365 Management Activity APIs to export alert information to other applications your organization may use to manage or aggregate insider risk information. Alert information is exported and available every 60 minutes via the Office 365 Management Activity APIs.
-If your organization uses Microsoft Sentinel, you can also use the out-of-the-box insider risk management data connector to import insider risk alert information to Sentinel. For more information, see [Insider Risk Management (IRM) (Preview)](/azure/sentinel/data-connectors-reference#microsoft-365-insider-risk-management-irm-preview) in the Microsoft Sentinel article.
+If your organization uses Microsoft Sentinel, you can also use the out-of-the-box insider risk management data connector to import insider risk alert information to Sentinel. For more information, see [Insider Risk Management (IRM) (preview)](/azure/sentinel/data-connectors-reference#microsoft-365-insider-risk-management-irm-preview) in the Microsoft Sentinel article.
> [!IMPORTANT] > To maintain referential integrity for users who have insider risk alerts or cases in Microsoft 365 or other systems, anonymization of usernames isn't preserved for exported alerts. Exported alerts will display usernames for each alert.
If you prefer to disable admin and analytics notifications, complete the followi
- **Send an email notification when Analytics is turned off** 4. Select **Save** to configure and exit.
+
+![Insider risk management priority admin notifications.](../media/insider-risk-settings-admin-notifications.png)
-## Inline alert customization (preview)
+## Inline alert customization
Inline alert customization allows you to quickly tune an insider risk management policy directly from the **Alert dashboard** while reviewing the alert. Alerts are generated when a risk management activity meets the thresholds configured in the related policy. To reduce the number of alerts you get from this type of activity, you can change the thresholds or remove the risk management activity from the policy altogether.
You can enable inline alert customization to allow users assigned to the *Inside
Complete the following steps to enable inline alert customization: 1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com), go to **Insider risk management** > **Insider risk settings**.
-2. Select the **Inline alert customization (preview)** page.
+2. Select the **Inline alert customization** page.
3. Enable inline alert customization for insider risk management. 4. Select **Save** to configure and exit.
After choosing an option, analysts and investigators can choose two options to u
- **Save and dismiss alert**: Saves the changes to the policy and updates the alert status to *Resolved*. - **Save only**: Saves the changes to the policy, but the alert status remains the same.+
+![Insider risk management priority inline alerts.](../media/insider-risk-settings-inline-alerts.png)
compliance Retention Policies Sharepoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/retention-policies-sharepoint.md
Because the retention label is not applied to the original file, the labeled fil
The copy that's stored in the Preservation Hold library is typically created within an hour from the cloud attachment being shared.
-To safeguard against the original file being deleted by users before the copy can be created and labeled, files in locations included in the auto-labeling policy are automatically copied into the Preservation Hold library if they are deleted. These files have a temporary retention period of one day and then follow the standard cleanup process described on this page. When the original file has been deleted, the copy for retaining cloud attachments uses this version of the file. The automatic and temporary retention of deleted files in the Preservation Hold library is unique to auto-labeling policies for cloud attachments.
+To safeguard against the original file being deleted or moved by users before the copy can be created and labeled, files in locations included in the auto-labeling policy are automatically copied into the Preservation Hold library if they are deleted or moved. These files have a temporary retention period of one day and then follow the standard cleanup process described on this page. When the original file has been deleted or moved, the copy for retaining cloud attachments uses this version of the file. The automatic and temporary retention of deleted or moved files in the Preservation Hold library is unique to auto-labeling policies for cloud attachments.
## How retention works with OneNote content
enterprise M365 Dr Product Terms Dr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/m365-dr-product-terms-dr.md
Microsoft Privacy and Security product terms included with Microsoft's Cloud product terms provides data residency commitment with the following scope:
-1. Online
+1. Online
2. Commitments period: The length of the customers contract with Microsoft. Typically, this is 1-3 years. 3. Country/regions included: Local Geographies, United States and the European Union.
enterprise Microsoft 365 Oab Size Limit Service Advisory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-oab-size-limit-service-advisory.md
+
+ Title: "Service advisories for OAB size limits in Exchange Online monitoring"
+++ Last updated :
+audience: Admin
++
+ms.localizationpriority: medium
+search.appverid:
+- MET150
+
+- scotvorg
+- Ent_O365
+- Strat_O365_Enterprise
+
+- admindeeplinkMAC
+- admindeeplinkEXCHANGE
+f1.keywords:
+- NOCSH
+description: "Learn about service advisories for OAB size limits in Exchange Online monitoring."
++
+# Service advisories for OAB size limits
+
+This alert informs you when your Offline Address Book has reached the size limit outlined in the [Address Book
+Limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#address-book-limits)
+within the [Exchange Online limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#address-book-limits).
+
+These alerts are displayed in the Microsoft 365 admin center. To view these alerts, navigate to **Health** \> **Service Health** \> **Exchange Online** and finally, the **Active Issues** tab. This alert will be listed as "Offline Address Book."
+
+## What Do These Service Alerts Indicate?
+
+This service alert informs you that the maximum size of a single Offline Address Book within your tenant has exceeded 1 GB. If you receive this alert, we ask that you review any recent changes made to the Offline Address Book(s) in your environment. Your users may observe missing or incomplete data if the size issue isn't corrected.
+
+## More information
+
+For more information about Offline Address Books, see the following articles:
+
+- [Offline address books in Exchange Online \| Microsoft Docs](/exchange/address-books/offline-address-books/offline-address-books)
+- [Exchange Online limits - Address Book Limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#address-book-limits)
enterprise Modern Desktop Deployment And Management Lab https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md
The Windows and Office 365 deployment lab kits are designed to help you plan, te
|Windows 10 Lab|Windows 11 Lab| |||
-|[Windows 10 lab environment](https://download.microsoft.com/download/b/7/6/b7696d5b-940e-4af6-ba8b-32cfa3532e6e/Windows10_21H2_2022-10-19.zip)|[Windows 11 lab environment](https://download.microsoft.com/download/a/1/0/a10d1f67-b499-4c2f-8db1-79d29cd98b05/Windows11_21H1_2022-10-18.zip)|
+|[Windows 10 lab environment](https://download.microsoft.com/download/b/7/6/b7696d5b-940e-4af6-ba8b-32cfa3532e6e/Win10_21H2.zip)|[Windows 11 lab environment](https://download.microsoft.com/download/a/1/0/a10d1f67-b499-4c2f-8db1-79d29cd98b05/Windows11_21H1_2022-10-18.zip)|
|[Windows 10 lab guides](https://download.microsoft.com/download/5/c/e/5cee2d36-da83-45b5-8ce5-5c478c343620/Win10_21H2_guides.zip)|[Windows 11 lab guides](https://download.microsoft.com/download/a/1/0/a10d1f67-b499-4c2f-8db1-79d29cd98b05/Win11_Lab_Guides_10.18.zip)| ## A complete lab environment
security Trial Playbook Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/trial-playbook-defender-business.md
Security policies to review and configure include:
## Start using Defender for Business
-For the next 30 days, hereΓÇÖs guidance from the product team on key features to try:
+For the next 30 days, here's guidance from the product team on key features to try:
1. [Use your Microsoft Defender Vulnerability Management dashboard](#1-use-the-defender-vulnerability-management-dashboard).
security TOC https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md
##### [Stream advanced hunting events to your storage account](raw-data-export-storage.md) #### [SIEM integration]()
-##### [Integrate SIEM tools with Microsoft Defender for Endpoint](configure-siem.md)
+##### [Migrate from the MDE SIEM API to the Microsoft 365 Defender alerts API](configure-siem.md)
##### [Troubleshoot SIEM tool integration issues](troubleshoot-siem.md) #### [Partners & APIs]()
security Android Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-whatsnew.md
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
> If users can't access the play store, the app can be updated through the company portal. ## Microsoft Defender for Endpoint on Company-owned personally enabled devices
-MDE is now generally available on AE COPE devices. Enterprises can onboard devices on COPE mode and push MDE to userΓÇÖs devices through the [Microsoft Endpoint Manager Admin center](https://endpoint.microsoft.com). With this support, Android Enterprise COPE devices will get the full capabilities of our offering on Android including phishing and web protection, malware scanning, Network protection (preview) and additional breach prevention through integration with Microsoft Endpoint Manager and Conditional Access. Read the announcement [here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-is-now-available-on-android/ba-p/3626100).
+MDE is now generally available on AE COPE devices. Enterprises can onboard devices on COPE mode and push MDE to user's devices through the [Microsoft Endpoint Manager Admin center](https://endpoint.microsoft.com). With this support, Android Enterprise COPE devices will get the full capabilities of our offering on Android including phishing and web protection, malware scanning, Network protection (preview) and additional breach prevention through integration with Microsoft Endpoint Manager and Conditional Access. Read the announcement [here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-is-now-available-on-android/ba-p/3626100).
## Privacy Controls
security Attack Surface Reduction Rules Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md
For the easiest method to enable the standard protection rules, see: [Simplified
| Block Win32 API calls from Office macros | | Yes | | Use advanced protection against ransomware | | Yes |
+## Microsoft Defender Antivirus exclusions and ASR rules
+
+Microsoft Defender Antivirus exclusions apply to some Microsoft Defender for Endpoint capabilities, such as some of the attack surface reduction (ASR) rules.
+
+Following is a list of ASR rules that honor Microsoft Defender Antivirus exclusions:
+
+|exclusion name | ASR rules name |
+|:|:|
+| BlockAdobeCreateProcessRule | [Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) |
+| BlockKnownRemotingToolCreateProcessRule | [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) |
+| BlockLsassCredentialTheft | [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) |
+| BlockOfficeCreateProcessRule | [Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) |
+| BlockOfficeInjectionRule | [Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) |
+| BlockOutlookCreateProcessRule | [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) |
+ ## ASR rules supported operating systems The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
security Attack Surface Reduction Rules Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-report.md
ms.pagetype: security ms.localizationpriority: medium audience: ITPro--++
Last updated 08/25/2022
search.appverid: met150
+<!-- v-jweston/jweston-1 is scheduled to resume authorship Apr/May 2023.-->
+ # Attack surface reduction (ASR) rules report **Applies to:**
To access the **Attack surface reduction rules report** in the Microsoft 365 Sec
| Permission type | Permission | Permission display name | |:|:|:|
-| Application | Machine.Read.All | ΓÇÿRead all machine profilesΓÇÖ |
-|Delegated (work or school account) | Machine.Read | ΓÇÿRead machine informationΓÇÖ |
+| Application | Machine.Read.All | 'Read all machine profiles' |
+|Delegated (work or school account) | Machine.Read | 'Read machine information' |
To assign these permissions:
Clicking on the **ASR rules detections** link at the top of the card also opens
**The top section** focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
-**The bottom section** surfaces six rules based on the number of unprotected devices per rule. The ΓÇ£View configurationΓÇ¥ button surfaces all configuration details for all ASR rules. The ΓÇ£Add exclusionΓÇ¥ button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Endpoint Manager (MEM).
+**The bottom section** surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Endpoint Manager (MEM).
Provides two 'action' buttons:
For more information about ASR rule audit and block modes, see [Attack surface r
#### Actionable flyout
-The ΓÇ£DetectionΓÇ¥ main page has a list of all detections (files/processes) in the last 30 days. Select on any of the detections to open with drill-down capabilities.
+The "Detection" main page has a list of all detections (files/processes) in the last 30 days. Select on any of the detections to open with drill-down capabilities.
>:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-flyout.png" alt-text="Shows the ASR rules report main detections tab flyout" lightbox="images/attack-surface-reduction-rules-report-main-detections-flyout.png":::
security Configure Extension File Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md
You can define exclusions for Microsoft Defender Antivirus that apply to [schedu
- [Exclusions for files that are opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) > [!IMPORTANT]
-> Microsoft Defender Antivirus exclusions don't apply to other Microsoft Defender for Endpoint capabilities, such as [attack surface reduction (ASR) rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md). Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections.
+> Microsoft Defender Antivirus exclusions do apply to some Microsoft Defender for Endpoint capabilities, such as [attack surface reduction (ASR) rules](attack-surface-reduction.md). Some Microsoft Defender Antivirus exclusions are applicable to some ASR rule exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
+> Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections.
> To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](manage-indicators.md). ## Before you begin
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-microsoft-threat-experts.md
You can filter your incidents and alerts if you want to only see the Endpoint At
This is available as a subscription service. If you're already a Defender for Endpoint customer, you can contact your Microsoft representative to subscribe to Microsoft Defender Experts - Experts on Demand. > [!NOTE]
-> Experts on Demand is not a security incident response service. ItΓÇÖs intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
+> Experts on Demand is not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
## Ask Defender Experts about suspicious cybersecurity activities in your organization
security Configure Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-siem.md
Title: Integrate your SIEM tools with Microsoft Defender for Endpoint
+ Title: Migrate from the MDE SIEM API to the Microsoft 365 Defender alerts API
description: Learn how to ingest incidents and alerts, and integrate SIEM tools. keywords: configure siem, security information and events management tools, splunk, arcsight, custom indicators, rest api, alert definitions, indicators of compromise search.appverid: met150
-# Integrate your SIEM tools with Microsoft Defender for Endpoint
+# Migrate from the MDE SIEM API to the Microsoft 365 Defender alerts API
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
For more information, see:
> [!IMPORTANT] > In February we announced the [Deprecation of the Microsoft Defender for Endpoint (MDE) SIEM API would be postponed](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/deprecating-the-legacy-siem-api-postponed/ba-p/3139643).
-After gathering customer feedback, we have learned there are challenges with the timeline originally communicated. As a result, we are making changes to our timeline to improve our customersΓÇÖ experience in migrating to the new API.
+After gathering customer feedback, we have learned there are challenges with the timeline originally communicated. As a result, we are making changes to our timeline to improve our customers' experience in migrating to the new API.
The new Microsoft 365 Defender alerts API, released to public preview in MS Graph, is the official and recommended API for customers migrating from the SIEM API. This API will enable customers to work with alerts across all Microsoft 365 Defender products using a single integration. We expect the new API to reach general availability (GA) by Q1 CY 2023.
