Updates from: 03/23/2022 02:36:06
Category Microsoft Docs article Related commit history on GitHub Change details
admin Sharepoint Site Usage Ww https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/activity-reports/sharepoint-site-usage-ww.md
The **SharePoint site usage** report can be viewed for trends over the last 7 da
|Unmanaged device policy | The site access policy for unmanaged devices. | |Geo location | The Geo location of the site. | |Files |The number of files on the site. |
-|Active files | The number of active files on the site.<br/> NOTE: If files were removed during the specified time period for the report, the number of active files shown in the report may be larger than the current number of files on the site. |
+|Active files | The number of active files on the site. A file is considered active if it has been saved, synced, modified, or shared within the specified time period.<br/> NOTE: If files were removed during the specified time period for the report, the number of active files shown in the report may be larger than the current number of files on the site. |
|Storage used (MB) |The amount of storage currently being used on the site. | |Storage allocated (MB) |The maximum amount of storage allocated for the site. | |Page views |The number of times pages were viewed on the site. |
admin Enable Modern Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/enable-modern-authentication.md
Title: "Enable Modern Authentication for Office 2013 on Windows devices"
+ Title: "Enable Modern authentication for Office 2013 on Windows devices"
f1.keywords: - NOCSH
audience: Admin
ms.localizationpriority: medium--- M365-subscription-management +
+- M365-subscription-management
- Adm_O365 - Adm_TOC-+ - AdminSurgePortfolio - okr_smb - AdminTemplateSet
ms.assetid: 7dc1c01a-090f-4971-9677-f1b192d6c910
description: "Learn to set registry keys to enable modern authentication for devices that have Microsoft Office 2013 installed."
-# Enable Modern Authentication for Office 2013 on Windows devices
+# Enable Modern authentication for Office 2013 on Windows devices
-To enable modern authentication for any Windows devices that have Office 2013 installed, you need to set specific registry keys.
-
-## Enable modern authentication for Office 2013 clients
-
-> [!NOTE]
-> Modern authentication is already enabled for Office 2016 clients, you do not need to set registry keys for Office 2016.
-
-To enable modern authentication for any devices running Windows (for example on laptops and tablets), that have Microsoft Office 2013 installed, you need to set the following registry keys. The keys need to be set on each device that you want to enable for modern authentication:
-
-<br>
-
-****
+Microsoft Office 2013 on Microsoft Windows computers supports Modern authentication. But, to turn it on, you need to configure the following registry keys:
|Registry key|Type|Value|
-|:|::|:|
+|:|::|::|
|HKEY_CURRENT_USER\Software\Microsoft\Exchange\AlwaysUseMSOAuthForAutoDiscover|REG_DWORD|1| |HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity\EnableADAL|REG_DWORD|1| |HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity\Version|REG_DWORD|1|
-Create or modify the following registry keys to force Outlook to use a newer authentication method for web services, such as EWS and Autodiscover. We recommend that users force Outlook to use Modern Authentication.
+> [!NOTE]
+> Modern authentication is already enabled in Office 2016 or later. You don't need to set these registry keys for later versions of Office.
-1. Exit Outlook.
+## Enable modern authentication for Office 2013 clients
-2. Start Registry Editor by using one of the following procedures, as appropriate for your version of Windows:
+1. Close Outlook.
- - **Windows 10, Windows 8.1, and Windows 8:** Press Windows Key + R to open a **Run** dialog box. Type *regedit.exe*, and then press **Enter.**
- - **Windows 7:** Click **Start**, type *regedit.exe* in the search box, and then press **Enter.**
+2. Copy and paste the following text into Notepad:
-3. In Registry Editor, locate and click the following registry subkey:
+ ```text
+ Windows Registry Editor Version 5.00
- ```console
- HKEY_CURRENT_USER\Software\Microsoft\Exchange\
- ```
+ [HKEY_CURRENT_USER\Software\Microsoft\Exchange]
+ "AlwaysUseMSOAuthForAutoDiscover"=dword:00000001
-4. If the *AlwaysUseMSOAuthForAutoDiscover* key is missing, on the Edit menu, point to **New** and then select **DWORD Value**. Type *AlwaysUseMSOAuthForAutoDiscover*, then press **Enter.**
+ [HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common]
-5. Right-click *AlwaysUseMSOAuthForAutoDiscover*, and then click **Modify.**
+ [HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity]
+ "EnableADAL"=dword:00000001
+ "Version"=dword:00000001
+ ```
-6. In the **Value** data box, type **1**, and then click **OK.**
+3. Save the file with the file extension .reg instead of .txt in a location that's easy for you to find. For example, `C:\Data\Office2013_Enable_ModernAuth.reg`.
-7. In Registry Editor, locate and click the following registry subkey:
+4. Open File Explorer (formerly known as Windows Explorer), browse to the location of the .reg file you just saved, and then double-click it.
- ```console
- HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity\
- ```
+5. In the **User account control** dialog that appears, click **Yes** to allow the app to make changes to your device.
-8. If the *EnableADAL* and *Version* keys already exist, modify the values if necessary, then exit Registry Editor. If they do not, on the Edit menu, point to **New** and then select **DWORD Value** to create the missing keys.
+6. In the **Registry Editor** warning dialog that appears, click **Yes** to accept the changes.
-9. For example, if the *EnableADAL* key is missing, type *EnableADAL*, and then press **Enter.**
+Once you've set the registry keys, you can set Office 2013 apps to use multifactor authentication (MFA) with Microsoft 365. For more information, see [Set up multifactor authentication](set-up-multi-factor-authentication.md).
-10. Right-click *EnableADAL*, and then click **Modify.**
+If you're currently signed in to any of Office client apps, you need to sign out and sign back in for the change to take effect. Otherwise, the MRU and roaming settings will be unavailable until the identity is established.
-11. In the **Value** data box, type **1**, and then click **OK.**
+## Disable modern authentication on devices
-12. Follow the same process for the Version key if necessary.
+The procedure to disable modern authentication on a device is very similar, but fewer registry keys are required, and you need to set their values to 0.
-13. **Exit Registry Editor.**
+|Registry key|Type|Value|
+||::|::|
+|HKEY_CURRENT_USER\Software\Microsoft\Exchange\AlwaysUseMSOAuthForAutoDiscover|REG_DWORD|0|
+|HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Common\Identity\EnableADAL|REG_DWORD|0|
-Once you've set the registry keys, you can set Office 2013 devices apps to use [multifactor authentication (MFA)](set-up-multi-factor-authentication.md) with Microsoft 365.
-
-If you're currently signed-in with any of the client apps, you need to sign out and sign back in for the change to take effect. Otherwise, the MRU and roaming settings will be unavailable until the identity is established.
-
-## Disable modern authentication on devices
+```text
+Windows Registry Editor Version 5.00
-To disable modern authentication on a device, set the following registry keys on the device:
+[HKEY_CURRENT_USER\Software\Microsoft\Exchange]
+"AlwaysUseMSOAuthForAutoDiscover"=dword:00000000
-<br>
+[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common]
-****
+[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Identity]
+"EnableADAL"=dword:00000000
+```
-|Registry key|Type|Value|
-|:|::|:|
-|HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Common\Identity\EnableADAL|REG_DWORD|0|
-|HKEY_CURRENT_USER\Software\Microsoft\Exchange\AlwaysUseMSOAuthForAutoDiscover|REG_DWORD|0|
-
## Related content
-[Sign in to Office 2013 with a second verification method](https://support.microsoft.com/office/2b856342-170a-438e-9a4f-3c092394d3cb) (article)\
-[Outlook prompts for password and doesn't use Modern Authentication to connect to Office 365](/outlook/troubleshoot/authentication/outlook-prompt-password-modern-authentication-enabled) (article)
+[Sign in to Office 2013 with a second verification method](https://support.microsoft.com/office/2b856342-170a-438e-9a4f-3c092394d3cb)
+
+[Outlook prompts for password and doesn't use Modern Authentication to connect to Office 365](/outlook/troubleshoot/authentication/outlook-prompt-password-modern-authentication-enabled)
compliance Compliance Easy Trials Compliance Playbook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/compliance-easy-trials-compliance-playbook.md
Proactively identify and protect against privacy risks such as data hoarding, da
**WhatΓÇÖs included**: For a full list of Microsoft 365 compliance solutions and features listed by product tier, view the [Feature Matrix](https://go.microsoft.com/fwlink/?linkid=2139145).
-**Microsoft Security Technical Content Library**: Explore this library to find interactive guides and other learning content relevant to your needs. [Visit Library](/security/content-library).
+**Microsoft Security Technical Content Library**: Explore this library to find interactive guides and other learning content relevant to your needs. [Visit Library](/security).
**Microsoft Security Resources**: From antimalware to Zero Trust, get all the relevant resources for your organizationΓÇÖs security needs. [Visit Resources](/security/business/resources).
compliance Device Onboarding Offboarding Macos Jamfpro Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/device-onboarding-offboarding-macos-jamfpro-mde.md
You can use JAMF Pro to onboard macOS devices into Microsoft 365 compliance solu
## Before you begin -- Make sure your [macOS devices are Azure AD joined](https://docs.jamf.com/10.30.0/jamf-pro/administrator-guide/Azure_AD_Integration.html)-- Make sure your [macOS devices are managed through JAMF pro](https://www.jamf.com/resources/product-documentation/jamf-pro-installation-guide-for-mac/) -- Install the v95+ Edge browser on your macOS devices
+- Make sure your [macOS devices are managed through JAMF pro](https://www.jamf.com/resources/product-documentation/jamf-pro-installation-guide-for-mac/) and are associated with an identity (Azure AD joined UPN) through JAMF Connect or Intune.
+- Install the v95+ Edge browser on your macOS devices
## Onboard devices into Microsoft 365 Compliance solutions using JAMF Pro
compliance Insider Risk Management Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-configure.md
If you don't have an existing Microsoft 365 Enterprise E5 plan and want to try i
## Recommended actions (preview)
-Recommended actions can help your organization quickly get started and to get the most out of insider risk management capabilities. Included on the **Overview** page, recommended actions help guide you through the steps to configure and deploy policies and to take investigation actions for user actions that generate alerts from policy matches.
+Recommended actions can help your organization quickly get with insider risk management. Included on the **Overview** page, recommended actions help guide you through the steps to configure and deploy policies.
![Insider risk management recommended actions.](../media/insider-risk-recommended-actions.png)
The following recommendations are available to help you get started with or maxi
- **Scan for potential insider risks**: Run an analytics scan to discover potential insider risks occurring in your org. After evaluating results, review recommended policies to set up. - **Assign permissions to others**: If there are additional team members who will be responsible for managing insider risk features, you'll need to assign them to the appropriate role groups. - **Create your first policy**: To receive alerts on potentially risky activities, you must set up policies based on predefined templates that define the user activities you want to detect and investigate.-- **Review user whose activity is being scored**: The **Users dashboard** allows you to view users whose activity is currently being assigned risk scores, regardless of whether that activity met the threshold to generate an alert.-- **Review alerts**: After a triggering event occurs for a user, policies start assigning risk scores to detected activity. If a risk score meets a policy's thresholds, you'll see an alert containing a detailed breakdown of all activity being scored for that user.-- **Investigate a case**: Cases are manually created from alerts when further investigation is needed to identify potential insider risks. Each case is scoped to a single user and multiple alerts for the user can be added to an existing case or to a new case. Each recommended action included in this experience has four attributes:
compliance Insider Risk Management Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/insider-risk-management-settings.md
Complete the following steps to turn off insider risk analytics:
## Admin notifications
-Admin notifications automatically send an email notification to users included in the *Insider Risk Management*, *Insider Risk Management Analysts*, and *Insider Risk Management Investigators* role groups when the first alert is generated for a new policy. This is enabled by default for all organizations and policies are checked every 24 hours for first-time alerts. Notifications aren't sent for any alerts that occur in policies after the first alert.
+Admin notifications automatically send an email notification to selectable insider risk management role groups. You can enable notifications and assign which role groups will receive the notifications for the following scenarios:
-If you've enabled insider risk management Analytics for your organization, members of the *Insider Risk Management Admin* role group automatically receive an email notification for initial analytics insights for data leaks, theft, and exfiltration activities.
+- Send a notification email when the first alert is generated for a new policy. Policies are checked every 24 hours for first-time alerts and notifications are not sent on subsequent alerts for the policy.
+- Send a daily email when new high severity alerts are generated. Policies are checked every 24 hours for high severity alerts.
+- Send a weekly email summarizing policies that have unresolved warnings
-If you prefer to disable admin notifications, complete the following steps:
+If you've enabled insider risk management analytics for your organization, members of the *Insider Risk Management Admin* role group automatically receive an email notification for initial analytics insights for data leaks, theft, and exfiltration activities.
+
+If you prefer to disable admin and analytics notifications, complete the following steps:
1. In the [Microsoft 365 compliance center](https://compliance.microsoft.com), go to **Insider risk management** > **Insider risk settings**. 2. Select the **Admin notifications** page.
If you prefer to disable admin notifications, complete the following steps:
- **Send an email notification when Analytics is turned off** 4. Select **Save** to configure and exit.-
-![Insider risk management admin notifications settings.](../media/insider-risk-admin-notifications.png)
compliance Records Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/records-management.md
A standard retention label has retention settings and actions but doesn't mark c
|Move within container <sup>3</sup>|Allowed |Allowed | Allowed| Allowed| |Move across containers <sup>3</sup>|Allowed |Allowed if never unlocked | **Blocked** | **Blocked**| |Open/Read|Allowed |Allowed | Allowed| Allowed|
-|Change label|Allowed |Allowed - container admin only | Allowed - container admin only| **Blocked**
-|Remove label|Allowed |Allowed - container admin only | Allowed - container admin only| **Blocked**
+|Change label|Allowed |Allowed - container admin only | **Blocked**| **Blocked**
+|Remove label|Allowed |Allowed - container admin only | **Blocked**| **Blocked**
Footnotes:
compliance Set Up Advanced Audit https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-advanced-audit.md
Advanced Audit features such as the ability to log crucial events such as MailIt
The logging of audit records for MailItemsAccessed and Send will begin within 24 hours. You have to perform Step 3 to start logging of two other Advanced Audit events: SearchQueryInitiatedExchange and SearchQueryInitiatedSharePoint.
-For organizations that assign licenses to groups of users by using group-based licensing, you have to turn off the licensing assignment for Microsoft 365 Advanced Auditing for the group. After you save your changes, verify that Microsoft 365 Advanced Auditing is turned off for the group. Then turn the licensing assignment for the group back on. For instructions about group-based licensing, see [Assign licenses to users by group membership in Azure Active Directory](/azure/active-directory/users-groups-roles/licensing-groups-assign).
-
-Also, if you have customized the mailbox actions that are logged on user mailboxes or shared mailboxes, any new Advanced Audit events released by Microsoft will not be automatically audited on those mailboxes. For information about changing the mailbox actions that are audited for each logon type, see the "Change or restore mailbox actions logged by default" section in [Manage mailbox auditing](enable-mailbox-auditing.md#change-or-restore-mailbox-actions-logged-by-default).
+Also, if you've customized the mailbox actions that are logged on user mailboxes or shared mailboxes, any new Advanced Audit events released by Microsoft won't be automatically audited on those mailboxes. For information about changing the mailbox actions that are audited for each logon type, see the "Change or restore mailbox actions logged by default" section in [Manage mailbox auditing](enable-mailbox-auditing.md#change-or-restore-mailbox-actions-logged-by-default).