-To provide customers with more time to plan and prepare their migration to the new Microsoft 365 Defender APIs, we have pushed the SIEM API deprecation date to December 31, 2023. This will give customers one year from the expected GA release of Microsoft 365 Defender APIs to migrate from the SIEM API. At the time of deprecation, the SIEM API will be declared ΓÇ£deprecatedΓÇ¥ but not ΓÇ£retired.ΓÇ¥ This means that until this date, the SIEM API will continue to function for existing customers. After the deprecation date, the SIEM API will continue to be available, however it will only be supported for security-related fixes.
+To provide customers with more time to plan and prepare their migration to the new Microsoft 365 Defender APIs, we have pushed the SIEM API deprecation date to December 31, 2023. This will give customers one year from the expected GA release of Microsoft 365 Defender APIs to migrate from the SIEM API. At the time of deprecation, the SIEM API will be declared "deprecated" but not "retired." This means that until this date, the SIEM API will continue to function for existing customers. After the deprecation date, the SIEM API will continue to be available, however it will only be supported for security-related fixes.
Effective December 31st, 2024, three years after the original deprecation announcement, we reserve the right to turn off the SIEM API, without additional notice. For additional information about the new APIs see the blog announcement: [The new Microsoft 365 Defender APIs in Microsoft Graph are now available in public preview!](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/the-new-microsoft-365-defender-apis-in-microsoft-graph-are-now/ba-p/3603099)
API documentation: [Use the Microsoft Graph security API - Microsoft Graph beta]
If you are a customer using the SIEM API, we strongly recommend planning and executing the migration. Listed below is information about the options available to migrate to a supported capability:
-1. [Pulling MDE alerts into an external system](#pulling-defender-for-endpoint-alerts into-an-external-system) (SIEM/SOAR)
+1. [Pulling MDE alerts into an external system](#pulling-defender-for-endpoint-alerts-into-an-external-system) (SIEM/SOAR)
1. [Calling the Microsoft 365 Defender alerts API directly](#calling-the-microsoft-365-defender-alerts-api-directly) Read about the new Microsoft 365 Defender [alerts and incidents API](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/the-new-microsoft-365-defender-apis-in-microsoft-graph-are-now/ba-p/3603099#:~:text=Incidents%3A%20Contain%20incident%20metadata%20and%20a%20collection%20of,richer%20and%20actionable%20information%20for%20your%20automation%20flows.)
Read about the new Microsoft 365 Defender [alerts and incidents API](https://tec
If you are pulling Defender for Endpoint alerts into an external system, there are various supported options to give organizations the flexibility to work with the solution of their choice:
-1. **Microsoft Sentinel** is a scalable, cloud-native, SIEM and Security orchestration, automation, and response (SOAR) solution. Delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response. The Microsoft 365 Defender connector allows customers to easily pull in all their incidents and alerts from all Microsoft 365
+1. **Microsoft Sentinel** is a scalable, cloud-native, SIEM and Security orchestration, automation, and response (SOAR) solution. Delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response. The Microsoft 365 Defender connector allows customers to easily pull in all their incidents and alerts from all Microsoft 365 Defender products. To learn more about the integration, see [Microsoft 365 Defender integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).
1. **IBM Security QRadar** SIEM provides centralized visibility and intelligent security analytics to identify and prevent threats and vulnerabilities from disrupting business operations. [QRadar SIEM team has just announced the release of a new DSM](https://community.ibm.com/community/user/security/blogs/gaurav-sharma/2022/10/18/ibm-qradar-and-microsoft-defender) that is integrated with the new Microsoft 365 Defender alerts API to pull in Microsoft Defender for Endpoint alerts. New customers are welcome to take advantage of the new DSM upon release. Learn more about the new DSM and how to easily migrate to it at [Microsoft 365 Defender - IBM Documentation](https://www.ibm.com/docs/en/dsm?topic=microsoft-365-defender). 1. **Splunk SOAR** helps customers orchestrate workflows and automate tasks in seconds to work smarter and respond faster. Spunk SOAR is integrated with the new Microsoft 365 Defender APIs, including the alerts API. For more information, see [Microsoft 365 Defender | Splunkbase](https://splunkbase.splunk.com/app/6563)
-1. **Defender products** To learn more about the integration, see [Microsoft 365 Defender integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).
Additional integrations are listed in [Technological partners of Microsoft 365 Defender](technological-partners.md), or contact your SIEM / SOAR provider to learn about integrations they may provide. ### Calling the Microsoft 365 Defender alerts API directly
-#### Migrate to the new Microsoft 365 Defender alerts API
- The below table provides a mapping between the SIEM API to the Microsoft 365 Defender alerts API: | SIEM API property | Mapping | Microsoft 365 Defender alert API property |
security Defender Endpoint Demonstration Potentially Unwanted Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications.md
The Potentially Unwanted Applications (PUA) protection feature in Microsoft Defe
## Scenario 1. Go to [http://www.amtso.org/feature-settings-check-potentially-unwanted-applications/](http://www.amtso.org/feature-settings-check-potentially-unwanted-applications/)
-2. Click "Download the Potentially Unwanted Application ΓÇÿtestΓÇÖ file" link
+2. Click "Download the Potentially Unwanted Application 'test' file" link
3. After downloading the file, it is automatically blocked and prevented from running. ## See also
security Deploy Manage Removable Storage Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deploy-manage-removable-storage-intune.md
Title: Deploy and manage Removable Storage Access Control using Intune
-description: Use Intune OMA-URI and Intune user interface to deploy and manage removable storage access control.
+description: Use Intune OMA-URI and Intune user interface to deploy and manage removable storage access control.
ms.mktglfcycl: deploy
ms.localizationpriority: medium audience: ITPro-+ - m365-security - tier2
Go to Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>
You can set the default access (Deny or Allow) for all Device Control features (`RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, `PrinterDevices`).
- To block a specific removable storage class but allow specific media, you can use ΓÇÿ`IncludedIdList` a group through `PrimaryId` and `ExcludedIDList` a group through `DeviceId`/`HardwareId`/etc.ΓÇÖ For additional details, see [Microsoft Defender for Endpoint Device Control Removable Storage Access Control](device-control-removable-storage-access-control.md).
+ To block a specific removable storage class but allow specific media, you can use '`IncludedIdList` a group through `PrimaryId` and `ExcludedIDList` a group through `DeviceId`/`HardwareId`/etc.' For additional details, see [Microsoft Defender for Endpoint Device Control Removable Storage Access Control](device-control-removable-storage-access-control.md).
For example, you can have either a **Deny** or an **Allow** policy for `RemovableMediaDevices`, but not for `CdRomDevices` or `WpdDevices`. You can set **Default Deny** through this policy, then Read/Write/Execute access to `CdRomDevices` or `WpdDevices` will be blocked. If you only want to manage storage, make sure to create an **Allow** policy for your printer; otherwise, this default enforcement will be applied to printers as well.
Go to Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>
:::image type="content" source="images/any-removable-storage-group.png" alt-text="Screenshot of creating any Removable Storage Group." lightbox="images/any-removable-storage-group.png":::
-> [!NOTE]
-> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
+ > [!NOTE]
+ > Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
4. Create one XML file for each access control or policy rule:
Go to Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>
:::image type="content" source="images/allow-read-activity.png" alt-text="Screenshot of Allow Read Activity policy" lightbox= "images/allow-read-activity.png":::
-> [!NOTE]
-> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
+ > [!NOTE]
+ > Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
5. Set location for a copy of the file (evidence):
-
+ If you want to have a copy of the file (evidence) when Write access happens, set right **Options** in your removable storage access policy rule in the XML file, and then specify the location where system can save the copy. - In the **Add Row** pane, enter:
For this scenario, you need to create two groups - one group for any removable s
:::image type="content" source="media/188234308-4db09787-b14e-446a-b9e0-93c99b08748f.png" alt-text="A screenshot showing removable storage" lightbox= "media/188234308-4db09787-b14e-446a-b9e0-93c99b08748f.png":::
- Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
+ Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
2. Group 2: Approved USBs based on device properties.
- :::image type="content" source="media/188234372-526d20b3-cfea-4f1d-8d63-b513497ada52.png" alt-text="A screenshot of approved USBs" lightbox= "media/188234372-526d20b3-cfea-4f1d-8d63-b513497ada52.png":::
+ :::image type="content" source="media/188234372-526d20b3-cfea-4f1d-8d63-b513497ada52.png" alt-text="A screenshot of approved USBs" lightbox= "media/188234372-526d20b3-cfea-4f1d-8d63-b513497ada52.png":::
Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Approved%20USBs%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
For this scenario, you need to create two groups - one group for any removable s
1. Policy 1: Block Write and Execute access for any removable storage group but allow approved USBs.
- :::image type="content" source="media/188243425-c0772ed4-6537-4c6a-9a1d-1dbb48018578.png" alt-text="A screenshot of policy 1" lightbox= "media/188243425-c0772ed4-6537-4c6a-9a1d-1dbb48018578.png":::
+ :::image type="content" source="media/188243425-c0772ed4-6537-4c6a-9a1d-1dbb48018578.png" alt-text="A screenshot of policy 1" lightbox= "media/188243425-c0772ed4-6537-4c6a-9a1d-1dbb48018578.png":::
- Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Scenario%201%20Block%20Write%20and%20Execute%20Access%20but%20allow%20approved%20USBs.xml). See step 4 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
+ Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Scenario%201%20Block%20Write%20and%20Execute%20Access%20but%20allow%20approved%20USBs.xml). See step 4 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
2. Policy 2: Audit Write and Execute access for allowed USBs.
For this scenario, you need to create two groups - one group for any removable s
1. Group 1: Any removable storage, CD/DVD, and Windows portable devices.
- :::image type="content" source="media/188234308-4db09787-b14e-446a-b9e0-93c99b08748f.png" alt-text="A screenshot of group 1" lightbox="media/188234308-4db09787-b14e-446a-b9e0-93c99b08748f.png":::
-
- Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
+ :::image type="content" source="media/188234308-4db09787-b14e-446a-b9e0-93c99b08748f.png" alt-text="A screenshot of group 1" lightbox="media/188234308-4db09787-b14e-446a-b9e0-93c99b08748f.png":::
+
+ Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
2. Group 2: Unapproved USBs based on device properties. :::image type="content" source="media/188243875-0693ebcf-00c3-45bd-afd3-57a79df9dce6.png" alt-text="A screenshot of group 2" lightbox= "media/188243875-0693ebcf-00c3-45bd-afd3-57a79df9dce6.png":::
-
- Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Unapproved%20USBs%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
+ Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Unapproved%20USBs%20Group.xml). See step 3 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
> [!TIP] > Replace `&` with `&amp;` in the value in the XML file.
For this scenario, you need to create two groups - one group for any removable s
1. Policy 1: Block Write and Execute access for all but block specific unapproved USBs. :::image type="content" source="media/188244024-62355ded-353c-4d3a-ba61-4520d48f5a18.png" alt-text="A screenshot of policy for blocking unapproved USBs" lightbox= "media/188244024-62355ded-353c-4d3a-ba61-4520d48f5a18.png":::
-
- Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Scenario%202%20Audit%20Write%20and%20Execute%20access%20to%20all%20but%20block%20specific%20unapproved%20USBs.xml). See step 4 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
+
+ Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Scenario%202%20Audit%20Write%20and%20Execute%20access%20to%20all%20but%20block%20specific%20unapproved%20USBs.xml). See step 4 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration.
2. Policy 2: Audit Write and Execute access for others.
- :::image type="content" source="media/188244203-36c869b6-9330-4e2a-854b-494c342bb77d.png" alt-text="A screenshot of audit write and execute access" lightbox= "media/188244203-36c869b6-9330-4e2a-854b-494c342bb77d.png":::
-
+ :::image type="content" source="media/188244203-36c869b6-9330-4e2a-854b-494c342bb77d.png" alt-text="A screenshot of audit write and execute access" lightbox= "media/188244203-36c869b6-9330-4e2a-854b-494c342bb77d.png":::
+ What does '54' mean in the policy? It's 18 + 36 = 54: - Write access: disk level 2 + file system level 16 = 18. - Execute: disk level 4 + file system level 32 = 36.
-
+ Here is the [sample file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Scenario%202%20Audit%20Write%20and%20Execute%20access%20to%20others.xml). See step 4 from the [Deploy Removable Storage Access Control](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri) section to deploy the configuration. ## Use Intune user interface
-This capability is available in the Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>).
+This capability is available in the Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>).
Go to **Endpoint Security** > **Attack Surface Reduction** > **Create Policy**. Choose **Platform: Windows 10 and later** with **Profile: Device Control**.
security Device Control Removable Storage Access Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control.md
The Removable Storage Access Control includes Removable storage group creation a
- Removable storage group allows you to create group. For example, authorized USB group or encrypted USB group. - Access policy rule allows you to create policy to restrict each removable storage group. For example, only allow authorized user to Write access-authorized USB group.-- To block a specific removable storage class but allow specific media, you can use ΓÇÿ`IncludedIdList` a group through `PrimaryId` and `ExcludedIDList` a group through `DeviceId`\/`HardwareId`/etc.` For additional guidance, see [Deploy Removable Storage Access Control by using Intune OMA-URI](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri).
+- To block a specific removable storage class but allow specific media, you can use '`IncludedIdList` a group through `PrimaryId` and `ExcludedIDList` a group through `DeviceId`\/`HardwareId`/etc.` For additional guidance, see [Deploy Removable Storage Access Control by using Intune OMA-URI](deploy-manage-removable-storage-intune.md#deploy-removable-storage-access-control-by-using-intune-oma-uri).
Here are the properties you can use when you create the group and policy XML files.
security Device Health Api Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-api-methods-properties.md
Method|Data type|Description
| avIsEngineUpToDate | String | Up-to-date status of AV engine | "True", "False", "Unknown" | | avIsPlatformUpToDate | String | Up-to-date status of AV platform | "True", "False", "Unknown" | | avIsSignatureUpToDate | String | Up-to-date status of AV signature | "True", "False", "Unknown" |
-| avMode | String | Antivirus mode. | Each mode will be a string typed integer value ranging from 0 to 5. Refer to the mapping below to see its valueΓÇÖs meaning: <ul><li>'' = Other</li><li> '0' = Active</li><li> '1' = Passive</li><li> '2' = Disabled</li><li> '3' = Other</li><li> '4' = EDRBlocked</li><li>'5' = PassiveAudit</li></ul> |
+| avMode | String | Antivirus mode. | Each mode will be a string typed integer value ranging from 0 to 5. Refer to the mapping below to see its value's meaning: <ul><li>'' = Other</li><li> '0' = Active</li><li> '1' = Passive</li><li> '2' = Disabled</li><li> '3' = Other</li><li> '4' = EDRBlocked</li><li>'5' = PassiveAudit</li></ul> |
| avPlatformUpdateTime | DateTimeOffset | Datetime when AV platform was last updated on device | "2022-08-04T12:44:02Z" | | avPlatformVersion | String | Antivirus platform version | "4.18.2203.5" | | avSignaturePublishTime | DateTimeOffset | Datetime when AV security intelligence build was released | "2022-08-04T12:44:02Z" |
security Device Health Sensor Health Os https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-sensor-health-os.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security--++ localization_priority: Normal Last updated 09/06/2022
+<!-- v-jweston/jweston-1 is scheduled to resume authorship Apr/May 2023.-->
+ # Device health, Sensor health & OS report **Applies to:**
_OS systems and platforms_ can give useful insights into whether devices in your
For example, Secure Boot (introduced in Windows 8) practically eliminated the threat from some of the most harmful types of malware. Improvements in Windows 10 provide PC manufacturers the option to prevent users from disabling Secure Boot. Preventing users from disabling Secure Boot removes almost any chance of malicious rootkits or other low-level malware from infecting the boot process.
-Ideally, the ΓÇ£Current stateΓÇ¥ graph shows that the number of operating systems is weighted in favor of more current OS over older versions. Otherwise, the trends graph indicates that new systems are being adopted and/or older systems are being updated or replaced.
+Ideally, the "Current state" graph shows that the number of operating systems is weighted in favor of more current OS over older versions. Otherwise, the trends graph indicates that new systems are being adopted and/or older systems are being updated or replaced.
### Windows versions card
security Endpoint Attack Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/endpoint-attack-notifications.md
If you're a Microsoft Defender for Endpoint customer, you can apply for Endpoint
![How to enable Endpoint Attack Notifications in 365 Defender Portal](../../media/defender-endpoint/enable-endpoint-attack-notifications.png) ## Receive Endpoint Attack notifications
-Endpoint Attack Notifications are alerts that have been hand crafted by MicrosoftΓÇÖs managed hunting service based on suspicious activity in your environment. They can be viewed through several mediums:
+Endpoint Attack Notifications are alerts that have been hand crafted by Microsoft's managed hunting service based on suspicious activity in your environment. They can be viewed through several mediums:
- The alerts queue in the Microsoft 365 Defender portal - Using the [API](../../security/defender-endpoint/get-alerts.md) - [DeviceAlertEvents](../../security/defender-endpoint/advanced-hunting-devicealertevents-table.md) table in Advanced hunting
security Event Error Codes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/event-error-codes.md
search.appverid: met150
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:**-- Event Viewer+ - [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037) - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/library/aa745633(v=bts.10).aspx) on individual devices.
+## View events in the Defender for Endpoint service event log
-For example, if devices aren't appearing in the **Devices list**, you might need to look for event IDs on the devices. You can then use this table to determine further troubleshooting steps.
+You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/library/aa745633(v=bts.10).aspx) on individual devices. This can help when, for example, a device isn't appearing in the Devices list. In this scenario, you can look for event IDs on the device and then use the table below to determine further troubleshooting steps based on the corresponding event ID.
-**Open Event Viewer and find the Microsoft Defender for Endpoint service event log:**
-
-1. Select **Start** on the Windows menu, type **Event Viewer**, and press **Enter**.
+To open the Defender for Endpoint service event log:
+1. Select **Start** on the Windows menu, type **Event Viewer**, and press **Enter** to open the Event Viewer.
2. In the log list, under **Log Summary**, scroll until you see **Microsoft-Windows-SENSE/Operational**. Double-click the item to open the log.
For example, if devices aren't appearing in the **Devices list**, you might need
> [!NOTE] > SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender for Endpoint.
-3. Events recorded by the service will appear in the log. See the following table for a list of events recorded by the service.
-
- <br>
+3. Events recorded by the service will appear in the log.
- ****
+See the following table for a list of events recorded by the service.
|Event ID|Message|Description|Action| |||||
For example, if devices aren't appearing in the **Devices list**, you might need
|1838| CSP: Failed to Set Device Tagging Criticality Value. Requested Value: (%1), Allowed Values between (%2) and (%3). | Set DeviceTagging Criticality failed as value was not within expected range. | Contact support if problem persists. | |1839| CSP: Set Device Tagging Identification Method value complete. Previous Value: (%1), IsDefault: (%2), New Value: (%3), Result: (%4). | Set DeviceTagging Id Method in registry completed. | Normal operating notification; no action required. | |1840| CSP: Failed to Set Device Tagging Identification Method Value. Requested Value: (%1), Allowed Values between (%2) and (%3). | Set DeviceTagging Id Method failed as value was not within expected range. | Contact support if problem persists. |
- |
-
+
+## View Defender for Endpoint events in the System event log
+
+Microsoft Defender for Endpoint events also appear in the System event log.
+
+To open the System event log:
+
+1. Select **Start** on the Windows menu, type **Event Viewer**, and press **Enter** to open the Event Viewer.
+2. In the log list, under **Log Summary**, scroll until you see **System**. Double-click the item to open the log.
+
+You can use this table for more information on the Defender for Endpoint events in the System events log and to determine further troubleshooting steps.
+
+ |Event ID|Message|Description|Action|
+ |||||
+ |1|The backing-file for the real-time session "SenseNdrPktmon" has reached its maximum size. As a result, new events will not be logged to this session until space becomes available.|This real-time session, between Pktmon - the built-in Windows service that captures network traffic, and our agent (SenseNDR) - that analyzes packets asynchroniously, is configured to limited to prevent potential performance issues. As a result, this alert may appear if too many packets are intercepted in a short time period, causing some packets to be skipped. This alert is more common with high network traffic.|Normal operating notification; no action required.|
+ ## See also+ - [Onboard Windows client devices](configure-endpoints.md) - [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md) - [Troubleshoot Microsoft Defender for Endpoint](troubleshoot-onboarding.md)
security Experts On Demand https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/experts-on-demand.md
Customers can engage our security experts directly from within Microsoft 365 Def
- Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques > [!NOTE]
-> Experts on Demand is not a security incident response service. ItΓÇÖs intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
+> Experts on Demand is not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
## Ask Defender Experts about suspicious cybersecurity activities in your organization
security Get Assessment Non Cpe Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-non-cpe-software-inventory.md
search.appverid: met150
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-This API returns all the data for installed software that doesn't have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe), on a per-device basis. The information returned by this API, along with the information returned by the [Export software inventory assessment](get-assessment-non-cpe-software-inventory.md) API, for software that does have a CPE, gives you full visibility into the software installed across your organization and the devices itΓÇÖs installed on.
+This API returns all the data for installed software that doesn't have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe), on a per-device basis. The information returned by this API, along with the information returned by the [Export software inventory assessment](get-assessment-non-cpe-software-inventory.md) API, for software that does have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on.
> [!NOTE] > Software products without a CPE are not supported by vulnerability management. They will be shown in the software inventory page, but because CPEs are used by vulnerability management to identify the software and any vulnerabilities, information like, exploits, number of exposed devices, and weaknesses won't be available for them. For more information, see [Software inventory](../defender-vulnerability-management/tvm-software-inventory.md).
security Get Assessment Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-assessment-software-inventory.md
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security--++ ms.localizationpriority: medium audience: ITPro
search.appverid: met150
+<!-- v-jweston/jweston-1 is scheduled to resume authorship Apr/May 2023.-->
+ # Export software inventory assessment per device [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
GET https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryByMac
``` > [!NOTE]
-> The information returned by this API, along with the information returned by the [Export non product code software inventory assessment](get-assessment-non-cpe-software-inventory.md) API, for software that doesn't have a CPE, gives you full visibility into the software installed across your organization and the devices itΓÇÖs installed on.
+> The information returned by this API, along with the information returned by the [Export non product code software inventory assessment](get-assessment-non-cpe-software-inventory.md) API, for software that doesn't have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on.
## 2. Export software inventory assessment (via files)
security Get Browser Extensions Permission Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-browser-extensions-permission-info.md
search.appverid: met150
Retrieves a list of all the permissions requested by a specific browser extension. This is a static data description and would mainly be used to enhance the data returned by the [Export browser extensions assessment API](get-assessment-browser-extensions.md).
-By combining these APIs youΓÇÖll be able to see a description of the permissions requested by the browser extensions that come up in the [Export browser extensions assessment](get-assessment-browser-extensions.md) results.
+By combining these APIs you'll be able to see a description of the permissions requested by the browser extensions that come up in the [Export browser extensions assessment](get-assessment-browser-extensions.md) results.
<br>Supports [OData V4 queries](https://www.odata.org/documentation/). <br>OData supported operators:
security Mac Schedule Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-schedule-scan.md
The following code shows the schema you need to use to schedule a quick scan.
</plist> ```
-2. Save the file as *com.microsoft.wdav.schedquickscan.plist*.
+2. Save the file as *com.microsoft.wdav.schedquickscan.plist* to the /Library/LaunchDaemons directory.
### Schedule a full scan
The following code shows the schema you need to use to schedule a quick scan.
</plist> ```
-2. Save the file as *com.microsoft.wdav.schedfullscan.plist*.
+2. Save the file as *com.microsoft.wdav.schedfullscan.plist* to the /Library/LaunchDaemons directory.
### Load your file
The following code shows the schema you need to use to schedule a quick scan.
2. Enter the following commands to load your file: ```bash
- launchctl load /Library/LaunchDaemons/<your file name.plist>
- launchctl start <your file name>
+ chown root:wheel /Library/LaunchDaemons/com.microsoft.wdav.sched*
+ chmod 644 /Library/LaunchDaemons/com.microsoft.wdav.sched*
+ xattr -c /Library/LaunchDaemons/com.microsoft.wdav.sched*
+ launchctl load -w /Library/LaunchDaemons/<your file name.plist>
``` 3. Your scheduled scan will run at the date, time, and frequency you defined in your p-list. In the previous examples, the scan runs at 2:50 AM every Friday.
- - The `Weekday` value of `StartCalendarInterval` uses an integer to indicate the fifth day of the week, or Friday. The range is between 0 and 7 with 7 representing Sunday.
+ - The `Weekday` value of `StartCalendarInterval` uses an integer to indicate the fifth day of the week, or Friday. The range is between 1 and 7 with 7 representing Sunday.
- The `Day` value of `StartCalendarInterval` uses an integer to indicate the third day of the month. The range is between 1 and 31.
- - The `Hour` value of `StartCalendarInterval` uses an integer to indicate the second hour of the day. The range is between 0 and 24.
- The `Minute` value of `StartCalendarInterval` uses an integer to indicate fifty minutes of the hour. The range is between 0 and 59.
+ - The `Hour` value of `StartCalendarInterval` uses an integer to indicate the second hour of the day. The range is between 0 and 23.
+ The `Minute` value of `StartCalendarInterval` uses an integer to indicate fifty minutes of the hour. The range is between 0 and 59.
> [!IMPORTANT]
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
ms.localizationpriority: medium
Last updated 11/07/2022 audience: ITPro-+ - m365-security - tier3
search.appverid: met150
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-For more information on Microsoft Defender for Endpoint on other operating systems:
-- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md) -- [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)</br>
+For more information on Microsoft Defender for Endpoint on other operating systems:
+- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md)
+- [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)</br>
**Known issues**
-Apple has identified an issue on macOS [Ventura upgrade](<https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes>), and expected to be fixed in the next release.
+Apple has identified an issue on macOS [Ventura upgrade](<https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes>), and expected to be fixed in the next release.
The issue impacts Microsoft Defender for endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly. > To mitigate the risk with this issue, make sure that [Microsoft Defender for Endpoint has Full Disk Access Authorization](mac-install-manually.md).
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Release version: **20.122082.18681.0**<br/> &ensp;Engine version: **1.1.19700.3**<br/> &ensp;Signature version: **1.377.636.0**<br/>
-
**What's new**
The issue impacts Microsoft Defender for endpoint security extensions, and might
<br/> </details> - > [!IMPORTANT] > This is a minimal recommended MDE version for macOS Ventura.
The issue impacts Microsoft Defender for endpoint security extensions, and might
- Fix for UI crash on Ventura - Fix for definitions not getting downloaded right after install - Other bug fixes
-
+ <br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
<br/> </details> - <details> <summary>Jun-2022 (Build: 101.70.18 | Release version: 20.122042.17018.0)</summary>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.66.54**<br/> &ensp;Release version: **20.122041.16654.0**<br/> - **What's new** - Addressed an issue where `mdatp diagnostic real-time-protection-statistics` was not printing the correct process path in some cases.
The issue impacts Microsoft Defender for endpoint security extensions, and might
**What's new** -- This version adds support for macOS 12.3. Starting with macOS 12.3, [Apple is removing Python 2.7](https://developer.apple.com/documentation/macos-release-notes/macos-12_3-release-notes). There will be no Python version preinstalled on macOS by default. **ACTION NEEDED**:
+- This version adds support for macOS 12.3. Starting with macOS 12.3, [Apple is removing Python 2.7](https://developer.apple.com/documentation/macos-release-notes/macos-12_3-release-notes). There will be no Python version preinstalled on macOS by default. **ACTION NEEDED**:
- Users must update Microsoft Defender for Endpoint for Mac to version 101.59.50 (or newer) prior to updating their devices to macOS Monterey 12.3 (or newer). This minimal version 101.59.50 is a prerequisite to eliminating Python-related issues with Microsoft Defender for Endpoint for Mac on macOS Monterey. - For remote deployments, existing MDM setups must be updated to Microsoft Defender for Endpoint for Mac version 101.59.50 (or newer). Pushing via MDM an older Microsoft Defender for Endpoint for Mac version to macOS Monterey 12.3 (or newer) will result in an installation failure.-
+\*\*\n
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
**What's new** -- Bug fixes
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
- macOS 10.14 (Mojave) is no longer supported - After a product setting stops being managed by the administrator through MDM, it now reverts to the value it had before it was managed (the value configured locally by the end user or, if no such local value was explicitly provided, the default value used by the product). Prior to this change, after a setting stopped being managed, its managed value persisted and was still used by the product. - Performance improvements & bug fixes
-
+ <br/> </details> <details><summary>2021 releases </summary><blockquote> <details><summary>(Build: 101.49.25 | Release version: 20.121092.14925.0)</summary>
-&ensp;Build:ΓÇ»**101.49.25**<br/>
-&ensp;Release version:ΓÇ»**20.121092.14925.0** <br/>
+&ensp;Build: **101.49.25**<br/>
+&ensp;Release version: **20.121092.14925.0** <br/>
**What's new** -- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through `mdatp config scan-archives --value [enabled/disabled]`. By default, this is set to enabled. -- Bug fixes
+- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through `mdatp config scan-archives --value [enabled/disabled]`. By default, this is set to enabled.