## Step 2: Enable Advanced Audit events
managed-desktop Config Setting Ref https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/managed-desktop/working-with-managed-desktop/config-setting-ref.md
These requirements must be met for proxy server and proxy site exceptions:
- Must be a valid server address and port number. - URLs must be a valid http site.
+- Proxy exceptions should be limited to a maximum of 2064 characters. This includes added Microsoft Managed Desktop addresses.
### Customize and deploy proxies
security Microsoft 365 Security For Bdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/Microsoft-365-security-for-bdm.md
search.appverid:
This article discusses some of the most common threat and attack scenarios currently faced by organizations for their Microsoft 365 environments, and recommended actions for mitigating these risks. While Microsoft 365 comes with a wide array of pre-configured security features, it also requires you as the customer to take responsibility to secure your own identities, data, and devices used to access cloud services. This guidance was developed by Kozeta Beam (Microsoft Cloud Security Architect) and Thiagaraj Sundararajan (Microsoft Senior Consultant).
-This article is organized by priority of work, starting with protecting those accounts used to administer the most critical services and assets, such as your tenant, e-mail, and SharePoint. It provides a methodical way for approaching security and works together with the following spreadsheet so you can track your progress with stakeholders and teams across your organization: [Microsoft 365 security for BDMs spreadsheet](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/Microsoft-365-BDM-security-recommendations-spreadsheet.xlsx).
+This article is organized by priority of work, starting with protecting those accounts used to administer the most critical services and assets, such as your tenant, e-mail, and SharePoint. It provides a methodical way for approaching security and works together with the following spreadsheet so you can track your progress with stakeholders and teams across your organization: [Microsoft 365 security for BDMs spreadsheet](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/Microsoft-365-BDM-security-recommendations-spreadsheet.xlsx).
-[![Thumb image Microsoft 365 BDM security recommendations spreadsheet.](../downloads/microsoft-365-bdm-security-recommendations-spreadsheet-thumb.png)](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/Microsoft-365-BDM-security-recommendations-spreadsheet.xlsx)
Microsoft provides you with the Secure Score tool within your tenant to automatically analyze your security posture based on your regular activities, assign a score, and provide security improvement recommendations. Before taking the actions recommended in this article, take note of your current score and recommendations. The actions recommended in this article will increase your score. The goal is not to achieve the max score, but to be aware of opportunities to protect your environment in a way that does not negatively affect productivity for your users. See [Microsoft Secure Score](defender/microsoft-secure-score.md).
-![Follow these steps to mitigate risks to your business.](../media/security/security-for-bdms-overview.png)
-One more thing before we get started . . . be sure to [turn on the audit log](../compliance/search-the-audit-log-in-security-and-compliance.md). You'll need this data later, in the event you need to investigate an incident or a breach.
+One more thing before we get started . . . be sure to [turn on the audit log](../compliance/search-the-audit-log-in-security-and-compliance.md). You'll need this data later, in the event you need to investigate an incident or a breach.
## Protect privileged accounts
-As a first step, we recommend ensuring critical accounts in the environment are given an extra layer of protection as these accounts have access and permissions to manage and alter critical services and resources, which can negatively impact the entire organization, if compromised. Protecting privileged accounts is one of the most effective ways to protect against an attacker who seeks to elevate the permissions of a compromised account to an administrative one.
+As a first step, we recommend ensuring critical accounts in the environment are given an extra layer of protection as these accounts have access and permissions to manage and alter critical services and resources, which can negatively impact the entire organization, if compromised. Protecting privileged accounts is one of the most effective ways to protect against an attacker who seeks to elevate the permissions of a compromised account to an administrative one.
|Recommendation |E3 |E5 | ||||
-|Enforce multifactor authentication (MFA) for all administrative accounts.|![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png)|
+|Enforce multifactor authentication (MFA) for all administrative accounts.|![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png)|
|Implement Azure Active Directory (Azure AD) Privileged Identity Management (PIM) to apply just-in-time privileged access to Azure AD and Azure resources. You can also discover who has access and review privileged access.| | ![green check mark.](../media/green-check-mark.png)| |Implement privileged access management to manage granular access control over privileged admin tasks in Office 365. | | ![green check mark.](../media/green-check-mark.png)|
-|Configure and use Privileged Access Workstations (PAW) to administer services. Do not use the same workstations for browsing the Internet and checking email not related to your administrative account.| ![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png) |
+|Configure and use Privileged Access Workstations (PAW) to administer services. Do not use the same workstations for browsing the Internet and checking email not related to your administrative account.| !![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png)::: |
The following diagram illustrates these capabilities.
-![Recommended capabilities for protecting privileged accounts.](../media/m365-security-bdm-illustrations-privileged-accounts.png)
Additional recommendations:-- Ensure accounts that are synchronized from on-premises are not assigned admin roles for cloud services. This helps prevent an attacker from applying on-premises accounts to gain administrative access to cloud services. +
+- Ensure accounts that are synchronized from on-premises are not assigned admin roles for cloud services. This helps prevent an attacker from applying on-premises accounts to gain administrative access to cloud services.
- Ensure service accounts are not assigned admin roles. These accounts are often not monitored and set with passwords that do not expire. Start by ensuring the AADConnect and ADFS services accounts are not Global Admins by default.-- Remove licenses from admin accounts. Unless there is a specific use case to assign licenses to specific admin accounts, remove licenses from these accounts.
+- Remove licenses from admin accounts. Unless there is a specific use case to assign licenses to specific admin accounts, remove licenses from these accounts.
## Reduce the surface of attack The next focus area is reducing the surface of attack. This can be accomplished with minimal effort and impact to your users and services. By reducing the surface area of attack, attackers have fewer ways to launch an attack against your organization. Here are some examples:-- Disable POP3, IMAP, and SMTP protocols. Most modern organizations no longer use these older protocols. You can safely disable these and allow exceptions only as needed. -- Reduce and keep the number of Global Admins in the tenant to the absolute minimum required. This directly reduces the surface area of attack for all Cloud applications. -- Retire servers and applications that are no longer used in your environment. -- Implement a process for disabling and deleting accounts that are no longer used. +
+- Disable POP3, IMAP, and SMTP protocols. Most modern organizations no longer use these older protocols. You can safely disable these and allow exceptions only as needed.
+- Reduce and keep the number of Global Admins in the tenant to the absolute minimum required. This directly reduces the surface area of attack for all Cloud applications.
+- Retire servers and applications that are no longer used in your environment.
+- Implement a process for disabling and deleting accounts that are no longer used.
## Protect against known threats
-Known threats include malware, compromised accounts, and phishing. Some protections against these threats can be implemented quickly with no direct impact to your users, while others require more planning and user training.
+Known threats include malware, compromised accounts, and phishing. Some protections against these threats can be implemented quickly with no direct impact to your users, while others require more planning and user training.
|Recommendation |E3 |E5 | ||||
Known threats include malware, compromised accounts, and phishing. Some protecti
|**Block connections from countries that you don't do business with**. Create an Azure AD conditional access policy to block any connections coming from these countries, effectively creating a geo firewall around your tenant.| |![green check mark.](../media/green-check-mark.png)| The following diagram illustrates these capabilities.
-![Recommended capabilities for protecting against known threats.](../media/m365-security-bdm-illustrations-known-threats.png)
## Protect against unknown threats
-After adding extra protections to your privileged accounts and protecting against known attacks, shift your attention to protecting against unknown threats. The more determined and advanced adversaries use innovative and new, unknown methods to attack organizations. With Microsoft's vast telemetry of data gathered over billions of devices, applications, and services, we are able to perform Defender for Office 365 on Windows, Office 365, and Azure to prevent against Zero-Day attacks, utilizing sand box environments, and checking validity before allowing access to your content.
-
+After adding extra protections to your privileged accounts and protecting against known attacks, shift your attention to protecting against unknown threats. The more determined and advanced adversaries use innovative and new, unknown methods to attack organizations. With Microsoft's vast telemetry of data gathered over billions of devices, applications, and services, we are able to perform Defender for Office 365 on Windows, Office 365, and Azure to prevent against Zero-Day attacks, utilizing sand box environments, and checking validity before allowing access to your content.
|Recommendation |E3 |E5 | ||||
-|**Configure Microsoft Defender for Office 365**:<br>* Safe Attachments<br>* Safe Links<br>* Microsoft Defender for Endpoint for SharePoint, OneDrive, and Microsoft Teams<br>* Anti-phishing in Defender for Office 365 protection| |![green check mark.](../media/green-check-mark.png) |
-|**Configure Microsoft Defender for Endpoint capabilities**:<br>* Windows Defender Antivirus <br>* Exploit protection <br> * Attack surface reduction <br> * Hardware-based isolation <br>* Controlled folder access | |![green check mark.](../media/green-check-mark.png) |
+|**Configure Microsoft Defender for Office 365**:<br>*Safe Attachments<br>* Safe Links<br>*Microsoft Defender for Endpoint for SharePoint, OneDrive, and Microsoft Teams<br>* Anti-phishing in Defender for Office 365 protection| |![green check mark.](../media/green-check-mark.png) |
+|**Configure Microsoft Defender for Endpoint capabilities**:<br>*Windows Defender Antivirus <br>* Exploit protection <br> *Attack surface reduction <br>* Hardware-based isolation <br>* Controlled folder access | |![green check mark.](../media/green-check-mark.png) |
|**Use Microsoft Defender for Cloud Apps** to discover SaaS apps and begin to use behavior analytics and anomaly detection. | |![green check mark.](../media/green-check-mark.png) | The following diagram illustrates these capabilities.
-![Recommended capabilities for protecting against unknown threats.](../media/m365-security-bdm-illustrations-unknown-threats.png)
Additional recommendations:+ - Secure partner channel communications like Emails using TLS. - Open Teams Federation only to Partners you communicate with.-- Do not add sender domains, individual senders, or source IPs to your allowlist as this allows these to bypass spam and malware checks ΓÇö A common practice with customers is adding their own accepted domains or many other domains where email flow issues may have been reported to the allowlist. Do not add domains in the Spam and Connection Filtering list as this potentially bypasses all spam checks.
+- Do not add sender domains, individual senders, or source IPs to your allowlist as this allows these to bypass spam and malware checks ΓÇö A common practice with customers is adding their own accepted domains or many other domains where email flow issues may have been reported to the allowlist. Do not add domains in the Spam and Connection Filtering list as this potentially bypasses all spam checks.
- Enable outbound spam notifications ΓÇö Enable outbound spam notifications to a distribution list internally to the Helpdesk or IT Admin team to report if any of the internal users are sending out Spam emails externally. This could be an indicator that the account has been compromised.-- Disable Remote PowerShell for all users ΓÇö Remote PowerShell is mainly used by Admins to access services for administrative purposes or programmatic API access. We recommended disabling this option for non-Admin users to avoid reconnaissance unless they have a business requirement to access it. -- Block access to the Microsoft Azure Management portal to all non-administrators. You can accomplish this by creating a conditional access rule to block all users, except for admins. -
+- Disable Remote PowerShell for all users ΓÇö Remote PowerShell is mainly used by Admins to access services for administrative purposes or programmatic API access. We recommended disabling this option for non-Admin users to avoid reconnaissance unless they have a business requirement to access it.
+- Block access to the Microsoft Azure Management portal to all non-administrators. You can accomplish this by creating a conditional access rule to block all users, except for admins.
## Assume breach
-While Microsoft takes every possible measure to prevent against threats and attacks, we recommend always working under the "Assume Breach" mindset. Even if an Attacker has managed to intrude into the environment, we need to make sure they are unable to exfiltrate data or identity information from the environment. For this reason, we recommend enabling protection against sensitive data leaks such as Social Security numbers, credit cards numbers, other personal information, and other organizational level confidential information.
-
-The "Assume Breach" mindset requires implementing a Zero Trust network strategy, which means users are not fully trusted just because they are internal to the network. Instead, as part of authorization of what users can do, sets of conditions are specified, and when such conditions are met, certain controls are enforced. Conditions may include device health status, application being accessed, operations being performed, and user risk. For example, a device enrollment action should always trigger MFA authentication to ensure no rouge devices are added to your environment.
-
-A Zero Trust network strategy also requires that you know where your information is stored and apply appropriate controls for classification, protection, and retention. To effectively protect your most critical and sensitive assets you need to first identify where these are located and take inventory, which can be challenging. Next, work with your organization to define a governance strategy. Defining a classification schema for an organization and configuring policies, labels, and conditions require careful planning and preparation. It is important to realize that this is not an IT driven process. Be sure to work with your legal and compliance team to develop an appropriate classification and labeling schema for your organization's data.
-
-Microsoft 365 information protection capabilities can help you discover what information you have, where it is stored, and which information requires extra protection. Information protection is a continuous process and Microsoft 365 capabilities provide you with visibility into how users are using and distributing sensitive information, where your information is currently stored, and where it flows. You can also see how users handling information that is regulated to be sure the appropriate labels and protections are applied.
+While Microsoft takes every possible measure to prevent against threats and attacks, we recommend always working under the "Assume Breach" mindset. Even if an Attacker has managed to intrude into the environment, we need to make sure they are unable to exfiltrate data or identity information from the environment. For this reason, we recommend enabling protection against sensitive data leaks such as Social Security numbers, credit cards numbers, other personal information, and other organizational level confidential information.