+- Bug fixes
<br/> </details>
-
+ <details><summary>(Build: 101.47.27 | Release version: 20.121082.14727.0)</summary>
-&ensp;Build:ΓÇ»**101.47.27**<br/>
-&ensp;Release version:ΓÇ»**20.121082.14727.0** <br/>
+&ensp;Build: **101.47.27**<br/>
+&ensp;Release version: **20.121082.14727.0** <br/>
**What's new**-- Fix for a system freeze occurring on shutdown on macOS Mojave and macOS Catalina. +
+- Fix for a system freeze occurring on shutdown on macOS Mojave and macOS Catalina.
<br/> </details> <details><summary>(Build: 101.43.84 | Release version: 20.121082.14384.0)</summary>
-&ensp;Build:ΓÇ»**101.43.84**<br/>
-&ensp;Release version:ΓÇ»**20.121082.14384.0** <br/>
+&ensp;Build: **101.43.84**<br/>
+&ensp;Release version: **20.121082.14384.0** <br/>
**What's new**-- Candidate build for macOS 12 (Monterey) -- Bug fixes +
+- Candidate build for macOS 12 (Monterey)
+- Bug fixes
<br/> </details> <details><summary>(Build: 101.41.10 | Release version: 20.121072.14110.0)</summary>
-&ensp;Build:ΓÇ»**101.41.10**<br/>
-&ensp;Release version:ΓÇ»**20.121072.14110.0** <br/>
+&ensp;Build: **101.41.10**<br/>
+&ensp;Release version: **20.121072.14110.0** <br/>
**What's new**-- Added new switches to the command-line tool:
- - Control degree of parallelism for on-demand scans. This can be configured through `mdatp config maximum-on-demand-scan-threads --value [number-between-1-and-64]`. By default, a degree of parallelism of 2 is used.
- - Control whether scans after security intelligence updates are enabled or disabled. This can be configured through `mdatp config scan-after-definition-update --value [enabled/disabled]`. By default, this is set to enabled.
-- Changing the product log level now requires elevation. -- Performance improvements & bug fixes +
+- Added new switches to the command-line tool:
+ - Control degree of parallelism for on-demand scans. This can be configured through `mdatp config maximum-on-demand-scan-threads --value [number-between-1-and-64]`. By default, a degree of parallelism of 2 is used.
+ - Control whether scans after security intelligence updates are enabled or disabled. This can be configured through `mdatp config scan-after-definition-update --value [enabled/disabled]`. By default, this is set to enabled.
+- Changing the product log level now requires elevation.
+- Performance improvements & bug fixes
<br/> </details> <details><summary>(Build: 101.40.84 | Release version: 20.121071.14084.0)</summary>
-&ensp;Build:ΓÇ»**101.40.84**<br/>
-&ensp;Release version:ΓÇ»**20.121071.14084.0** <br/>
+&ensp;Build: **101.40.84**<br/>
+&ensp;Release version: **20.121071.14084.0** <br/>
**What's new**-- M1 chip native support -- Performance improvements & bug fixes +
+- M1 chip native support
+- Performance improvements & bug fixes
<br/> </details> <details><summary>(Build: 101.37.97 | Release version: 20.121062.13797.0)</summary>
-&ensp;Build:ΓÇ»**101.37.97**<br/>
-&ensp;Release version:ΓÇ»**20.121062.13797.0** <br/>
+&ensp;Build: **101.37.97**<br/>
+&ensp;Release version: **20.121062.13797.0** <br/>
**What's new**-- Performance improvements & bug fixes +
+- Performance improvements & bug fixes
<br/> </details> <details><summary>(Build: 101.34.28 | Release version: 20.121061.13428.0)</summary>
-&ensp;Build:ΓÇ»**101.34.28**<br/>
-&ensp;Release version:ΓÇ»**20.121061.13428.0** <br/>
+&ensp;Build: **101.34.28**<br/>
+&ensp;Release version: **20.121061.13428.0** <br/>
**What's new**-- Bug fixes +
+- Bug fixes
<br/> </details> <details><summary>(Build: 101.34.27 | Release version: 20.121052.13427.0)</summary>
-&ensp;Build:ΓÇ»**101.34.27**<br/>
-&ensp;Release version:ΓÇ»**20.121052.13427.0** <br/>
+&ensp;Build: **101.34.27**<br/>
+&ensp;Release version: **20.121052.13427.0** <br/>
**What's new**-- Bug fixes +
+- Bug fixes
<br/> </details> <details><summary>(Build: 101.34.20 | Release version: 20.121051.13420.0)</summary>
-&ensp;Build:ΓÇ»**101.34.20**<br/>
-&ensp;Release version:ΓÇ»**20.121051.13420.0** <br/>
+&ensp;Build: **101.34.20**<br/>
+&ensp;Release version: **20.121051.13420.0** <br/>
**What's new**-- [Device control for macOS](mac-device-control-overview.md) is now in general availability. -- Addressed an issue where a quick scan could not be started from the status menu on macOS 11 (Big Sur). -- Other bug fixes +
+- [Device control for macOS](mac-device-control-overview.md) is now in general availability.
+- Addressed an issue where a quick scan could not be started from the status menu on macOS 11 (Big Sur).
+- Other bug fixes
<br/> </details> <details><summary>(Build: 101.32.69 | Release version: 20.121042.13269.0)</summary>
-&ensp;Build:ΓÇ»**101.32.69**<br/>
-&ensp;Release version:ΓÇ»**20.121042.13269.0** <br/>
+&ensp;Build: **101.32.69**<br/>
+&ensp;Release version: **20.121042.13269.0** <br/>
**What's new**+ - Addressed an issue where concurrent access to the keychain from Microsoft Defender for Endpoint and other applications can lead to keychain corruption. <br/>
The issue impacts Microsoft Defender for endpoint security extensions, and might
<details><summary>(Build: 101.29.64 | Release version: 20.121042.12964.0)</summary>
-&ensp;Build:ΓÇ»**101.29.64**<br/>
-&ensp;Release version:ΓÇ»**20.121042.12964.0** <br/>
+&ensp;Build: **101.29.64**<br/>
+&ensp;Release version: **20.121042.12964.0** <br/>
**What's new**-- Starting with this version, threats detected during on-demand antivirus scans triggered through the command-line client are automatically remediated. Threats detected during scans triggered through the user interface still require manual action. -- `mdatp diagnostic real-time-protection-statistics` now supports two additional switches:
- - `--sort`: sorts the output descending by total number of files scanned
- - `--top N`: displays the top N results (only works if `--sort` is also specified)
+
+- Starting with this version, threats detected during on-demand antivirus scans triggered through the command-line client are automatically remediated. Threats detected during scans triggered through the user interface still require manual action.
+- `mdatp diagnostic real-time-protection-statistics` now supports two additional switches:
+ - `--sort`: sorts the output descending by total number of files scanned
+ - `--top N`: displays the top N results (only works if `--sort` is also specified)
- Performance improvements (specifically for when `YARN` is used) & bug fixes <br/>
The issue impacts Microsoft Defender for endpoint security extensions, and might
<details><summary>(Build: 101.27.50 | Release version: 20.121022.12750.0)</summary>
-&ensp;Build:ΓÇ»**101.27.50**<br/>
-&ensp;Release version:ΓÇ»**20.121022.12750.0** <br/>
+&ensp;Build: **101.27.50**<br/>
+&ensp;Release version: **20.121022.12750.0** <br/>
**What's new**-- Fix to accommodate for Apple certificate expiration for macOS Catalina and earlier. This fix restores Microsoft Defender Vulnerability Management (MDVM) functionality. +
+- Fix to accommodate for Apple certificate expiration for macOS Catalina and earlier. This fix restores Microsoft Defender Vulnerability Management (MDVM) functionality.
<br/> </details> <details><summary>(Build: 101.25.69 | Release version: 20.121022.12569.0)</summary>
-&ensp;Build:ΓÇ»**101.25.69**<br/>
-&ensp;Release version:ΓÇ»**20.121022.12569.0** <br/>
+&ensp;Build: **101.25.69**<br/>
+&ensp;Release version: **20.121022.12569.0** <br/>
**What's new**-- Microsoft Defender for Endpoint on macOS is now available in preview for US Government customers. For more information, seeΓÇ»[Microsoft Defender for Endpoint for US Government customers](gov.md) . -- Performance improvements (specifically for the situation when the XCode Simulator app is used) & bug fixes. +
+- Microsoft Defender for Endpoint on macOS is now available in preview for US Government customers. For more information, see [Microsoft Defender for Endpoint for US Government customers](gov.md).
+- Performance improvements (specifically for the situation when the XCode Simulator app is used) & bug fixes.
<br/> </details> <details><summary>(Build: 101.23.64 | Release version: 20.121021.12364.0)</summary>
-&ensp;Build:ΓÇ»**101.23.64**<br/>
-&ensp;Release version:ΓÇ»**20.121021.12364.0** <br/>
+&ensp;Build: **101.23.64**<br/>
+&ensp;Release version: **20.121021.12364.0** <br/>
**What's new**-- Added a new option to the command-line tool to view information about the last on-demand scan. To view information about the last on-demand scan, runΓÇ»`mdatp health --details antivirus`. -- Performance improvements & bug fixes +
+- Added a new option to the command-line tool to view information about the last on-demand scan. To view information about the last on-demand scan, run `mdatp health --details antivirus`.
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
<details><summary>Prior releases </summary><blockquote> <details><summary>(Build: 101.22.79 | Release version: 20.121012.12279.0)</summary>
-&ensp;Build: **101.22.79** <br>
+&ensp;Build: **101.22.79** <br>
&ensp;Release version: **20.121012.12279.0**<br> **What's new**-- Performance improvements & bug fixes +
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Release version: **20.121011.11988.0**<br> **What's new**-- Performance improvements & bug fixes +
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Release version: **20.120121.11948.0**<br> **What's new**+ > [!NOTE]
-> The old command-line tool syntax has been deprecated with this release. For information on the new syntax, seeΓÇ»[Resources](mac-resources.md#configuring-from-the-command-line).
-- Added a new command-line switch to disable the network extension:ΓÇ»`mdatp system-extension network-filter disable`. This command can be useful to troubleshoot networking issues that could be related to Microsoft Defender for Endpoint on Mac. -- Performance improvements & bug fixes
+> The old command-line tool syntax has been deprecated with this release. For information on the new syntax, see [Resources](mac-resources.md#configuring-from-the-command-line).
+- Added a new command-line switch to disable the network extension: `mdatp system-extension network-filter disable`. This command can be useful to troubleshoot networking issues that could be related to Microsoft Defender for Endpoint on Mac.
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Release version: **20.120101.11921.0** <br> **What's new**-- Bug fixes +
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Release version: **20.120102.11526.0**<br> **What's new**-- Improved the reliability of the agent when running on macOS 11 Big Sur. -- Added a new command-line switch (`--ignore-exclusions`) to ignore AV exclusions during custom scans (`mdatp scan custom`). +
+- Improved the reliability of the agent when running on macOS 11 Big Sur.
+- Added a new command-line switch (`--ignore-exclusions`) to ignore AV exclusions during custom scans (`mdatp scan custom`).
- Performance improvements & bug fixes
-<br/>
+<br/>
</details> <details><summary>(Build: 101.13.75 | Release version: 20.120101.11375.0)</summary>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.13.75**<br> &ensp;Release version: **20.120101.11375.0**<br>
-**What's new**
-- Removed conditions when Microsoft Defender for Endpoint was triggering a macOS 11 (Big Sur) bug that manifests into a kernel panic. -- Fixed a memory leak in the Endpoint Security system extension when running on mac 11 (Big Sur). -- Bug fixes
+**What's new**
+
+- Removed conditions when Microsoft Defender for Endpoint was triggering a macOS 11 (Big Sur) bug that manifests into a kernel panic.
+- Fixed a memory leak in the Endpoint Security system extension when running on mac 11 (Big Sur).
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.10.72** <br>
-**What's new**
-- Bug fixes
+**What's new**
+
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.09.61**<br>
-**What's new**
-- Added a new managed preference forΓÇ»[disabling the option to send feedback](mac-preferences.md#show--hide-option-to-send-feedback). -- Status menu icon now shows a healthy state when the product settings are managed. Previously, the status menu icon was displaying a warning or error state, even though the product settings were managed by the administrator. -- Performance improvements & bug fixes
+**What's new**
+
+- Added a new managed preference for [disabling the option to send feedback](mac-preferences.md#show--hide-option-to-send-feedback).
+- Status menu icon now shows a healthy state when the product settings are managed. Previously, the status menu icon was displaying a warning or error state, even though the product settings were managed by the administrator.
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.09.50**<br>
-**What's new**
-- This product version has been validated on macOS Big Sur 11 beta 9. -- The new syntax for the mdatp command-line tool is now the default one. For more information on the new syntax, see [Resources for Microsoft Defender for Endpoint on macOS](mac-resources.md#configuring-from-the-command-line).
+**What's new**
+
+- This product version has been validated on macOS Big Sur 11 beta 9.
+- The new syntax for the mdatp command-line tool is now the default one. For more information on the new syntax, see [Resources for Microsoft Defender for Endpoint on macOS](mac-resources.md#configuring-from-the-command-line).
> [!NOTE]
-> The old command-line tool syntax will be removed from the product onΓÇ»**January 1st, 2021**.
-- Extended `mdatp diagnostic create` with a new parameter (`--path [directory]`) that allows the diagnostic logs to be saved to a different directory. -- Performance improvements & bug fixes
+> The old command-line tool syntax will be removed from the product on **January 1st, 2021**.
+- Extended `mdatp diagnostic create` with a new parameter (`--path [directory]`) that allows the diagnostic logs to be saved to a different directory.
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.09.49**<br>
-**What's new**
-- User interface improvements to differentiate exclusions that are managed by the IT administrator versus exclusions defined by the local user. -- Improved CPU utilization during on-demand scans. -- Performance improvements & bug fixes
+**What's new**
+
+- User interface improvements to differentiate exclusions that are managed by the IT administrator versus exclusions defined by the local user.
+- Improved CPU utilization during on-demand scans.
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.07.23**<br>
-**What's new**
-- Added new fields to the output of `mdatp --health` for checking the status of passive mode and the EDR group ID.
+**What's new**
+
+- Added new fields to the output of `mdatp --health` for checking the status of passive mode and the EDR group ID.
> [!NOTE]
-> `mdatp --health` will be replaced with `mdatp health` in a future product update.
-- Fixed a bug where automatic sample submission was not marked as managed in the user interface. -- Added new settings for controlling the retention of items in the antivirus scan history. You can now [specify the number of days to retain items in the scan history](mac-preferences.md#antivirus-scan-history-retention-in-days) and [specify the maximum number of items in the scan history](mac-preferences.md#maximum-number-of-items-in-the-antivirus-scan-history). -- Bug fixes
+> `mdatp --health` will be replaced with `mdatp health` in a future product update.
+- Fixed a bug where automatic sample submission was not marked as managed in the user interface.
+- Added new settings for controlling the retention of items in the antivirus scan history. You can now [specify the number of days to retain items in the scan history](mac-preferences.md#antivirus-scan-history-retention-in-days) and [specify the maximum number of items in the scan history](mac-preferences.md#maximum-number-of-items-in-the-antivirus-scan-history).
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.06.63**<br>
-**What's new**
-- Addressed a performance regression introduced in versionΓÇ»`101.05.17`. The regression was introduced with the fix to eliminate the kernel panics some customers have observed when accessing SMB shares. We have reverted this code change and are investigating alternative ways to eliminate the kernel panics.
+**What's new**
+
+- Addressed a performance regression introduced in version `101.05.17`. The regression was introduced with the fix to eliminate the kernel panics some customers have observed when accessing SMB shares. We have reverted this code change and are investigating alternative ways to eliminate the kernel panics.
<br/> </details> <details><summary>(Build: 101.05.17)</summary>
-&ensp;Build: **101.05.17**<br>
+&ensp;Build: **101.05.17**<br>
+
+**What's new**
-**What's new**
> [!IMPORTANT]
-> We are working on a new and enhanced syntax for the `mdatp` command-line tool. The new syntax is currently the default in the Insider Fast and Insider Slow update channels. We encourage you to famliliarize yourself with this new syntax.
-> We will continue supporting the old syntax in parallel with the new syntax and will provide more communication around the deprecation plan for the old syntax in the upcoming months.
-- Addressed a kernel panic that occurred sometimes when accessing SMB file shares. -- Performance improvements & bug fixes
+> We are working on a new and enhanced syntax for the `mdatp` command-line tool. The new syntax is currently the default in the Insider Fast and Insider Slow update channels. We encourage you to famliliarize yourself with this new syntax.
+> We will continue supporting the old syntax in parallel with the new syntax and will provide more communication around the deprecation plan for the old syntax in the upcoming months.
+- Addressed a kernel panic that occurred sometimes when accessing SMB file shares.
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.05.16**<br>
-**What's new**
-- Improvements to quick scan logic to significantly reduce the number of scanned files. -- Added [autocompletion support](mac-resources.md#how-to-enable-autocompletion) for the command-line tool. -- Bug fixes
+**What's new**
+
+- Improvements to quick scan logic to significantly reduce the number of scanned files.
+- Added [autocompletion support](mac-resources.md#how-to-enable-autocompletion) for the command-line tool.
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.03.12**<br>
-**What's new**
-- Performance improvements & bug fixes
+**What's new**
+
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.01.54**<br>
-**What's new**
-- Improvements around compatibility with Time Machine -- Accessibility improvements -- Performance improvements & bug fixes
+**What's new**
+
+- Improvements around compatibility with Time Machine
+- Accessibility improvements
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **101.00.31** <br>
-**What's new**
-- ImprovedΓÇ»[product onboarding experience for Intune users](/mem/intune/apps/apps-advanced-threat-protection-macos) -- AntivirusΓÇ»[exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types)-- Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and selectΓÇ»**Scan with Microsoft Defender for Endpoint**. -- In-place product downgrades are now explicitly disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device. -- Other performance improvements & bug fixes
+**What's new**
+
+- Improved [product onboarding experience for Intune users](/mem/intune/apps/apps-advanced-threat-protection-macos)
+- Antivirus [exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types)
+- Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select **Scan with Microsoft Defender for Endpoint**.
+- In-place product downgrades are now explicitly disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device.
+- Other performance improvements & bug fixes
<br/> </details> <details><summary>(Build: 100.90.27)</summary>
-&ensp;Build: **100.90.27** <br>
+&ensp;Build: **100.90.27** <br>
+
+**What's new**
-**What's new**
-- You can now [set an update channel](mac-updates.md#set-the-channel-name) for Microsoft Defender for Endpoint on macOS that is different from the system-wide update channel. -- New product icon -- Other user experience improvements -- Bug fixes
+- You can now [set an update channel](mac-updates.md#set-the-channel-name) for Microsoft Defender for Endpoint on macOS that is different from the system-wide update channel.
+- New product icon
+- Other user experience improvements
+- Bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **100.86.92**<br>
-**What's new**
-- Improvements around compatibility with Time Machine -- Addressed an issue where the product was sometimes not cleaning all files under `/Library/Application Support/Microsoft/Defender` during uninstallation. -- Reduced the CPU utilization of the product when Microsoft products are updated through Microsoft AutoUpdate. -- Other performance improvements & bug fixes
+**What's new**
+
+- Improvements around compatibility with Time Machine
+- Addressed an issue where the product was sometimes not cleaning all files under `/Library/Application Support/Microsoft/Defender` during uninstallation.
+- Reduced the CPU utilization of the product when Microsoft products are updated through Microsoft AutoUpdate.
+- Other performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **100.86.91**<br> **What's new**+ > [!CAUTION] > To ensure the most complete protection for your macOS devices and in alignment with Apple stopping delivery of macOS native security updates to OS versions older than [current - 2], MDATP for Mac deployment and updates will no longer be supported on macOS Sierra [10.12]. MDATP for Mac updates and enhancements will be delivered to devices running versions Catalina [10.15], Mojave [10.14], and High Sierra [10.13]. > > If you already have MDATP for Mac deployed to your Sierra [10.12] devices, please upgrade to the latest macOS version to eliminate risks of losing protection. -- Performance improvements & bug fixes
+- Performance improvements & bug fixes
<br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **100.83.73**<br> **What's new**-- Added more controls for IT administrators aroundΓÇ»[management of exclusions](mac-preferences.md#exclusion-merge-policy),ΓÇ»[management of threat type settings](mac-preferences.md#threat-type-settings-merge-policy), andΓÇ»[disallowed threat actions](mac-preferences.md#disallowed-threat-actions). -- When Full Disk Access is not enabled on the device, a warning is now displayed in the status menu. +
+- Added more controls for IT administrators around [management of exclusions](mac-preferences.md#exclusion-merge-policy), [management of threat type settings](mac-preferences.md#threat-type-settings-merge-policy), and [disallowed threat actions](mac-preferences.md#disallowed-threat-actions).
+- When Full Disk Access is not enabled on the device, a warning is now displayed in the status menu.
- Performance improvements & bug fixes
-
+ <br/> </details>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **100.82.60** <br> **What's new**+ - Addressed an issue where the product fails to start following a definition update.
-<br/>
+<br/>
</details> <details><summary>(Build: 100.80.42)</summary>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **100.80.42**<br> **What's new**+ - Bug fixes
-<br/>
+<br/>
</details> <details><summary>(Build: 100.79.42)</summary>
The issue impacts Microsoft Defender for endpoint security extensions, and might
&ensp;Build: **100.79.42**<br> **What's new**-- Fixed an issue where Microsoft Defender for Endpoint on Mac was sometimes interfering with Time Machine. +
+- Fixed an issue where Microsoft Defender for Endpoint on Mac was sometimes interfering with Time Machine.
- Added a new switch to the command-line utility for testing the connectivity with the backend service
-
+ ```bash mdatp connectivity test ```-- Added ability to view the full threat history in the user interface (can be accessed from the **Protection history** view).
+- Added ability to view the full threat history in the user interface (can be accessed from the **Protection history** view).
- Performance improvements & bug fixes <br/> </details>
-<details><summary>(Build: 100.72.15)</summary>
+<details><summary>(Build: 100.72.15)</summary>
&ensp;Build: **100.72.15**<br> **What's new**-- Bug fixes +
+- Bug fixes
<br/> </details>
-<details><summary>(Build: 100.70.99)</summary>
+<details><summary>(Build: 100.70.99)</summary>
&ensp;Build: **100.70.99**<br> **What's new**+ - Addressed an issue that impacts the ability of some users to upgrade to macOS Catalina when real-time protection is enabled. This sporadic issue was caused by Microsoft Defender for Endpoint locking files within Catalina upgrade package while scanning them for threats, which led to failures in the upgrade sequence. <br/>
-</details>
+</details>
-<details><summary>(Build: 100.68.99)</summary>
+<details><summary>(Build: 100.68.99)</summary>
&ensp;Build: **100.68.99**<br> **What's new**-- Added the ability to configure the antivirus functionality to run inΓÇ»[passive mode](mac-preferences.md#enforcement-level-for-antivirus-engine). -- Performance improvements & bug fixes +
+- Added the ability to configure the antivirus functionality to run in [passive mode](mac-preferences.md#enforcement-level-for-antivirus-engine).
+- Performance improvements & bug fixes
<br/> </details>
-<details><summary>(Build: 100.65.28)</summary>
+<details><summary>(Build: 100.65.28)</summary>
&ensp;Build: **100.65.28**<br> **What's new**-- Added support for macOS Catalina. +
+- Added support for macOS Catalina.
+ > [!CAUTION] > macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.
->
+>
> The mechanism for granting this consent depends on how you deployed Microsoft Defender for Endpoint:
->
-> - For manual deployments, see the updated instructions in the [Manual deployment topic](mac-install-manually.md#how-to-allow-full-disk-access).
-> - For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics.
+>
+> - For manual deployments, see the updated instructions in the [Manual deployment topic](mac-install-manually.md#how-to-allow-full-disk-access).
+> - For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics.
-- Performance improvements & bug fixes
+- Performance improvements & bug fixes
<br/> </details> <br/><br/> </details>--
security Mde Device Control Device Installation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-device-control-device-installation.md
Prevent installation of removable devices
This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. By default, this policy setting takes precedence over any other policy setting that allows Windows to install a device. > [!NOTE]
-> To enable the **Allow installation of devices that match any of these device instance IDs** policy setting to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting. Also, the allow policy wonΓÇÖt take precedence if the **Block Removable Storage** option is selected in Device Control.
+> To enable the **Allow installation of devices that match any of these device instance IDs** policy setting to supersede this policy setting for applicable devices, enable the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy setting. Also, the allow policy won't take precedence if the **Block Removable Storage** option is selected in Device Control.
If you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
security Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-threat-experts.md
Endpoint Attack Notifications (previously referred to as Microsoft Threat Expert
## Microsoft Defender Experts - Experts on Demand > [!NOTE]
-> Experts on Demand is not a security incident response service. ItΓÇÖs intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
+> Experts on Demand is not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
Customers can engage our security experts directly from within Microsoft 365 Defender portal to get their response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised devices, root cause of a suspicious network connection, to more threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can:
security Migrating Mde Server To Cloud https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migrating-mde-server-to-cloud.md
Once all prerequisites are met, [connect](/azure/defender-for-cloud/quickstart-o
:::image type="content" source="images/select-plans-aws-gcp.png" alt-text="Screenshot that shows how to enable auto-provisioning for Azure Arc agent." lightbox="images/select-plans-aws-gcp.png":::
- For more information, see [Defender for CloudΓÇÖs multicloud capabilities](https://aka.ms/mdcmc).
+ For more information, see [Defender for Cloud's multicloud capabilities](https://aka.ms/mdcmc).
## What happens once all migration steps are completed?
Once you've completed the relevant migration steps, Microsoft Defender for Cloud
The extension acts as a management and deployment interface, which will orchestrate and wrap the MDE installation scripts inside the operating system and reflect its provisioning state to the Azure management plane. The installation process will recognize an existing Defender for Endpoint installation and connect it to Defender for Cloud by automatically adding Defender for Endpoint service tags.
-In case you have Windows Server 2012 R2 or 2016 machines that are provisioned with the legacy, Log Analytics-based Microsoft Defender for Endpoint solution, Microsoft Defender for CloudΓÇÖs deployment process will deploy the Defender for Endpoint [unified solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution). After successful deployment, it will stop and disable the legacy Defender for Endpoint process on these machines.
+In case you have Windows Server 2012 R2 or 2016 machines that are provisioned with the legacy, Log Analytics-based Microsoft Defender for Endpoint solution, Microsoft Defender for Cloud's deployment process will deploy the Defender for Endpoint [unified solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution). After successful deployment, it will stop and disable the legacy Defender for Endpoint process on these machines.
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
Network protection is enabled per device, which is typically done using your man
> [!NOTE] > Microsoft Defender Antivirus must be active to enable network protection.