|Recommendation |E3|E5 | ||||
-|**Review and optimize your conditional access and related policies to align with your objectives for a Zero Trust network**. Protecting against known threats includes implementing a set of [recommended policies](./office-365-security/microsoft-365-policies-configurations.md). Review your implementation of these policies to ensure you're protecting your apps and data against hackers who have gained access to your network. The recommended Intune app protection policy for Windows 10 enables Windows Information Protection (WIP). WIP protects against accidental leaks of your organization data through apps and services, like email, social media, and the public cloud. | |![green check mark.](../media/green-check-mark.png)|
+|**Review and optimize your conditional access and related policies to align with your objectives for a zero trust network**. Protecting against known threats includes implementing a set of [recommended policies](./office-365-security/microsoft-365-policies-configurations.md). Review your implementation of these policies to ensure you're protecting your apps and data against hackers who have gained access to your network. The recommended Intune app protection policy for Windows 10 enables Windows Information Protection (WIP). WIP protects against accidental leaks of your organization data through apps and services, like email, social media, and the public cloud. | |![green check mark.](../media/green-check-mark.png)|
|**Disable external email forwarding**. Hackers who gain access to a user's mailbox can steal your mail by setting the mailbox to automatically forward email. This can happen even without the user's awareness. You can prevent this from happening by configuring a mail flow rule.|![green check mark.](../media/green-check-mark.png) |![green check mark.](../media/green-check-mark.png)| |**Disable anonymous external calendar sharing**. By default external anonymous calendar sharing is allowed. [Disable calendar sharing](/exchange/sharing/sharing-policies/modify-a-sharing-policy) to reduce potential leaks of sensitive information.|![green check mark.](../media/green-check-mark.png) |![green check mark.](../media/green-check-mark.png)| |**Configure data loss prevention policies for sensitive data**. Create a Data Loss Prevention Policy in the Security &amp; Compliance center to discover and protect sensitive data such as credit card numbers, Social Security numbers and bank account numbers. Microsoft 365 includes many predefined sensitive information types you can use in data loss prevention policies. You can also create your own sensitive information types for sensitive data that is custom to your environment. |![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png)|
Microsoft 365 information protection capabilities can help you discover what inf
The following diagram illustrates these capabilities. ![Recommended capabilities for protecting against breach.](../media/m365-security-bdm-illustrations-assume-breach.png) ## Continuous monitoring and auditing
Last but not least, Continuous Monitoring and Auditing of the Microsoft 365 envi
|||| |Ensure the **audit log** is turned on.|![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png)| |**Review Secure Score weekly** ΓÇö Secure score is a central location to access the Security status of your company and take actions based on Secure score recommendations. It is recommended to perform this check weekly.|![green check mark.](../media/green-check-mark.png)|![green check mark.](../media/green-check-mark.png)|
-|Use **Microsoft Defender for Office 365** tools:<br>* Threat investigation and response capabilities<br> * Automated investigation and response | |![green check mark.](../media/green-check-mark.png)|
-|Use **Microsoft Defender for Endpoint**:<br> * [Endpoint detection and response](/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) <br> * Automated investigation and remediation Secure score <br>* [Advanced hunting](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) <br>| |![green check mark.](../media/green-check-mark.png)|
-|Use **Microsoft Defender for Cloud Apps** to detect unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications, analyze high-risk usage and remediate automatically to limit the risk to your organization.| |![green check mark.](../media/green-check-mark.png)|
-|Use **Microsoft Sentinel** or your current SIEM tool to monitor for threats across your environment. | |![green check mark](../media/green-check-mark.png)|
-|**Deploy [Microsoft Defender for Identity](/azure-advanced-threat-protection/what-is-atp)** to monitor and protect against threats targeted to your on-premises Active Directory environment. | |![green check mark](../media/green-check-mark.png) |
+|Use **Microsoft Defender for Office 365** tools:<br>*Threat investigation and response capabilities<br>* Automated investigation and response | |![green check mark.](../media/green-check-mark.png)|
+|Use **Microsoft Defender for Endpoint**:<br> *[Endpoint detection and response](/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) <br>* Automated investigation and remediation Secure score <br>* [Advanced hunting](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) <br>| |![green check mark.](../media/green-check-mark.png)|
+|Use **Microsoft Defender for Cloud Apps** to detect unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications, analyze high-risk usage and remediate automatically to limit the risk to your organization.| |:::image type="content" source="../media/green-check-mark.png" alt-text="The example of green colored check mark" lightbox="../media/green-check-mark.png":::|
+|Use **Microsoft Sentinel** or your current SIEM tool to monitor for threats across your environment. | |![green check mark.](../media/green-check-mark.png)|
+|**Deploy [Microsoft Defender for Identity](/azure-advanced-threat-protection/what-is-atp)** to monitor and protect against threats targeted to your on-premises Active Directory environment. | |![green check mark.](../media/green-check-mark.png) |
|Use **Microsoft Defender for Cloud** to monitor for threats across hybrid and cloud workloads. Microsoft Defender for Cloud includes a free tier of capabilities and a standard tier of capabilities that are paid for based on resource hours or transactions.| | | The following diagram illustrates these capabilities.
-![Recommended capabilities for continuous monitoring and auditing.](../media/m365-security-bdm-illustrations-monitoring-auditing.png)
Top recommended monitoring actions:
security Microsoft 365 Zero Trust https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/Microsoft-365-zero-trust.md
A Zero Trust approach extends throughout the entire digital estate and serves as
This illustration provides a representation of the primary elements that contribute to Zero Trust.
-<!
-[![Zero Trust security architecture](../media/zero-trust/zero-trust-architecture.png)](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/media/zero-trust/zero-trust-architecture.png)
>--- In the illustration: - Security policy enforcement is at the center of a Zero Trust architecture. This includes Multi Factor authentication with conditional access that takes into account user account risk, device status, and other criteria and policies that you set.
While this work is represented at the top of the deployment stack illustrated ea
Microsoft Information Protection provides a framework, process, and capabilities you can use to accomplish your specific business objectives.
-![Microsoft Information Protection (MIP) framework](../media/zero-trust/mip-solution-overview.png)
+ For more information on how to plan and deploy information protection, see [**_Deploy a Microsoft Information Protection solution_**](../compliance/information-protection-solution.md).
security Attack Surface Reduction Rules Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md
Links to information about configuration management system versions referenced i
|Rule name | Intune | Microsoft Endpoint Manager |Microsoft Endpoint Configuration Manager |Group Policy<sup>[[1](#fn1)]<sup></sup> | PowerShell<sup>[[1](#fn1)]<sup></sup> | ||::|::|::|::|::|
-|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | Y | Y MEM OMA-URI | | Y | Y |
+|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | Y | Y MEM OMA-URI | | Y | Y |
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Y | | Y | Y | Y | |[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | Y | |Y <br><br> CB 1710 | Y | Y | |[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | Y | | Y <br><br>CB 1802 | Y | Y |
Dependencies: MDAV
This rule blocks Office apps from creating child processes. Office apps include Word, Excel, PowerPoint, OneNote, and Access.
-Creating malicious child processes is a common malware strategy. Malware that abuse Office as a vector often run VBA macros and exploit code to download and attempt to run more payloads. However, some legitimate line-of-business applications might also generate child processes for benign purposes; such as spawning a command prompt or using PowerShell to configure registry settings.
+Creating malicious child processes is a common malware strategy. Malware that abuses Office as a vector often runs VBA macros and exploit code to download and attempt to run more payloads. However, some legitimate line-of-business applications might also generate child processes for benign purposes; such as spawning a command prompt or using PowerShell to configure registry settings.
Intune name: `Office apps launching child processes`
security Manage Updates Baselines Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus.md
ms.technology: mde Previously updated : 03/16/2022 Last updated : 03/22/2022 - M365-security-compliance - m365initiative-defender-endpoint
We recommend updating your Windows 10 (Enterprise, Pro, and Home editions), Wind
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images). <details>
+<summary>20220321.1</summary>
+
+&ensp;Package version: **20220321.1**<br/>
+&ensp;Platform version: **4.18.2202.4**<br/>
+&ensp;Engine version: **1.1.19000.8**<br/>
+&ensp;Signature version: **1.351.337.0**<br/>
+
+### Fixes
+- None
+
+### Additional information
+- None
+
+<br/>
+</details><details>
<summary>20220305.1</summary> &ensp;Package version: **20220305.1**<br/>
security Onboard Offline Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-offline-machines.md
ms.technology: mde
To onboard devices without Internet access, you'll need to take the following general steps: > [!IMPORTANT]
-> The steps below are applicable only to devices running previous versions of Windows such as:
-Windows Server 2016 and earlier or Windows 8.1 and earlier.
+> The following steps are only applicable to devices running previous versions of Windows using the MMA-based solution. For more information, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
> [!NOTE] > - An OMS gateway server cannot be used as proxy for disconnected Windows or Windows Server devices when configured via 'TelemetryProxyServer' registry or GPO.
For more information about onboarding methods, see the following articles:
- [Onboard servers to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/configure-server-endpoints#windows-server-2008-r2-sp1--windows-server-2012-r2-and-windows-server-2016) - [Configure device proxy and Internet connectivity settings](/microsoft-365/security/defender-endpoint/configure-proxy-internet#configure-the-proxy-server-manually-using-a-registry-based-static-proxy)
-## On-premises devices
+## Devices running the previous MMA-based solution
- Setup Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub: - [Azure Log Analytics Agent](/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
For more information about onboarding methods, see the following articles:
- Azure Log Analytics IP as a proxy - Defender for Endpoint workspace key & ID
-## Azure virtual machines
+### Azure virtual machines
-- Setup Azure Log Analytics Gateway (formerly known as OMS Gateway) to act as proxy or hub:
+- For devices running the previous, MMA-based solution, setup Azure Log Analytics Gateway (formerly known as OMS Gateway) to act as proxy or hub:
- [Azure Log Analytics Gateway](/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway) - [Install and configure Microsoft Monitoring Agent (MMA)](onboard-downlevel.md#install-and-configure-microsoft-monitoring-agent-mma) point to Defender for Endpoint Workspace key & ID - Offline Azure VMs in the same network of OMS Gateway
security Advanced Hunting Find Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-find-ransomware.md
The consolidated query returns the following results:
- **TotalEvidenceCount**ΓÇönumber of observed signs - **UniqueEvidenceCount**ΓÇönumber of types of observed signs *Query results showing affected devices and counts of various signs of ransomware activity*
By default, the query result lists only devices that have more than two types of
- [Understand the schema](advanced-hunting-schema-tables.md) - [Apply query best practices](advanced-hunting-best-practices.md)
-## Additional ransomware resources
+## More ransomware resources
Key information from Microsoft:
Microsoft Azure:
- [Azure Defenses for Ransomware Attack](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack/) - [Maximize Ransomware Resiliency with Azure and Microsoft 365](https://azure.microsoft.com/resources/maximize-ransomware-resiliency-with-azure-and-microsoft-365/) - [Backup and restore plan to protect against ransomware](/security/compass/backup-plan-to-protect-against-ransomware)-- [Help protect from ransomware with Microsoft Azure Backup](https://www.youtube.com/watch?v=VhLOr2_1MCg) (26 minute video)
+- [Help protect from ransomware with Microsoft Azure Backup](https://www.youtube.com/watch?v=VhLOr2_1MCg) (26-minute video)
- [Recovering from systemic identity compromise](/azure/security/fundamentals/recover-from-identity-compromise) - [Advanced multistage attack detection in Microsoft Sentinel](/azure/sentinel/fusion#ransomware) - [Fusion Detection for Ransomware in Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/what-s-new-fusion-detection-for-ransomware/ba-p/2621373)
Microsoft Defender for Cloud Apps:
Microsoft Security team blog posts: -- [3 steps to prevent and recover from ransomware (September 2021)](https://www.microsoft.com/security/blog/2021/09/07/3-steps-to-prevent-and-recover-from-ransomware/)
+- [Three steps to prevent and recover from ransomware (September 2021)](https://www.microsoft.com/security/blog/2021/09/07/3-steps-to-prevent-and-recover-from-ransomware/)
- [A guide to combatting human-operated ransomware: Part 1 (September 2021)](https://www.microsoft.com/security/blog/2021/09/20/a-guide-to-combatting-human-operated-ransomware-part-1/) Key steps on how Microsoft's Detection and Response Team (DART) conducts ransomware incident investigations.
security Advanced Hunting Go Hunt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-go-hunt.md
ms.technology: m365d
With the *go hunt* action, you can quickly investigate events and various entity types using powerful query-based [advanced hunting](advanced-hunting-overview.md) capabilities. This action automatically runs an advanced hunting query to find relevant information about the selected event or entity.
-The *go hunt* action is available in various sections of the Defender for Cloud whenever event or entity details are displayed. For example, you can use *go hunt* from the following sections:
+The *go hunt* action is available in various sections of the Defender for Cloud. This action is available to view once event or entity details are displayed. For example, you can use the *go hunt* option from the following sections:
-- In the [incident page](investigate-incidents.md#summary), you can review details about users, devices, and many other entities associated with an incident. As you select an entity, you get additional information as well as various actions you could take on that entity. In the example below, a mailbox is selected, showing details about the mailbox as well as the option to hunt for more information about the mailbox.
+- In the [incident page](investigate-incidents.md#summary), you can review details about users, devices, and many other entities associated with an incident. As you select an entity, you get additional information and the various actions you could take on that entity. In the example below, a mailbox is selected, showing details about the mailbox and the option to hunt for more information about the mailbox.
- :::image type="content" source="../../media/go-hunt-1-incident.png" alt-text="The **Mailboxes** page with the **Go hunt** option in the Microsoft 365 Defender portal " lightbox="../../media/go-hunt-1-incident.png":::
+ :::image type="content" source="../../media/go-hunt-1-incident.png" alt-text="The Mailboxes page with the Go hunt option in the Microsoft 365 Defender portal " lightbox="../../media/go-hunt-1-incident.png":::
- In the incident page, you can also access a list of entities under the **Evidence** tab. Selecting one of those entities provides an option to quickly hunt for information about that entity.
- :::image type="content" source="../../media/go-hunt-2-entity.png" alt-text="The Go hunt option for a piece of evidence in the **Incident** page in Microsoft 365 Defender portal" lightbox="../../media/go-hunt-2-entity.png":::
+ :::image type="content" source="../../media/go-hunt-2-entity.png" alt-text="The Go hunt option for a piece of evidence in the Incident page in Microsoft 365 Defender portal" lightbox="../../media/go-hunt-2-entity.png":::
- When viewing the timeline for a device, you can select an event in the timeline to view additional information about that event. Once an event is selected, you get the option to hunt for other relevant events in advanced hunting.
- :::image type="content" source="../../media/go-hunt-3-event.png" alt-text="The **Hunt for related events** option on an event's page in the **Timelines** tab in Microsoft 365 Defender portal" lightbox="../../media/go-hunt-3-event.png":::
+ :::image type="content" source="../../media/go-hunt-3-event.png" alt-text="The Hunt for related events option on an event's page in the Timelines tab in Microsoft 365 Defender portal" lightbox="../../media/go-hunt-3-event.png":::
Selecting **Go hunt** or **Hunt for related events** passes different queries, depending on whether you've selected an entity or an event. ## Query for entity information
-When using *go hunt* to query for information about a user, device, or any other type of entity, the query checks all relevant schema tables for any events involving that entity. To keep the results manageable, the query is scoped to around the same time period as the earliest activity in the past 30 days that involves the entity and is associated with the incident.
+You can use *go hunt* to query for information about a user, device, or any other type of entity; the query checks all relevant schema tables for any events involving that entity to return information. To keep the results manageable, the query is:
+- scoped to around the same time period as the earliest activity in the past 30 days that involves the entity
+- associated with the incident.
Here is an example of the go hunt query for a device:
and DeviceName == deviceName
| take 100 ``` ### Supported entity types
-You can use *go hunt* after selecting any of these entity types:
+You can use the *go hunt* option after selecting any of these entity types:
- Files - Emails
security Advanced Hunting Link To Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-link-to-incident.md
ms.technology: m365d
- Microsoft 365 Defender - Microsoft Defender for Endpoint
-The link to incident feature lets you add advanced hunting query results to a new or existing incident under investigation. This feature helps you easily capture records from advanced hunting activities so you can create a richer timeline or context of events regarding an incident.
+You can use the link to incident feature to add advanced hunting query results to a new or existing incident under investigation. This feature helps you easily capture records from advanced hunting activities, which enables you to create a richer timeline or context of events regarding an incident.
## Link results to new or existing incidents 1. In the advanced hunting query page, first enter your query in the query field provided then select **Run query** to get your results.
- :::image type="content" source="../../media/link-to-incident-1.png" alt-text="An example of the **Query** page in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-1.png":::
+ :::image type="content" source="../../media/link-to-incident-1.png" alt-text="The Query page in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-1.png":::
-2. In the Results page, select the events or records that are related to a new or current investigation you are working on, then select **Link to incident**.