-You can enable network protection in **Audit** mode or **Block** mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in Audit mode for time to gather data on what would be blocked. Audit mode logs when end users have connected to an address or site that would otherwise have been blocked by network protection. Note that in order for indicators of compromise (IoC) or Web content filtering (WCF) to work, network protection must be in ΓÇ£Block modeΓÇ¥
+You can enable network protection in **Audit** mode or **Block** mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in Audit mode for time to gather data on what would be blocked. Audit mode logs when end users have connected to an address or site that would otherwise have been blocked by network protection. Note that in order for indicators of compromise (IoC) or Web content filtering (WCF) to work, network protection must be in "Block mode"
For information about network protection for Linux and macOS see: [Network protection for Linux](network-protection-linux.md) and [Network protection for macOS](network-protection-macos.md).
security Schedule Antivirus Scan In Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scan-in-mde.md
Use the following steps to schedule scans:
``` #!/bin/sh set -e
- echo $(date) ΓÇ£Time Scan BeginsΓÇ¥ >>/logs/mdav_avacron_full_scan.log
+ echo $(date) "Time Scan Begins" >>/logs/mdav_avacron_full_scan.log
/bin/mdatp scan full >> /logs/mdav_avacron_full_scan.log
- echo $(date) ΓÇ£Time Scan FinishedΓÇ¥ >>/logs/mdav_avacron_full_scan.log
+ echo $(date) "Time Scan Finished" >>/logs/mdav_avacron_full_scan.log
exit 0 ~ ```
security Technological Partners https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/technological-partners.md
search.appverid: met150
Microsoft 365 Defender supports third-party integrations to help secure users with effective threat protection, detection, investigation, and response, in various security fields of endpoints, vulnerability management, email, identities, cloud apps.
-The following are the solutionΓÇÖs categories:
+The following are the solution's categories:
- Security information and event management (SIEM) - Security orchestration, automation, and response (SOAR)
The following are the solutionΓÇÖs categories:
|Product name|Vendor|Description| ||||
-|[SafeBreach](https://go.microsoft.com/fwlink/?linkid=2201775)|SafeBreach|SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its HackerΓÇÖs PlaybookΓäó, the industryΓÇÖs most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.|
+|[SafeBreach](https://go.microsoft.com/fwlink/?linkid=2201775)|SafeBreach|SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker's PlaybookΓäó, the industry's most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.|
|[Extended Security Posture Management (XSPM)](https://go.microsoft.com/fwlink/?linkid=2201771)|Cymulate|Cymulate's Extended Security Posture Management enables companies to challenge, assess, and optimize their cybersecurity posture.| |[Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2201967)|SkyBox|Develops a vulnerability program strategy that accurately analyzes exposure risk across hybrid attack surface and prioritize the remediation.| |[Attack Path Management](https://go.microsoft.com/fwlink/?linkid=2201774)|XM Cyber|Attack Path Management is a hybrid cloud security company providing attack path management changing the ways organizations approach cyber risk.|
The following are the solutionΓÇÖs categories:
|Product name|Vendor|Description| ||||
-|[Zscaler Internet Access](https://go.microsoft.com/fwlink/?linkid=2201779)|Zscaler|Zscaler Internet Access is a cloud native security service edge (SSE) solution that builds on a decade of secure web gateway leadership. Offered as a scalable SaaS platform from the worldΓÇÖs largest security cloud, it replaces legacy network security solutions to stop advanced attacks and prevent data loss with a comprehensive zero trust approach.|
+|[Zscaler Internet Access](https://go.microsoft.com/fwlink/?linkid=2201779)|Zscaler|Zscaler Internet Access is a cloud native security service edge (SSE) solution that builds on a decade of secure web gateway leadership. Offered as a scalable SaaS platform from the world's largest security cloud, it replaces legacy network security solutions to stop advanced attacks and prevent data loss with a comprehensive zero trust approach.|
### Additional integrations
security Tune Performance Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus.md
ms.sitesec: library
ms.pagetype: security ms.localizationpriority: medium audience: ITPro--++ Last updated 08/13/2022
search.appverid: met150
+<!-- v-jweston/jweston-1 is scheduled to resume authorship Apr/May 2023.-->
+ # Performance analyzer for Microsoft Defender Antivirus **Applies to**
Based on the query, the user will be able to view data for scan counts, duration
The results of the performance analyzer can also be exported and converted to a CSV or JSON file. For examples that describe the process of "export" and "convert" through sample codes, see below.
-Starting with Defender version 4.18.2206.X, users will be able to view scan skip reason information under ΓÇ£SkipReasonΓÇ¥ column. The possible values are:
+Starting with Defender version 4.18.2206.X, users will be able to view scan skip reason information under "SkipReason" column. The possible values are:
1. Not Skipped 1. Optimization (typically due to performance reasons)
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
For more information on Microsoft Defender for Endpoint on specific operating sy
- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md) - [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
+## November 2022
+
+**Zeek is now generally available as a component of Microsoft Defender for Endpoint.**
+
+Microsoft has partnered with [Corelight](https://corelight.com/company/zeek-now-component-of-microsoft-windows), a leader in open source Network Detection and Response (NDR), to provide a new open-source integration with [Zeek](https://corelight.com/about-zeek/how-zeek-works) for Microsoft Defender for Endpoint. With this integration organizations can super-charge their investigation efforts with rich network signals and reduce the time it takes to detect network-based threats by having unprecedented visibility into network traffic from the endpoints' perspective.
+
+The new Zeek integration is available in the latest version of the Microsoft Defender for Endpoint agent via the following knowledge base articles: [KB5016691](https://support.microsoft.com/topic/august-25-2022-kb5016691-os-build-22000-918-preview-59097044-915a-49a0-8870-49823236adbd), [KB5016693](https://support.microsoft.com/topic/august-16-2022-kb5016693-os-build-20348-946-preview-ee90d0bc-c162-4124-b7c6-f963ee7b17ed), [KB5016688](https://support.microsoft.com/topic/august-26-2022-kb5016688-os-builds-19042-1949-19043-1949-and-19044-1949-preview-ec31ebdc-067d-44dd-beb0-eabcc984d843), and [KB5016690](https://support.microsoft.com/topic/august-23-2022-kb5016690-os-build-17763-3346-preview-b81d1ac5-75c7-42c1-b638-f13aa4242f42).
+
+> [!NOTE]
+> This integration doesnΓÇÖt currently support the use of custom scripts to gain visibility into extra signals.
++ ## October 2022 - [Network protection C2 detection and remediation is now generally available](network-protection.md#block-command-and-control-attacks). <br/>Attackers often compromise existing internet-connected servers to become their command and control servers. Attackers can use the compromised servers to hide malicious traffic and deploy malicious bots that are used to infect endpoints. Network protection detection and remediation will help improve the time it takes security operations (SecOps) teams to pinpoint and respond to malicious network threats that are looking to compromise endpoints.
security Windows Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/windows-whatsnew.md
All updates contain:
**What's new** -- Added a fix to resolve a missing intermediate certificate issue with the use of ΓÇ£TelemetryProxyServerΓÇ¥ on Windows Server 2012 R2 running the unified agent.
+- Added a fix to resolve a missing intermediate certificate issue with the use of "TelemetryProxyServer" on Windows Server 2012 R2 running the unified agent.
- Enhanced Endpoint DLP with ability to protect password protected and encrypted files and not label files. - Enhanced Endpoint DLP with support for context data in audit telemetry (short evidence). - Improved Microsoft Defender for Endpoint client authentication support for VDI devices.-- Enhanced Microsoft Defender for EndpointΓÇÖs ability to identify and intercept ransomware and advanced attacks.
+- Enhanced Microsoft Defender for Endpoint's ability to identify and intercept ransomware and advanced attacks.
- The Contain feature now supports more desktop and server versions to perform the Contain action and block discovered devices when these are contained. - Expanded the troubleshooting mode feature to additional desktop and server versions. For a complete list of supported OS versions and more information about prerequisites, see [Get started with troubleshooting mode in Microsoft Defender for Endpoint](enable-troubleshooting-mode.md). - Live Response improvements include reduced session creation latency when using proxies, an undo Remediation manual command, support for OneDrive share in FindFile action, and improved isolation and stability.
security Tvm Supported Os https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-supported-os.md
Ubuntu 16.04 LTS or higher LTS|Yes|Yes|Yes|Yes|Yes
Oracle Linux 7.2 or higher|Yes|Yes|Yes|Yes|Yes SUSE Linux Enterprise Server 12 or higher|Yes|Yes|Yes|Yes|Yes Linux Debian 9 or higher|Yes|Yes|Yes|Yes|Yes
-Android 6.0 or higher|Yes|Yes|Not supported|Not supported|Not supported
-iOS 12.0 or higher|Yes|Not supported|Not supported|Not supported|Not supported
Fedora 33 or higher|Yes|Yes|Yes|Yes|Yes Amazon Linux 2|Yes|Yes|Yes|Yes|Yes
+Android 6.0 or higher|Yes|Yes|Not supported|Not supported|Not supported
+iOS 12.0 or higher|Yes|Yes (public preview)|Not supported|Not supported|Not supported
> [!NOTE] > Some features are not available for down-level Operating System, check the Microsoft 365 Defender Portal for more details on supported OS.
security Tvm Usage Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-usage-insights.md
Daily software usage is calculated from process events collected by the core end
### Software inventory view
-You can view software usage by selecting an application in the software inventory page. A flyout panel will open with more details including data related to that softwareΓÇÖs usage over the past 30 days.
+You can view software usage by selecting an application in the software inventory page. A flyout panel will open with more details including data related to that software's usage over the past 30 days.
:::image type="content" alt-text="Software usage insights" source="../../media/defender-vulnerability-management/usage-insights-inventory.png" lightbox="../../media/defender-vulnerability-management/usage-insights-inventory.png":::
The Recommendations page opens with the software usage information displayed:
>[!NOTE]
->If you donΓÇÖt see usage insights, it's because that application is currently not supported. Software usage is currently not supported for:
+>If you don't see usage insights, it's because that application is currently not supported. Software usage is currently not supported for:
> > - Software usage related to operating systems > - Software usage related to apps for macOS and Linux
security Whats New In Microsoft Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management public preview.
-## August 2022
+## October 2022
-- Defender Vulnerability Management is now supported for Amazon Linux 2 and Fedora 33 or higher.
+Several Linux platforms have high numbers of CVEs that are reported in official channels as not having a fix available (Red Hat, CentOS, Debian, and Ubuntu). This results in a high volume of non-actionable CVEs appearing in Microsoft Defender Vulnerability Management.
+
+To address this, Defender Vulnerability Management will no longer report such CVEs on the above Linux platforms. The new behavior may lead to reporting of fewer exposed devices and lower organization exposure score.
+
+## September 2022
-- [Browser extensions APIs](../defender-endpoint/get-assessment-browser-extensions.md)
+- Vulnerability assessment of apps on Microsoft Defender for Endpoint for iOS is now in public preview. Defender for Endpoint on iOS supports vulnerability assessments of apps only for enrolled (MDM) devices. For more information, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps). If you are interested in participating in the preview, share your tenant name and ID with us at: [mdatpmobile@microsoft.com](mailto:mdatpmobile@microsoft.com).
- You can now use the new broswer extenstions APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk.
+## August 2022
+
+- Defender Vulnerability Management is now supported for Amazon Linux 2 and Fedora 33 or higher.
-- [Extended software inventory API support for non product code software](../defender-endpoint/get-assessment-non-cpe-software-inventory.md)
+- [Browser extensions APIs](../defender-endpoint/get-assessment-browser-extensions.md) </br>
+ You can now use the new browser extensions APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk.
+- [Extended software inventory API support for non product code software](../defender-endpoint/get-assessment-non-cpe-software-inventory.md) </br>
A new API is now available and returns all the data for installed software that doesn't have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe). The information returned by this API, along with the information returned by the Export software inventory assessment API, for software that does have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on. ## May 2022
security Advanced Hunting Query Builder Details https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-details.md
Advanced hunting in guided mode supports several data types that you can use to
![Screenshot of datetime values as third condition](../../media/guided-hunting/data-datetime.png) -- Closed list - You donΓÇÖt need to remember the exact value you are looking for. You can easily choose from a suggested closed list that supports multi-selection.<br>
+- Closed list - You don't need to remember the exact value you are looking for. You can easily choose from a suggested closed list that supports multi-selection.<br>
![Screenshot of a closed list used as third condition](../../media/guided-hunting/data-closed.png)
You can create groups of conditions by clicking **Add subgroup**:
## Use smart auto-complete for search Smart auto-complete for searching devices and user accounts is supported.
-You donΓÇÖt need to remember the device ID, full device name, or user account name. You can start typing the first few characters of the device or user you are looking for and a suggested list appears from which you can choose what you need:
+You don't need to remember the device ID, full device name, or user account name. You can start typing the first few characters of the device or user you are looking for and a suggested list appears from which you can choose what you need:
![Screenshot showing smart auto-complete support](../../media/guided-hunting/smart-auto.png)
For instance, if you want to add a condition that looks for registry value delet
![Screenshot of various EventTypes](../../media/guided-hunting/hunt-specific-events-1.png)
-Selecting EventType under Registry Events allows you to choose from different registry events, including the one youΓÇÖre hunting for, **RegistryValueDeleted**.
+Selecting EventType under Registry Events allows you to choose from different registry events, including the one you're hunting for, **RegistryValueDeleted**.
![Screenshot of EventType RegistryValueDeleted](../../media/guided-hunting/hunt-specific-events-2.png)
Selecting EventType under Registry Events allows you to choose from different re
>`EventType` is the equivalent of `ActionType` in the data schema, which users of advanced mode might be more familiar with. ## Test your query with a smaller sample size
-If youΓÇÖre still working on your query and would like to see its performance and some sample results quickly, adjust the number of records to return by picking a smaller set through the **Sample size** dropdown menu.
+If you're still working on your query and would like to see its performance and some sample results quickly, adjust the number of records to return by picking a smaller set through the **Sample size** dropdown menu.
![Screenshot of sample size dropdown menu](../../media/guided-hunting/smaller-sample.png)
security Advanced Hunting Query Builder https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder.md
Follow the instructions in the blue teaching bubbles to construct your query. Se
## Try some queries ### Hunt for successful connections to specific IP
-To hunt for successful network communications to a specific IP address, start typing ΓÇ£ipΓÇ¥ to get suggested filters:
+To hunt for successful network communications to a specific IP address, start typing "ip" to get suggested filters:
![Screenshot of guided mode query builder hunt for successful connections to specific IP first filter](../../media/guided-hunting/query-builder-hunt-ip.png)
security Alert Grading Password Spray https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-password-spray.md
This means there's suspicious user activity originating from an IP address that
### 3. Investigate suspicious user activity after signing in
-Once a suspicious IP is recognized, you can review the accounts that signed in. ItΓÇÖs possible that a group of accounts were compromised and successfully used to sign in from the IP or other similar IPs.
+Once a suspicious IP is recognized, you can review the accounts that signed in. It's possible that a group of accounts were compromised and successfully used to sign in from the IP or other similar IPs.
Filter all successful attempts to sign in from the IP address around and shortly after the time of the alerts. Then search for malicious or unusual activities in such accounts after signing in.
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-microsoft-threat-experts.md
You can filter your incidents and alerts if you want to only see the Defender Ex
## Subscribe to Microsoft Defender Experts - Experts on Demand > [!NOTE]
-> Experts on Demand is not a security incident response service. ItΓÇÖs intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
+> Experts on Demand is not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
If you're already a Microsoft Defender for Endpoint customer, you can contact your Microsoft representative to subscribe to Microsoft Defender Experts - Experts on Demand.
security Microsoft Secure Score Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md
New Microsoft Defender for Office 365 recommendations for anti-phishing policies
- Quarantine messages that are detected from impersonated users - Quarantine messages that are detected from impersonated domains - Move messages that are detected as impersonated users by mailbox intelligence-- Enable the ΓÇÿshow first contact safety tipΓÇÖ option
+- Enable the 'show first contact safety tip' option
- Enable the user impersonation safety tip - Enable the domain impersonation safety tip - Enable the user impersonation unusual characters safety tip
New Microsoft Defender for Office 365 recommendations are now available as Secur
- Set action to take on bulk spam detection - Retain spam in quarantine for 30 days - Ensure spam safety tips are enabled
- - Ensure that no sender domains are allowed for anti-spam policies (will replace ΓÇ£Ensure that there are no sender domains allowed for Anti-spam policiesΓÇ¥ to extend functionality also for specific senders)
+ - Ensure that no sender domains are allowed for anti-spam policies (will replace "Ensure that there are no sender domains allowed for Anti-spam policies" to extend functionality also for specific senders)
- **Anti-spam - Outbound policy** - Set maximum number of external recipients that a user can email per hour
security Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-threat-experts.md
Once your application is approved, you'll start receiving endpoint attack notifi
## Subscribe to Microsoft Defender Experts - Experts on Demand > [!NOTE]
-> Experts on Demand is not a security incident response service. ItΓÇÖs intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
+> Experts on Demand is not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
Contact your Microsoft representative to subscribe to Experts on Demand. See [Configure Microsoft Defender Experts capabilities](./configure-microsoft-threat-experts.md) for full details.
security Allow Block Email Spoof https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/allow-block-email-spoof.md
You can create block entries for domains and email addresses directly in the Ten
Email messages from these senders are marked as *high confidence spam* (SCL = 9). What happens to the messages is determined by the [anti-spam policy](configure-your-spam-filter-policies.md) that detected the message for the recipient. In the default anti-spam policy and new custom policies, messages that are marked as high confidence spam are delivered to the Junk Email folder by default. In Standard and Strict [preset security policies](preset-security-policies.md), high confidence spam messages are quarantined. > [!NOTE]
-> Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): `550 5.7.703 Your message can't be delivered because one or more recipients are blocked by your organization's tenant recipient block policy.`
+> Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): `550 5.7.703 Your message can't be delivered because one or more recipients are blocked by your organization's tenant recipient block policy.` The entire message is blocked for all recipients of the message, even if only one recipient email address or domain is defined in a block entry.
1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
security Investigate Malicious Email That Was Delivered https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/investigate-malicious-email-that-was-delivered.md
Title: Investigate malicious email that was delivered in Microsoft 365, Find and investigate malicious email keywords: TIMailData-Inline, Security Incident, incident, Microsoft Defender for Endpoint PowerShell, email malware, compromised users, email phish, email malware, read email headers, read headers, open email headers,special actions
+f1.keywords:
- NOCSH
audience: ITPro
ms.localizationpriority: medium
+search.appverid:
- MET150 - MOE150 ms.assetid: 8f54cd33-4af7-4d1b-b800-68f8818e5b2a-+ - m365-security description: Learn how to use threat investigation and response capabilities to find and investigate malicious email.-+ - seo-marvel-apr2020
Threat Explorer is a powerful report that can serve multiple purposes, such as f
*Submissions* view shows up all mails submitted by admin or user that were reported to Microsoft.
-4. **Search and filter in Threat Explorer**: Filters appear at the top of the page in the search bar to help admins in their investigations. Notice that multiple filters can be applied at the same time, and multiple comma-separated values added to a filter to narrow down the search. Remember:
+3. **Search and filter in Threat Explorer**: Filters appear at the top of the page in the search bar to help admins in their investigations. Notice that multiple filters can be applied at the same time, and multiple comma-separated values added to a filter to narrow down the search. Remember:
- Filters do exact matching on most filter conditions. - Subject filter uses a CONTAINS query.
Threat Explorer is a powerful report that can serve multiple purposes, such as f
- URL domain, URL path, and URL domain and path filters don't require a protocol to filter. - You must click the Refresh icon every time you change the filter values to get relevant results.
-5. **Advanced filters**: With these filters, you can build complex queries and filter your data set. Clicking on *Advanced Filters* opens a flyout with options.
+4. **Advanced filters**: With these filters, you can build complex queries and filter your data set. Clicking on *Advanced Filters* opens a flyout with options.
Advanced filtering is a great addition to search capabilities. A boolean NOT on the **Recipient**, **Sender** and **Sender domain** filters allows admins to investigate by excluding values. This option is the **Equals none of** selection. This option allows admins to exclude unwanted mailboxes from investigations (for example, alert mailboxes and default reply mailboxes), and is useful for cases where admins search for a specific subject (for example, Attention) where the Recipient can be set to *Equals none of: defaultMail@contoso.com*. This is an exact value search.
Threat Explorer is a powerful report that can serve multiple purposes, such as f
:::image type="content" source="../../media/tp-InvestigateMalEmail-FilterbyHours.png" alt-text="The filtering by hours option" lightbox="../../media/tp-InvestigateMalEmail-FilterbyHours.png":::
-6. **Fields in Threat Explorer**: Threat Explorer exposes a lot more security-related mail information such as *Delivery action*, *Delivery location*, *Special action*, *Directionality*, *Overrides*, and *URL threat*. It also allows your organization's security team to investigate with a higher certainty.
+5. **Fields in Threat Explorer**: Threat Explorer exposes a lot more security-related mail information such as *Delivery action*, *Delivery location*, *Special action*, *Directionality*, *Overrides*, and *URL threat*. It also allows your organization's security team to investigate with a higher certainty.
*Delivery action* is the action taken on an email due to existing policies or detections. Here are the possible actions an email can take:
Threat Explorer is a powerful report that can serve multiple purposes, such as f
**URL threat**: The URL threat field has been included on the *details* tab of an email to indicate the threat presented by a URL. Threats presented by a URL can include *Malware*, *Phish*, or *Spam*, and a URL with *no threat* will say *None* in the threats section.
-7. **Email timeline view**: Your security operations team might need to deep-dive into email details to investigate further. The email timeline allows admins to view actions taken on an email from delivery to post-delivery. To view an email timeline, click on the subject of an email message, and then click Email timeline. (It appears among other headings on the panel like Summary or Details.) These results can be exported to spreadsheet.
+6. **Email timeline view**: Your security operations team might need to deep-dive into email details to investigate further. The email timeline allows admins to view actions taken on an email from delivery to post-delivery. To view an email timeline, click on the subject of an email message, and then click Email timeline. (It appears among other headings on the panel like Summary or Details.) These results can be exported to spreadsheet.
Email timeline will open to a table that shows all delivery and post-delivery events for the email. If there are no further actions on the email, you should see a single event for the original delivery that states a result, such as *Blocked*, with a verdict like *Phish*. Admins can export the entire email timeline, including all details on the tab and email (such as, Subject, Sender, Recipient, Network, and Message ID). The email timeline cuts down on randomization because there is less time spent checking different locations to try to understand events that happened since the email arrived. When multiple events happen at, or close to, the same time on an email, those events show up in a timeline view.
-8. **Preview / download**: Threat Explorer gives your security operations team the details they need to investigate suspicious email. Your security operations team can either:
+7. **Preview / download**: Threat Explorer gives your security operations team the details they need to investigate suspicious email. Your security operations team can either:
- [Check the delivery action and location](#check-the-delivery-action-and-location).
security Manage Tenant Allow Block List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/manage-tenant-allow-block-list.md
Use the Submissions portal (also known as *admin submission*) at <https://securi
- **Domains and email addresses**: - Email messages from these senders are marked as *high confidence spam* (SCL = 9). What happens to the messages is determined by the [anti-spam policy](configure-your-spam-filter-policies.md) that detected the message for the recipient. In the default anti-spam policy and new custom policies, messages that are marked as high confidence spam are delivered to the Junk Email folder by default. In Standard and Strict [preset security policies](preset-security-policies.md), high confidence spam messages are quarantined.
- - Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): '550 5.7.703 Your message can't be delivered because one or more recipients are blocked by your organization's tenant recipient block policy.'
+ - Users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): '550 5.7.703 Your message can't be delivered because one or more recipients are blocked by your organization's tenant recipient block policy'. The entire message is blocked for all recipients of the message, even if only one recipient email address or domain is defined in a block entry.
> [!NOTE] > To block only spam from a specific sender, add the email address or domain to the block list in [anti-spam policies](configure-your-spam-filter-policies.md). To block all email from the sender, use **Domains and email addresses** in the Tenant Allow/Block List.
security Report Junk Email Messages To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/report-junk-email-messages-to-microsoft.md
Watch this video that shows more information about the unified submissions exper
> When you report an email entity to Microsoft, we copy everything associated with the email to include it in our continual algorithm reviews. This copy includes the email content, email headers, and related data about email routing. Any message attachments are also included. > > Microsoft treats your feedback as your organization's permission for us to analyze all of the previously described information to fine tune the message hygiene algorithms. We hold your message in our secure audited datacenters in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and attachments, which is normally not permitted for email in Microsoft 365. However, your email is still treated as confidential between you and Microsoft, and we will not provide your email or attachments to any other party as part of the review process.
+>
+> Information is blocked from going outside the organization when data is not supposed to leave the tenant boundary for compliance purposes (for example, in U.S. Government organizations: Microsoft 365 GCC, GCC High, and DoD). Reporting a message or file to Microsoft from one of these organizations will have the following message in the result details:
+>
+> **Further investigation needed**. Your tenant does not allow data to leave the environment, so we could not find anything with an initial scan. You'll need to contact Microsoft support to have this item reviewed.
security Responding To A Compromised Email Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account.md
To unblock a mailbox from sending mail, follow the procedures in [Removing a use
## See also - [Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Microsoft 365](detect-and-remediate-outlook-rules-forms-attack.md)
+- [Detect and Remediate Illicit Consent Grants](detect-and-remediate-illicit-consent-grants.md)
- [Internet Crime Complaint Center](https://www.ic3.gov/Home/Ransomware) - [Securities and Exchange Commission - "Phishing" Fraud](https://www.sec.gov/investor/pubs/phishing.htm) - To report spam email directly to Microsoft and your admin [Use the Report Message add-in](https://support.microsoft.com/office/b5caa9f1-cdf3-4443-af8c-ff724ea719d2)
security Defense In Depth Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/defense-in-depth-guide.md
search.appverid: met150
This guide is for you if: -- YouΓÇÖre licensed for Microsoft Defender for Office 365 and host your mailboxes in Office 365
+- You're licensed for Microsoft Defender for Office 365 and host your mailboxes in Office 365
- You're also using a third party for your email security The information below will detail how to get the most out of your investment, broken down into easy to follow steps.
The information below will detail how to get the most out of your investment, br
**Read more here:** [Anti-phishing policies](../set-up-anti-phishing-policies.md) -- If your current security provider is configured to modify messages *in any way*, itΓÇÖs important to note that authentication signals can impact the ability for Defender for Office to protect you against attacks such as spoofing. If your third party supports Authenticated Received Chain (ARC), then enabling this is a highly recommended step in your journey to advanced dual filtering. Moving any message modification configuration to Defender for Office 365 is also an alternative.
+- If your current security provider is configured to modify messages *in any way*, it's important to note that authentication signals can impact the ability for Defender for Office to protect you against attacks such as spoofing. If your third party supports Authenticated Received Chain (ARC), then enabling this is a highly recommended step in your journey to advanced dual filtering. Moving any message modification configuration to Defender for Office 365 is also an alternative.
**Read more here:** [Use Trusted ARC senders for legitimate devices and services between the sender and receiver](../use-arc-exceptions-to-mark-trusted-arc-senders.md)
The information below will detail how to get the most out of your investment, br
### Education features -- Attack simulation training allows you to run realistic but benign cyber-attack scenarios in your organization. If you don't already have phishing simulation capabilities from your primary email security provider, MicrosoftΓÇÖs simulated attacks can help you identify and find vulnerable users, policies, and practices. This is important knowledge to have and correct *before* a real attack impacts your organization. Post simulation we assign in product or custom training to educate users about the threats they missed, ultimately reducing your organization's risk profile. With Attack simulation training we deliver messages directly into the inbox, so the user experience is rich. This also means no security changes such as overrides needed to get simulations delivered correctly.
+- Attack simulation training allows you to run realistic but benign cyber-attack scenarios in your organization. If you don't already have phishing simulation capabilities from your primary email security provider, Microsoft's simulated attacks can help you identify and find vulnerable users, policies, and practices. This is important knowledge to have and correct *before* a real attack impacts your organization. Post simulation we assign in product or custom training to educate users about the threats they missed, ultimately reducing your organization's risk profile. With Attack simulation training we deliver messages directly into the inbox, so the user experience is rich. This also means no security changes such as overrides needed to get simulations delivered correctly.