+2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
- :::image type="content" source="../../media/link-to-incident-1b.png" alt-text="The **Link to incident** option of the **Results** tab in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-1b.png":::
+ :::image type="content" source="../../media/link-to-incident-1b.png" alt-text="The Link to incident option of the Results tab in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-1b.png":::
3. Find the **Alert details** section in the Link to incident pane, then select **Create new incident** to convert the events to alerts and group them to a new incident:
- :::image type="content" source="../../media/link-to-incident-3-create-new.png" alt-text="An example of the **Alert details** section in the **Link to incident** pane in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-3-create-new.png":::
+ :::image type="content" source="../../media/link-to-incident-3-create-new.png" alt-text="The Alert details section in the Link to incident pane in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-3-create-new.png":::
Or select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
- :::image type="content" source="../../media/link-to-incident-3-link-to-existing.png" alt-text="An example of **Alert details** section in the **Link to incident** pane in the Microsoft 365 Defender portal":::
+ :::image type="content" source="../../media/link-to-incident-3-link-to-existing.png" alt-text="The Alert details section in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-3-link-to-existing.png":::
4. For either selection, provide the following details, then select **Next**:
- - **Alert title** - provide a descriptive title for the results that your incident responders can understand. This becomes the alert title.
+ - **Alert title** - provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
- **Severity** - Choose the severity applicable to the group of alerts. - **Category** - Choose the appropriate threat category for the alerts. - **Description** - Give a helpful description for the grouped alerts.
The link to incident feature lets you add advanced hunting query results to a ne
5. In the **Impacted entities** section, select the main affected or impacted entity. Only the applicable entities based on the query results appear in this section. In our example, we used a query to find events related to a possible email exfiltration incident, therefore the Sender is the impacted entity. If there are four different senders, for instance, four alerts are created and linked to the chosen incident.
- :::image type="content" source="../../media/link-to-incident-4-impacted-entities.png" alt-text="An example of an impacted entity in the **Link to incident** section in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-4-impacted-entities.png":::
+ :::image type="content" source="../../media/link-to-incident-4-impacted-entities.png" alt-text="The impacted entity in the Link to incident section in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-4-impacted-entities.png":::
1. Select **Next**.
-1. Review the details you have provided in the **Summary** section.
- :::image type="content" source="../../media/link-to-incident-5-summary.png" alt-text="An example of the results page in the **Link to incident** section in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-5-summary.png":::
+1. Review the details you've provided in the **Summary** section.
+ :::image type="content" source="../../media/link-to-incident-5-summary.png" alt-text="The results page in the Link to incident section in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-5-summary.png":::
1. Select **Done**. ## View linked records in the incident You can select the incident name to view the incident that the events are linked to.
- :::image type="content" source="../../media/link-to-incident-6-incident-pg.png" alt-text="An example of event details screen in the **Summary** tab in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-6-incident-pg.png":::
In our example, the four alerts, representing the four selected events, were linked successfully to a new incident. In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and query results view.
- :::image type="content" source="../../media/link-to-incident-7-alert-story.png" alt-text="An example of full details of an event in the **Timeline** tab in the Microsoft 365 Defender portal" lightbox="../../media/link-to-incident-7-alert-story.png":::
You can also select the event to open the **Inspect record** pane. ## Filter for events added using advanced hunting You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by **Manual** detection source.
security Advanced Hunting Query Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-results.md
ms.technology: m365d
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
-While you can construct your [advanced hunting](advanced-hunting-overview.md) queries to return very precise information, you can also work with the query results to gain further insight and investigate specific activities and indicators. You can take the following actions on your query results:
+While you can construct your [advanced hunting](advanced-hunting-overview.md) queries to return precise information, you can also work with the query results to gain further insight and investigate specific activities and indicators. You can take the following actions on your query results:
- View results as a table or chart - Export tables and charts
While you can construct your [advanced hunting](advanced-hunting-overview.md) qu
By default, advanced hunting displays query results as tabular data. You can also display the same data as a chart. Advanced hunting supports the following views: | View type | Description |
-| -- | -- |
+|--|--|
| **Table** | Displays the query results in tabular format | | **Column chart** | Renders a series of unique items on the x-axis as vertical bars whose heights represent numeric values from another field | | **Stacked column chart** | Renders a series of unique items on the x-axis as stacked vertical bars whose heights represent numeric values from one or more other fields |
AlertInfo
``` When rendering the results, a column chart displays each severity value as a separate column:
-![Image of advanced hunting query results displayed as a column chart.](../../media/advanced-hunting-column-chart-new.png)
*Query results for alerts by severity displayed as a column chart* #### Phishing emails across top ten sender domains
-If you're dealing with a list of values that isnΓÇÖt finite, you can use the `Top` operator to chart only the values with the most instances. For example, to get the top ten sender domains with the most phishing emails, use the query below:
+If you're dealing with a list of values that isnΓÇÖt finite, you can use the `Top` operator to chart only the values with the most instances. For example, to get the top 10 sender domains with the most phishing emails, use the query below:
```kusto EmailEvents
EmailEvents
``` Use the pie chart view to effectively show distribution across the top domains:
-![Image of advanced hunting query results displayed as a pie chart.](../../media/advanced-hunting-pie-chart-new.png)
-*Pie chart showing distribution of phishing emails across top sender domains*
+*Pie chart that shows distribution of phishing emails across top sender domains*
#### File activities over time
-Using the `summarize` operator with the `bin()` function, you can check for events involving a particular indicator over time. The query below counts events involving the file `invoice.doc` at 30 minute intervals to show spikes in activity related to that file:
+Using the `summarize` operator with the `bin()` function, you can check for events involving a particular indicator over time. The query below counts events involving the file `invoice.doc` at 30-minute intervals to show spikes in activity related to that file:
```kusto CloudAppEvents
CloudAppEvents
``` The line chart below clearly highlights time periods with more activity involving `invoice.doc`:
-![Image of advanced hunting query results displayed as a line chart.](../../media/line-chart-a.png)
*Line chart showing the number of events involving a file over time* ## Export tables and charts After running a query, select **Export** to save the results to local file. Your chosen view determines how the results are exported: -- **Table view** ΓÇö the query results are exported in tabular form as a Microsoft Excel workbook-- **Any chart** ΓÇö the query results are exported as a JPEG image of the rendered chart
+- **Table view**ΓÇöThe query results are exported in tabular form as a Microsoft Excel workbook
+- **Any chart**ΓÇöThe query results are exported as a JPEG image of the rendered chart
## Drill down from query results To quickly inspect a record in your query results, select the corresponding row to open the **Inspect record** panel. The panel provides the following information based on the selected record: -- **Assets** ΓÇö summarized view of the main assets (mailboxes, devices, and users) found in the record, enriched with available information, such as risk and exposure levels-- **All details** ΓÇö all the values from the columns in the record
+- **Assets**ΓÇöSummarized view of the main assets (mailboxes, devices, and users) found in the record, enriched with available information, such as risk and exposure levels
+- **All details**ΓÇöAll the values from the columns in the record
-![Image of selected record with panel for inspecting the record.](../../media/results-inspect-record.png)
To view more information about a specific entity in your query results, such as a machine, file, user, IP address, or URL, select the entity identifier to open a detailed profile page for that entity.
Select the three dots to the right of any column in the **Inspect record** panel
- Explicitly look for the selected value (`==`) - Exclude the selected value from the query (`!=`)-- Get more advanced operators for adding the value to your query, such as `contains`, `starts with` and `ends with`
+- Get more advanced operators for adding the value to your query, such as `contains`, `starts with`, and `ends with`
-![Image of advanced hunting result set.](../../media/work-with-query-tweak-query.png)
>[!NOTE]
->Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
+>Some tables in this article might not be available at Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
## Related topics - [Advanced hunting overview](advanced-hunting-overview.md)
security Advanced Hunting Schema Tables https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-schema-tables.md
While constructing queries, use the built-in schema reference to quickly get the
### Access the schema reference To quickly access the schema reference, select the **View reference** action next to the table name in the schema representation. You can also select **Schema reference** to search for a table.
-![Image showing how to access in-portal schema reference.](../../media/understand-schema-1.png)
## Learn the schema tables The following reference lists all the tables in the schema. Each table name links to a page describing the column names for that table. Table and column names are also listed in the Defender for Cloud as part of the schema representation on the advanced hunting screen.
security Advanced Hunting Shared Queries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-shared-queries.md
ms.technology: m365d
[Advanced hunting](advanced-hunting-overview.md) queries can be shared among users in the same organization. You can also find queries shared publicly on GitHub. These queries let you quickly pursue specific threat hunting scenarios without having to write queries from scratch.
-![Image of shared queries.](../../media/shared-query-1.png)
## Save, modify, and share a query You can save a new or existing query so that it is only accessible to you or shared with other users in your organization.
You can save a new or existing query so that it is only accessible to you or sha
3. Enter a name for the query.
- ![Image of saving a query.](../../media/shared-query-2.png)
+ :::image type="content" source="../../media/shared-query-2.png" alt-text="The new query that is about to be saved in the Microsoft 365 Defender portal" lightbox="../../media/shared-query-2.png":::
4. Select the folder where you'd like to save the query. - **Shared queries** ΓÇö shared to all users your organization
You can save a new or existing query so that it is only accessible to you or sha
## Delete or rename a query 1. Select the three dots to the right of a query you want to rename or delete.
- ![Image of delete query.](../../media/shared-query-3.png)
+ :::image type="content" source="../../media/shared-query-3.png" alt-text="The options for a shared query in the Advanced Hunting page in the Microsoft 365 Defender portal" lightbox="../../media/shared-query-3.png":::
2. Select **Delete** and confirm deletion. Or select **Rename** and provide a new name for the query.
security Advanced Hunting Take Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-take-action.md
To learn more about how these response actions are performed through Microsoft D
## Quarantine files You can deploy the *quarantine* action on files so that they are automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine: -- `SHA1` ΓÇö In most advanced hunting tables, this is the SHA-1 of the file that was affected by the recorded action. For example, if a file was copied, this would be the copied file.-- `InitiatingProcessSHA1` ΓÇö In most advanced hunting tables, this is the file responsible for initiating the recorded action. For example, if a child process was launched, this would be the parent process. -- `SHA256` ΓÇö This is the SHA-256 equivalent of the file identified by the `SHA1` column.-- `InitiatingProcessSHA256` ΓÇö This is the SHA-256 equivalent of the file identified by the `InitiatingProcessSHA1` column.
+- `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that was affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.
+- `InitiatingProcessSHA1`: In most advanced hunting tables, this column refers to the file responsible for initiating the recorded action. For example, if a child process was launched, this initiator file would be part of the parent process.
+- `SHA256`: This column is the SHA-256 equivalent of the file identified by the `SHA1` column.
+- `InitiatingProcessSHA256`: This column is the SHA-256 equivalent of the file identified by the `InitiatingProcessSHA1` column.
To learn more about how quarantine actions are taken and how files can be restored, [read about response actions on files](/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts).
To learn more about how quarantine actions are taken and how files can be restor
## Take action To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard will guide you through the process of selecting and then submitting your preferred actions.
-![Image of selected record with panel for inspecting the record.](../../media/take-action-multiple.png)
## Review actions taken Each action is individually recorded in the [action center](m365d-action-center.md) under **Action center** > **History** ([security.microsoft.com/action-center/history](https://security.microsoft.com/action-center/history)). Go to the action center to check the status of each action.
security Api Create App User Context https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-user-context.md
This article explains how to:
2. Navigate to **Azure Active Directory** > **App registrations** > **New registration**.
- ![Image of Microsoft Azure and navigation to application registration.](../../media/atp-azure-new-app2.png)
+ :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="The New registration option in the Manage pane in the Azure portal" lightbox="../../media/atp-azure-new-app2.png":::
3. In the form, choose a name for your application and enter the following information for the redirect URI, then select **Register**.
- ![Image of Create application window.](../../media/nativeapp-create2.PNG)
+ :::image type="content" source="../../media/nativeapp-create2.PNG" alt-text="The application registration pane in the Azure portal" lightbox="../../media/nativeapp-create2.PNG":::
+
- **Application type:** Public client - **Redirect URI:** https://portal.azure.com
This article explains how to:
> [!TIP] > *Microsoft Threat Protection* is a former name for Microsoft 365 Defender, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
- ![Image of API permission selection.](../../media/apis-in-my-org-tab.PNG)
+ :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="Your organization's APIs pane in the Microsoft 365 Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
- Choose **Delegated permissions**. Choose the relevant permissions for your scenario (for example **Incident.Read**), and then select **Add permissions**.
- ![Image of API access and API selection.](../../media/request-api-permissions-delegated.PNG)
+ :::image type="content" source="../../media/request-api-permissions-delegated.PNG" alt-text="The Delegated permissions pane in the Microsoft 365 Defender portal" lightbox="../../media/request-api-permissions-delegated.PNG":::
> [!NOTE] > You need to select the relevant permissions for your scenario. *Read all incidents* is just an example. To determine which permission you need, please look at the **Permissions** section in the API you want to call.
This article explains how to:
5. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
- ![Image of Grant permissions.](../../media/grant-consent-delegated.PNG)
+ :::image type="content" source="../../media/grant-consent-delegated.PNG" alt-text="The admin consent-granting pane in the Microsoft 365 Defender portal" lightbox="../../media/grant-consent-delegated.PNG":::
6. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
- ![Image of created app id.](../../media/app-and-tenant-ids.png)
+ :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview pane in the Microsoft 365 Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
## Get an access token
$response.AccessToken
In the following image, you can see a decoded token acquired from an app, with ```Incidents.Read.All```, ```Incidents.ReadWrite.All```, and ```AdvancedHunting.Read.All``` permissions:
-![Image of token validation.](../../media/webapp-decoded-token.png)
## Use the token to access the Microsoft 365 Defender API
security Api Create App Web https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-web.md
This article explains how to:
2. Navigate to **Azure Active Directory** > **App registrations** > **New registration**.
- ![Image of Microsoft Azure and navigation to application registration.](../../media/atp-azure-new-app2.png)
+ :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="The New registration tab in the Microsoft 365 Defender portal" lightbox="../../media/atp-azure-new-app2.png":::
3. In the form, choose a name for your application, then select **Register**.
This article explains how to:
> [!TIP] > *Microsoft Threat Protection* is a former name for Microsoft 365 Defender, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
- ![Image of API permission selection.](../../media/apis-in-my-org-tab.PNG)
+ :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="The organization's APIs usage tab in the Microsoft 365 Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
5. Select **Application permissions**. Choose the relevant permissions for your scenario (for example, **Incident.Read.All**), and then select **Add permissions**.
- ![Image of API access and API selection.](../../media/request-api-permissions.PNG)
+ :::image type="content" source="../../media/request-api-permissions.PNG" alt-text="The application permission pane in the Microsoft 365 Defender portal" lightbox="../../media/request-api-permissions.PNG":::
> [!NOTE] > You need to select the relevant permissions for your scenario. *Read all incidents* is just an example. To determine which permission you need, please look at the **Permissions** section in the API you want to call.
This article explains how to:
6. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
- ![Image of Grant permissions.](../../media/grant-consent.PNG)
+ :::image type="content" source="../../media/grant-consent.PNG" alt-text="The consent grant-related pane in the Microsoft 365 Defender portal" lightbox="../../media/grant-consent.PNG":::
7. To add a secret to the application, select **Certificates & secrets**, add a description to the secret, then select **Add**. > [!TIP] > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve the secret value after you leave.
- ![Image of create app key.](../../media/webapp-create-key2.png)
+ :::image type="content" source="../../media/defender-endpoint/webapp-create-key2.png" alt-text="The create app pane in the Microsoft 365 Defender portal" lightbox="../../media/defender-endpoint/webapp-create-key2.png":::
8. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
- ![Image of created app id.](../../media/app-and-tenant-ids.png)
+ :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview pane in the Microsoft 365 Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
9. **For Microsoft 365 Defender Partners only**: [Follow these instructions](./api-partner-access.md) for partner access through the Microsoft 365 Defender APIs, set your app to be multi-tenant, so it can be available in all tenants once you receive admin consent. Partner access is **required** for third-party appsΓÇöfor example, if you create an app that is intended to run in multiple customers' tenants. It is **not required** if you create a service that you want to run in your tenant only, such as an application for your own usage that will only interact with your own data. To set your app to be multi-tenant:
aadToken = jsonResponse["access_token"]
In the following image, you can see a decoded token acquired from an app, with `Incidents.Read.All`, `Incidents.ReadWrite.All`, and `AdvancedHunting.Read.All` permissions:
- ![Image of token validation.](../../media/webapp-decoded-token.png)
+ :::image type="content" source="../../media/defender-endpoint/webapp-decoded-token.png" alt-text="The Decoded token pane in the Microsoft 365 Defender portal" lightbox="../../media/defender-endpoint/webapp-decoded-token.png":::
## Use the token to access the Microsoft 365 Defender API
security Api Hello World https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-hello-world.md
It should take 5 to 10 minutes to complete this project. This time estimate incl
2. Navigate to **Azure Active Directory** > **App registrations** > **New registration**.
- ![Image of Microsoft Azure and navigation to application registration.](../../media/atp-azure-new-app2.png)
+ :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="The New registration section in the Microsoft 365 Defender portal" lightbox="../../media/atp-azure-new-app2.png":::
3. In the registration form, choose a name for your application, then select **Register**. Selecting a redirect URI is optional. You won't need one to complete this example.
It should take 5 to 10 minutes to complete this project. This time estimate incl
> [!TIP] > *Microsoft Threat Protection* is a former name for Microsoft 365 Defender, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
- ![Image of API permission selection.](../../media/apis-in-my-org-tab.PNG)
+ :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="The section of APIs usage in the Microsoft 365 Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
- Choose **Application permissions** > **Incident.Read.All** and select **Add permissions**.
- ![Image of API access and API selection.](../../media/request-api-permissions.PNG)
+ :::image type="content" source="../../media/request-api-permissions.PNG" alt-text="An application's permissions pane in the Microsoft 365 Defender portal" lightbox="../../media/request-api-permissions.PNG":::
5. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
- ![Image of Grant permissions.](../../media/grant-consent.PNG)
+ :::image type="content" source="../../media/grant-consent.PNG" alt-text=" The Grant admin consent section in the Microsoft 365 Defender portal" lightbox="../../media/grant-consent.PNG":::
6. Add a secret to the application. Select **Certificates & secrets**, add a description to the secret, then select **Add**. > [!TIP] > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve the secret value after you leave.
- ![Image of create app key.](../../media/webapp-create-key2.png)
+ :::image type="content" source="../../media/webapp-create-key2.png" alt-text=" The add secret section in the Microsoft 365 Defender portal" lightbox="../../media/webapp-create-key2.png":::
+
7. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
- ![Image of created app id.](../../media/app-and-tenant-ids.png)
+ :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview section in the Microsoft 365 Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
### Get a token using the app and use the token to access the API
For more information on Azure Active Directory tokens, see the [Azure AD tutoria
In the following image, you can see a decoded token acquired from an app, with ```Incidents.Read.All```, ```Incidents.ReadWrite.All```, and ```AdvancedHunting.Read.All``` permissions:
- ![Image jwt.ms.](../../media/api-jwt-ms.png)
+ :::image type="content" source="../../media/api-jwt-ms.png" alt-text="The Decoded Token section in the Microsoft 365 Defender portal" lightbox="../../media/api-jwt-ms.png":::
### Get a list of recent incidents
security Api Partner Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-partner-access.md
The following steps with guide you how to create a multi-tenant Azure AD applica
2. Navigate to **Azure Active Directory** > **App registrations** > **New registration**.
- ![Image of Microsoft Azure and navigation to application registration.](../../media/atp-azure-new-app2.png)
+ :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="An application's registration section in the Microsoft 365 Defender portal" lightbox="../../media/atp-azure-new-app2.png":::
3. In the registration form:
The following steps with guide you how to create a multi-tenant Azure AD applica
After you're done filling out the form, select **Register**.
- ![Image of the Register an application form.](../..//media/atp-api-new-app-partner.png)
+ :::image type="content" source="../..//media/atp-api-new-app-partner.png" alt-text="An application's registration sections in the Microsoft 365 Defender portal" lightbox="../..//media/atp-api-new-app-partner.png":::
4. On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Threat Protection**, and select **Microsoft Threat Protection**. Your app can now access Microsoft 365 Defender. > [!TIP] > *Microsoft Threat Protection* is a former name for Microsoft 365 Defender, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
- ![Image of API permission selection.](../../media/apis-in-my-org-tab.PNG)
+ :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="The APIs usage section in the Microsoft 365 Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
5. Select **Application permissions**. Choose the relevant permissions for your scenario (for example, **Incident.Read.All**), and then select **Add permissions**.
- ![Image of API access and API selection.](../../media/request-api-permissions.PNG)
+ :::image type="content" source="../../media/request-api-permissions.PNG" alt-text="An application's permission pane in the Microsoft 365 Defender portal" lightbox="../../media/request-api-permissions.PNG":::
> [!NOTE] > You need to select the relevant permissions for your scenario. *Read all incidents* is just an example. To determine which permission you need, please look at the **Permissions** section in the API you want to call.
The following steps with guide you how to create a multi-tenant Azure AD applica
6. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
- ![Image of Grant permissions.](../../media/grant-consent.PNG)
+ :::image type="content" source="../../media/grant-consent.PNG" alt-text="A section to grant admin consent in the Microsoft 365 Defender portal" lightbox="../../media/grant-consent.PNG":::
7. To add a secret to the application, select **Certificates & secrets**, add a description to the secret, then select **Add**. > [!TIP] > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve the secret value after you leave.
- ![Image of create app key.](../../media/webapp-create-key2.png)
+ :::image type="content" source="../../media/webapp-create-key2.png" alt-text="The Secret addition section in the Microsoft 365 Defender portal" lightbox="../../media/webapp-create-key2.png":::
8. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
- ![Image of created app id.](../../media/app-and-tenant-ids.png)
+ :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview pane in the Microsoft 365 Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
9. Add the application to your user's tenant.
The following steps with guide you how to create a multi-tenant Azure AD applica
After clicking on the consent link, sign in with the Global Administrator of the user's tenant and consent the application.
- ![Image of consent.](../../media/app-consent-partner.png)
+ :::image type="content" source="../../media/app-consent-partner.png" alt-text="The consent application page in the Microsoft 365 Defender portal" lightbox="../../media/app-consent-partner.png":::
You'll also need to ask your user for their tenant ID. The tenant ID is one of the identifiers used to acquire access tokens.
A successful response will look like this:
In the following image, you can see a decoded token acquired from an app, with ```Incidents.Read.All```, ```Incidents.ReadWrite.All```, and ```AdvancedHunting.Read.All``` permissions:
-![Image of token validation.](../../media/webapp-decoded-token.png)
+ ## Use the token to access the Microsoft 365 Defender API
security Configure Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-event-hub.md
Learn how to configure your Event Hub so that it can ingest events from Microsof
## Set up the required Resource Provider in the Event Hub subscription 1. Sign in to the [Azure portal](https://portal.azure.com).
-1. Select **Subscriptions** > **{ Select the subscription the event hub will be deployed to }** > **Resource providers**.
+1. Select **Subscriptions** > **{ Select the subscription the event hubs will be deployed to }** > **Resource providers**.
1. Verify that the **Microsoft.Insights** Provider is registered. Otherwise, register it.
-![Image of resource providers in Microsoft Azure.](../../media/f893db7a7b1f7aa520e8b9257cc72562.png)
## Set up Azure Active Directory App Registration
Learn how to configure your Event Hub so that it can ingest events from Microsof
1. Fill out the form with just the Name (no Redirect URI is required).
- ![Image of register an application.](../../media/336bc84e6be23900c43232b4ef0c253c.png)
+ :::image type="content" source="../../media/336bc84e6be23900c43232b4ef0c253c.png" alt-text="The application name display section in the Microsoft Azure portal" lightbox="../../media/336bc84e6be23900c43232b4ef0c253c.png":::
- ![Image of Overview information.](../../media/06ac04c4ff713c2065cec2ef2f99a294.png)
+
+ :::image type="content" source="../../media/06ac04c4ff713c2065cec2ef2f99a294.png" alt-text="The Overview information section in the Microsoft Azure portal" lightbox="../../media/06ac04c4ff713c2065cec2ef2f99a294.png":::
1. Create a secret by clicking on **Certificates & secrets** \> **New client secret**:
- ![Image of certificates and secrets.](../../media/d2ef88d3d2310d2c60c294b569cdf02e.png)
+ :::image type="content" source="../../media/d2ef88d3d2310d2c60c294b569cdf02e.png" alt-text="The Client secret section in the Microsoft Azure portal" lightbox="../../media/d2ef88d3d2310d2c60c294b569cdf02e.png":::
+
> [!WARNING] > **You won't be able to access the client secret again so make sure to save it**.
Learn how to configure your Event Hub so that it can ingest events from Microsof
1. Create an Event Hub Namespace:
- Go **to Event Hubs \> Add** and select the pricing tier, throughput units and Auto-Inflate (requires standard pricing and under features) appropriate for the load you are expecting. For more information, see [Pricing - Event Hubs \| Microsoft Azure](https://azure.microsoft.com/pricing/details/event-hubs/)
+ Go **to Event Hub \> Add** and select the pricing tier, throughput units and Auto-Inflate (requires standard pricing and under features) appropriate for the load you are expecting. For more information, see [Pricing - Event Hub \| Microsoft Azure](https://azure.microsoft.com/pricing/details/event-hubs/)
> [!NOTE]
- > You can use an existing event hub, but the throughput and scaling are set at the namespace level so it is recommended to place an event hub in itsown namespace.
+ > You can use an existing event-hub, but the throughput and scaling are set at the namespace level so it is recommended to place an event-hub in its own namespace.
+
+ :::image type="content" source="../../media/ebc4ca37c342ad1da75c4aee4018e51a.png" alt-text="The event hubs section in the Microsoft Azure portal" lightbox="../../media/ebc4ca37c342ad1da75c4aee4018e51a.png":::
- ![Image of Event Hub name space.](../../media/ebc4ca37c342ad1da75c4aee4018e51a.png)
+1. You will also need the Resource ID of this Event Hub Namespace. Go to your Azure Event Hub namespace page \> Properties. Copy the text under Resource ID and record it for use during the Microsoft 365 Configuration section below.
-1. You will also need the Resource ID of this Event Hub Namespace. Go to your Azure Event Hubs namespace page \> Properties. Copy the text under Resource ID and record it for use during the Microsoft 365 Configuration section below.
+ :::image type="content" source="../../media/759498162a4e93cbf17c4130d704d164.png" alt-text="The event hubs properties section in the Microsoft Azure portal" lightbox="../../media/759498162a4e93cbf17c4130d704d164.png":::
- ![Image of properties.](../../media/759498162a4e93cbf17c4130d704d164.png)
-1. Once the Event Hub Namespace is created, you will need to add the App Registration Service Principal as Reader, Azure Event Hubs Data Receiver, and the user who will be logging into Microsoft 365 Defender as Contributor (you can also do this at Resource Group or Subscription level).
+1. Once the Event Hub Namespace is created, you will need to add the App Registration Service Principal as Reader, Azure Event Hub Data Receiver, and the user who will be logging into Microsoft 365 Defender as Contributor (you can also do this at Resource Group or Subscription level).
- You do this step at **Event Hubs Namespace** \> **Access Control (IAM)** \> **Add** and verify under **Role assignments**:
+ You do this step at **Event Hub Namespace** \> **Access Control (IAM)** \> **Add** and verify under **Role assignments**:
- ![Image of access control.](../../media/9c9c29137b90d5858920202d87680d16.png)
+ :::image type="content" source="../../media/9c9c29137b90d5858920202d87680d16.png" alt-text="An application registration service principal section in the Microsoft Azure portal" lightbox="../../media/9c9c29137b90d5858920202d87680d16.png":::
## Set up Event Hub
You can create an Event Hub within your Namespace and **all** the Event Types (T
**Option 2:**
-Instead of exporting all the Event Types (Tables) into one Event Hub, you can export each table into a different Event Hub inside your Event Hub Namespace (one Event Hub per Event Type).
+Instead of exporting all the Event Types (Tables) into one Event Hub, you can export each table into different Event Hub inside your Event Hub Namespace (one Event Hub per Event Type).
-In this option, Microsoft 365 Defender will create Event Hubs for you.
+In this option, Microsoft 365 Defender will create Event Hub for you.
> [!NOTE]
-> If you are using an Event Hub Namespace that is **not** part of an Event Hub Cluster, you will only be able to choose up to 10 Event Types (Tables) to export in each Export Settings you define, due to an Azure limitation of 10 Event Hubs per Event Hub Namespace.
+> If you are using an Event Hub Namespace that is **not** part of an Event Hub Cluster, you will only be able to choose up to 10 Event Types (Tables) to export in each Export Settings you define, due to an Azure limitation of 10 Event Hub per Event Hub Namespace.
For example:
-![Image of example Event Hub.](../../media/005c1f6c10c34420d387f594987f9ffe.png)
If you choose this option, you can skip to the [Configure Microsoft 365 Defender to send email tables](#configure-microsoft-365-defender-to-send-email-tables) section.
-Create an Event Hub within your Namespace by selecting **Event Hubs** \> **+ Event Hub**.
+Create Event Hub within your Namespace by selecting **Event Hub** \> **+ Event Hub**.
The Partition Count allows for more throughput via parallelism, so it is recommended to increase this number based on the load you are expecting. Default Message Retention and Capture values of 1 and Off are recommended.
-![Image of create Event Hub.](../../media/1db04b8ec02a6298d7cc70419ac6e6a9.png)
+
-For this Event Hub (not namespace) you will need to configure a Shared Access Policy with Send, Listen Claims. Click on your **Event Hub** \> **Shared access policies** \> **+ Add** and then give it a Policy name (not used elsewhere) and check **Send** and **Listen**.
+For these Event Hub (not namespace) you will need to configure a Shared Access Policy with Send, Listen Claims. Click on your **Event Hub** \> **Shared access policies** \> **+ Add** and then give it a Policy name (not used elsewhere) and check **Send** and **Listen**.
-![Image of shared access policies.](../../media/1867d13f46dc6a0f4cdae6cf00df24db.png)
## Configure Microsoft 365 Defender to send email tables
For this Event Hub (not namespace) you will need to configure a Shared Access Po
- Global Admin or Security Admin Role on the tenant tied to Microsoft 365 Defender and Azure.
- ![Image of security portal.](../../media/55d5b1c21dd58692fb12a6c1c35bd4fa.png)
+ :::image type="content" source="../../media/55d5b1c21dd58692fb12a6c1c35bd4fa.png" alt-text="The Settings page of the Microsoft 365 Defender portal" lightbox="../../media/55d5b1c21dd58692fb12a6c1c35bd4fa.png":::
1. Click on **Raw Data Export \> +Add**.
For this Event Hub (not namespace) you will need to configure a Shared Access Po
**Event-Hub Resource ID**: This value is the Event Hub Namespace Resource ID you recorded when you setup the Event Hub.
- **Event-Hub name**: If you created an Event Hub inside your Event Hub Namespace, paste the Event Hub sname you recorded above.
+ **Event-Hub name**: If you created an Event Hub inside your Event Hub Namespace, paste the Event Hub name you recorded above.
- If you choose to let Microsoft 365 Defender to create Event Hubs per Event Types (Tables) for you, leave this field empty.
+ If you choose to let Microsoft 365 Defender to create Event Hub per Event Types (Tables) for you, leave this field empty.
**Event Types**: Select the Advanced Hunting tables that you want to forward to the Event Hub and then on to your custom app. Alert tables are from Microsoft 365 Defender, Devices tables are from Microsoft Defender for Endpoint (EDR), and Email tables are from Microsoft Defender for Office 365. Email Events records all Email Transactions. The URL (Safe Links), Attachment (Safe Attachments), and Post Delivery Events (ZAP) are also recorded and can be joined to the Email Events on the NetworkMessageId field.
- ![Image of streaming API settings.](../../media/3b2ad64b6ef0f88cf0175f8d57ef8b97.png)
+ :::image type="content" source="../../media/3b2ad64b6ef0f88cf0175f8d57ef8b97.png" alt-text="The Streaming API settings page in the Microsoft Azure portal" lightbox="../../media/3b2ad64b6ef0f88cf0175f8d57ef8b97.png":::
1. Make sure to click **Submit**.
EmailEvents
|count ```
-This will show you how many emails were received in the last hour joined across all the other tables. It will also show you if you are seeing events that could be exported to the event hub. If this count shows 0, then you won't see any data going out to the Event Hub.
+This will show you how many emails were received in the last hour joined across all the other tables. It will also show you if you are seeing events that could be exported to the event hubs. If this count shows 0, then you won't see any data going out to the Event Hub.
-![Image of advanced hunting.](../../media/c305e57dc6f72fa9eb035943f244738e.png)
-Once you have verified there is data to export, you can view the Event Hub to verify that messages are incoming. This can take up to one hour.
+Once you have verified there is data to export, you can view the Event Hub page to verify that messages are incoming. This can take up to one hour.
-1. In Azure, go to **Event Hubs** \> Click on the **Namespace** \> **Event Hubs** \> Click on the **Event Hub**.
+1. In Azure, go to **Event Hub** \> Click on the **Namespace** \> **Event Hub** \> Click on the **Event Hub**.
1. Under **Overview**, scroll down and in the Messages graph you should see Incoming Messages. If you don't see any results, then there will be no messages for your custom app to ingest.
- ![Image of the overview tab with messages.](../../media/e88060e315d76e74269a3fc866df047f.png)
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-microsoft-threat-experts.md
If you already have Microsoft Defender for Endpoint and Microsoft 365 Defender,
2. Select **Apply**.
- ![Image of Microsoft Threat Experts settings.](../../media/mte/mte-collaboratewithmte.png)
+ :::image type="content" source="../../media/mte/mte-collaboratewithmte.png" alt-text=" The Microsoft Threat Experts settings page in the Microsoft 365 Defender portal" lightbox="../../media/mte/mte-collaboratewithmte.png":::
3. Enter your name and email address so that Microsoft can contact you about your application.
- ![Image of Microsoft Threat Experts application.](../../media/mte/mte-apply.png)
-
+ :::image type="content" source="../../media/mte/mte-apply.png" alt-text="The Microsoft Threat Experts application page in the Microsoft 365 Defender portal" lightbox="../../media/mte/mte-apply.png":::
+
4. Read the [privacy statement](https://privacy.microsoft.com/en-us/privacystatement), then select **Submit** when you're done. You'll receive a welcome email once your application is approved.
- ![Image of Microsoft Threat Experts application confirmation.](../../media/mte/mte-applicationconfirmation.png)
+ :::image type="content" source="../../media/mte/mte-applicationconfirmation.png" alt-text="The Microsoft Threat Experts application confirmation in the Microsoft 365 Defender portal" lightbox="../../media/mte/mte-applicationconfirmation.png":::
5. After you receive your welcome email, you'll automatically start receiving targeted attack notifications.
You can contact Microsoft Threat Experts from inside the Microsoft 365 Defender
2. From the top menu, select **? Consult a threat expert**.
- ![Image of Microsoft Threat Experts Experts on Demand from the menu.](../../media/mte/incidents-action-mte-highlighted.png)
+ :::image type="content" source="../../media/mte/incidents-action-mte-highlighted.png" alt-text="The Microsoft Threat Experts Experts on Demand from the menu in the Microsoft 365 Defender portal" lightbox="../../media/mte/incidents-action-mte-highlighted.png":::
A flyout screen will open. The header will indicate if you are on a trial subscription, or a full Microsoft Threat Experts - Experts on-Demand subscription.
- ![Image of Microsoft Threat Experts Experts on Demand trial subscription screen.](../../media/mte/mte-trial.png)
+ :::image type="content" source="../../media/mte/mte-trial.png" alt-text="The Microsoft Threat Experts Experts on Demand trial subscription screen in the Microsoft 365 Defender portal" lightbox="../../media/mte/mte-trial.png":::
The **Investigation topic** field will already be populated with the link to the relevant page for your request.
security Custom Detection Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md
To view all existing custom detection rules, navigate to **Hunting** > **Custom
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information its run status and scope. The page also provides the list of triggered alerts and actions.
-![Custom detection rule details page.](../../media/custom-detect-rules-view.png)<br>
*Custom detection rule details* You can also take the following actions on the rule from this page:
security Device Profile https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/device-profile.md
If the device is enrolled in Microsoft Defender for Endpoint, you can also use t
The profile page is broken up into several broad sections.
-![Image of device profile page with (1) Tab area (2) Sidebar and (3) Actions highlighted in red.](../../media/mtp-device-profile/hybrid-device-overall.png)
The sidebar (1) lists basic details about the device.
If the device is enrolled in Microsoft Defender for Endpoint, you will also see
Beside the main content area of the device profile page is the sidebar.
-![Image of sidebar tab for device profile.](../../media/mtp-device-profile/azure-atp-only-device-sidebar.png)
The sidebar lists the device's full name and exposure level. It also provides some important basic information in small subsections which can be toggled open or closed, such as:
The sidebar lists the device's full name and exposure level. It also provides so
Response actions offer a quick way to defend against and analyze threats.
-![Image of action bar for device profile.](../../media/mtp-device-profile/hybrid-device-long-action-bar.png)
> [!IMPORTANT] > * [Response actions](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts) are only available if the device is enrolled in Microsoft Defender for Endpoint.
Devices enrolled in Microsoft Defender for Endpoint will also display tabs that
The default tab is **Overview**. It provides a quick look at the most important security fact about the device.
-![Image of overview tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-overview.png)
Here, you can get a quick look at the device's active alerts, and any currently logged on users.
If the device is enrolled in Microsoft Defender for Endpoint, you will also see
The **Alerts** tab contains a list of alerts that have been raised on the device, from both Microsoft Defender for Identity and Microsoft Defender for Endpoint.
-![Image of alerts tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-alerts.png)
You can customize the number of items displayed, as well as which columns are displayed for each item. The default behavior is to list thirty items per page.
The **Timeline** tab includes an interactive, chronological chart of all events
Below the chart is a list of events for the selected range of dates.
-![Image of timeline tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-timeline.png)
The number of items displayed and the columns on the list can both be customized. The default columns list the event time, active user, action type, entities (processes), and additional information about the event.
The list can also be exported to a CSV file, for download. Although the file is
The **Security recommendations** tab lists actions you can take to protect the device. Selecting an item on this list will open a flyout where you can get instructions on how to apply the recommendation.
-![Image of security recommendations tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-security-recs.png)
As with the previous tabs, the number of items displayed per page, as well as which columns are visible, can be customized.
The default view includes columns that detail the security weaknesses addressed,
The **Software inventory** tab lists software installed on the device.
-![Image of software inventory tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-software-inventory.png)
The default view displays the software vendor, installed version number, number of known software weaknesses, threat insights, product code, and tags. The number of items displayed and which columns are displayed can both be customized.
This list can be filtered by product code.
The **Discovered vulnerabilities** tab lists any Common Vulnerabilities and Exploits (CVEs) that may affect the device.
-![Image of discovered vulnerabilities tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-discovered-vulnerabilities.png)
The default view lists the severity of the CVE, the Common Vulnerability Score (CVS), the software related to the CVE, when the CVE was published, when the CVE was last updated, and threats associated with the CVE.
Selecting an item from this list will open a flyout that describes the CVE.
The **Missing KBs** tab lists any Microsoft Updates that have yet to be applied to the device. The "KBs" in question are [Knowledge Base articles](https://support.microsoft.com/help/242450/how-to-query-the-microsoft-knowledge-base-by-using-keywords-and-query) which describe these updates; for example, [KB4551762](https://support.microsoft.com/help/4551762/windows-10-update-kb4551762).
-![Image of missing kbs tab for device profile.](../../media/mtp-device-profile/hybrid-device-tab-missing-kbs.PNG)
The default view lists the bulletin containing the updates, OS version, products affected, CVEs addressed, the KB number, and tags.
security Eval Create Eval Environment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-create-eval-environment.md
The second is to [Set up your Microsoft 365 Defender trial lab environment](set
2. Select **Purchase Services** from the navigation menu. 3. Scroll down to the Office 365 section and select **Details** button under Office 365 E5 license.
- :::image type="content" source="../../medio-eval-license-details.png" alt-text="The Office 365 section has a Details button to click.":::
+ :::image type="content" source="../../medio-eval-license-details.png":::
4. Select **Start free trial** link.
- :::image type="content" source="../../media/mdo-eval/3-m365-purchase-button.png" alt-text="Click 'Start free trial' (there's a 35$ fee).":::
+ :::image type="content" source="../../medio-eval/3-m365-purchase-button.png":::
5. Confirm your request and click **Try now** button.
- :::image type="content" source="../../medio-trial-order.png" alt-text="There is a 'Try Now' button on the 'Check out, confirm your order' panel (for an Office 365 E5 trial of a month for 25 users).":::
+ :::image type="content" source="../../medio-trial-order.png":::
## Go to the next step
security Eval Defender Endpoint Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-architecture.md
Before enabling Microsoft Defender for Endpoint, be sure you understand the arch
The following diagram illustrates Microsoft Defender for Endpoint architecture and integrations.
-![Steps for adding Microsoft Defender for Office to the Defender evaluation environment.](../../media/defender/m365-defender-endpoint-architecture.png)
The following table describes the illustration.
security Eval Defender Endpoint Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-enable-eval.md
This article will guide you through the steps on setting up the evaluation envir
Use the following steps to enable the evaluation for Microsoft Defender for Endpoint.
-![Steps to enable Microsoft Defender for Endpoint in the Microsoft Defender evaluation environment.](../../media/defender/m365-defender-endpoint-eval-enable-steps.png)
- [Step 1. Check license state](#step-1-check-license-state) - [Step 2. Onboard endpoints](#step-2-onboard-endpoints-using-any-of-the-supported-management-tools)
You'll first need to check the license state to verify that it was properly prov
1. To view your licenses, go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products).
- ![Image of Azure Licensing page.](../../media/defender/atp-licensing-azure-portal.png)
+ :::image type="content" source="../../media/defender/atp-licensing-azure-portal.png" alt-text="The Azure Licensing page in the Microsoft 365 Defender portal" lightbox="../../media/defender/atp-licensing-azure-portal.png":::
1. Alternately, in the admin center, navigate to **Billing** > **Subscriptions**. On the screen, you'll see all the provisioned licenses and their current **Status**.
- ![Image of billing licenses.](../../media/defender/atp-billing-subscriptions.png)
+ :::image type="content" source="../../media/defender/atp-billing-subscriptions.png" alt-text="The Billing licenses page in the Microsoft Azure portal" lightbox="../../media/defender/atp-billing-subscriptions.png":::
+
## Step 2. Onboard endpoints using any of the supported management tools
security Eval Defender Endpoint Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-overview.md
This article outlines the process to enable and pilot Microsoft Defender for End
Use the following steps to enable and pilot Microsoft Defender for Endpoint.
-![Steps for adding Microsoft Defender for Endpoint to the Defender evaluation environment.](../../media/defender/m365-defender-endpoint-eval-steps.png)
The following table describes the steps in the illustration.
The following table describes the steps in the illustration.
||| | [Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md) | Understand the Defender for Endpoint architecture and the capabilities available to you. | |[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md) | Follow the steps to setup the evaluation environment. |
-|[Step 3. Set up the pilot ](eval-defender-endpoint-pilot.md) | Verify your pilot group, run simulations, and become familiar with key features and dashboards. |
--
+|[Step 3. Set up the pilot ](eval-defender-endpoint-pilot.md) | Verify your pilot group, run simulations, and become familiar with key features and dashboards. |
security Eval Defender Endpoint Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-pilot.md
This article will guide you in the process of running a pilot for Microsoft Defe
Use the following steps to setup and configure the pilot for Microsoft Defender for Endpoint.
-![Steps for adding Microsoft Defender for Identity to the Defender evaluation environment.](../../media/defender/m365-defender-endpoint-pilot-steps.png)
- Step 1. Verify pilot group - Step 2. Try out capabilities
security Eval Defender Identity Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-architecture.md
Defender for Identity protects your on-premises Active Directory users and/or us
The following diagram illustrates the baseline architecture for Defender for Identity.
-![Architecture for Microsoft Defender for Identity.](../../media/defender/m365-defender-identity-architecture.png)
In this illustration:+ - Sensors installed on AD domain controllers parse logs and network traffic and send them to Microsoft Defender for Identity for analysis and reporting. - Sensors can also parse Active Directory Federation Services (AD FS) when Azure AD is configured to use federated authentication (dotted line in illustration). - Microsoft Defender for Identity shares signals to Microsoft 365 Defender for extended detection and response (XDR). - Defender for Identity sensors can be directly installed on the following servers: - Domain controllers: The sensor directly monitors domain controller traffic, without the need for a dedicated server, or configuration of port mirroring.
For a deeper look into the architecture of Defender for Identity, including inte
The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Identity. - |Concept |Description |More information | |||| | Monitored activities | Defender for Identity monitors signals generated from within your organization to detect suspicious or malicious activity and helps you determine the validity of each potential threat so that you can effectively triage and respond. | [Microsoft Defender for Identity monitored activities](/defender-for-identity/monitored-activities) |
The following table identified key concepts that are important to understand whe
| Role groups | Defender for Identity offers role-based groups and delegated access to safeguard data according to your organization's specific security and compliance needs which includes Administrators, Users and Viewers. | [Microsoft Defender for Identity role groups](/defender-for-identity/role-groups) | | Administrative portal | In addition to the Microsoft 365 Defender portal, the Defender for Identity portal can be used to monitor and respond to suspicious activity. | [Working with the Microsoft Defender for Identity portal](/defender-for-identity/workspace-portal) | | Microsoft Defender for Cloud Apps integration | Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Identity to provide user entity behavioral analytics (UEBA) across a hybrid environment - both cloud app and on-premises | Microsoft Defender for Identity integration |
-| | | |
- ## Review prerequisites
security Eval Defender Identity Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-enable-eval.md
This article is [Step 2 of 2](eval-defender-identity-overview.md) in the process
Use the following steps to set up your Microsoft Defender for Identity environment.
-![Steps to enable Microsoft Defender for Identity in the Microsoft Defender evaluation environment.](../../media/defender/m365-defender-identity-eval-enable-steps.png)
- [Step 1. Set up the Defender for Identity Instance](#step-1-set-up-the-defender-for-identity-instance) - [Step 2. Install and configure the sensor](#step-2-install-and-configure-the-sensor)
Use the following steps to set up your Microsoft Defender for Identity environme
Sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
-| |Step |More information |
+| Step | Description |More information |
|||| |1 | Create the Defender for Identity instance | [Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1) | |2 | Connect the Defender for Identity instance to your Active Directory forest | [Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2) |
-| | |
## Step 2. Install and configure the sensor Next, download, install, and configure the Defender for Identity sensor on the domain controllers and AD FS servers in your on-premises environment.
-| |Step |More information |
+| Step | Description |More information |
|||| |1 | Determine how many Microsoft Defender for Identity sensors you need. | [Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning) | |2 | Download the sensor setup package | [Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3) | |3 | Install the Defender for Identity sensor | [Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4) | |4 | Configure the sensor | [Configure Microsoft Defender for Identity sensor settings ](/defender-for-identity/install-step5) |
-| | | |
## Step 3. Configure event log and proxy settings on machines with the sensor On the machines that you installed the sensor on, configure Windows event log collection and Internet proxy settings to enable and enhance detection capabilities.
-| |Step |More information |
+| Step | Description |More information |
|||| |1 | Configure Windows event log collection | [Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection) | |2 | Configure Internet proxy settings | [Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy) |
-| | | |
## Step 4. Allow Defender for Identity to identify local admins on other computers
Step 3 of 3: [Pilot Microsoft Defender for Identity](eval-defender-identity-pilo
Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md)
-Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md)
+Return to the overview for [Evaluate and pilot Microsoft 365 Defender](eval-overview.md)
security Eval Defender Identity Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-overview.md
ms.technology: m365d
Use the steps below to enable and pilot Microsoft Defender for Identity.
-![Steps for adding Microsoft Defender for Identity to the Defender evaluation environment.](../../media/defender/m365-defender-identity-eval-steps.png)
This table describes the steps in the illustration.
-| |Step |Description |
+| Serial Number|Step |Description |
|||| |1|[Review architecture requirements and key concepts](eval-defender-identity-architecture.md) | Understand the Defender for Identity architecture and be sure your environment meets the architecture prerequisites. | |2|[Enable the evaluation environment](eval-defender-identity-enable-eval.md) | Follow the steps to set up the evaluation environment. | |3|[Set up the pilot](eval-defender-identity-pilot.md) | Learn about benchmark settings for your identity environment and try out Defender for Identity tutorials. |
-||||
-
security Eval Defender Identity Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-pilot.md
This article is [Step 3 of 3](eval-defender-identity-overview.md) in the process
Use the following steps to setup and configure the pilot for Microsoft Defender for identity. Note that the recommendations don't include setting up a pilot group. The best practice is to go ahead and install the sensor on all of your servers running Active Directory Domain Services (AD DS) and Active Directory Federated Services (AD FS).
-![Steps for adding Microsoft Defender for Identity to the Defender evaluation environment.](../../media/defender/m365-defender-identity-pilot-steps.png)
The following table describes the steps in the illustration.
security Eval Defender Investigate Respond Additional https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-additional.md
Once you have performed an [incident response for a simulated attack](eval-defen
You get to the incident queue from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. Here's an example. + The **Most recent incidents and alerts** section shows a graph of the number of alerts received and incidents created in the last 24 hours.
To examine the list of incidents and prioritize their importance for assignment
From the default incident queue, select **Filters** to see a **Filters** pane, from which you can specify a specific set of incidents. Here's an example. For more information, see [Prioritize incidents](incident-queue.md).
For more information, see [Prioritize incidents](incident-queue.md).
You can manage incidents from the **Manage incident** pane for an incident. Here's an example. You can display this pane from the **Manage incident** link on the:
Depending on how automated investigation and response capabilities are configure
Here's an example. From the Action center, you can select pending actions and then approve or reject them in the flyout pane. Here's an example. + Approve (or reject) pending actions as soon as possible so that your automated investigations can proceed and complete in a timely manner.
There's a single internal mailbox and device required for this simulation. You'l
> [!NOTE] > See the next step for filtering options to limit data return.
- ![Example of the advanced hunting query results.](../../media/advanced-hunting-incident-response-try-1.png)
+ :::image type="content" source="../../media/advanced-hunting-incident-response-try-1.png" alt-text="The Advanced Hunting page in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-incident-response-try-1.png":::
> [!NOTE] > Advanced hunting displays query results as tabular data. You can also opt to view the data in other format types such as charts.
There's a single internal mailbox and device required for this simulation. You'l
1. Click the resulting rows from the query so you can inspect the record.
- ![Example of the inspect record side panel which opens up when an advanced hunting result is selected.](../../media/advanced-hunting-incident-response-try-2.png)
+ :::image type="content" source="../../media/advanced-hunting-incident-response-try-2.png" alt-text="The Inspect record section of the Advanced Hunting page in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-incident-response-try-2.png":::
4. Now that you have verified that you can see the email, add a filter for the attachments. Focus on all emails with attachments in the environment. For this simulation, focus on inbound emails, not those that are being sent out from your environment. Remove any filters you have added to locate your message and add "| where **AttachmentCount > 0** and **EmailDirection** == **"Inbound""**
Custom detections will run the query according to the frequency you set, and the
1. On the query page, remove lines 7 and 8 that were added in step 7 of the Go hunting instructions and click **Create detection rule**.
- ![Example of where you can click create detection rule in the the advanced hunting page.](../../media/advanced-hunting-incident-response-try-3.png)
+ :::image type="content" source="../../media/advanced-hunting-incident-response-try-3.png" alt-text="The Query editing section of the Advanced Hunting page in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-incident-response-try-3.png":::
> [!NOTE] > If you click **Create detection rule** and you have syntax errors in your query, your detection rule won't be saved. Double-check your query to ensure there's no errors. 2. Fill in the required fields with the information that will allow the security team to understand the alert, why it was generated, and what actions you expect them to take.
- ![Example of the create detection rule page where you can define the alert details.](../../media/mtp/fig23.png)
+ :::image type="content" source="../../media/mtp/fig23.png" alt-text="The Alert details page in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig23.png":::
Ensure that you fill out the fields with clarity to help give the next user an informed decision about this detection rule alert 3. Select what entities are impacted in this alert. In this case, select **Device** and **Mailbox**.
- ![Example of the create detection rule page where you can choose the parameters of the impacted entities.](../../media/mtp/fig24.png)
+ :::image type="content" source="../../media/mtp/fig24.png" alt-text="The Impacted entities details page in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig24.png":::
4. Determine what actions should take place if the alert is triggered. In this case, run an antivirus scan, though other actions could be taken.
- ![Example of the create detection rule page where you can run an antivirus scan when an alert is triggered to help address threats.](../../media/mtp/fig25.png)
+ :::image type="content" source="../../media/mtp/fig25.png" alt-text="The Actions page in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig25.png":::
5. Select the scope for the alert rule. Since this query involves devices, the device groups are relevant in this custom detection according to Microsoft Defender for Endpoint context. When creating a custom detection that does not include devices as impacted entities, scope does not apply.
- ![Example of the create detection rule page where you can set the scope for the alert rule manages your expectations for the results that you'll see.](../../media/mtp/fig26.png)
+ :::image type="content" source="../../media/mtp/fig26.png" alt-text="The Scope page in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig26.png":::
+ For this pilot, you might want to limit this rule to a subset of testing devices in your production environment. 6. Select **Create**. Then, select **Custom detection rules** from the navigation panel.
- ![Example of Custom detection rules option in the menu.](../../media/mtp/fig27a.png)
+ :::image type="content" source="../../media/mtp/fig27a.png" alt-text="The Custom detection rules rules option in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig27a.png":::
- ![Example of the detection rules page which displays the rule and execution details.](../../media/mtp/fig27b.png)
+ :::image type="content" source="../../media/mtp/fig27b.png" alt-text="The page displaying the detection rules and execution details in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig27b.png":::
From this page, you can select the detection rule, which will open a details page.
- ![Example of the email attachments page where you can see the status of the rule execution, triggered alerts and actions, edit the detection, and so on.](../../media/mtp/fig28.png)
+ :::image type="content" source="../../media/mtp/fig28.png" alt-text="The page displaying details of the triggered alerts in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig28.png":::
### Expert training on advanced hunting
security Eval Defender Investigate Respond Simulate Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack.md
One alternative is to host your AD DS domain controller and test device as virtu
Here is the result.
-![Endpoints for your Defender evaluation environment using the simulated enterprise Test Lab Guide.](../../media/eval-defender-investigate-respond/eval-defender-eval-investigate-respond-endpoints-tlg.png)
You'll simulate a sophisticated attack that leverages advanced techniques to hide from detection. The attack enumerates opened Server Message Block (SMB) sessions on domain controllers and retrieves recent IP addresses of users' devices. This category of attacks usually doesn't include files dropped on the victim's device and they occur solely in memory. They "live off the land" by using existing system and administrative tools and inject their code into system processes to hide their execution. Such behavior allows them to evade detection and persist on the device. In this simulation, our sample scenario starts with a PowerShell script. In the real world, a user might be tricked into running a script or the script might run from a remote connection to another computer from a previously infected device, which indicates that the attacker is attempting to move laterally in the network. Detection of these scripts can be difficult because administrators also often run scripts remotely to carry out various administrative activities.
-![Fileless PowerShell attack with process injection and SMB reconnaisance attack diagram.](../../media/mtp/mtpdiydiagram.png)
During the simulation, the attack injects shellcode into a seemingly innocent process. The scenario requires the use of notepad.exe. We chose this process for the simulation, but attackers would more likely target a long-running system process, such as svchost.exe. The shellcode then goes on to contact the attacker's command-and-control (C2) server to receive instructions on how to proceed. The script attempts executing reconnaissance queries against the domain controller (DC). Reconnaissance allows an attacker to get information about recent user login information. Once attackers have this information, they can move laterally in the network to get to a specific sensitive account
Switching to the SOC analyst point of view, you can now start to investigate the
3. The new incident for the simulated attack will appear in the incident queue.
- ![Example of the incident queue.](../../media/mtp/fig2.png)
+ :::image type="content" source="../../media/mtp/fig2.png" alt-text="The Incidents queue in the Microsoft 365 Defender portal" lightbox="../../media/mtp/fig2.png":::
#### Investigate the attack as a single incident
Let's look at some of the alerts generated during the simulated attack.
> [!NOTE] > We'll walk through only a few of the alerts generated during the simulated attack. Depending on the version of Windows and the Microsoft 365 Defender products running on your test device, you might see more alerts that appear in a slightly different order.
-![Example of the generated alerts.](../../media/mtp/fig6.png)
##### Alert: Suspicious process injection observed (Source: Microsoft Defender for Endpoint)
Advanced attackers use sophisticated and stealthy methods to persist in memory a
To allow the SOC analysts to catch these advanced attacks, deep memory sensors in Microsoft Defender for Endpoint provide our cloud service with unprecedented visibility into a variety of cross-process code injection techniques. The following figure shows how Defender for Endpoint detected and alerted on the attempt to inject code to <i>notepad.exe</i>.
-![Example of the alert for injection of potentially malicious code.](../../media/mtp/fig7.png)
##### Alert: Unexpected behavior observed by a process run with no command-line arguments (Source: Microsoft Defender for Endpoint)
Notice that the alert details include the external IP addressΓÇöan indicator tha
Select the IP address in the alert process tree to view the IP address details page.
-![Example of the alert for unexpected behavior by a process run with no command line arguments.](../../media/mtp/fig8.png)
The following figure displays the selected IP Address details page (clicking on IP address in the Alert process tree).
-![Example of the IP address details page.](../../media/mtp/fig9.png)
+ ##### Alert: User and IP address reconnaissance (SMB) (Source: Microsoft Defender for Identity)
Enumeration using Server Message Block (SMB) protocol enables attackers to get r
In this detection, an alert is triggered when the SMB session enumeration runs against a domain controller.
-![Example of the Microsoft Defender for Identity alert for User and IP address reconnaissance.](../../media/mtp/fig10.png)
#### Review the device timeline with Microsoft Defender for Endpoint
Select the name of the device where the attack was conducted, to open the entity
Select the **Timeline** tab to open the device timeline and view all events and behaviors observed on the device in chronological order, interspersed with the alerts raised.
-![Example of the device timeline with behaviors.](../../media/mtp/fig11.png)
Expanding some of the more interesting behaviors provides useful details, such as process trees. For example, scroll down until you find the alert event **Suspicious process injection observed**. Select the **powershell.exe injected to notepad.exe process** event below it, to display the full process tree for this behavior under the **Event entities** graph on the side pane. Use the search bar for filtering if necessary.
-![Example of the process tree for selected PowerShell file creation behavior.](../../media/mtp/fig12.png)
#### Review the user information with Microsoft Defender for Cloud Apps
On the incident page, select the **Users** tab to display the list of users invo
Select the user name to open the user's profile page where further investigation can be conducted. [Read more about investigating risky users](/cloud-app-security/tutorial-ueba#identify).
-![Example of Defender for Cloud Apps user page.](../../media/mtp/fig13.png)
#### Automated investigation and remediation
Select the user name to open the user's profile page where further investigation
Navigate back to the incident in the Microsoft 365 Defender portal. The **Investigations** tab in the **Incident** page shows the automated investigations that were triggered by Microsoft Defender for Identity and Microsoft Defender for Endpoint. The screenshot below displays only the automated investigation triggered by Defender for Endpoint. By default, Defender for Endpoint automatically remediates the artifacts found in the queue, which requires remediation.
-![Example of the automated investigations related to the incident.](../../media/mtp/fig14.png)
Select the alert that triggered an investigation to open the **Investigation details** page. You'll see the following details:
Select the alert that triggered an investigation to open the **Investigation det
> [!NOTE] > Depending on timing, the automated investigation might still be running. Wait a few minutes for the process to complete before you collect and analyze the evidence and review the results. Refresh the **Investigation details** page to get the latest findings.
-![Example of the Investigation details page.](../../media/mtp/fig15.png)
During the automated investigation, Microsoft Defender for Endpoint identified the notepad.exe process, which was injected as one of the artifacts requiring remediation. Defender for Endpoint automatically stops the suspicious process injection as part of the automated remediation.
After the investigation is complete and confirmed to be remediated, you resolve
From the **Incident** page, select **Manage incident**. Set the status to **Resolve incident** and select **True alert** for the classification and **Security testing** for the determination.
-![Example of the incidents page with the open Manage incident panel where you can resolve the incident.](../../media/mtp/fig16.png)
When the incident is resolved, it resolves all of the associated alerts in the Microsoft 365 Defender portal and the related portals.
This wraps up attack simulations for incident analysis, automated investigation,
## Next step
-[![Try Microsoft 365 Defender incident response capabilities.](../../medi)
+[:::image type="content" source="../../medi)
Step 2 of 2: [Try Microsoft 365 Defender incident response capabilities](eval-defender-investigate-respond-additional.md)
security Eval Defender Office 365 Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-pilot.md
ms.technology: m365d
This article is [Step 3 of 3](eval-defender-office-365-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Office 365. For more information about this process, see the [overview article](eval-defender-office-365-overview.md).
-Use the following steps to setup and configure the pilot for Microsoft Defender for Office 365.
+Use the following steps to set up and configure the pilot for Microsoft Defender for Office 365.
![Steps for creating the pilot for Microsoft Defender for Office 365.](../../media/defender/m365-defender-office-pilot.png)
Use the following steps to setup and configure the pilot for Microsoft Defender
When you evaluate Microsoft Defender for Office 365, you may choose to pilot specific users before enabling and enforcing policies for your entire organization. Creating distribution groups can help manage the deployment processes. For example, create groups such as *Defender for Office 365 Users - Standard Protection*, *Defender for Office 365 Users - Strict Protection*, *Defender for Office 365 Users - Custom Protection*, or *Defender for Office 365 Users - Exceptions*.
-It may not be evident why 'Standard' and 'Strict' are the terms used for this, but that will become clear when you explore more about Defender for Office 365 security presets. Naming groups 'custom' and 'exceptions' speak for themselves, and though most of your users should fall under *standard* and *strict*, custom and exception groups will collect valuable data for you regarding managing risk.
+It may not be evident why 'Standard' and 'Strict' are the terms used for these groups, but that will become clear when you explore more about Defender for Office 365 security presets. Naming groups 'custom' and 'exceptions' speak for themselves, and though most of your users should fall under *standard* and *strict*, custom and exception groups will collect valuable data for you regarding managing risk.
## Step 1: Create pilot groups Distribution groups can be created and defined directly in Exchange Online or synchronized from on-premises Active Directory.
-1. Logon to Exchange Admin Center (EAC) using an account that has been granted Recipient Administrator role or been delegated group management permissions.
-2. From the navigation menu, expand **Recipients** and select <a href="https://go.microsoft.com/fwlink/?linkid=2183233" target="_blank">**Groups**</a>.
+1. Sign in to the Exchange Admin Center (EAC) using an account that has been granted Recipient Administrator role or been delegated group management permissions.
+2. From the navigation menu, expand *Recipients* and select *Groups*.
- :::image type="content" source="../../medio-eval-pilot.png" alt-text="Exchange admin center on the navigation menu (the quick launch) with an arrow pointing at Groups. Click Groups.":::
+ :::image type="content" source="../../medio-eval-pilot.png":::
3. From the Groups dashboard, select "Add a group".
- :::image type="content" source="../../medio-eval-pilot-add-group.png" alt-text="Add groups on the Groups panel.":::
+ :::image type="content" source="../../medio-eval-pilot-add-group.png":::
4. For group type, select *Distribution* and click Next.
- :::image type="content" source="../../medio-eval-pilot-group-type.png" alt-text="Choose a distribution group type here.":::
+ :::image type="content" source="../../medio-eval-pilot-group-type.png":::
5. Give the group a name and description and then click Next.
- :::image type="content" source="../../medio-eval-pilot-set-up-basics.png" alt-text="Name and describe the group.":::
+ :::image type="content" source="../../medio-eval-pilot-set-up-basics.png":::
## Step 2: Configure protection
Some capabilities in Defender for Office 365 are configured and turned on by def
Some capabilities are *not yet* configured. You have three options for configuring protection: - **Assign preset security policies automatically** ΓÇö [Preset security policies](../office-365-security/preset-security-policies.md) are provided as a method to quickly assign a uniform level of protection across all of the capabilities. You can choose from ***standard*** or ***strict***. A good approach is to start with preset security policies and then fine-tune the policies as you learn more about the capabilities and your own unique threat environment. The advantage here is that you protect groups of users as quickly as possible, with the ability to tweak protection afterward. (This method is recommended.)-- **Configure baseline protection manually** ΓÇö If you prefer to configure the environment yourself, you can quickly achieve a *baseline* of protection by following the guidance in [Protect against threats](../office-365-security/protect-against-threats.md). With this approach you get to learn more about the settings that are configurable. And, of course, you can fine-tune the policies later.
+- **Configure baseline protection manually** ΓÇö If you prefer to configure the environment yourself, you can quickly achieve a *baseline* of protection by following the guidance in [Protect against threats](../office-365-security/protect-against-threats.md). With this approach, you get to learn more about the settings that are configurable. And, of course, you can fine-tune the policies later.
- **Configure *custom* protection policies** ΓÇö You can also build and assign custom protection policies as part of your evaluation. Before you start customizing policies, it's important to understand the precedence in which these protection policies are applied and enforced. Security ops will need to create some policies even if when the preset is applied, in specific in order to define security policies for Safe Links and Safe Attachments. > [!IMPORTANT]
Some capabilities are *not yet* configured. You have three options for configuri
### Assign preset security policies
-It's encouraged to begin with the *recommended baseline policies* when evaluating MDO and then refine them as needed over the course of your evaluation period.
+It's recommended you begin with the *recommended baseline policies* when evaluating MDO and then refine them as needed over the course of your evaluation period.
You can enable recommended EOP and Defender for Office 365 protection policies fast, and assign them to specific pilot users or defined groups as part of your evaluation. Preset policies offer a baseline **Standard** protection template or a more aggressive **Strict** protection template which can be assigned independently, or combined.
Here is the [Preset security policies in EOP and Microsoft Defender for Office 3
3. On the Policy & Rules dashboard, click *Threat Policies*.
- :::image type="content" source="../../medio-eval-pilot-threat-policies.png" alt-text="a.":::
+ :::image type="content" source="../../medio-eval-pilot-threat-policies.png":::
4. From the Microsoft 365 Defender portal, expand Threat Management from the navigation menu and then select Policy from the submenu. 5. On the Policy dashboard, click *Preset security policies*.
- :::image type="content" source="../../medio-eval-pilot-template-policies.png" alt-text="Click the Preset Security Policies tile.":::
+ :::image type="content" source="../../medio-eval-pilot-template-policies.png":::
6. Click *Edit* to configure and assign the Standard policy and/or Strict policy.
- :::image type="content" source="../../medio-eval-pilot-preset.png" alt-text="On the Preset security policies panel, click Edit.":::
+ :::image type="content" source="../../medio-eval-pilot-preset.png":::
7. Add conditions to apply baseline ***EOP*** protections to specific pilot users, or groups of users, as needed, and select *Next* to continue. Example, a Defender for Office 365 condition for pilot evaluations could be applied if the recipients are *members* of a defined *Defender for Office 365 Standard Protection* group, and then managed by simply adding accounts to, or removing account from, the group.
- :::image type="content" source="../../medio-eval-pilot-eop-protections.png" alt-text="Add the conditions needed to apply the EOP security level to your pilot group.":::
+ :::image type="content" source="../../medio-eval-pilot-eop-protections.png":::
8. Add conditions to apply baseline ***MDO*** protections to specific pilot users, or groups of users, as needed. Click *Next* to continue. For example, a Defender for Office 365 condition for pilot evaluations could be applied if the recipients are *members* of a defined *Defender for Office 365 Standard Protection* group and then managed by simply adding / removing accounts via the group.
- :::image type="content" source="../../medio-protections.png" alt-text="Add the conditions needed to apply the Defender for Office 365 security level to your pilot group.":::
+ :::image type="content" source="../../medio-protections.png":::
9. Review and confirm your changes for assigning preset security policies. 10. Preset protection policies can be managed (re-configured, re-applied, disabled, etc.) by returning to the Microsoft 365 Defender portal > Policies & rules > Threat Policies > and clicking the *Preset security policies* tile.
security Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md
Microsoft 365 Defender emphasizes *unity, clarity, and common goals* as it merge
Centralizing security information creates a single place for investigating security incidents across Microsoft 365. A primary example is **Incidents** under **Incidents & alerts** on the quick launch of Microsoft 365 Defender. Selecting an incident name displays a page that demonstrates the value of centralizing security information.
security Top Security Tasks For Remote Work https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/top-security-tasks-for-remote-work.md
description: "Protect your business email and data from cyber threats, including
If you are like [Microsoft](https://www.microsoft.com/microsoft-365/blog/2020/03/10/staying-productive-while-working-remotely-with-microsoft-teams/) and suddenly find yourself supporting a primarily home-based workforce, we want to help you ensure your organization is working as securely as possible. This article prioritizes tasks to help security teams implement the most important security capabilities as quickly as possible.
-![Perform these top tasks to support working from home.](../media/security/security-support-remote-work.png)
If you are a small or medium-size organization using one of Microsoft's business plans, see these resources instead:
For customers using our enterprise plans, Microsoft recommends you complete the
|4|[Configure Microsoft Defender for Identity](#4-configure-microsoft-defender-for-identity)|||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)| |5|[Turn on Microsoft 365 Defender](#5-turn-on-microsoft-365-defender)|||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)| |6|[Configure Intune mobile app protection for phones and tablets](#6-configure-intune-mobile-app-protection-for-phones-and-tablets)||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|7|[Configure MFA and conditional access for guests, including Intune app protection](#7-configure-mfa-and-conditional-access-for-guests-including-intune-mobile-app-protection)||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|8|[Enroll PCs into device management and require compliant PCs](#8-enroll-pcs-into-device-management-and-require-compliant-pcs)||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|9|[Optimize your network for cloud connectivity](#9-optimize-your-network-for-cloud-connectivity)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|10|[Train users](#10-train-users)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|11|[Get started with Microsoft Defender for Cloud Apps](#11-get-started-with-microsoft-defender-for-cloud-apps)|||![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|12|[Monitor for threats and take action](#12-monitor-for-threats-and-take-action)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
-|
+|7|[Configure MFA and conditional access for guests, including Intune app protection](#7-configure-mfa-and-conditional-access-for-guests-including-intune-mobile-app-protection)||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|
+|8|[Enroll PCs into device management and require compliant PCs](#8-enroll-pcs-into-device-management-and-require-compliant-pcs)||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|
+|9|[Optimize your network for cloud connectivity](#9-optimize-your-network-for-cloud-connectivity)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included](../media/d238e041-6854-4a78-9141-049224df0795.png)|
+|10|[Train users](#10-train-users)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|
+|11|[Get started with Microsoft Defender for Cloud Apps](#11-get-started-with-microsoft-defender-for-cloud-apps)|||![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|
+|12|[Monitor for threats and take action](#12-monitor-for-threats-and-take-action)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|![Included.](../media/d238e041-6854-4a78-9141-049224df0795.png)|
Before you begin, check your [Microsoft 365 Secure Score](./defender/microsoft-secure-score.md) in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>. From a centralized dashboard, you can monitor and improve the security for your Microsoft 365 identities, data, apps, devices, and infrastructure. You are given points for configuring recommended security features, performing security-related tasks (such as viewing reports), or addressing recommendations with a third-party application or software. The recommended tasks in this article will raise your score.
-![Screenshot of Microsoft Secure Score.](../media/secure-score.png)
## 1: Enable Azure AD Multi-Factor Authentication (MFA)
Applying these policies will take only a few minutes, but be prepared to support
|Microsoft 365 plans (without Azure AD P1 or P2)|[Enable Security defaults in Azure AD](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults). Security defaults in Azure AD include MFA for users and administrators.| |Microsoft 365 E3 (with Azure AD P1)|Use [Common Conditional Access policies](/azure/active-directory/conditional-access/concept-conditional-access-policy-common) to configure the following policies: <br/>- [Require MFA for administrators](/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa) <br/>- [Require MFA for all users](/azure/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa) <br/> - [Block legacy authentication](/azure/active-directory/conditional-access/howto-conditional-access-policy-block-legacy)| |Microsoft 365 E5 (with Azure AD P2)|Taking advantage of Azure AD Identity Protection, begin to implement Microsoft's [recommended set of conditional access and related policies](./office-365-security/identity-access-policies.md) by creating these policies:<br/> - [Require MFA when sign-in risk is medium or high](./office-365-security/identity-access-policies.md#require-mfa-based-on-sign-in-risk) <br/>- [Block clients that don't support modern authentication](./office-365-security/identity-access-policies.md#block-clients-that-dont-support-multi-factor)<br/>- [High risk users must change password](./office-365-security/identity-access-policies.md#high-risk-users-must-change-password)|
-|
## 2: Protect against threats
You'll need to work with your Exchange Online administrator and SharePoint Onlin
Now that you have Microsoft Defender for Office 365 and Microsoft Defender for Identity configured, you can view the combined signals from these capabilities in one dashboard. [Microsoft 365 Defender](./defender/microsoft-365-defender.md) brings together alerts, incidents, automated investigation and response, and advanced hunting across workloads (Microsoft Defender for Identity, Defender for Office 365, Microsoft Defender for Endpoint, and Microsoft Defender for Cloud Apps) into a single pane in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft 365 Defender portal</a>.
-![MTP dashboard illustration.](../media/top-ten-security-remote-work-mtp-dashboard.png)
+<!--
+-->
After you have configured one or more of your Defender for Office 365 services, turn on MTP. New features are added continually to MTP; consider opting in to receive preview features.
Microsoft 365 provides the following resources to help inform users in your orga
|Microsoft 365|[Customizable learning pathways](/office365/customlearning/) <p>These resources can help you put together training for end users in your organization| |Microsoft 365 security|[Learning module: Secure your organization with built-in, intelligent security from Microsoft 365](/learn/modules/security-with-microsoft-365) <p>This module enables you to describe how Microsoft 365 security features work together and to articulate the benefits of these security features.| |Multi-factor authentication|[Two-step verification: What is the additional verification page?](/azure/active-directory/user-help/multi-factor-authentication-end-user-first-time) <p>This article helps end users understand what multi-factor authentication is and why it's being used at your organization.|
-|
In addition to this guidance, Microsoft recommends that your users take the actions described in this article: [Protect your account and devices from hackers and malware](https://support.office.com/article/066d6216-a56b-4f90-9af3-b3a1e9a327d6.aspx). These actions include:
solutions Cloud Architecture Models https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/cloud-architecture-models.md
These cloud architecture posters give you information about Microsoft cloud serv
IT decision makers and architects can use these resources to determine the ideal solutions for their workloads and to make decisions about core infrastructure components such as networking, identity, and security.
+<a name="zero trust"></a>
+### Microsoft 365 Zero Trust deployment plan
++
+This illustration provides a deployment plan for building Zero Trust security with Microsoft 365. Zero Trust is a new security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify."
+
+| Item | Description |
+|:--|:--|
+|[![Illustration of the Microsoft 365 Zero Trust deployment plan.](../medi)</li></ul>
+ <a name="attacks"></a> ### Common attacks and Microsoft capabilities that protect your organization
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
Microsoft supports several options as you begin your journey to Teams in the Mic
With Microsoft 365 and other Microsoft cloud technologies, you can provide your workers with secure access to your organization's on-premises and cloud-based information, tools, and resources from their homes. [![Set up your infrastructure for hybrid work poster.](../media/empower-people-to-work-remotely/empower-remote-workers-poster.png)](https://download.microsoft.com/download/9/b/b/9bb5fa79-74e9-497b-87c5-4021e53d9fc2/hybrid-worker-infrastructure.pdf) <br/>
-[PDF](https://download.microsoft.com/download/9/b/b/9bb5fa79-74e9-497b-87c5-4021e53d9fc2/hybrid-worker-infrastructure.pdf) | [PowerPoint](https://download.microsoft.com/download/9/b/b/9bb5fa79-74e9-497b-87c5-4021e53d9fc2/hybrid-worker-infrastructure.pptx) <br>
+[PDF](https://download.microsoft.com/download/9/b/b/9bb5fa79-74e9-497b-87c5-4021e53d9fc2/hybrid-worker-infrastructure.pdf) <br>
Updated June 2021 For more information, see the article for this poster: [Set up your infrastructure for hybrid work with Microsoft 365](empower-people-to-work-remotely.md).