**Get started here:** [Get started using Attack simulation](../attack-simulation-training-get-started.md)
security Track And Respond To Emerging Threats With Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/track-and-respond-to-emerging-threats-with-campaigns.md
A campaign might be short-lived, or could span several days, weeks, or months wi
## Investigating a suspicious email campaign using threat reports
-In the event that a campaign has targeted your organization and youΓÇÖd like to learn more about the impact:
+In the event that a campaign has targeted your organization and you'd like to learn more about the impact:
1. Navigate to the [campaign page](https://security.microsoft.com/campaigns). 1. Select the campaign name that you would like to investigate.
In the event that a campaign has targeted your organization and youΓÇÖd like to
1. Below the flow diagram, select the **URL clicks** tab to display information regarding the click. Here you can see the user that clicked on a URL, if the user is tagged as a priority account user, the URL itself, and the time of click. 1. If you want to learn more about the inboxed and clicked messages, select **Explore messages** \> **Inboxed messages**. A new tab will open and navigate to Threat Explorer. 1. In the **details view** of Explorer you can reference **Latest delivery** to determine if a message is still in the inbox or was moved into quarantine by system ZAP. *To get more details about the specific message, select the message. The flyout provides extra information. Upon selecting the **Open email entity page** on the top left of the flyout, a new tab will open and give you further information about the message.*
-1. If you would like to take an action and move the messages out of the inbox, you can select the message and then select **Message actions** \> **Move to junk folder**. This will ensure your user doesnΓÇÖt continue to interact with the malicious message that could result in a potential breach.
+1. If you would like to take an action and move the messages out of the inbox, you can select the message and then select **Message actions** \> **Move to junk folder**. This will ensure your user doesn't continue to interact with the malicious message that could result in a potential breach.
## Next steps
security Utilize Microsoft Defender For Office 365 In Sharepoint Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md
search.appverid: met150
# Use Microsoft Defender for Office 365 with SharePoint Online
-Microsoft SharePoint Online is a widely used user collaboration and file storage tool. The following steps help reduce the attack surface area in SharePoint Online and that help keep this collaboration tool in your organization secure. However, itΓÇÖs important to note there is a balance to strike between security and productivity, and not all these steps may be relevant for your organizational risk profile. Take a look, test, and maintain that balance.
+Microsoft SharePoint Online is a widely used user collaboration and file storage tool. The following steps help reduce the attack surface area in SharePoint Online and that help keep this collaboration tool in your organization secure. However, it's important to note there is a balance to strike between security and productivity, and not all these steps may be relevant for your organizational risk profile. Take a look, test, and maintain that balance.
## What you'll need
If licensed for Microsoft Defender for Office 365 **(free 90-day evaluation avai
To learn more, read [Step 1: Use the Microsoft 365 Defender portal to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/microsoft-365/security/office-365-security/turn-on-mdo-for-spo-odb-and-teams#step-1-use-the-microsoft-365-defender-portal-to-turn-on-safe-attachments-for-sharepoint-onedrive-and-microsoft-teams).
-1. Sign in to the [security centerΓÇÖs safe attachments configuration page](https://security.microsoft.com/safeattachmentv2).
+1. Sign in to the [security center's safe attachments configuration page](https://security.microsoft.com/safeattachmentv2).
1. Select **Global settings**. 1. Ensure that **Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** is set to **on**. 1. Select **Save**.
security User Submission https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-submission.md
The related configuration options are described in the following sections.
When **Microsoft Outlook Report Message button** is **On** ![Toggle on.](../../media/scc-toggle-on.png), the following settings are available on the **User submissions** page: -- **Send the reported messages to** section: Select one of the following options:
+- **Use Microsoft's integrated report experience** section:
- - **Microsoft**: The user reports go directly to Microsoft for analysis. Only the metadata such as sender, recipient, reported by, and the message details from the user reports are provided to the tenant admin via the Microsoft 365 Defender portal.
+ - **Send the reported messages to** section: Select one of the following options:
- - **Microsoft and my organization's mailbox**: In the box that appears, enter the email address of an existing Exchange Online mailbox to use as the user submissions mailbox. Distribution groups are not allowed. User submissions go to Microsoft for analysis and to the user submissions mailbox for an admin or security operations team to analyze.
+ - **Microsoft (Recommended)**: The user reports go directly to Microsoft for analysis. Only the metadata such as sender, recipient, reported by, and the message details from the user reports are provided to the tenant admin via the Microsoft 365 Defender portal.
- - **My organization's mailbox**: In the box that appears, enter the email address of an existing Exchange Online mailbox. Distribution groups are not allowed. User submissions go only to the user submissions mailbox for an admin or the security operations team to analyze. Messages don't go to Microsoft for analysis unless an admin manually submits the messages.
+ - **Microsoft and my organization's mailbox**: In the box that appears, enter the email address of an existing Exchange Online mailbox to use as the user submissions mailbox. Distribution groups are not allowed. User submissions go to Microsoft for analysis and to the user submissions mailbox for an admin or security operations team to analyze.
- > [!IMPORTANT]
- > In U.S. Government organizations (GCC, GCC High, and DoD) organizations, the only available selection in the **Send the reported messages to** section is **My organization's mailbox**. The other two options are grayed out.
- >
- > If you used [Outlook on the web mailbox policies](/exchange/clients-and-mobile-in-exchange-online/outlook-on-the-web/configure-outlook-web-app-mailbox-policy-properties) to disable junk email reporting in Outlook on the web, but you select **Microsoft** or **Microsoft and my organization's mailbox**, users will be able to report messages to Microsoft in Outlook on the web using the Report Message add-in or the Report Phishing add-in.
- >
- > If you select **My organization's mailbox**, reported messages appear on the **User reported messages** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission>. But the **Result** value of these messages will always be empty, because the messages were not rescanned.
- >
- > If you use [Attack simulation training](attack-simulation-training-get-started.md) or a third-party product to do phishing simulations, you must configure the user submissions mailbox as a SecOps mailbox as previously described in the [Configuration requirements for the user submissions mailbox](#configuration-requirements-for-the-user-submissions-mailbox) section earlier in this article. If you don't, a user reporting a message might trigger a training assignment in the phishing simulation product.
+ - **My organization's mailbox**: In the box that appears, enter the email address of an existing Exchange Online mailbox. Distribution groups are not allowed. User submissions go only to the user submissions mailbox for an admin or the security operations team to analyze. Messages don't go to Microsoft for analysis unless an admin manually submits the messages.
- Regardless of your selection, the following settings are also available in the **Send the reported messages to** section:
+ > [!IMPORTANT]
+ > In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), the only available selection in the **Send the reported messages to** section is **My organization's mailbox**. The other two options are grayed out.
+ >
+ > If you used [Outlook on the web mailbox policies](/exchange/clients-and-mobile-in-exchange-online/outlook-on-the-web/configure-outlook-web-app-mailbox-policy-properties) to disable junk email reporting in Outlook on the web, but you select **Microsoft** or **Microsoft and my organization's mailbox**, users will be able to report messages to Microsoft in Outlook on the web using the Report Message add-in or the Report Phishing add-in.
+ >
+ > If you select **My organization's mailbox**, reported messages appear on the **User reported messages** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission>. But the **Result** value of these messages will always be empty, because the messages were not rescanned.
+ >
+ > If you use [Attack simulation training](attack-simulation-training-get-started.md) or a third-party product to do phishing simulations, you must configure the user submissions mailbox as a SecOps mailbox as previously described in the [Configuration requirements for the user submissions mailbox](#configuration-requirements-for-the-user-submissions-mailbox) section earlier in this article. If you don't, a user reporting a message might trigger a training assignment in the phishing simulation product.
- - **Let users choose if they want to report**: This setting controls the options that are available in the **Select reporting options that are available to users** section:
+ Regardless of your selection, the following settings are also available in the **Send the reported messages to** section:
- - **Let users choose if they want to report** selected: You can select some, all or none of the settings in the **Select reporting options that are available to users** section.
- - **Let users choose if they want to report** not selected: You can select only one setting in the **Select reporting options that are available to users** section.
+ - **Let users choose if they want to report**: This setting controls the options that are available in the **Select reporting options that are available to users** section:
- - **Select reporting options that are available to users** section:
- - **Ask me before sending the message**
- - **Always report the message**
- - **Never report the message**
+ - **Let users choose if they want to report** selected: You can select some, all or none of the settings in the **Select reporting options that are available to users** section.
+ - **Let users choose if they want to report** not selected: You can select only one setting in the **Select reporting options that are available to users** section.
-- **User reporting experience** section: The following settings are available:
+ - **Select reporting options that are available to users** section:
+ - **Ask me before sending the message**
+ - **Always report the message**
+ - **Never report the message**
- As shown on the page, if you select an option that sends the reported messages to Microsoft, the following text is also added to the notification:
+ - **User reporting experience** section: The following settings are available:
- > Your email will be submitted as-is to Microsoft for analysis. Some emails might contain personal or sensitive information.
+ As shown on the page, if you select an option that sends the reported messages to Microsoft, the following text is also added to the notification:
- - **Before reporting** tab: In the **Title** and **Message body** boxes, enter the descriptive text that users see before they report a message using the Report Message add-in or the Report Phishing add-in. You can use the variable `%type%` to include the submission type (junk, not junk, phishing, etc.).
- - **After reporting** tab: In the **Title** and **Confirmation message** boxes, enter the descriptive text that users see after they report a message using the Report Message add-in or the Report Phishing add-in. You can use the variable `%type%` to include the submission type.
+ > Your email will be submitted as-is to Microsoft for analysis. Some emails might contain personal or sensitive information.
- - **Only display when user reports phishing**: Select this option to display the **Before reporting** and **After reporting** notifications only when users report messages as phishing. Otherwise, the notifications are shown for all reported messages.
+ - **Before reporting** tab: In the **Title** and **Message body** boxes, enter the descriptive text that users see before they report a message using the Report Message add-in or the Report Phishing add-in. You can use the variable `%type%` to include the submission type (junk, not junk, phishing, etc.).
+ - **After reporting** tab: In the **Title** and **Confirmation message** boxes, enter the descriptive text that users see after they report a message using the Report Message add-in or the Report Phishing add-in. You can use the variable `%type%` to include the submission type.
-- **Email notifications for admin review results** section: The following settings are available:
+ - **Only display when user reports phishing**: Select this option to display the **Before reporting** and **After reporting** notifications only when users report messages as phishing. Otherwise, the notifications are shown for all reported messages.
- - **Specify Office 365 email address to use as sender**: Select this setting and enter the email address in the box that appears.
+ - **Email notifications for admin review results** section: The following settings are available:
+
+ - **Specify Office 365 email address to use as sender**: Select this setting and enter the email address in the box that appears.
- - **Customize notifications**: Click this link to customize the email notification that's sent after an admin reviews and marks a reported message.
+ - **Customize notifications**: Click this link to customize the email notification that's sent after an admin reviews and marks a reported message.
- On the **Customize confirmation message** flyout that appears, configure the following settings:
+ On the **Customize confirmation message** flyout that appears, configure the following settings:
- - **Phishing**, **Junk** and **No threats found** tabs: In the **Review result text** on some, none, or all of the tabs, enter the custom text to use.
- - **Footer** tab: The following options are available:
+ - **Phishing**, **Junk** and **No threats found** tabs: In the **Review result text** on some, none, or all of the tabs, enter the custom text to use.
+ - **Footer** tab: The following options are available:
- **Footer text**: Enter the custom message footer text to use. - **Display company logo**: Before you select this option, you need to follow the instructions in [Customize the Microsoft 365 theme for your organization](../../admin/setup/customize-your-organization-theme.md) to upload your custom logo.
- When you're finished on the **Customize confirmation message** flyout, click **Confirm**.
+ When you're finished on the **Customize confirmation message** flyout, click **Confirm**.
- **Customize your organization's experience when reporting potential threats in quarantine** section:
The message formatting requirements are described in the next section. The forma
When **Microsoft Outlook Report Message button** is **Off** ![Toggle off.](../../media/scc-toggle-off.png) the following settings are available on the **User submissions** page: -- **Microsoft and my organization's mailbox**: In the box that appears, enter the email address of an existing Exchange Online mailbox to use as the user submissions mailbox. Distribution groups are not allowed.
+- **Use Microsoft's integrated Outlook reporting experience** section:
+
+ **Use this custom mailbox to receive user reported messages**: Select this option and enter the email address of an existing Exchange Online mailbox to use as the user submissions mailbox. Distribution groups are not allowed.
- **Customize your organization's experience when reporting potential threats in quarantine** section:
security What S The Difference Between Junk Email And Bulk Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/what-s-the-difference-between-junk-email-and-bulk-email.md
EmailEvents
| summarize count() by SenderMailFromAddress, BulkComplaintLevel ```
-This query allows admins to identify wanted and unwanted senders. If a bulk sender has a BCL score that doesn't meet the bulk threshold, admins can [submit the senderΓÇÖs messages to Microsoft for analysis](allow-block-email-spoof.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal), which adds the sender as an allow entry to the Tenant Allow/Block List.
+This query allows admins to identify wanted and unwanted senders. If a bulk sender has a BCL score that doesn't meet the bulk threshold, admins can [submit the sender's messages to Microsoft for analysis](allow-block-email-spoof.md#use-the-microsoft-365-defender-portal-to-create-allow-entries-for-domains-and-email-addresses-in-the-submissions-portal), which adds the sender as an allow entry to the Tenant Allow/Block List.
Organizations without Defender for Office 365 Plan 2 can try the features in Microsoft 365 Defender for Office 365 Plan 2 for free. Use the 90-day Defender for Office 365 evaluation at <https://security.microsoft.com/atpEvaluation>. Learn about who can sign up and trial terms [here](try-microsoft-defender-for-office-365.md) or you can use the [Threat protection status report](view-email-security-reports.md#threat-protection-status-report) to identify wanted and unwanted bulk senders: