Updates from: 04/06/2022 02:02:45
Category Microsoft Docs article Related commit history on GitHub Change details
admin Signup Business Standard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/signup-business-standard.md
There are a couple of ways to get started:
- **[Buy](https://go.microsoft.com/fwlink/?linkid=2109654) Microsoft 365 Business Standard and complete your own setup**. To purchase Microsoft 365 Business Standard, [follow the steps below](#sign-up-steps). - **For Microsoft partners**: If you're a partner, see [Get Microsoft 365 Business](../../business/get-microsoft-365-business.md).
-**Need something different?** You can:
+## Sign up for Microsoft 365 for business
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE3znhX]
-- [Sign up for a home or family plan](https://go.microsoft.com/fwlink/?linkid=2109398) if you're not buying for a business. > [!IMPORTANT] > Microsoft 365 Business Standard subscriptions are for commercial use and are intended for business and enterprise customers.
-## Sign up for Microsoft 365 for business
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE3znhX]
## Sign up steps
compliance Customer Key Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-overview.md
description: "In this article, you will learn about how service encryption works
# Service encryption with Customer Key
-Microsoft 365 provides baseline, volume-level encryption enabled through BitLocker and Distributed Key Manager (DKM). Microsoft 365 offers an added layer of encryption for your content. This content includes data from Exchange Online, Skype for Business, SharePoint Online, OneDrive for Business, and Microsoft Teams.
+Microsoft 365 provides baseline, volume-level encryption enabled through BitLocker and Distributed Key Manager (DKM). Microsoft 365 offers an added layer of encryption for your content. This content includes data from Exchange Online, Skype for Business, SharePoint Online, OneDrive for Business, and Microsoft Teams.
## How service encryption, BitLocker, and Customer Key work together
compliance Customer Key Set Up https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/customer-key-set-up.md
description: "Learn how to set up Customer Key for Microsoft 365."
# Set up Customer Key
-With Customer Key, you control your organization's encryption keys and then configure Microsoft 365 to use them to encrypt your data at rest in Microsoft's data centers. In other words, Customer Key allows customers to add a layer of encryption that belongs to them, with their keys.
+With Customer Key, you control your organization's encryption keys and then configure Microsoft 365 to use them to encrypt your data at rest in Microsoft's data centers. In other words, Customer Key allows customers to add a layer of encryption that belongs to them, with their keys.
Set up Azure before you can use Customer Key for Office 365. This article describes the steps you need to follow to create and configure the required Azure resources and then provides the steps for setting up Customer Key in Office 365. After you set up Azure, you determine which policy, and therefore, which keys, to assign to encrypt data across various Microsoft 365 workloads in your organization. For more information about Customer Key, or for a general overview, see [Service encryption with Customer Key in Office 365](customer-key-overview.md).
Set up Azure before you can use Customer Key for Office 365. This article descri
## Before you set up Customer Key
-Before you get started, ensure that you have the appropriate Azure subscriptions and licensing for your organization. Use paid Azure Subscriptions using either an Enterprise Agreement or a Cloud Service Provider. Credit Card based payments are not accepted. Approve and set up the account needs for invoicing. Subscriptions you got through Free, Trial, Sponsorships, MSDN Subscriptions, and those under Legacy Support are not eligible.
+Before you get started, ensure that you have the appropriate Azure subscriptions and M365/O365 licensing for your organization. You must use paid Azure Subscriptions. Subscriptions you got through Free, Trial, Sponsorships, MSDN Subscriptions, and those under Legacy Support are not eligible.
-Office 365 E5, Microsoft 365 E5, Microsoft 365 E5 Compliance, and Microsoft 365 E5 Information Protection & Governance SKUs offer Customer Key. Office 365 Advanced Compliance SKU is no longer available for procuring new licenses. Existing Office 365 Advanced Compliance licenses will continue to be supported.
+> [!IMPORTANT]
+> Valid M365/O365 licenses that offer M365 Customer Key are:
+>
+> - Office 365 E5
+> - Microsoft 365 E5
+> - Microsoft 365 E5 Compliance
+> - Microsoft 365 E5 Information Protection & Governance SKUs
+> - Microsoft 365 Security and Compliance for FLW
+
+Existing Office 365 Advanced Compliance licenses will continue to be supported.
To understand the concepts and procedures in this article, review the [Azure Key Vault](/azure/key-vault/) documentation. Also, become familiar with the terms used in Azure, for example, [Azure AD tenant](/previous-versions/azure/azure-services/jj573650(v=azure.100)#what-is-an-azure-ad-tenant).
You'll complete most of these tasks by remotely connecting to Azure PowerShell.
- [Create two new Azure subscriptions](#create-two-new-azure-subscriptions) - [Submit a request to activate Customer Key for Office 365](#submit-a-request-to-activate-customer-key-for-office-365)
-
+ - [Register Azure subscriptions to use a mandatory retention period](#register-azure-subscriptions-to-use-a-mandatory-retention-period) This registration process will take five business days to complete.
+- [Contact the corresponding Microsoft alias to proceed with the process](#contact-the-corresponding-microsoft-alias-to-proceed-with-the-process)
- [Create a premium Azure Key Vault in each subscription](#create-a-premium-azure-key-vault-in-each-subscription)
You'll complete most of these tasks by remotely connecting to Azure PowerShell.
- [Add a key to each key vault either by creating or importing a key](#add-a-key-to-each-key-vault-either-by-creating-or-importing-a-key)
+- [Verify expiration date of your keys](#verify-expiration-date-of-your-keys)
+ - [Check the recovery level of your keys](#check-the-recovery-level-of-your-keys) - [Back up Azure Key Vault](#back-up-azure-key-vault) -- [Validate Azure Key Vault configuration settings](#validate-azure-key-vault-configuration-settings)- - [Obtain the URI for each Azure Key Vault key](#obtain-the-uri-for-each-azure-key-vault-key) ## Complete tasks in Azure Key Vault and Microsoft FastTrack for Customer Key
To submit an offer to activate Customer Key, complete these steps:
The temporary or permanent loss of root encryption keys can be disruptive or even catastrophic to service operation and can result in data loss. For this reason, the resources used with Customer Key require strong protection. All the Azure resources that are used with Customer Key offer protection mechanisms beyond the default configuration. You can tag or register Azure subscriptions for a *mandatory retention period*. A mandatory retention period prevents immediate and irrevocable cancellation of your Azure subscription. The steps required to register Azure subscriptions for a mandatory retention period require collaboration with the Microsoft 365 team. This process will take five business days to complete. Previously, mandatory retention period was sometimes referred to as "Do Not Cancel".
-Before contacting the Microsoft 365 team, you must do the following steps for each Azure subscription that you use with Customer Key. Ensure that you have the [Azure PowerShell Az](/powershell/azure/new-azureps-module-az) module installed before you start.
-
+> [!IMPORTANT]
+> Before contacting the Microsoft 365 team, you must do the following steps for **each** Azure subscription that you use with Customer Key. Ensure that you have the [Azure PowerShell Az](/powershell/azure/new-azureps-module-az) module installed before you start.
+ 1. Sign in with Azure PowerShell. For instructions, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps). 2. Run the Register-AzProviderFeature cmdlet to register your subscriptions to use a mandatory retention period. Complete this action for each subscription.
Before contacting the Microsoft 365 team, you must do the following steps for ea
Register-AzProviderFeature -FeatureName mandatoryRetentionPeriodEnabled -ProviderNamespace Microsoft.Resources ```
-3. Contact Microsoft to complete the process.
+### Contact the corresponding Microsoft alias to proceed with the process
- - For enabling Customer Key for assigning DEP to individual Exchange Online mailboxes, contact [exock@microsoft.com](mailto:exock@microsoft.com).
+>[!NOTE]
+> Before contacting the corresponding Microsoft alias, verify that you have complete your FastTrack requests for M365 Customer Key.
- - For enabling Customer Key for assigning DEPs to encrypt SharePoint Online and OneDrive for Business content (including Teams files) for all tenant users, contact [spock@microsoft.com](mailto:spock@microsoft.com).
+- For enabling Customer Key for assigning DEP to individual Exchange Online mailboxes, contact [exock@microsoft.com](mailto:exock@microsoft.com).
- - For enabling Customer Key for assigning DEPs to encrypt content across multiple Microsoft 365 workloads (Exchange Online, Teams, Microsoft Information Protection) for all tenant users, contact [m365-ck@service.microsoft.com](mailto:m365-ck@service.microsoft.com).
+- For enabling Customer Key for assigning DEPs to encrypt SharePoint Online and OneDrive for Business content (including Teams files) for all tenant users, contact [spock@microsoft.com](mailto:spock@microsoft.com).
- - Include the following information in your email:
+- For enabling Customer Key for assigning DEPs to encrypt content across multiple Microsoft 365 workloads (Exchange Online, Teams, MIP EDM) for all tenant users, contact [m365-ck@service.microsoft.com](mailto:m365-ck@service.microsoft.com).
+
+- Include the following information in your email:
**Subject**: Customer Key for \<*Your tenant's fully qualified domain name*\> **Body**:
- Include the subscription IDs for which you want to complete the mandatory retention period and the output of Get-AzProviderFeature for each subscription.
+ Include the FastTrack Request IDs and subscription IDs for **each** of the Customer Key services that you would like to be onboard to. These subscription IDs are the ones that you want to complete the mandatory retention period and the output of Get-AzProviderFeature for each subscription.
+
+The Service Level Agreement (SLA) for completion of this process is five business days once Microsoft has been notified (and verified) that you have registered your subscriptions to use a mandatory retention period.
- The Service Level Agreement (SLA) for completion of this process is five business days once Microsoft has been notified (and verified) that you have registered your subscriptions to use a mandatory retention period.
+### Verify the status of each your Azure Subscriptions
-4. Once you receive notification from Microsoft that registration is complete, verify the status of your registration by running the Get-AzProviderFeature command as follows. If verified, the Get-AzProviderFeature command returns a value of **Registered** for the **Registration State** property. Complete this step for each subscription.
+Once you receive notification from Microsoft that registration is complete, verify the status of your registration by running the Get-AzProviderFeature command as follows. If verified, the Get-AzProviderFeature command returns a value of **Registered** for the **Registration State** property. Complete this step for **each** subscription.
```powershell Set-AzContext -SubscriptionId <SubscriptionId> Get-AzProviderFeature -ProviderNamespace Microsoft.Resources -FeatureName mandatoryRetentionPeriodEnabled ```
-5. To complete the process, run the Register-AzResourceProvider command. Complete this step for each subscription.
+To complete the process, run the Register-AzResourceProvider command. Complete this step for **each** subscription.
```powershell Set-AzContext -SubscriptionId <SubscriptionId>
+ ```
+
+ ```powershell
Register-AzResourceProvider -ProviderNamespace Microsoft.KeyVault ```
+> [!TIP]
+> Before moving on, make sure the 'RegistrationState' is set to 'Registered' like the image below.
+>
+> ![Mandatory Retention Period](../media/MandatoryRetentionPeriod.png)
+ ### Create a premium Azure Key Vault in each subscription The steps to create a key vault are documented in [Getting Started with Azure Key Vault](/azure/key-vault/general/overview), which guides you through installing and launching Azure PowerShell, connecting to your Azure subscription, creating a resource group, and creating a key vault in that resource group.
For each Microsoft 365 service with which you will use Customer Key, create a ke
Use a naming convention for key vaults that reflects the intended use of the DEP with which you will associate the vaults. See the Best Practices section below for naming convention recommendations.
-Create a separate, paired set of vaults for each data encryption policy. For Exchange Online, the scope of a data encryption policy is chosen by you when you assign the policy to mailbox. A mailbox can have only one policy assigned, and you can create up to 50 policies. The scope of a SharePoint Online policy includes all of the data within an organization in a geographic location, or _geo_. The scope for a multi-workload policy includes all of the data across the supported workloads for all users.
+Create a separate, paired set of vaults for each data encryption policy. For Exchange Online, the scope of a data encryption policy is chosen by you when you assign the policy to mailbox. A mailbox can have only one policy assigned, and you can create up to 50 policies. The scope of a SharePoint Online policy includes all of the data within an organization in a geographic location, or *geo*. The scope for a multi-workload policy includes all of the data across the supported workloads for all users.
The creation of key vaults also requires the creation of Azure resource groups, since key vaults need storage capacity (though small) and Key Vault logging, if enabled, also generates stored data. As a best practice Microsoft recommends using separate administrators to manage each resource group, with the administration that's aligned with the set of administrators that will manage all related Customer Key resources.
-> [!IMPORTANT]
-> To maximize availability, place your key vaults in regions close to your Microsoft 365 service For example, if your Exchange Online organization is in North America, place your key vaults in North America. If your Exchange Online organization is in Europe, place your key vaults in Europe.
->
-> Use a common prefix for key vaults, and include an abbreviation of the use and scope of the key vault and keys (e.g., for the Contoso SharePoint service where the vaults will be located in North America, a possible pair of names is Contoso-CK-SP-NA-VaultA1 and Contoso-CK-SP-NA-VaultA2. Vault names are globally unique strings within Azure, so you may need to try variations of your desired names in case the desired names are already claimed by other Azure customers. As of July 2017 vault names cannot be changed, so a best practice is to have a written plan for setup and use a second person to verify the plan is executed correctly.
->
-> If possible, create your vaults in non-paired regions. Paired Azure regions provide high availability across service failure domains. Therefore, regional pairs can be thought of as each other's backup region. This means that an Azure resource that is placed in one region is automatically gaining fault tolerance through the paired region. For this reason, choosing regions for two vaults used in a data encryption policy where the regions are paired means that only a total of two regions of availability are in use. Most geographies only have two regions, so it's not yet possible to select non-paired regions. If possible, choose two non-paired regions for the two vaults used with a data encryption policy. This benefits from a total of four regions of availability. For more information, see [Business continuity and disaster recovery (BCDR): Azure Paired Regions](/azure/best-practices-availability-paired-regions) for a current list of regional pairs.
-
### Assign permissions to each key vault You'll need to define three separate sets of permissions for each key vault, depending on your implementation. For example, you will need to define one set of permissions for each of the following:
You'll need to define three separate sets of permissions for each key vault, dep
To assign these permissions to a user in your organization, sign in to your Azure subscription with Azure PowerShell. For instructions, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps). -- Run the Set-AzKeyVaultAccessPolicy cmdlet to assign the necessary permissions.
+ - Run the Set-AzKeyVaultAccessPolicy cmdlet to assign the necessary permissions.
```powershell Set-AzKeyVaultAccessPolicy -VaultName <vault name> -UserPrincipalName <UPN of user> -PermissionsToKeys create,import,list,get,backup,restore
You'll need to define three separate sets of permissions for each key vault, dep
- **Key vault contributors** that can change permissions on the Azure Key Vault itself. You'll need to change these permissions as employees leave or join your team. In the rare situation that the key vault administrators legitimately need permission to delete or restore a key you'll also need to change the permissions. This set of key vault contributors needs to be granted the **Contributor** role on your key vault. You can assign this role by using Azure Resource Manager. For detailed steps, see [Use Role-Based Access Control to manage access to your Azure subscription resources](/azure/active-directory/role-based-access-control-configure). The administrator who creates a subscription has this access implicitly, and the ability to assign other administrators to the Contributor role. -- **Permissions to Microsoft 365 applications** for every key vault that you use for Customer Key, you need to give wrapKey, unwrapKey, and get permissions to the corresponding Microsoft 365 Service Principal.
+- **Permissions to Microsoft 365 applications** for every key vault that you use for Customer Key, you need to give wrapKey, unwrapKey, and get permissions to the corresponding Microsoft 365 Service Principal.
To give permission to Microsoft 365 Service Principal, run the **Set-AzKeyVaultAccessPolicy** cmdlet using the following syntax:
You'll need to define three separate sets of permissions for each key vault, dep
``` Where:- - *vault name* is the name of the key vault you created. - For Exchange Online and Skype for Business, replace *Office 365 appID* with `00000002-0000-0ff1-ce00-000000000000` - For SharePoint Online, OneDrive for Business, and Teams files, replace *Office 365 appID* with `00000003-0000-0ff1-ce00-000000000000`
You'll need to define three separate sets of permissions for each key vault, dep
Set-AzKeyVaultAccessPolicy -VaultName Contoso-CK-SP-NA-VaultA1 -PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName 00000003-0000-0ff1-ce00-000000000000 ```
+ Confirm *Get, wrapKey, and unwrapKey* are granted to **each** key vault by running the *Get-AzKeyVault* cmdlet.
+
+ ```powershell
+ Get-AzKeyVault -VaultName <vault name> | fl
+ ```
+
+> [!Tip]
+> Before moving on, make sure the permissions are configured properly for the key vault, the *Permissions to Keys* will return **wrapKey, unwrapKey, get**.
+> Make sure to correct the permissions to the correct service you are onboarding to. The *Display Name* for each service is listed below:
+ >
+ > - Exchange Online and Skype for Business: *Office 365 Exchange Online*
+ > - SharePoint Online, OneDrive, and Teams files: *Office 365 SharePoint Online*
+ > - Multiple Microsoft 365 workloads: *M365DataAtRestEncryption*
+ >
+ > For example, the snippet below is an example of making sure the permissions are configured for M365DataAtRestEncryption. The below cmdlet with a vault named *mmcexchangevault* will display the following fields.
+ >
+ > ```powershell
+ > Get-AzKeyVault -VaultName mmcexchangevault | fl
+ > ```
+ >
+ >
+ > ![Encryption ciphers for Exchange Online Customer Key.](../media/KeyVaultPermissions.png)
+ ### Make sure soft delete is enabled on your key vaults When you can quickly recover your keys, you are less likely to experience an extended service outage due to accidentally or maliciously deleted keys. Enable this configuration, referred to as Soft Delete, before you can use your keys with Customer Key. Enabling Soft Delete allows you to recover keys or vaults within 90 days of deletion without having to restore them from backup.
To enable Soft Delete on your key vaults, complete these steps:
Set-AzResource -ResourceId $r.ResourceId -Properties $r.Properties ```
-3. Confirm soft delete is configured for the key vault by running the **Get-AzKeyVault** cmdlet. If soft delete is configured properly for the key vault, then the _Soft Delete Enabled_ property returns a value of **True**:
+3. Confirm soft delete is configured for the key vault by running the **Get-AzKeyVault** cmdlet. If soft delete is configured properly for the key vault, then the *Soft Delete Enabled* property returns a value of **True**:
```powershell Get-AzKeyVault -VaultName <vault name> | fl ```
+> [!TIP]
+> Before moving on, make sure the 'Soft Delete Enabled?' is set to 'True' like the image below.
+>
+> <img src="../media/SoftDeleteEnabled.png" alt="SoftDelete" width="400"/>
+ ### Add a key to each key vault either by creating or importing a key There are two ways to add keys to an Azure Key Vault; you can create a key directly in Key Vault, or you can import a key. Creating a key directly in Key Vault is less complicated, but importing a key provides total control over how the key is generated. Use the RSA keys. Azure Key Vault doesn't support wrapping and unwrapping with elliptical curve keys.
-
-To create a key directly in your key vault, run the [Add-AzKeyVaultKey](/powershell/module/az.keyvault/add-azkeyvaultkey) cmdlet as follows:
-
-```powershell
-Add-AzKeyVaultKey -VaultName <vault name> -Name <key name> -Destination <HSM|Software> -KeyOps wrapKey,unwrapKey
-```
-Where:
+For instructions to add a key to each vault, see [Add-AzKeyVaultKey](/powershell/module/az.keyvault/add-azkeyvaultkey).
-- *vault name* is the name of the key vault in which you want to create the key.
+ For detailed steps to create a key on-premises and import it into your key vault, see [How to generate and transfer HSM-protected keys for Azure Key Vault](/azure/key-vault/keys/hsm-protected-keys). Use the Azure instructions to create a key in each key vault.
-- *key name* is the name you want to give the new key.
+### Verify expiration date of your keys
- > [!TIP]
- > Name keys using a similar naming convention as described above for key vaults. This way, in tools that show only the key name, the string is self-describing.
-
-If you intend to protect the key with an HSM, ensure that you specify **HSM** as the value of the _Destination_ parameter, otherwise, specify **Software**.
-
-For example:
+To verify that an expiration date isn't set for your keys, run the [Get-AzKeyVaultKey](/powershell/module/az.keyvault/get-azkeyvault) cmdlet as follows:
```powershell
-Add-AzKeyVaultKey -VaultName Contoso-CK-EX-NA-VaultA1 -Name Contoso-CK-EX-NA-VaultA1-Key001 -Destination HSM -KeyOps wrapKey,unwrapKey
+Get-AzKeyVaultKey -VaultName <vault name>
```
-To import a key directly into your key vault, you need to have a nCipher nShield Hardware Security Module.
+Customer Key can't use an expired key. Operations attempted with an expired key will fail, and possibly result in a service outage. We strongly recommend that keys used with Customer Key don't have an expiration date. An expiration date, once set, cannot be removed, but can be changed to a different date. If a key must be used that has an expiration date set, change the expiration value to 12/31/9999. Keys with an expiration date set to a date other than 12/31/9999 won't pass Microsoft 365 validation.
-Some organizations prefer this approach to establish the provenance of their keys, and then this method also provides the following attestations:
+To change an expiration date that has been set to any value other than 12/31/9999, run the [Update-AzKeyVaultKey](/powershell/module/az.keyvault/update-azkeyvaultkey) cmdlet as follows:
-- The toolset used for import includes attestation from nCipher that the Key Exchange Key (KEK) that is used to encrypt the key you generate is not exportable and is generated inside a genuine HSM that was manufactured by nCipher.
+```powershell
+Update-AzKeyVaultKey -VaultName <vault name> -Name <key name> -Expires (Get-Date -Date "12/31/9999")
+```
-- The toolset includes attestation from nCipher that the Azure Key Vault security world was also generated on a genuine HSM manufactured by nCipher. This attestation proves that Microsoft is also using genuine nCipher hardware.
+> [!CAUTION]
+> Don't set expiration dates on encryption keys you use with Customer Key.
-Check with your security group to determine if the above attestations are required. For detailed steps to create a key on-premises and import it into your key vault, see [How to generate and transfer HSM-protected keys for Azure Key Vault](/azure/key-vault/keys/hsm-protected-keys). Use the Azure instructions to create a key in each key vault.
-
### Check the recovery level of your keys Microsoft 365 requires that the Azure Key Vault subscription is set to Do Not Cancel and that the keys used by Customer Key have soft delete enabled. You can confirm you subscriptions settings by looking at the recovery level on your keys.
To check the recovery level of a key, in Azure PowerShell, run the Get-AzKeyVaul
(Get-AzKeyVaultKey -VaultName <vault name> -Name <key name>).Attributes ```
-If the _Recovery Level_ property returns anything other than a value of **Recoverable+ProtectedSubscription**, ensure that you have put the subscription on the Do Not Cancel list and that you have soft delete enabled on each of your key vaults.
-
-### Back up Azure Key Vault
-
-Immediately following creation or any change to a key, perform a backup and store copies of the backup, both online and offline. Don't connect offline copies to any network. Instead store them in an offline location, such as in a physical safe or commercial storage facility. At least one copy of the backup should be stored in a location that will be accessible if a disaster occurs. The backup blobs are the sole means of restoring key material should a Key Vault key be permanently destroyed or otherwise rendered inoperable. Keys that are external to Azure Key Vault and imported to Azure Key Vault don't qualify as a backup because the metadata necessary for Customer Key to use the key doesn't exist with the external key. Only a backup taken from Azure Key Vault can be used for restore operations with Customer Key. Therefore, you must create a backup of Azure Key Vault after you upload or create a key.
-
-To create a backup of an Azure Key Vault key, run the [Backup-AzKeyVaultKey](/powershell/module/az.keyvault/backup-azkeyvaultkey) cmdlet as follows:
-
-```powershell
-Backup-AzKeyVaultKey -VaultName <vault name> -Name <key name>
--OutputFile <filename.backup>
-```
-
-Ensure that your output file uses the suffix `.backup`.
-
-The output file resulting from this cmdlet is encrypted and cannot be used outside of Azure Key Vault. The backup can be restored only to the Azure subscription from which the backup was taken.
-
-> [!TIP]
-> For the output file, choose a combination of your vault name and key name. This will make the file name self-describing. It will also ensure that backup file names do not collide.
-
-For example:
-
-```powershell
-Backup-AzKeyVaultKey -VaultName Contoso-CK-EX-NA-VaultA1 -Name Contoso-CK-EX-NA-VaultA1-Key001 -OutputFile Contoso-CK-EX-NA-VaultA1-Key001-Backup-20170802.backup
-```
-
-### Validate Azure Key Vault configuration settings
-
-Validating before using keys in a DEP is optional, but highly recommended. If you use steps to set up your keys and vaults other than the ones described in this article, validate the health of your Azure Key Vault resources before you configure Customer Key.
-
-To verify that your keys have `get`, `wrapKey`, and `unwrapKey` operations enabled:
-
-Run the [Get-AzKeyVault](/powershell/module/az.keyvault/get-azkeyvault) cmdlet as follows:
-
-```powershell
-Get-AzKeyVault -VaultName <vault name>
-```
-
-In the output, look for the Access Policy and for the Exchange Online identity (GUID) or the SharePoint Online identity (GUID) as appropriate. All three of the above permissions must be shown under Permissions to Keys.
-
-If the access policy configuration is incorrect, run the Set-AzKeyVaultAccessPolicy cmdlet as follows:
-
-```powershell
-Set-AzKeyVaultAccessPolicy -VaultName <vault name> -PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName <Office 365 appID>
-```
-
-For example, for Exchange Online and Skype for Business:
-
-```powershell
-Set-AzKeyVaultAccessPolicy -VaultName Contoso-CK-EX-NA-VaultA1
--PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName 00000002-0000-0ff1-ce00-000000000000
-```
-
-For example, for SharePoint Online and OneDrive for Business:
-
-```powershell
-Set-AzKeyVaultAccessPolicy -VaultName Contoso-CK-SP-NA-VaultA1
--PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName 00000003-0000-0ff1-ce00-000000000000
-```
+> [!Tip]
+> Before moving on, If the *Recovery Level* property returns anything other than a value of **Recoverable+ProtectedSubscription**, ensure that you have registered the *MandatoryRetentionPeriodEnabled* feature on the subscription and that you have soft delete enabled on each of your key vaults.
+>
+> <img src="../media/RecoveryLevel.png" alt="drawing" width="500"/>
-To verify that an expiration date isn't set for your keys, run the [Get-AzKeyVaultKey](/powershell/module/az.keyvault/get-azkeyvault) cmdlet as follows:
-
-```powershell
-Get-AzKeyVaultKey -VaultName <vault name>
-```
+### Back up Azure Key Vault
-Customer Key can't use an expired key. Operations attempted with an expired key will fail, and possibly result in a service outage. We strongly recommend that keys used with Customer Key don't have an expiration date. An expiration date, once set, cannot be removed, but can be changed to a different date. If a key must be used that has an expiration date set, change the expiration value to 12/31/9999. Keys with an expiration date set to a date other than 12/31/9999 won't pass Microsoft 365 validation.
-
-To change an expiration date that has been set to any value other than 12/31/9999, run the [Update-AzKeyVaultKey](/powershell/module/az.keyvault/update-azkeyvaultkey) cmdlet as follows:
-
-```powershell
-Update-AzKeyVaultKey -VaultName <vault name> -Name <key name> -Expires (Get-Date -Date "12/31/9999")
-```
+Immediately following creation or any change to a key, perform a backup and store copies of the backup, both online and offline.
+To create a backup of an Azure Key Vault key, run the [Backup-AzKeyVaultKey](/powershell/module/az.keyvault/backup-azkeyvaultkey) cmdlet.
-> [!CAUTION]
-> Don't set expiration dates on encryption keys you use with Customer Key.
-
### Obtain the URI for each Azure Key Vault key Once you've set up your key vaults and added your keys, run the following command to get the URI for the key in each key vault. You'll use these URIs when you create and assign each DEP later, so save this information in a safe place. Run this command once for each key vault.
Once you've completed the steps in this article, you're ready to create and assi
- [Learn about the availability key](customer-key-availability-key-understand.md) -- [Service Encryption](office-365-service-encryption.md)
+- [Service Encryption](office-365-service-encryption.md)
compliance Enable Mailbox Auditing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/enable-mailbox-auditing.md
The following table describes the mailbox actions that are available in mailbox
|**AddFolderPermissions**|Although this value is accepted as a mailbox action, it's already included in the **UpdateFolderPermissions** action and isn't audited separately. In other words, don't use this value.|||| |**ApplyRecord**|An item is labeled as a record.|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)<sup>\*</sup>| |**Copy**|A message was copied to another folder.|![Check mark.](../media/checkmark.png)|||
-|**Create**|An item was created in the Calendar, Contacts, Notes, or Tasks folder in the mailbox (for example, a new meeting request is created). Creating, sending, or receiving a message isn't audited. Also, creating a mailbox folder is not audited.|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)|
+|**Create**|An item was created in the Calendar, Contacts, Draft, Notes, or Tasks folder in the mailbox (for example, a new meeting request is created). Creating, sending, or receiving a message isn't audited. Also, creating a mailbox folder is not audited.|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)|
|**FolderBind**|A mailbox folder was accessed. This action is also logged when the admin or delegate opens the mailbox. <br/><br/> **Note**: Audit records for folder bind actions performed by delegates are consolidated. One audit record is generated for individual folder access within a 24-hour period.|![Check mark.](../media/checkmark.png)|![Check mark.](../media/checkmark.png)|| |**HardDelete**|A message was purged from the Recoverable Items folder.|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)<sup>\*</sup>|![Check mark.](../media/checkmark.png)<sup>\*</sup>| |**MailboxLogin**|The user signed into their mailbox.|||![Check mark](../media/checkmark.png)|
compliance Named Entities Use https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/named-entities-use.md
To create or edit a DLP policy, use the procedures in [Create, test, and tune a
- **Microsoft 3655 eDiscovery** supports the use of named entities in Substrate services. - **Microsoft Defender for Cloud Apps** supports the use of named entities in Defender for Cloud Apps policies. - **Insider Risk Management** supports the use of named entities in Substrate services.-- **Communication Compliance** doesn't support the use of named entities in Exchange transport rules and data-at-rest.-- **Microsoft Information Governance** (MIG) doesn't support the use of named entities in Exchange transport rules and data-at-rest.
+<! **Communication Compliance** doesn't support the use of named entities in Exchange transport rules and data-at-rest.
+- **Microsoft Information Governance** (MIG) doesn't support the use of named entities in Exchange transport rules and data-at-rest.-->
### Unified DLP
contentunderstanding Difference Between Document Understanding And Form Processing Model https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/difference-between-document-understanding-and-form-processing-model.md
Use the following table to understand when to use forms processing and when to u
| Supported regions| Form processing relies on Power Platform. For information about global availability for Power Platform and AI Builder, see [Power Platform availability](https://dynamics.microsoft.com/geographic-availability/). | Available in all regions.| | Transactional cost | Uses AI Builder credits.<br>Credits can be purchased in batches of 1M.<br>1M credits are included when 300+ SharePoint Syntex licenses are purchased.<br>1M credits will allow processing of 2,000 file pages.<br>| N/A | | Capacity | Uses the default Power Platform environment (custom environments with Dataverse database supported). | Does not have capacity restrictions.|
-| Supported languages| English <br>Coming later in 2022: Latin alphabet languages | Models work on all Latin alphabet languages. In addition to English: German, Swedish, French, Spanish, Italian, and Portuguese.|
+| Supported languages| Language support for more [73 languages](/power-platform-release-plan/2021wave2/ai-builder/form-processing-new-language-support). | Models work on all Latin alphabet languages. In addition to English: German, Swedish, French, Spanish, Italian, and Portuguese.|
## See Also
enterprise Cross Tenant Mailbox Migration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cross-tenant-mailbox-migration.md
To obtain the tenant ID of a subscription, sign in to the [Microsoft 365 admin c
> You will need the application ID of the mailbox migration app you just created and the password (the secret) you configured during this process. Also depending on the Microsoft 365 Cloud Instance you use your endpoint may be different. Please refer to the [Microsoft 365 endpoints](/microsoft-365/enterprise/microsoft-365-endpoints) page and select the correct instance for your tenant and review the Exchange Online Optimize Required address and replace as appropriate. ```powershell
-
+ # Enable customization if tenant is dehydrated $dehydrated=Get-OrganizationConfig | fl isdehydrated if ($dehydrated -eq $true) {Enable-OrganizationCustomization}
-
+ $AppId = "[guid copied from the migrations app]" $Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $AppId, (ConvertTo-SecureString -String "[this is your secret password you saved in the previous steps]" -AsPlainText -Force)
To obtain the tenant ID of a subscription, sign in to the [Microsoft 365 admin c
New-OrganizationRelationship "[name of your organization relationship]" -Enabled:$true -MailboxMoveEnabled:$true -MailboxMoveCapability RemoteOutbound -DomainNames $targetTenantId -OAuthApplicationId $appId -MailboxMovePublishedScopes $scope } ```
-
+ > [!NOTE] > The tenant ID that you enter as the $sourceTenantId and $targetTenantId is the GUID and not the tenant domain name. For an example of a tenant ID and information about finding your tenant ID, see [Find your Microsoft 365 tenant ID](/onedrive/find-your-office-365-tenant-id).
-
+ ### How do I know this worked? You can verify cross-tenant mailbox migration configuration by running [Test-MigrationServerAvailability](/powershell/module/exchange/Test-MigrationServerAvailability) cmdlet against the cross-tenant migration endpoint that you created on your target tenant.
You can verify cross-tenant mailbox migration configuration by running [Test-Mig
> [!NOTE] > > - Target tenant:
- >
+ >
> Test-MigrationServerAvailability -Endpoint "[the name of your cross-tenant migration endpoint]" > > Get-OrganizationRelationship | fl name, DomainNames, MailboxMoveEnabled, MailboxMoveCapability > > - Source tenant:
- >
- > Get-OrganizationRelationship | fl name, DomainNames, MailboxMoveEnabled, MailboxMoveCapability
+ >
+ > Get-OrganizationRelationship | fl name, DomainNames, MailboxMoveEnabled, MailboxMoveCapability
### Move mailboxes back to the original source
Ensure the following objects and attributes are set in the target organization.
| | 7273f1f9-Lara | | | smtp:LaraN@northwindtraders.onmicrosoft.com | | | SMTP:Lara.Newton@northwind.com |
- | | |
Example **source** Mailbox object:
Ensure the following objects and attributes are set in the target organization.
| | (FYDIBOHF23SPDLT)/cn=Recipients/cn=d11ec1a2cacd4f81858c81907273f1f9Lara | | EmailAddresses | smtp:LaraN@contoso.onmicrosoft.com | | | SMTP:Lara.Newton@contoso.com |
- | | |
- Additional attributes may be included in Exchange hybrid write-back already. If not, they should be included. - msExchBlockedSendersHash ΓÇô Writes back online safe and blocked sender data from clients to on-premises Active Directory.
Ensure the following objects and attributes are set in the target organization.
if ($source.LitigationHoldEnabled) {$ELCValue = $ELCValue + 8} if ($source.SingleItemRecoveryEnabled) {$ELCValue = $ELCValue + 16} if ($ELCValue -gt 0) {Set-ADUser -Server $domainController -Identity $destination.SamAccountName -Replace @{msExchELCMailboxFlags=$ELCValue}} ```
-3. Non-hybrid target tenants can modify the quota on the Recoverable Items folder for the MailUsers prior to migration by running the following command to enable Litigation Hold on the MailUser object and increasing the quota to 100 GB: `Set-MailUser -EnableLitigationHoldForMigration`. Note this will not work for tenants in hybrid.
+3. Non-hybrid target tenants can modify the quota on the Recoverable Items folder for the MailUsers prior to migration by running the following command to enable Litigation Hold on the MailUser object and increasing the quota to 100 GB:
+
+ ```powershell
+ Set-MailUser -Identity <MailUserIdentity> -EnableLitigationHoldForMigration
+ ```
+
+ Note this will not work for tenants in hybrid.
4. Users in the target organization must be licensed with appropriate Exchange Online subscriptions applicable for the organization. You may apply a license in advance of a mailbox move but ONLY once the target MailUser is properly set up with ExchangeGUID and proxy addresses. Applying a license before the ExchangeGUID is applied will result in a new mailbox provisioned in target organization.
Ensure the following objects and attributes are set in the target organization.
```powershell Set-User John@northwindtraders.com -PermanentlyClearPreviousMailboxInfo -Confirm
-
+ Are you sure you want to perform this action? Delete all existing information about user "John@northwindtraders.com"?. This operation will clear existing values from Previous home MDB and Previous Mailbox GUID of the user. After deletion, reconnecting to the previous mailbox that existed in the cloud will not be possible and any content it had will be unrecoverable PERMANENTLY. Do you want to continue?
Get-MoveRequest -Flags "CrossTenant"
> SAMPLE ΓÇô AS IS, NO WARRANTY > This script assumes a connection to both source mailbox (to get source values) and the target on-premises Active Directory Domain Services (to stamp the ADUser object). If source has litigation or single item recovery enabled, set this on the destination account. This will increase the dumpster size of destination account to 100 GB. -- ```powershell # This will export users from the source tenant with the CustomAttribute1 = "Cross-Tenant-Project" # These are the 'target' users to be moved to the Northwind org tenant
No, after a cross tenant mailbox migration, eDiscovery against the migrated user
``` > [!NOTE]
- > The *contoso.onmicrosoft.com* address is *not* present in the EmailAddresses / proxyAddresses array.
+ > The _contoso.onmicrosoft.com_ address is _not_ present in the EmailAddresses / proxyAddresses array.
- **Issue: MailUser objects with "external" primary SMTP addresses are modified / reset to "internal" company claimed domains**
No, after a cross tenant mailbox migration, eDiscovery against the migrated user
| Name | | |
- | Advanced eDiscovery Storage (500 GB) |
+ | Advanced eDiscovery Storage (500 GB) |
| Customer Lockbox | | Data Loss Prevention | | Exchange Enterprise CAL Services (EOP, DLP) |
No, after a cross tenant mailbox migration, eDiscovery against the migrated user
| Microsoft Defender for Office 365 (Plan 2) | | Office 365 Privileged Access Management | | Premium Encryption in Office 365 |
- | |
enterprise External Domain Name System Records https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/external-domain-name-system-records.md
Email customers who are using Exchange Federation will also need the additional
|**DNS record** <br/> |**Purpose** <br/> |**Value to use** <br/> | |-|--|| |**CNAME** <br/> **(Exchange Online)** <br/> |Helps Outlook clients to easily connect to the Exchange Online service by using the Autodiscover service. Autodiscover automatically finds the correct Exchange Server host and configures Outlook for users. <br/> |**Alias:** Autodiscover <br/> **Target:** autodiscover.outlook.com <br/> |
-|**MX** <br/> **(Exchange Online)** <br/> |Sends incoming mail for your domain to the Exchange Online service in Office 365. <br/> **Note:** Once email is flowing to Exchange Online, you should remove the MX records that are pointing to your old system. |**Domain:** For example, contoso.com <br/> **Target email server:**\<MX token\>.mail.protection.outlook.com <br/> **Preference/Priority:** Lower than any other MX records (this ensures mail is delivered to Exchange Online) - for example 1 or 'low' <br/> Find your \<MX token\> by following these steps: <br/> Sign in to Office 365, go to Office 365 admin \> Domains. <br/> In the Action column for your domain, choose Fix issues. <br/> In the MX records section, choose What do I fix? <br/> Follow the directions on this page to update your MX record. <br/> [What is MX priority?](../admin/setup/domains-faq.yml) <br/> |
+|**MX** <br/> **(Exchange Online)** <br/> |Sends incoming mail for your domain to the Exchange Online service in Office 365. <br/> **Note:** Once email is flowing to Exchange Online, you should remove the MX records that are pointing to your old system. |**Domain:** For example, contoso.com <br/> **Target email server:**\<MX token\>.mail.protection.outlook.com <br/> **Time To Live (TTL) Value:** 3600 <br/> **Preference/Priority:** Lower than any other MX records (this ensures mail is delivered to Exchange Online) - for example 1 or 'low' <br/> Find your \<MX token\> by following these steps: <br/> Sign in to Office 365, go to Office 365 admin \> Domains. <br/> In the Action column for your domain, choose Fix issues. <br/> In the MX records section, choose What do I fix? <br/> Follow the directions on this page to update your MX record. <br/> [What is MX priority?](../admin/setup/domains-faq.yml) <br/> |
|**SPF (TXT)** <br/> **(Exchange Online)** <br/> |Helps to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain. <br/> |[External DNS records required for SPF](external-domain-name-system-records.md#BKMK_SPFrecords) <br/> | |**TXT** <br/> **(Exchange federation)** <br/> |Used for Exchange federation for hybrid deployment. <br/> |**TXT record 1:** For example, contoso.com and associated custom-generated, domain-proof hash text (for example, Y96nu89138789315669824) <br/> **TXT record 2:** For example, exchangedelegation.contoso.com and associated custom-generated, domain-proof hash text (for example, Y3259071352452626169) <br/> | |**CNAME** <br/> **(Exchange federation)** <br/> |Helps Outlook clients to easily connect to the Exchange Online service by using the Autodiscover service when your company is using Exchange federation. Autodiscover automatically finds the correct Exchange Server host and configures Outlook for your users. <br/> |**Alias:** For example, Autodiscover.service.contoso.com <br/> **Target:** autodiscover.outlook.com <br/> |
security Microsoft 365 Zero Trust https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/Microsoft-365-zero-trust.md
This article provides a deployment plan for building **Zero Trust** security with Microsoft 365. Zero Trust is a new security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify." - ## Zero Trust security architecture
-A Zero Trust approach extends throughout the entire digital estate and serves as an integrated security philosophy and end-to-end strategy.
+A Zero Trust approach extends throughout the entire digital estate and serves as an integrated security philosophy and end-to-end strategy.
This illustration provides a representation of the primary elements that contribute to Zero Trust. :::image type="content" source="../media/zero-trust/zero-trust-architecture.png" alt-text="The Zero Trust security architecture" lightbox="../media/zero-trust/zero-trust-architecture.png"::: In the illustration:+ - Security policy enforcement is at the center of a Zero Trust architecture. This includes Multi Factor authentication with conditional access that takes into account user account risk, device status, and other criteria and policies that you set. - Identities, devices, data, apps, network, and other infrastructure components are all configured with appropriate security. Policies that are configured for each of these components are coordinated with your overall Zero Trust strategy. For example, device policies determine the criteria for healthy devices and conditional access policies require healthy devices for access to specific apps and data. - Threat protection and intelligence monitors the environment, surfaces current risks, and takes automated action to remediate attacks. <!
-For more information about this architecture, including deployment objectives for your entire digital estate, see [Zero Trust Rapid Modernization Plan (RaMP)](https://review.docs.microsoft.com/security/zero-trust/zero-trust-ramp-overview?branch=zt-content-prototype).
+For more information about this architecture, including deployment objectives for your entire digital estate, see [Zero Trust Rapid Modernization Plan (RaMP)](https://review.docs.microsoft.com/security/zero-trust/zero-trust-ramp-overview?branch=zt-content-prototype).
--> For more information about Zero Trust, see Microsoft's [_**Zero Trust Guidance Center**_](/security/zero-trust).
Microsoft 365 is built intentionally with many security and information protecti
This illustration represents the work of deploying Zero Trust capabilities. This work is broken into units of work that can be configured together, starting from the bottom and working to the top to ensure that prerequisite work is complete. - :::image type="content" source="../media/zero-trust/m365-zero-trust-deployment-stack.png" alt-text="The Microsoft 365 Zero Trust deployment stack" lightbox="../media/zero-trust/m365-zero-trust-deployment-stack.png"::: In this illustration:-- Zero Trust begins with a foundation of identity and device protection. -- Threat protection capabilities are built on top of this foundation to provide real-time monitoring and remediation of security threats. +
+- Zero Trust begins with a foundation of identity and device protection.
+- Threat protection capabilities are built on top of this foundation to provide real-time monitoring and remediation of security threats.
- Information protection and governance provide sophisticated controls targeted at specific types of data to protect your most valuable information and to help you comply with compliance standards, including protecting personal information. ## Step 1. Configure Zero Trust identity and device access protection ΓÇö starting-point policies
-The first step is to build your Zero Trust foundation by configuring identity and device access protection.
-
+The first step is to build your Zero Trust foundation by configuring identity and device access protection.
:::image type="content" source="../media/zero-trust/m365-zero-trust-architecture-step-1b.png" alt-text="The process to configure Zero Trust identity and device access protection" lightbox="../media/zero-trust/m365-zero-trust-architecture-step-1b.png"::: -- Go to [**_Zero Trust identity and device access protection_**](office-365-security/microsoft-365-policies-configurations.md) for prescriptive guidance to accomplish this. This series of articles describes a set of identity and device access prerequisite configurations and a set of Azure Active Directory (Azure AD) Conditional Access, Microsoft Intune, and other policies to secure access to Microsoft 365 for enterprise cloud apps and services, other SaaS services, and on-premises applications published with Azure AD Application Proxy. --
-|Includes |Prerequisites |Doesn't include |
+|Includes|Prerequisites|Doesn't include|
||||
-|Recommended identity and device access policies for three tiers of protection:<br>- Starting point<br>- Enterprise (recommended)<br>- Specialized<br><br>Additional recommendations for:<br>- External users (guests<br>- Microsoft Teams<br>- SharePoint Online<br>- Microsoft Defender for Cloud Apps| Microsoft E3 or E5<br><br>Azure Active Directory in either of these modes:<br>- Cloud-only<br>- Hybrid with password hash sync (PHS) authentication<br>- Hybrid with pass-through authentication (PTA)<br>- Federated |Device enrollment for policies that require managed devices. See ΓÇ£Manage endpoints with IntuneΓÇ¥ to enroll devices |
-| | | |
-
-Start by implementing the starting-point tier. These policies do not require enrolling devices into management.
+|Recommended identity and device access policies for three tiers of protection: <ul><li>Starting point</li><li>Enterprise (recommended)</li><li>Specialized</li></ul> <br> Additional recommendations for: <ul><li>External users (guests)</li><li>Microsoft Teams</li><li>SharePoint Online</li><li>Microsoft Defender for Cloud Apps</lu></ul>|Microsoft E3 or E5 <br><br> Azure Active Directory in either of these modes: <ul><li>Cloud-only</li><li>Hybrid with password hash sync (PHS) authentication</li><li>Hybrid with pass-through authentication (PTA)</li><li>Federated</li></ul>|Device enrollment for policies that require managed devices. See [Step 2. Manage endpoints with Intune](#step-2-manage-endpoints-with-intune) to enroll devices|
+Start by implementing the starting-point tier. These policies do not require enrolling devices into management.
:::image type="content" source="../media/zero-trust/identity-access-starting-point-tier.png" alt-text="The Zero Trust identity and device access policies ΓÇö starting-point tier" lightbox="../media/zero-trust/identity-access-starting-point-tier.png"::: - ## Step 2. Manage endpoints with Intune
-Next, enroll your devices into management and begin protecting these with more sophisticated controls.
+Next, enroll your devices into management and begin protecting these with more sophisticated controls.
:::image type="content" source="../media/zero-trust/m365-zero-trust-architecture-step-2.png" alt-text="The Manage endpoints with Intune element" lightbox="../media/zero-trust/m365-zero-trust-architecture-step-2.png":::
+Go to [**_Manage devices with Intune_**](../solutions/manage-devices-with-intune-overview.md) for prescriptive guidance to accomplish this.
-Go to [**_Manage devices with Intune_**](../solutions/manage-devices-with-intune-overview.md) for prescriptive guidance to accomplish this.
--
-|Includes |Prerequisites |Doesn't include |
+|Includes|Prerequisites|Doesn't include|
||||
-|Enroll devices with Intune<br>- Corporate-owned devices<br>- Autopilot/automated<br>- enrollment<br><br>Configure policies<br>- App Protection policies<br>- Compliance policies<br>- Device profile policies | Register endpoints with Azure AD | Configuring information protection capabilities, including:<br>- Sensitive information types<br>- Labels<br>- DLP policies<br>For these capabilities, see Step 5. Protect and govern data (later in this article). |
-| | | |
+|Enroll devices with Intune: <ul><li>Corporate-owned devices</li><li>Autopilot/automated</li><li>enrollment</li></ul> <br> Configure policies: <ul><li>App Protection policies</li><li>Compliance policies</li><li>Device profile policies</li></ul>|Register endpoints with Azure AD|Configuring information protection capabilities, including: <ul><li>Sensitive information types</li><li>Labels</li><li>DLP policies</li></ul> <br> For these capabilities, see [Step 5. Protect and govern sensitive data](#step-5-protect-and-govern-sensitive-data) (later in this article).|
## Step 3. Add Zero Trust identity and device access protection ΓÇö Enterprise policies
With devices enrolled into management, you can now implement the full set of rec
:::image type="content" source="../media/zero-trust/m365-zero-trust-architecture-enterprise-policies.png" alt-text="The Zero Trust identity and access policies with device management" lightbox="../media/zero-trust/m365-zero-trust-architecture-enterprise-policies.png":::
-Return to [**_Common identity and device access policies_**](office-365-security/identity-access-policies.md) and add the policies in the Enterprise tier.
+Return to [**_Common identity and device access policies_**](office-365-security/identity-access-policies.md) and add the policies in the Enterprise tier.
:::image type="content" source="../media/zero-trust/identity-access-enterprise-tier.png" alt-text="The Zero Trust identity and access policies ΓÇö Enterprise (recommended) tier" lightbox="../media/zero-trust/identity-access-enterprise-tier.png":::
Microsoft 365 Defender is an extended detection and response (XDR) solution that
:::image type="content" source="../media/zero-trust/m365-zero-trust-architecture-defender.png" alt-text="The process of adding Microsoft 365 Defender to the Zero Trust architecture" lightbox="../media/zero-trust/m365-zero-trust-architecture-defender.png":::
-Go to [**_Evaluate and pilot Microsoft 365 Defender_**](defender/eval-overview.md) for a methodical guide to piloting and deploying Microsoft 365 Defender components.
+Go to [**_Evaluate and pilot Microsoft 365 Defender_**](defender/eval-overview.md) for a methodical guide to piloting and deploying Microsoft 365 Defender components.
-|Includes |Prerequisites |Doesn't include |
+|Includes|Prerequisites|Doesn't include|
||||
-| Set up the evaluation and pilot environment for all components:<br>- Defender for Identity<br>- Defender for Office 365<br>- Defender for Endpoint<br>- Microsoft Defender for Cloud Apps<br><br>Protect against threats<br><br> Investigate and respond to threats | See the guidance to read about the architecture requirements for each component of Microsoft 365 Defender. | Azure AD Identity Protection is not included in this solution guide. It is included in Step 1: Configure Zero Trust identity and device access protection. |
-| | | |
+|Set up the evaluation and pilot environment for all components: <ul><li>Defender for Identity</li><li>Defender for Office 365</li><li>Defender for Endpoint</li><li>Microsoft Defender for Cloud Apps</li></ul> <br> Protect against threats <br><br> Investigate and respond to threats|See the guidance to read about the architecture requirements for each component of Microsoft 365 Defender.| Azure AD Identity Protection is not included in this solution guide. It is included in [Step 1. Configure Zero Trust identity and device access protection](#step-1-configure-zero-trust-identity-and-device-access-protection--starting-point-policies).|
## Step 5. Protect and govern sensitive data
Implement Microsoft Information Protection (MIP) to help you discover, classify,
MIP capabilities are included with Microsoft 365 Compliance and give you the tools to know your data, protect your data, and prevent data loss. - :::image type="content" source="../media/zero-trust/m365-zero-trust-architecture-info-protect.png" alt-text="The Information protection capabilities protecting data through policy enforcement" lightbox="../media/zero-trust/m365-zero-trust-architecture-info-protect.png":::
-While this work is represented at the top of the deployment stack illustrated earlier in this article, you can begin this work anytime.
+While this work is represented at the top of the deployment stack illustrated earlier in this article, you can begin this work anytime.
Microsoft Information Protection provides a framework, process, and capabilities you can use to accomplish your specific business objectives. :::image type="content" source="../media/zero-trust/mip-solution-overview.png" alt-text="The Microsoft Information Protection (MIP) framework" lightbox="../media/zero-trust/mip-solution-overview.png":::
+For more information on how to plan and deploy information protection, see [**_Deploy a Microsoft Information Protection solution_**](../compliance/information-protection-solution.md).
-For more information on how to plan and deploy information protection, see [**_Deploy a Microsoft Information Protection solution_**](../compliance/information-protection-solution.md).
-
-If you're deploying information protection for data privacy regulations, this solution guide provides a recommended framework for the entire process: [**_Deploy information protection for data privacy regulations with Microsoft 365_**](../solutions/information-protection-deploy.md).
+If you're deploying information protection for data privacy regulations, this solution guide provides a recommended framework for the entire process: [**_Deploy information protection for data privacy regulations with Microsoft 365_**](../solutions/information-protection-deploy.md).
security Get Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/get-defender-business.md
> > Some information in this article relates to prereleased products/services that might be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, for the information provided here.
-If you donΓÇÖt already have Microsoft Defender for Business, you can choose from several options:
+If you don't already have Microsoft Defender for Business, you can choose from several options:
- [Work with a Microsoft solution provider](#work-with-a-microsoft-solution-provider) - [Get Microsoft 365 Business Premium](#get-microsoft-365-business-premium)
security Mdb Firewall https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-firewall.md
Microsoft Defender for Business includes firewall protection through Windows Def
| **Domain network** | The domain network profile applies to your company's network. Firewall settings for your domain network apply to inbound connections that are initiated on other devices that are on the same network. By default, incoming connections are set to **Block all**. | | **Public network** | The public network profile applies to a network that you can use in a public location, such as a coffee shop or an airport. Firewall settings for public networks apply to inbound connections that are initiated on other devices that are on the same network. Because a public network can include devices that you don't know or don't trust, incoming connections are set to **Block all** by default. | | **Private network** | The private network profile applies to a network in a private location, such as your home. Firewall settings for private networks apply to inbound connections that are initiated on other devices that are on the same network. In general, on a private network, it's assumed that all other devices on the same network are trusted devices. However, by default, incoming connections are set to **Block all**. |
-| **Custom rules** | [Custom rules](mdb-custom-rules-firewall.md) allow you to block or allow specific connections. For example, suppose that you want to block all incoming connections on devices that are connected to a private network, except for connections through a specific app on a device. In this case, you would set **Private network** to block all incoming connections, and then add a custom rule to define the exception. <br/><br/>You can use custom rules to define exceptions for specific files or apps, an Internet protocol (IP) address, or a range of IP addresses. <br/><br/>Depending on the type of custom rule you're creating, here are some example values you can use: <br/><br/>Application file path: `C:\Windows\System\Notepad.exe or %WINDIR%\Notepad.exe` <br/><br/>IP: A valid IPv4/IPv6 address, such as `192.168.1.0` or `192.168.1.0/24` ΓÇï<br/><br/>IP: A valid IPv4/IPv6 address range, formatted like `192.168.1.0-192.168.1.9` (with no spaces included) |
+| **Custom rules** | [Custom rules](mdb-custom-rules-firewall.md) allow you to block or allow specific connections. For example, suppose that you want to block all incoming connections on devices that are connected to a private network, except for connections through a specific app on a device. In this case, you would set **Private network** to block all incoming connections, and then add a custom rule to define the exception. <br/><br/>You can use custom rules to define exceptions for specific files or apps, an Internet protocol (IP) address, or a range of IP addresses. <br/><br/>Depending on the type of custom rule you're creating, here are some example values you can use: <br/><br/>Application file path: `C:\Windows\System\Notepad.exe or %WINDIR%\Notepad.exe` <br/><br/>IP: A valid IPv4/IPv6 address, such as `192.168.11.0` or `192.168.1.0/24` <br/><br/>IP: A valid IPv4/IPv6 address range, formatted like `192.168.1.0-192.168.1.9` (with no spaces included) |
## Next steps
security Mdb Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-get-started.md
Take a moment to get acquainted with your Microsoft 365 Defender portal.
### Use the navigation bar
-Use the navigation bar on the left side of the screen to access your incidents, view reports, and manage your security policies. The following table describes items youΓÇÖll see in your navigation bar.
+Use the navigation bar on the left side of the screen to access your incidents, view reports, and manage your security policies. The following table describes items you'll see in your navigation bar.
| Item | Description | |:|:|
-| **Home** | Takes you to your home page in Microsoft 365 Defender. The home page includes cards that highlight any active threats that were detected, along with recommendations to help secure your companyΓÇÖs data and devices. <br/><br/>Recommendations are included in Defender for Business can save your security team time and effort. Recommendations are based on industry best practices. To learn more about recommendations, see [Security recommendations - threat and vulnerability management](../defender-endpoint/tvm-security-recommendation.md). |
+| **Home** | Takes you to your home page in Microsoft 365 Defender. The home page includes cards that highlight any active threats that were detected, along with recommendations to help secure your company's data and devices. <br/><br/>Recommendations are included in Defender for Business can save your security team time and effort. Recommendations are based on industry best practices. To learn more about recommendations, see [Security recommendations - threat and vulnerability management](../defender-endpoint/tvm-security-recommendation.md). |
| **Incidents** | Takes you to your list of recent incidents. As alerts are triggered, incidents are created. An incident can include multiple alerts. Make sure to review your incidents regularly. <br/><br/>To learn more about incidents, see [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md).| | **Action center** | Takes you to your list of response actions, including completed or pending actions. <br/>- Select the **History** tab to see the actions that were taken. Some actions are taken automatically; others are taken manually or complete after they're approved. <br/>- Select the **Pending** tab to view actions that require approval to proceed. <br/><br/>To learn more about the Action center, see [Review remediation actions in the Action center](mdb-review-remediation-actions.md). | | **Threat analytics** | Takes you to a view of current threats, and provides you with an at-a-glance view of your threat landscape. Threat analytics also includes reports and information from Microsoft security researchers. <br/><br/>To learn more about threat analytics, see [Track and respond to emerging threats through threat analytics](../defender-endpoint/threat-analytics.md). |
-| **Secure score** | Provides you with a representation of your companyΓÇÖs security position and offers suggestions to improve it.<br/><br/>To learn more about Secure Score, see [Microsoft Secure Score for Devices](../defender-endpoint/tvm-microsoft-secure-score-devices.md). |
+| **Secure score** | Provides you with a representation of your company's security position and offers suggestions to improve it.<br/><br/>To learn more about Secure Score, see [Microsoft Secure Score for Devices](../defender-endpoint/tvm-microsoft-secure-score-devices.md). |
| **Learning hub** | Provides access to security training and other resources through learning paths that are included with your subscription. You can filter by product, skill level, role, and more. The Learning hub can help your security team ramp up on security features & capabilities in Defender for Business and more Microsoft offerings, such as [Microsoft Defender for Endpoint](../defender-endpoint/microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](../office-365-security/defender-for-office-365.md). | | **Endpoints** > **Search** | Enables you to search for one or more devices that were onboarded to Microsoft Defender for Business. | | **Endpoints** > **Device inventory** | Enables you to search for one or more devices that were onboarded to Microsoft Defender for Business. | | **Endpoints** > **Vulnerability management** | Provides you with a dashboard, recommendations, remediation activities, a software inventory, and a list of potential weaknesses within your company. | | **Endpoints** > **Tutorials** | Provides access to walkthroughs and simulations to help you learn more about how your threat protection features work. <br/><br/>Select the **Read the walkthrough** link before attempting to get the simulation file for each tutorial. Some simulations require Office apps, such as Microsoft Word, to read the walkthrough. | | **Endpoints** > **Device configuration** | Lists your security policies by operating system and by type. <br/><br/>To learn more about your security policies, see [View or edit policies in Microsoft Defender for Business](mdb-view-edit-policies.md). |
-| **Reports** | Lists your available security reports. These reports enable you to see your security trends, view details about threat detections and alerts, and learn more about your companyΓÇÖs vulnerable devices. |
-| **Health** | Enables you to view your service health status and plan for upcoming changes. <br/>- Select **Service health** to view the health status of the Microsoft 365 services that are included in your companyΓÇÖs subscription. <br/>- Select **Message center** to learn about planned changes and what to expect. |
-| **Permissions & roles** | Enables you to assign permissions to the people in your company who will be managing your security and viewing incidents and reports in the Microsoft 365 Defender portal. Also enables you to set up and manage device groups to onboard your companyΓÇÖs devices and assign your threat protection policies. |
-| **Settings** | Enables you to edit settings for the Microsoft 365 Defender portal and Microsoft Defender for Business. For example, you can onboard (or offboard) and your companyΓÇÖs devices (also referred to as endpoints). You can also define rules, such as alert suppression rules, and set up indicators to block or allow certain files or processes. |
+| **Reports** | Lists your available security reports. These reports enable you to see your security trends, view details about threat detections and alerts, and learn more about your company's vulnerable devices. |
+| **Health** | Enables you to view your service health status and plan for upcoming changes. <br/>- Select **Service health** to view the health status of the Microsoft 365 services that are included in your company's subscription. <br/>- Select **Message center** to learn about planned changes and what to expect. |
+| **Permissions & roles** | Enables you to assign permissions to the people in your company who will be managing your security and viewing incidents and reports in the Microsoft 365 Defender portal. Also enables you to set up and manage device groups to onboard your company's devices and assign your threat protection policies. |
+| **Settings** | Enables you to edit settings for the Microsoft 365 Defender portal and Microsoft Defender for Business. For example, you can onboard (or offboard) and your company's devices (also referred to as endpoints). You can also define rules, such as alert suppression rules, and set up indicators to block or allow certain files or processes. |
| **More resources** | Navigate to other portals, such as Azure Active Directory. Keep in mind that the Microsoft 365 Defender portal should meet your needs without requiring you to navigate to other portals. | ## Complete a learning module about incidents and response actions
security Mdb Next Gen Configuration Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-next-gen-configuration-settings.md
The following table lists your settings and options:<br/><br/>
| **Time of day to run a scheduled scan** | Select a time to run your regularly scheduled antivirus scans to run. | | **Use low performance** | This setting is turned off by default. *We recommend keeping this setting turned off.* However, you can turn this setting on to limit the device memory and resources that are used during scheduled scans. <br/><br/>**IMPORTANT** If you turn **Use low performance** on, it configures the following settings for Microsoft Defender Antivirus: <br/>- Archive files aren't scanned ([AllowArchiveScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowarchivescanning))<br/>- Scans are assigned a low CPU priority ([EnableLowCPUPriority](/windows/client-management/mdm/policy-csp-defender#defender-enablelowcpupriority)) <br/>- If a full antivirus scan is missed, no catch-up scan will run ([DisableCatchupFullScan](/windows/client-management/mdm/policy-csp-defender#defender-disablecatchupfullscan)) <br/>- If a quick antivirus scan is missed, no catch-up scan will run ([DisableCatchupQuickScan](/windows/client-management/mdm/policy-csp-defender#defender-disablecatchupquickscan)) <br/>- Reduces the average CPU load factor during an antivirus scan from 50% to 20% ([AvgCPULoadFactor](/windows/client-management/mdm/policy-csp-defender#defender-avgcpuloadfactor)) | | **User experience** | |
-| **Allow users to access the Windows Security app** | Turn this setting on to enable users to open the Windows Security app on their devices. Users wonΓÇÖt be able to override settings that you configure in Microsoft Defender for Business, but they'll be able to run a quick scan if need be, or view any detected threats. |
+| **Allow users to access the Windows Security app** | Turn this setting on to enable users to open the Windows Security app on their devices. Users won't be able to override settings that you configure in Microsoft Defender for Business, but they'll be able to run a quick scan if need be, or view any detected threats. |
| **Antivirus exclusions** | Exclusions are processes, files, or folders that are skipped by Microsoft Defender Antivirus scans. *In general, you shouldn't need to define exclusions.* Microsoft Defender Antivirus includes many automatic exclusions that are based on known operating system behaviors and typical management files.<br/><br/>[Learn more about exclusions](../defender-endpoint/configure-exclusions-microsoft-defender-antivirus.md) | | **Process exclusions** | Process exclusions prevent files that are opened by specific processes from being scanned by Microsoft Defender Antivirus. <br/><br/>[Learn more about process exclusions](../defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) | | **File extension exclusions** | File extension exclusions prevent files with specific extensions from being scanned by Microsoft Defender Antivirus.<br/><br/>[Learn more about file extension exclusions](../defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md) |
security Mdb Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-overview.md
With Defender for Business, you can help protect the devices and data your busin
**This guide is intended to**: -- **Provide you with an overview of Defender for Business** so you know whatΓÇÖs included and how it works
+- **Provide you with an overview of Defender for Business** so you know what's included and how it works
- Use this article as a starting point - [Compare security features in Microsoft Defender for Business to other plans](compare-mdb-m365-plans.md) - [Find out how to get Microsoft Defender for Business](get-defender-business.md)
security Mdb Policy Order https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-policy-order.md
Microsoft Defender for Business includes predefined policies to help ensure the devices your employees use are protected. Your security team can add new policies as well. For example, suppose that you want to apply certain settings to some devices, and different settings to other devices. You can do that by adding policies, such as next-generation protection policies or firewall policies.
-As policies are added, youΓÇÖll notice that an order of priority is assigned. You can edit the order of priority for the policies that you define, but you canΓÇÖt change the order of priority for default policies. For example, suppose that for your Windows client devices, you have three next-generation protection policies. In this case, your default policy is number 3 in priority. You can change the order of your policies that are numbered 1 and 2, but the default policy will remain number 3 in your list.
+As policies are added, you'll notice that an order of priority is assigned. You can edit the order of priority for the policies that you define, but you can't change the order of priority for default policies. For example, suppose that for your Windows client devices, you have three next-generation protection policies. In this case, your default policy is number 3 in priority. You can change the order of your policies that are numbered 1 and 2, but the default policy will remain number 3 in your list.
**The important thing to remember about multiple policies is that devices will receive the first applied policy only.** Referring to our earlier example of three next-generation policies, suppose that you have devices that are targeted by all three policies. In this case, those devices will receive policy number 1, but won't receive policies numbered 2 and 3.
security Mdb Simplified Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-simplified-configuration.md
Microsoft Defender for Business features a simplified configuration process, designed especially for small and medium-sized businesses. This experience takes the guesswork out of onboarding and managing devices, with a wizard-like experience and default policies that are designed to protect your company's devices from day one. **We recommend using the simplified configuration process; however, you're not limited to this option**.
-When it comes to onboarding devices and configuring security settings for your companyΓÇÖs devices, you can choose from several experiences:
+When it comes to onboarding devices and configuring security settings for your company's devices, you can choose from several experiences:
- The simplified configuration process in Microsoft Defender for Business (*recommended*) - Microsoft Endpoint Manager, which includes Microsoft Intune (included in [Microsoft 365 Business Premium](../../business-premium/index.md))
security Mdb Tutorials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-tutorials.md
The following table describes the recommended tutorials for Defender for Busines
||| | **Document drops backdoor** | Simulate an attack that introduces file-based malware on a test device. The tutorial describes how to get and use the simulation file, and what to watch for in the Microsoft 365 Defender portal. <br/><br/>This tutorial requires Microsoft Word to be installed on your test device. | | **Live Response tutorial** | Learn how to use basic and advanced commands with Live Response. Learn how to locate a suspicious file, remediate the file, and gather information on a device. |
-| **Threat & Vulnerability Management (core scenarios)** | Learn about threat and vulnerability management through three scenarios: <br/><br/>1. Reduce your companyΓÇÖs threat and vulnerability exposure. <br/>2. Request a remediation. <br/>3. Create an exception for security recommendations. <br/><br/> Threat and vulnerability management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. |
+| **Threat & Vulnerability Management (core scenarios)** | Learn about threat and vulnerability management through three scenarios: <br/><br/>1. Reduce your company's threat and vulnerability exposure. <br/>2. Request a remediation. <br/>3. Create an exception for security recommendations. <br/><br/> Threat and vulnerability management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. |
Each tutorial includes a walkthrough document that explains the scenario, how it works, and what to do.
security Mdb View Edit Create Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-view-edit-create-policies.md
In Defender for Business, there are two main types of policies to protect your c
8. On the **Review your policy** tab, review the general information, targeted devices, and configuration settings. - Make any needed changes by selecting **Edit**.
- - When youΓÇÖre ready to proceed, choose **Update policy**.
+ - When you're ready to proceed, choose **Update policy**.
## Create a new policy
In Defender for Business, there are two main types of policies to protect your c
9. On the **Review your policy** tab, review the general information, targeted devices, and configuration settings. - Make any needed changes by selecting **Edit**.
- - When youΓÇÖre ready to proceed, choose **Create policy**.
+ - When you're ready to proceed, choose **Create policy**.
## Next steps
security Android Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure.md
Use the following steps to **enable vulnerability assessment of apps** from devi
1. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings: - **Platform**: Select Android device administrator
- - **Profile**: Select ΓÇ£CustomΓÇ¥ and click Create
+ - **Profile**: Select "Custom" and click Create
2. In the **Basics** section, specify a name and description of the profile.
security Android Support Signin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-support-signin.md
Users can follow these steps to enable the same permissions from the device sett
:::image type="content" source="images/show-all-apps-1.png" alt-text="The drop-down that displays the All Apps option under the Battery Optimisation pane" lightbox="images/show-all-apps-1.png":::
-5. Locate ΓÇ£Microsoft Defender for EndpointΓÇ¥ and select **DonΓÇÖt Optimize**.
+5. Locate "Microsoft Defender for Endpoint" and select **Don't Optimize**.
:::image type="content" source="images/select-dont-optimise.png" alt-text="The page that enables location of the option Microsoft Defender for Endpoint and selection of Don't Optimize" lightbox="images/select-dont-optimise.png":::
If a user faces an issue which is not already addressed in the above sections or
:::image type="content" source="images/select-profile-icon-1.jpg" alt-text="The profile icon in the Microsoft Defender for Endpoint portal" lightbox="images/select-profile-icon-1.jpg":::
-2. Select ΓÇ£Help & feedbackΓÇ¥.
+2. Select "Help & feedback".
:::image type="content" source="images/selecthelpandfeedback2.png" alt-text="The Help & feedback option that can be selected in the Microsoft Defender for Endpoint portal" lightbox="images/selecthelpandfeedback2.png":::
-3. Select ΓÇ£Send feedback to MicrosoftΓÇ¥.
+3. Select "Send feedback to Microsoft".
:::image type="content" alt-text="Select send feedback to Microsoft" source="images/send-feedback-to-microsoft-3.jpg":::
-4. Choose from the given options. To report an issue, select ΓÇ£I want to report an issueΓÇ¥.
+4. Choose from the given options. To report an issue, select "I want to report an issue".
:::image type="content" source="images/report-issue-4.jpg" alt-text="The I want to report an issue option" lightbox="images/report-issue-4.jpg":::
-5. Provide details of the issue that you are facing and check ΓÇ£Send diagnostic dataΓÇ¥. We recommend checking ΓÇ£Include your email addressΓÇ¥ so that the team can reach back to you with a solution or a follow-up.
+5. Provide details of the issue that you are facing and check "Send diagnostic data". We recommend checking "Include your email address" so that the team can reach back to you with a solution or a follow-up.
:::image type="content" source="images/finalsubmit5.png" alt-text="The pane on which you can add details and attach diagnostic data" lightbox="images/finalsubmit5.png":::
-6. Click on ΓÇ£SubmitΓÇ¥ to successfully send the feedback.
+6. Click on "Submit" to successfully send the feedback.
security Android Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-whatsnew.md
These changes will take effect if you are using Microsoft Defender for Endpoint
> [!NOTE] > The new storage permissions cannot be configured by admin to 'Auto Approve' through Microsoft Endpoint Manager. User will need to take action to provide access to this permission. -- **User experience:** Users will receive a notification indicating a missing permission for app security. If the user denies this permission, the ΓÇÿApp securityΓÇÖ functionality will be turned off on the device. If user doesn't accept or deny permission, they will continue to receive the prompt when unlocking their device or opening the app, until it has been approved.
+- **User experience:** Users will receive a notification indicating a missing permission for app security. If the user denies this permission, the 'App security' functionality will be turned off on the device. If user doesn't accept or deny permission, they will continue to receive the prompt when unlocking their device or opening the app, until it has been approved.
> [!NOTE]
-> If your organization is previewing ΓÇÿTamper protectionΓÇÖ feature and if the new storage permissions are not granted by the user within 7 days of updating to the latest version, the user might lose access to corporate resources.
+> If your organization is previewing 'Tamper protection' feature and if the new storage permissions are not granted by the user within 7 days of updating to the latest version, the user might lose access to corporate resources.
**What you need to do to prepare:**
Notify your users and helpdesk (as applicable) that users will need to accept th
4. The device is now protected. > [!NOTE]
- > This permission allows Microsoft Defender for Endpoint to access storage on userΓÇÖs device, which helps detect and remove malicious and unwanted apps. Microsoft Defender for Endpoint accesses/scans Android app package file (.apk) only. On devices with a Work Profile, Defender for Endpoint only scans work-related files.
+ > This permission allows Microsoft Defender for Endpoint to access storage on user's device, which helps detect and remove malicious and unwanted apps. Microsoft Defender for Endpoint accesses/scans Android app package file (.apk) only. On devices with a Work Profile, Defender for Endpoint only scans work-related files.
security Attack Surface Reduction Rules Deployment Implement https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-implement.md
Implementing attack surface reduction (ASR) rules moves the first test ring into
## Step 1: Transition ASR Rules from Audit to Block
-1. After all exclusions are determined while in audit mode, start setting some ASR rules to "block" mode, starting with the rule that has the fewest triggered events. SeeΓÇ¥ [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
+1. After all exclusions are determined while in audit mode, start setting some ASR rules to "block" mode, starting with the rule that has the fewest triggered events. See" [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
2. Review the reporting page in the Microsoft 365 Defender portal; see [Threat protection report in Microsoft Defender for Endpoint](threat-protection-reports.md). Also review feedback from your ASR champions. 3. Refine exclusions or create new exclusions as determined necessary. 4. Switch problematic rules back to Audit.
Implementing attack surface reduction (ASR) rules moves the first test ring into
### How does Warn mode work?
-Warn mode is effectively a Block instruction, but with the option for the user to ΓÇ£UnblockΓÇ¥ subsequent executions of the given flow or app. Warn mode unblocks on a per device, user, file and process combination. The warn mode information is stored locally and has a duration of 24 hours.
+Warn mode is effectively a Block instruction, but with the option for the user to "Unblock" subsequent executions of the given flow or app. Warn mode unblocks on a per device, user, file and process combination. The warn mode information is stored locally and has a duration of 24 hours.
### Step 2: Expand deployment to ring n + 1
The deployment process, steps 1 ΓÇô 3, is essentially the same for each subsequ
2. Review ASR-triggered audit events in the Microsoft 365 Defender portal 3. Create exclusions 4. Review: refine, add, or remove exclusions as necessary
-5. Set rules to ΓÇ£blockΓÇ¥
+5. Set rules to "block"
6. Review the reporting page in the Microsoft 365 Defender portal. 7. Create exclusions. 8. Disable problematic rules or switch them back to Audit.
security Attack Surface Reduction Rules Deployment Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-plan.md
Last updated 1/18/2022
# Step 1: Plan ASR rules deployment
-When testing attack surface reduction (ASR) rules it is important to start with the right business unit. YouΓÇÖll want to start with a small group of people in a specific business unit. You can identify some ASR champions within a particular business unit who can provide real-world impact about the ASR rules, and help you tune your implementation.
+When testing attack surface reduction (ASR) rules it is important to start with the right business unit. You'll want to start with a small group of people in a specific business unit. You can identify some ASR champions within a particular business unit who can provide real-world impact about the ASR rules, and help you tune your implementation.
> [!div class="mx-imgBorder"] > :::image type="content" source="images/asr-rules-planning-steps.png" alt-text="The ASR rules planning steps" lightbox="images/asr-rules-planning-steps.png":::
Typical roles and responsibilities include:
## Ring deployment
-For large enterprises, Microsoft recommends deploying ASR rules in ΓÇ£rings.ΓÇ¥ Rings are groups of devices that are visually represented as concentric circles that radiate outward like non-overlapping tree rings. When the innermost ring is successfully deployed, you can transition the next ring into the testing phase. Thorough assessment of your business units, ASR rules champions, apps, and processes is imperative to defining your rings.
+For large enterprises, Microsoft recommends deploying ASR rules in "rings." Rings are groups of devices that are visually represented as concentric circles that radiate outward like non-overlapping tree rings. When the innermost ring is successfully deployed, you can transition the next ring into the testing phase. Thorough assessment of your business units, ASR rules champions, apps, and processes is imperative to defining your rings.
In most cases, your organization will have designed deployment rings for phased rollouts of Windows updates. You can use your existing ring design to implement ASR rules. See: [Create a deployment plan for Windows](/windows/deployment/update/create-deployment-plan)
security Attack Surface Reduction Rules Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment.md
Keeping Microsoft Defender Antivirus versions current helps reduce ASR rules fal
### Caveat
-Some rules donΓÇÖt work well if un-signed, internally developed application and scripts are in high usage. It is more difficult to deploy ASR rules if code signing is not enforced.
+Some rules don't work well if un-signed, internally developed application and scripts are in high usage. It is more difficult to deploy ASR rules if code signing is not enforced.
## ASR rules deployment steps
security Attack Surface Reduction Rules Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md
Links to information about configuration management system versions referenced i
Toast notifications are generated for all rules in Block mode. Rules in any other mode will not generate toast notifications
-For rules with the ΓÇ£Rule StateΓÇ¥ specified:
+For rules with the "Rule State" specified:
- ASR rules with \<ASR Rule, Rule State\> combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at high-cloud block level. Devices not at high cloud block level will not generate alerts for any <ASR Rule, Rule State> combinations - EDR alerts are generated for ASR rules in the specified states, but only for devices at high cloud block level.
_Warn mode_ is a block-mode type that alerts users about potentially risky actio
If the allow button is clicked, the block will be suppressed for 24 hours. After 24 hours, the end-user will need to allow the block again. The warn mode for ASR rules is only supported for RS5+ (1809+) devices. If bypass is assigned to ASR rules on devices with older versions, the rule will be in blocked mode.
-You can also set a rule in warn mode via PowerShell by simply specifying the AttackSurfaceReductionRules_Actions as ΓÇ£WarnΓÇ¥. For example:
+You can also set a rule in warn mode via PowerShell by simply specifying the AttackSurfaceReductionRules_Actions as "Warn". For example:
```powershell -command "& {&'Add-MpPreference' -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Warn"}
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender
> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there is no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat. > [!IMPORTANT]
-> The default state for the Attack Surface Reduction (ASR) rule ΓÇ£Block credential stealing from the Windows local security authority subsystem (lsass.exe)ΓÇ¥ will change from **Not Configured** to **Configured** and the default mode set to **Block**. All other ASR rules will remain in their default state: **Not Configured**. Additional filtering logic has already been incorporated in the rule to reduce end user notifications. Customers can configure the rule to **Audit**, **Warn** or **Disabled** modes, which will override the default mode. The functionality of this rule is the same, whether the rule is configured in the on-by-default mode, or if you enable Block mode manually. ΓÇ»
+> The default state for the Attack Surface Reduction (ASR) rule "Block credential stealing from the Windows local security authority subsystem (lsass.exe)" will change from **Not Configured** to **Configured** and the default mode set to **Block**. All other ASR rules will remain in their default state: **Not Configured**. Additional filtering logic has already been incorporated in the rule to reduce end user notifications. Customers can configure the rule to **Audit**, **Warn** or **Disabled** modes, which will override the default mode. The functionality of this rule is the same, whether the rule is configured in the on-by-default mode, or if you enable Block mode manually.
Intune name: `Flag credential stealing from the Windows local security authority subsystem`
security Configure Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-siem.md
The SmartConnector replaces the previous FlexConnector for Microsoft 365 Defende
### IBM QRadar >[!NOTE]
->IBM QRadar integration with Microsoft 365 Defender, which include Microsoft Defender for Endpoint is now supported by the new Microsoft 365 Defender Device Support Module (DSM) that calls the [Microsoft 365 Defender Streaming API](../defender/streaming-api.md) that allows ingesting streaming event data from Microsoft 365 Defender products, including Microsoft Defender for Endpoint. For more information on the new QRadar Microsoft 365 Defender DSM, see [IBM QRadar Product Documentation](https://www.ibm.com/docs/en/dsm?topic=microsoft-365-defender), and for more information on Streaming API supported event types, see [Supported event types](../defender/supported-event-types.md).
+>IBM QRadar integration with Microsoft 365 Defender, which include Microsoft Defender for Endpoint is now supported by the new Microsoft 365 Defender Device Support Module (DSM) that calls the [Microsoft 365 Defender Streaming API](../defender/streaming-api.md) that allows ingesting streaming event data from Microsoft 365 Defender products, including Microsoft Defender for Endpoint. For more information on the new QRadar Microsoft 365 Defender DSM, see [IBM QRadar Product Documentation](https://www.ibm.com/docs/en/dsm?topic=microsoft-365-defender), and for more information on Streaming API supported event types, see [Supported event types](../defender/supported-event-types.md).
New customers are no longer being onboarded using the previous QRadar Microsoft Defender ATP Device Support Module (DSM), and existing customers are encouraged to adopt the new Microsoft 365 Defender DSM as their single point of integration with all Microsoft 365 Defender products.
security Corelight Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/corelight-integration.md
ms.technology: mde
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-Microsoft has partnered with [Corelight](https://corelight.com/integrations/iot-security), provider of the industryΓÇÖs leading open network detection and response (NDR) platform, to help you discover IoT/OT devices across your organization. Using data, sent from Corelight network appliances, Microsoft 365 Defender gains increased visibility into the network activities of unmanaged devices, including communication with other unmanaged devices or external networks.
+Microsoft has partnered with [Corelight](https://corelight.com/integrations/iot-security), provider of the industry's leading open network detection and response (NDR) platform, to help you discover IoT/OT devices across your organization. Using data, sent from Corelight network appliances, Microsoft 365 Defender gains increased visibility into the network activities of unmanaged devices, including communication with other unmanaged devices or external networks.
With this data source enabled, all events from Corelight network appliances are sent to Microsoft 365 Defender. You can view these activities in the unmanaged devices timeline, available in the Microsoft Defender for Endpoint device inventory. For more information, see [Device discovery](device-discovery.md). ## Enabling the Corelight integration
-To enable the Corelight integration, youΓÇÖll need to take the following steps:
+To enable the Corelight integration, you'll need to take the following steps:
[Step 1: Turn on Corelight as a data source](#step-1-turn-on-corelight-as-a-data-source)<br> [Step 2: Provide permission for Corelight to send events to Microsoft 365 Defender](#step-2-provide-permission-for-corelight-to-send-events-to-microsoft-365-defender)<br>
security Defender Endpoint Plan 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1.md
The green boxes in the following image depict what's included in Defender for En
Use this guide to: -- [Get an overview of whatΓÇÖs included in Defender for Endpoint Plan 1](#defender-for-endpoint-plan-1-capabilities)
+- [Get an overview of what's included in Defender for Endpoint Plan 1](#defender-for-endpoint-plan-1-capabilities)
- [Compare Defender for Endpoint Plan 1 to Plan 2](defender-endpoint-plan-1-2.md) - [Learn how to set up and configure Defender for Endpoint Plan 1](mde-p1-setup-configuration.md) - [Get started using the Microsoft 365 Defender portal, where you can view incidents and alerts, manage devices, and use reports about detected threats](mde-plan1-getting-started.md)
Manual response actions are actions that your security team can take when threat
| File/Device | Action | Description | |:|:|:| | Device | Run antivirus scan | Starts an antivirus scan. If any threats are detected on the device, those threats are often addressed during an antivirus scan. |
-| Device | Isolate device | Disconnects a device from your organizationΓÇÖs network while retaining connectivity to Defender for Endpoint. This action enables you to monitor the device and take further action if needed. |
+| Device | Isolate device | Disconnects a device from your organization's network while retaining connectivity to Defender for Endpoint. This action enables you to monitor the device and take further action if needed. |
| File | Stop and quarantine |Stops processes from running and quarantines associated files. | | File | Add an indicator to block or allow a file | Block indicators prevent portable executable files from being read, written, or executed on devices. <p>Allow indicators prevent files from being blocked or remediated. |
To learn more, see the following articles:
## Attack surface reduction
-Your organizationΓÇÖs attack surfaces are all the places where youΓÇÖre vulnerable to cyberattacks. With Defender for Endpoint Plan 1, you can reduce your attack surfaces by protecting the devices and applications that your organization uses. The attack surface reduction capabilities that are included in Defender for Endpoint Plan 1 are described in the following sections.
+Your organization's attack surfaces are all the places where you're vulnerable to cyberattacks. With Defender for Endpoint Plan 1, you can reduce your attack surfaces by protecting the devices and applications that your organization uses. The attack surface reduction capabilities that are included in Defender for Endpoint Plan 1 are described in the following sections.
- [Attack surface reduction rules](#attack-surface-reduction-rules) - [Ransomware mitigation](#ransomware-mitigation)
To learn more, see [Protect important folders with controlled folder access](con
### Device control
-Sometimes threats to your organizationΓÇÖs devices come in the form of files on removable drives, such as USB drives. Defender for Endpoint includes capabilities to help prevent threats from unauthorized peripherals from compromising your devices. You can configure Defender for Endpoint to block or allow removable devices and files on removable devices.
+Sometimes threats to your organization's devices come in the form of files on removable drives, such as USB drives. Defender for Endpoint includes capabilities to help prevent threats from unauthorized peripherals from compromising your devices. You can configure Defender for Endpoint to block or allow removable devices and files on removable devices.
To learn more, see [Control USB devices and removable media](control-usb-devices-using-intune.md). ### Web protection
-With web protection, you can protect your organizationΓÇÖs devices from web threats and unwanted content. Web protection includes web threat protection and web content filtering.
+With web protection, you can protect your organization's devices from web threats and unwanted content. Web protection includes web threat protection and web content filtering.
- [Web threat protection](web-threat-protection.md) prevents access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that you explicitly block. - [Web content filtering](web-content-filtering.md) prevents access to certain sites based on their category. Categories can include adult content, leisure sites, legal liability sites, and more.
To learn more, see [Protect your network](network-protection.md).
### Network firewall
-With network firewall protection, you can set rules that determine which network traffic is permitted to flow to or from your organizationΓÇÖs devices. With your network firewall and advanced security that you get with Defender for Endpoint, you can:
+With network firewall protection, you can set rules that determine which network traffic is permitted to flow to or from your organization's devices. With your network firewall and advanced security that you get with Defender for Endpoint, you can:
- Reduce the risk of network security threats - Safeguard sensitive data and intellectual property
To learn more, see [Get started with Microsoft Defender for Endpoint Plan 1](mde
### APIs
-With the Defender for Endpoint APIs, you can automate workflows and integrate with your organizationΓÇÖs custom solutions.
+With the Defender for Endpoint APIs, you can automate workflows and integrate with your organization's custom solutions.
To learn more, see [Defender for Endpoint APIs](management-apis.md).
security Device Control Removable Storage Access Control https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-removable-storage-access-control.md
Last updated 03/18/2022
> [!NOTE] > The Group Policy management and Intune OMA-URI/Custom Policy management of this product are now generally available (4.18.2106): See [Tech Community blog: Protect your removable storage and printer with Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/protect-your-removable-storage-and-printers-with-microsoft/ba-p/2324806). - Microsoft Defender for Endpoint Device Control Removable Storage Access Control enables you to do the following task: - auditing, allowing or preventing the read, write or execute access to removable storage with or without exclusion
Before you get started with Removable Storage Access Control, you must confirm y
2. Combine all rules within `<PolicyRules>` `</PolicyRules>` into one xml file. If you want to restrict a specific user, then use SID property into the Entry. If there is no SID in the policy Entry, the Entry will be applied to everyone login instance for the machine.
-
+ If you want to monitor file information for Write access, use the right AccessMask with the right Option (16); here is the example of [Capture file information](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Audit%20File%20Information.xml). The following image illustrates the usage of SID property, and an example of [Scenario 1: Prevent Write and Execute access to all but allow specific approved USBs](#scenario-1-prevent-write-and-execute-access-to-all-but-allow-specific-approved-usbs).
Before you get started with Removable Storage Access Control, you must confirm y
:::image type="content" source="images/148609685-4c05f002-5cbe-4aab-9245-83e730c5449e.png" alt-text="Enabled or Disabled device control in PowerShell code"::: 6. Set location for a copy of the file: if you want to have a copy of the file when Write access happens, you have to set the location where system can save the copy.
-
+ Deploy this together with the right AccessMask and Option - see step 2 above. :::image type="content" source="../../media/define-device-control-policy-rules.png" alt-text="Group Policy - Set locaiton for file evidence":::
Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>) \> *
`./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7bc544a991-5786-4402-949e-a032cb790d0e%7d/RuleData` - Data Type: String (XML file)
-
+ If you want to monitor file information for Write access, use the right AccessMask with the right Option (16); here is the example of [Capture file information](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Audit%20File%20Information.xml). 3. Default enforcement: allows you to set default access (Deny or Allow) to removable media if there is no policy. For example, you only have policy (either Deny or Allow) for RemovableMediaDevices, but do not have any policy for CdRomDevices or WpdDevices, and you set default Deny through this policy, Read/Write/Execute access to CdRomDevices or WpdDevices will be blocked.
Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>) \> *
:::image type="content" source="images/148609770-3e555883-f26f-45ab-9181-3fb1ff7a38ac.png" alt-text="Removeable Storage Access Control in PowerShell code"::: 5. Set the location for a copy of the file: if you want to have a copy of the file when Write access happens, you have to set the location where the system can save the copy.
-
+ - OMA-URI: `./Vendor/MSFT/Defender/Configuration/DataDuplicationRemoteLocation;**username**;**password**` - Data Type: String
-
+ You have to deploy this together with the right AccessMask and the right Option - see step 2 above. :::image type="content" source="../../media/device-control-oma-uri-edit-row.png" alt-text="Set locaiton for file evidence":::
-
+ ## Deploying and managing policy by using Intune user interface (*Coming soon!*) This capability will be available in the Microsoft Endpoint Manager admin center (<https://endpoint.microsoft.com/>). Go to **Endpoint Security** > **Attack Surface Reduction** > **Create Policy**. Choose **Platform: Windows 10 and later** with **Profile: Device Control**.
DeviceEvents
| project Timestamp, DeviceId, DeviceName, InitiatingProcessAccountName, ActionType, Policy, PolicyRuleId, FileInformationOperation, MediaClassName, MediaInstanceId, MediaName, MediaProductId, MediaVendorId, MediaSerialNumber, FileName, FolderPath, FileSize, FileEvidenceLocation, AdditionalFields | order by Timestamp desc ```
-
## Frequently asked questions - ### How to generate GUID for Group Id/PolicyRule Id/Entry Id?
-You can generate GUID through online open source, or through PowerShell - [How to generate GUID through PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?msclkid=c1398a25a6d911ec9c888875fa1f24f5&view=powershell-7.2)
-
+You can generate GUID through online open source, or through PowerShell - [How to generate GUID through PowerShell](/powershell/module/microsoft.powershell.utility/new-guid)
+ ![image](https://user-images.githubusercontent.com/81826151/159046476-26ea0a21-8087-4f01-b8ae-5aa73b392d8f.png)
-
+ ### What is the removable storage media limitation for the maximum number of USBs? We've validated one USB group with 100,000 media - up to 7 MB in size. The policy works in both Intune and GPO without performance issues.
We've validated one USB group with 100,000 media - up to 7 MB in size. The polic
2. Another reason could be that the XML file isn't correctly formatted, for example, not using the correct markdown formatting for the "&" character in the XML file, or the text editor might add a byte order mark (BOM) 0xEF 0xBB 0xBF at the beginning of the files, which causes the XML parsing not to work. One simple solution is to download the [sample file](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples) (select **Raw** and then **Save as**) and then update. 3. If you are deploying and managing the policy via Group Policy, please make sure combine all PolicyRule into one XML file within a parent node called PolicyRules and all Group into one XML file within a parent node called Groups; if you manage through Intune, keep one PolicyRule one XML file, same thing, one Group one XML file.
-
-If still not working, you may want to contact us and share support cab by running cmd with administrator: ΓÇ£%programfiles%\Windows Defender\MpCmdRun.exe" -GetFiles
+
+If still not working, you may want to contact us and share support cab by running cmd with administrator: "%programfiles%\Windows Defender\MpCmdRun.exe" -GetFiles
### There is no configuration UX for 'Define device control policy groups' and 'Define device control policy rules' on my Group Policy
We don't backport the Group Policy configuration UX, but you can still get the r
### How can I know whether the latest policy has been deployed to the target machine?
-You can run ΓÇÿGet-MpComputerStatusΓÇÖ on PowerShell as an Administrator. The following value will show whether the latest policy has been applied to the target machine.
+You can run "Get-MpComputerStatus' on PowerShell as an Administrator. The following value will show whether the latest policy has been applied to the target machine.
:::image type="icon" source="images/148609885-bea388a9-c07d-47ef-b848-999d794d24b8.png" border="false":::
security Device Control Removable Storage Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-removable-storage-protection.md
Microsoft Defender for Endpoint Device Control Removable Storage Protection allo
|Property Name|Applicable Policies|Applies to Operating Systems|Description| |||||
-|Device Class|[How to control USB devices and other removable media using Microsoft Defender for Endpoint](control-usb-devices-using-intune.md)|Windows|For information about Device ID formats, see [device setup class](/windows-hardware/drivers/install/overview-of-device-setup-classes). The following two links provide the complete list of Device Setup Classes. ΓÇÿSystem UseΓÇÖ classes are mostly refer to devices that come with a computer/machine from the factory, while ΓÇÿVendorΓÇÖ classes are mostly refer to devices that could be connected to an existing computer/machine: [System-Defined Device Setup Classes Available to Vendors - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-available-to-vendors) and [System-Defined Device Setup Classes Reserved for System Use - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-reserved-for-system-use). **Note**: Device Installation can be applied to any devices, not only Removable storage.|
+|Device Class|[How to control USB devices and other removable media using Microsoft Defender for Endpoint](control-usb-devices-using-intune.md)|Windows|For information about Device ID formats, see [device setup class](/windows-hardware/drivers/install/overview-of-device-setup-classes). The following two links provide the complete list of Device Setup Classes. 'System Use' classes are mostly refer to devices that come with a computer/machine from the factory, while 'Vendor' classes are mostly refer to devices that could be connected to an existing computer/machine: [System-Defined Device Setup Classes Available to Vendors - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-available-to-vendors) and [System-Defined Device Setup Classes Reserved for System Use - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-reserved-for-system-use). **Note**: Device Installation can be applied to any devices, not only Removable storage.|
|Primary ID|[Removable storage Access Control](device-control-removable-storage-access-control.md)|Windows|The Primary ID includes removable storage and CD/DVD and Windows Portable Device/WPD.| |Device ID|[Removable storage Access Control](device-control-removable-storage-access-control.md); <p> [How to control USB devices and other removable media using Microsoft Defender for Endpoint](control-usb-devices-using-intune.md)|Windows|For information about Device ID formats, see [Standard USB Identifiers](/windows-hardware/drivers/install/standard-usb-identifiers), for example, USBSTOR\DISK&VEN_GENERIC&PROD_FLASH_DISK&REV_8.07| |Hardware ID|[Removable storage Access Control](device-control-removable-storage-access-control.md) <p> [How to control USB devices and other removable media using Microsoft Defender for Endpoint](control-usb-devices-using-intune.md)|Windows|A string identified the device in the system, for example, USBSTOR\DiskGeneric_Flash_Disk___8.07; **Note**: Hardware ID is not unique; different devices might share the same value.|
security Device Discovery Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-discovery-faq.md
When considering Standard discovery, you may be wondering about the implications
### Probing is distributed across all Windows devices on the network
-As opposed to malicious activity, which would typically scan the entire network from a small number of compromised devices, Microsoft Defender for EndpointΓÇÖs Standard discovery probing is initiated from all onboarded Windows devices making the activity benign and non-anomalous. The probing is centrally managed from the cloud to balance the probing attempt between all the supported onboarded devices in the network.
+As opposed to malicious activity, which would typically scan the entire network from a small number of compromised devices, Microsoft Defender for Endpoint's Standard discovery probing is initiated from all onboarded Windows devices making the activity benign and non-anomalous. The probing is centrally managed from the cloud to balance the probing attempt between all the supported onboarded devices in the network.
### Active probing generates negligible amount of extra traffic
Network security and monitoring tools are indifferent to such activities perform
### Only unmanaged devices are being probed
-The device discovery capabilities have been built to only discover and identify unmanaged devices on your network. This means that previously discovered devices that are already onboarded with Microsoft Defender for Endpoint wonΓÇÖt be probed.
+The device discovery capabilities have been built to only discover and identify unmanaged devices on your network. This means that previously discovered devices that are already onboarded with Microsoft Defender for Endpoint won't be probed.
### You can exclude network lures from active probing
-Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions will ensure that those devices wonΓÇÖt be actively probed and wonΓÇÖt be alerted. Those devices will be discovered using passive methods only (similar to Basic discovery mode).
+Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions will ensure that those devices won't be actively probed and won't be alerted. Those devices will be discovered using passive methods only (similar to Basic discovery mode).
security Device Discovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-discovery.md
For more information, see [Device inventory](machines-view-overview.md).
The large number of unmanaged network devices deployed in an organization creates a large surface area of attack, and represents a significant risk to the entire enterprise. Microsoft Defender for Endpoint network discovery capabilities helps you ensure network devices are discovered, accurately classified, and added to the asset inventory.
-Network devices are not managed as standard endpoints, as Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan will obtain the necessary information from the devices. To do this, a designated Microsoft Defender for Endpoint device will be used on each network segment to perform periodic authenticated scans of preconfigured network devices. Once discovered, Defender for EndpointΓÇÖs threat and vulnerability management capabilities provide integrated workflows to secure discovered switches, routers, WLAN controllers, firewalls, and VPN gateways.
+Network devices are not managed as standard endpoints, as Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan will obtain the necessary information from the devices. To do this, a designated Microsoft Defender for Endpoint device will be used on each network segment to perform periodic authenticated scans of preconfigured network devices. Once discovered, Defender for Endpoint's threat and vulnerability management capabilities provide integrated workflows to secure discovered switches, routers, WLAN controllers, firewalls, and VPN gateways.
For more information, see [Network devices](network-devices.md).
To address the challenge of gaining enough visibility to locate, identify, and s
- **Corelight**: Microsoft has partnered with Corelight to receive data from Corelight network appliances. This provides Microsoft 365 Defender with increased visibility into the network activities of unmanaged devices, including communication with other unmanaged devices or external networks. for more information, see [Enable Corelight data integration](corelight-integration.md). -- **Microsoft Defender for IoT**: This integration combines Microsoft Defender for EndpointΓÇÖs device discovery capabilities, with the agentless monitoring capabilities of Microsoft Defender for IoT, to secure enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Microsoft Defender for IoT integration](enable-microsoft-defender-for-iot-integration.md).
+- **Microsoft Defender for IoT**: This integration combines Microsoft Defender for Endpoint's device discovery capabilities, with the agentless monitoring capabilities of Microsoft Defender for IoT, to secure enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Microsoft Defender for IoT integration](enable-microsoft-defender-for-iot-integration.md).
## Vulnerability assessment on discovered devices
security Enable Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction.md
ASR rules support environment variables and wildcards. For information about usi
- Endpoint security > **Attack surface reduction policy** > [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune). - Endpoint security > Security baselines > **Microsoft Defender ATP Baseline** > [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules). - Settings that do not have conflicts are added to a superset of policy for the device.
- - When two or more policies have conflicting settings, the conflicting settings are not added to the combined policy, while settings that donΓÇÖt conflict are added to the superset policy that applies to a device.
+ - When two or more policies have conflicting settings, the conflicting settings are not added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
- Only the configurations for conflicting settings are held back. ## Configuration methods
security Exclude Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exclude-devices.md
ms.technology: mde
Excluding devices that are inactive, duplicate, or out of scope allows you to focus on discovering and prioritizing the risks on your active devices. This action can also help reflect a more accurate threat and vulnerability management exposure score, as the excluded devices won't be visible in your threat and vulnerability management reports.
-Once devices are excluded, you won’t be able to view updated or relevant information about vulnerabilities and installed software on these devices. It affects all threat and vulnerability management pages, reports, and related tables in advanced hunting.
+Once devices are excluded, you won't be able to view updated or relevant information about vulnerabilities and installed software on these devices. It affects all threat and vulnerability management pages, reports, and related tables in advanced hunting.
Even though the device exclusion feature removes the device data from vulnerability management pages and reports, the devices remain connected to the network and can still be a risk to the organization. You'll be able to cancel the device exclusion at any time.
You can choose to exclude a single device or multiple devices at the same time.
### Exclude a single device 1. Go to the **Device inventory** page and select the device to exclude.
-2. Select **Exclude** from the action bar on the device inventory page or from the actions menu in the device flyout.
+2. Select **Exclude** from the action bar on the device inventory page or from the actions menu in the device flyout.
-![Image of exclude device menu option.](images/exclude-devices-menu.png)
+ ![Image of exclude device menu option.](images/exclude-devices-menu.png)
- 3. Select a justification:
+3. Select a justification:
- Inactive device - Duplicate device
- - Device doesnΓÇÖt exist
- - Out of scope  
+ - Device doesn't exist
+ - Out of scope
- Other
-4. Type a note and select **Exclude device**.
+4. Type a note and select **Exclude device**.
![Image of exclude device.](images/exclude-device.png) You can also exclude a device from its device page. > [!NOTE]
-> Excluding active devices is not recommended, since it is especially risky to not have visibility into their vulnerability info. If a device is active and you try to exclude it, youΓÇÖll get a warning message and a confirmation pop-up asking if you are sure you want to exclude an active device.
+> Excluding active devices is not recommended, since it is especially risky to not have visibility into their vulnerability info. If a device is active and you try to exclude it, you'll get a warning message and a confirmation pop-up asking if you are sure you want to exclude an active device.
It can take up to 10 hours for a device to be fully excluded from vulnerability management views and data.
-Excluded devices are still visible in the Device inventory list. You can manage your view of excluded devices by:
+Excluded devices are still visible in the Device inventory list. You can manage your view of excluded devices by:
- Adding the **Exclusion state** column to the device inventory view.-- Using the **Exclusion state** filter to view the relevant list of devices.
+- Using the **Exclusion state** filter to view the relevant list of devices.
![Image of exclusion state.](images/exclusion-state.png)
If you select multiple devices in the device list with different exclusion statu
![Image of bulk exclude](images/exclude-device-bulk.png)
-Once a device is excluded, if you go to the device page of an excluded device, you wonΓÇÖt be able to see data for discovered vulnerabilities, software inventory or security recommendations. The data also wonΓÇÖt show up in vulnerability management pages, related advanced hunting tables and the vulnerable devices report.
+Once a device is excluded, if you go to the device page of an excluded device, you won't be able to see data for discovered vulnerabilities, software inventory or security recommendations. The data also won't show up in vulnerability management pages, related advanced hunting tables and the vulnerable devices report.
## Stop excluding a device
-You’ll be able to stop excluding a device at any time. Once devices are no longer excluded, their vulnerability data will be visible in vulnerability management pages, reports, and in advanced hunting. It may take up to 8 hours for the changes to take effect.
+You'll be able to stop excluding a device at any time. Once devices are no longer excluded, their vulnerability data will be visible in vulnerability management pages, reports, and in advanced hunting. It may take up to 8 hours for the changes to take effect.
1. Go to the Device inventory, select the excluded device to open the flyout, and then select **Exclusion details**
-2. Select **Stop exclusion**
+2. Select **Stop exclusion**
![Image of exclusion details](images/exclusion-details.png)
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-alerts.md
If you are experiencing a false alert with a line-of-business application, creat
> [!TIP] > If you're experiencing any issues not described above, use the 🙂 button to provide feedback or open a support ticket. - ## Related topics+ - [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md) - [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md) - [Investigate a file associated with a Defender for Endpoint alert](investigate-files.md)
If you are experiencing a false alert with a line-of-business application, creat
- [Investigate an IP address associated with a Defender for Endpoint alert](investigate-ip.md) - [Investigate a domain associated with a Defender for Endpoint alert](investigate-domain.md) - [Investigate a user account in Defender for Endpoint](investigate-user.md)--
security Linux Install Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-manually.md
Alternatively, you can use an automated [installer bash script](https://github.c
The script identifies the distribution and version, simplifies the selection of the right repository, sets up the device to pull the latest package, and combines the product installation and onboarding steps. ```bash
-Γ¥» ./mde_installer.sh --help
+> ./mde_installer.sh --help
usage: basename ./mde_installer.sh [OPTIONS] Options: -c|--channel specify the channel from which you want to install. Default: insiders-fast
security Linux Install With Puppet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-puppet.md
Download the onboarding package from Microsoft 365 Defender portal:
```bash ls -l ```+ ```Output total 8 -rw-r--r-- 1 test staff 4984 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip ```+ 5. Extract the contents of the archive.+ ```bash unzip WindowsDefenderATPOnboardingPackage.zip ```+ ```Output Archive: WindowsDefenderATPOnboardingPackage.zip inflating: mdatp_onboard.json
Create the folders *install_mdatp/files* and *install_mdatp/manifests* under the
```bash pwd ```+ ```Output /etc/puppetlabs/code/environments/production/modules ```
pwd
```bash tree install_mdatp ```+ ```Output install_mdatp Γö£ΓöÇΓöÇ files
Include the above manifest in your site.pp file:
```bash cat /etc/puppetlabs/code/environments/production/manifests/site.pp ```+ ```Output node "default" { include install_mdatp
On the agent device, you can also check the onboarding status by running:
```bash mdatp health ```+ ```Output ... licensed : true
security Linux Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md
When you run the `mdatp health` command for the first time, the value for the ta
``` > [!NOTE]
- > DonΓÇÖt forget to add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (please see the above example). At the moment, the only supported key name for tags is `GROUP`.
+ > Don't forget to add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (please see the above example). At the moment, the only supported key name for tags is `GROUP`.
## Configuration profile validation
security Linux Schedule Scan Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-schedule-scan-mde.md
crontab -u username -r
### Explanation
-+ΓÇöΓÇöΓÇöΓÇöΓÇö- minute (values: 0 - 59) (special characters: , - * /) <br>
-| +ΓÇöΓÇöΓÇöΓÇö- hour (values: 0 - 23) (special characters: , - * /) <br>
-| | +ΓÇöΓÇöΓÇö- day of month (values: 1 - 31) (special characters: , - * / L W C) <br>
-| | | +ΓÇöΓÇö- month (values: 1 - 12) (special characters: ,- * / ) <br>
-| | | | +ΓÇö- day of week (values: 0 - 6) (Sunday=0 or 7) (special characters: , - * / L W C) <br>
++ΓÇöΓÇöΓÇöΓÇöΓÇö- minute (values: 0 - 59) (special characters: , \- \* /) <br>
+| +ΓÇöΓÇöΓÇöΓÇö- hour (values: 0 - 23) (special characters: , \- \* /) <br>
+| | +ΓÇöΓÇöΓÇö- day of month (values: 1 - 31) (special characters: , \- \* / L W C) <br>
+| | | +ΓÇöΓÇö- month (values: 1 - 12) (special characters: , \- \* / ) <br>
+| | | | +ΓÇö- day of week (values: 0 - 6) (Sunday=0 or 7) (special characters: , \- \* / L W C) <br>
| | | | |*****command to be executed
security Linux Support Perf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-perf.md
The following steps can be used to troubleshoot and mitigate these issues:
To collect current statistics, run: ```bash
- mdatp diagnostic real-time-protection-statistics --output json > real_time_protection.json
+ mdatp diagnostic real-time-protection-statistics --output json > real_time_protection.json
``` > [!NOTE]
The following steps can be used to troubleshoot and mitigate these issues:
```Output ... > python ~/repo/mdatp-xplat/linux/diagnostic/high_cpu_parser.py <~Downloads/output.json | head -n 10 27432 None 76703
- 73467 actool     1249
+ 73467 actool 1249
73914 xcodebuild 1081 73873 bash 1050 27475 None 836
- 1    launchd    407
- 73468 ibtool     344
- 549  telemetryd_v1   325
+ 1 launchd 407
+ 73468 ibtool 344
+ 549 telemetryd_v1 325
4764 None 228
- 125  CrashPlanService 164
+ 125 CrashPlanService 164
``` To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
security Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response.md
ms.technology: mde
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink) Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats in real time.
Before you can initiate a session on a device, make sure you fulfill the followi
- [Version 1803 (RS 4)](/windows/whats-new/whats-new-windows-10-version-1803) with [KB4537795](https://support.microsoft.com/help/4537795/windows-10-update-kb4537795) - [Version 1709 (RS 3)](/windows/whats-new/whats-new-windows-10-version-1709) with [KB4537816](https://support.microsoft.com/help/4537816/windows-10-update-kb4537816)
- - **macOS** - Only applicable for Public Preview, minimum required version: 101.43.84
-
+ - **macOS** - Only applicable for Public Preview, minimum required version: 101.43.84
+ > [!NOTE] > Currently only Intel-based macOS systems are supported.
-
- - **Linux** - Only applicable for Public Preview, minimum required version: 101.45.13
-
+ - **Linux** - Only applicable for Public Preview, minimum required version: 101.45.13
+ - **Windows Server 2012 R2** - with [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)
-
+ - **Windows Server 2016** - with [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac) - **Windows Server 2019** - Version 1903 or (with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)) later - Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
-
- - **Windows Server 2022**
-
+ - **Windows Server 2022**
- **Enable live response from the advanced settings page**.
Before you can initiate a session on a device, make sure you fulfill the followi
> [!NOTE] > Only users with manage security or global admin roles can edit these settings.
- >
+ >
> Automated Investigation must be enabled in the [Advanced features settings](advanced-features.md) prior to enabling live response. - **Enable live response for servers from the advanced settings page** (recommended).
Before you can initiate a session on a device, make sure you fulfill the followi
- **Enable live response unsigned script execution** (optional). >[!IMPORTANT]
- >Signature verification only applies for PowerShell scripts.
+ >Signature verification only applies for PowerShell scripts.
> [!WARNING] > Allowing the use of unsigned scripts may increase your exposure to threats.
Depending on the role that's been granted to you, you can run basic or advanced
The following commands are available for user roles that are granted the ability to run **basic** live response commands. For more information on role assignments, see [Create and manage roles](user-roles.md).
-<br>
-
-****
| Command | Description | Windows and Windows Server | macOS | Linux | |||||| | cd | Changes the current directory. | Y | Y | Y |
The following commands are available for user roles that are granted the ability
The following commands are available for user roles that are granted the ability to run **advanced** live response commands. For more information on role assignments, see [Create and manage roles](user-roles.md).
-<br>
-
-****
- | Command | Description | Windows and Windows Server | macOS | Linux | |||||| | analyze | Analyses the entity with various incrimination engines to reach a verdict. | Y | N | N |
The following commands are available for user roles that are granted the ability
| run | Runs a PowerShell script from the library on the device. | Y | Y | Y | | library | Lists files that were uploaded to the live response library. | Y | Y | Y | | putfile | Puts a file from the library to the device. Files are saved in a working folder and are deleted when the device restarts by default. | Y | Y | Y |
-| remediate | Remediates an entity on the device. The remediation action will vary depending on the entity type: File: delete Process: stop, delete image file Service: stop, delete image file Registry entry: delete Scheduled task: remove Startup folder item: delete file NOTE: This command has a prerequisite command. You can use the -auto command in conjunction with remediate to automatically run the prerequisite command. | Y | Y | Y |
+| remediate | Remediates an entity on the device. The remediation action will vary depending on the entity type: File: delete Process: stop, delete image file Service: stop, delete image file Registry entry: delete Scheduled task: remove Startup folder item: delete file NOTE: This command has a prerequisite command. You can use the -auto command in conjunction with remediate to automatically run the prerequisite command. | Y | Y | Y |
| scan | Runs an antivirus scan to help identify and remediate malware. | N | Y | Y | | undo | Restores an entity that was remediated. | Y | Y | Y | - ## Use live response commands The commands that you can use in the console follow similar principles as [Windows Commands](/windows-server/administration/windows-commands/windows-commands#BKMK_c).
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
ms.technology: mde
## 101.59.50 (20.122021.15950.0) -- This version adds support for macOS 12.3. Starting with macOS 12.3, [Apple is removing Python 2.7](https://developer.apple.com/documentation/macos-release-notes/macos-12_3-release-notes). There will be no Python version preinstalled on macOS by default. **ACTION NEEDED**:
+- This version adds support for macOS 12.3. Starting with macOS 12.3, [Apple is removing Python 2.7](https://developer.apple.com/documentation/macos-release-notes/macos-12_3-release-notes). There will be no Python version preinstalled on macOS by default. **ACTION NEEDED**:
- Users must update Microsoft Defender for Endpoint for Mac to version 101.59.50 (or newer) prior to updating their devices to macOS Monterey 12.3 (or newer). This minimal version 101.59.50 is a prerequisite to eliminating Python-related issues with Microsoft Defender for Endpoint for Mac on macOS Monterey. - For remote deployments, existing MDM setups must be updated to Microsoft Defender for Endpoint for Mac version 101.59.50 (or newer). Pushing via MDM an older Microsoft Defender for Endpoint for Mac version to macOS Monterey 12.3 (or newer) will result in an installation failure.
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
During the Microsoft Defender for Endpoint onboarding process, devices onboarded
## Navigate to the Device inventory page
-Access the device inventory page by selecting **Device inventory** from the **Endpoints** navigation menu in the [Microsoft 365 Defender portal](/defender/microsoft-365-security-center-mde).
+Access the device inventory page by selecting **Device inventory** from the **Endpoints** navigation menu in the [Microsoft 365 Defender portal](/defender/microsoft-365-security-center-mde).
## Device inventory overview
-The device inventory opens on the **Computers and Mobile** tab. At a glance youΓÇÖll see information such as device name, domain, risk level, exposure level, OS platform, onboarding status, sensor health state, and other details for easy identification of devices most at risk.
+The device inventory opens on the **Computers and Mobile** tab. At a glance you'll see information such as device name, domain, risk level, exposure level, OS platform, onboarding status, sensor health state, and other details for easy identification of devices most at risk.
Use the **Onboarding Status** column to sort and filter by discovered devices, and those already onboarded to Microsoft Defender for Endpoint. ![Image of devices list with list of devices.](images/device-inventory.png)
-From the **Network devices** and **IoT devices** tabs, youΓÇÖll also see information such as vendor, model and device type:
+From the **Network devices** and **IoT devices** tabs, you'll also see information such as vendor, model and device type:
![Image of network devices list.](images/device-inventory-networkdevices.png)
The counts on the top of each tab will be updated based on the current view.
Filter | Description :|: **Risk level** </br> | The risk level reflects the overall risk assessment of the device based on a combination of factors, including the types and severity of active alerts on the device. Resolving active alerts, approving remediation activities, and suppressing subsequent alerts can lower the risk level.
-**Exposure level** </br> | The exposure level reflects the current exposure of the device based on the cumulative impact of its pending security recommendations. The possible levels are low, medium, and high. Low exposure means your devices are less vulnerable from exploitation. </br> </br> If the exposure level says ΓÇ£No data available,ΓÇ¥ there are a few reasons why this may be the case:</br>- Device stopped reporting for more than 30 days. In that case itΓÇÖs considered inactive, and the exposure isnΓÇÖt computed.</br>- Device OS not supported - see [minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements).</br>- Device with stale agent (unlikely).
-**Tags** </br> | Filter the list based on the grouping and tagging that youΓÇÖve added to individual devices. See [Create and manage device tags](machine-tags.md).
+**Exposure level** </br> | The exposure level reflects the current exposure of the device based on the cumulative impact of its pending security recommendations. The possible levels are low, medium, and high. Low exposure means your devices are less vulnerable from exploitation. </br> </br> If the exposure level says "No data available," there are a few reasons why this may be the case:</br>- Device stopped reporting for more than 30 days. In that case it's considered inactive, and the exposure isn't computed.</br>- Device OS not supported - see [minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements).</br>- Device with stale agent (unlikely).
+**Tags** </br> | Filter the list based on the grouping and tagging that you've added to individual devices. See [Create and manage device tags](machine-tags.md).
**Device value**</br> | Filter the list based on whether the device has been marked as high value or low value. **Exclusion state** </br> | Filter the list based on whether the device has been excluded or not. For more information, see [Exclude devices](exclude-devices.md).
-**OS Platform** </br>| Filter by the OS platforms youΓÇÖre interested in investigating </br></br>(_Computers and mobile and IoT devices only_)
+**OS Platform** </br>| Filter by the OS platforms you're interested in investigating </br></br>(_Computers and mobile and IoT devices only_)
**First seen** </br> | Filter your view based on when the device was first seen in the network or when it was first reported by the Microsoft Defender for Endpoint sensor.</br></br>(_Computers and mobile and IoT devices only_)
-**Windows version** </br> | Filter by the Windows versions youΓÇÖre interested in investigating.</br></br> (_Computers and mobile only_)
+**Windows version** </br> | Filter by the Windows versions you're interested in investigating.</br></br> (_Computers and mobile only_)
**Sensor health state** </br> | Filter by the following sensor health states, for devices onboard to Microsoft Defender for Endpoint:</br> - **Active**: Devices that are actively reporting sensor data to the service.</br> - **Inactive**: Devices that have stopped sending signals for more than 7 days. </br> - **Misconfigured**: Devices that have impaired communications with service or are unable to send sensor data. </br> Misconfigured devices can further be classified to: </br> - No sensor data </br> - Impaired communications </br> For more information on how to address issues on misconfigured devices see, [Fix unhealthy sensors](/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors).</br></br> (_Computers and mobile only_)
-**Onboarding status** </br> | Onboarding status indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or not. You can filter by the following states: </br> - **Onboarded**: The endpoint is onboarded to Microsoft Defender for Endpoint. </br> - **Can be onboarded**: The endpoint was discovered in the network as a supported device, but itΓÇÖs not currently onboarded. Microsoft highly recommends onboarding these devices. </br> - **Unsupported**: The endpoint was discovered in the network, but is not supported by Microsoft Defender for Endpoint. </br> - **Insufficient info**: The system couldnΓÇÖt determine the supportability of the device.</br></br> (_Computers and mobile only_)
+**Onboarding status** </br> | Onboarding status indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or not. You can filter by the following states: </br> - **Onboarded**: The endpoint is onboarded to Microsoft Defender for Endpoint. </br> - **Can be onboarded**: The endpoint was discovered in the network as a supported device, but it's not currently onboarded. Microsoft highly recommends onboarding these devices. </br> - **Unsupported**: The endpoint was discovered in the network, but is not supported by Microsoft Defender for Endpoint. </br> - **Insufficient info**: The system couldn't determine the supportability of the device.</br></br> (_Computers and mobile only_)
**Antivirus status** </br> | Filter the view based on whether the antivirus status is disabled, not updated or unknown.</br></br> (_Computers and mobile only_)
-**Group** </br> | Filter the list based on the group youΓÇÖre interested in investigating. </br></br> (_Computers and mobile only_)
+**Group** </br> | Filter the list based on the group you're interested in investigating. </br></br> (_Computers and mobile only_)
**Managed by** </br> | Managed by indicates how the device is being managed. You can filter by:</br>- Microsoft Defender for Endpoint </br> - Mobile device management (MDM) </br>- Unknown: This could be due the running an outdated Windows version, SCCM being in place, or another third party MDM.</br></br> (_Computers and mobile only_)
-**Device Type** </br> | Filter by the device type youΓÇÖre interested in investigating.</br></br> (_IoT devices only_)
+**Device Type** </br> | Filter by the device type you're interested in investigating.</br></br> (_IoT devices only_)
## Use columns to customize the device inventory views
security Manage Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-indicators.md
The table below shows exactly which actions are available per indicator (IoC) ty
The functionality of pre-existing IoCs will not change. However, the indicators were renamed to match the current supported response actions: -- The ΓÇ£alert onlyΓÇ¥ response action was renamed to ΓÇ£auditΓÇ¥ with the generate alert setting enabled.-- The ΓÇ£alert and blockΓÇ¥ response was renamed to ΓÇ£block and remediateΓÇ¥ with the optional generate alert setting.
+- The "alert only" response action was renamed to "audit" with the generate alert setting enabled.
+- The "alert and block" response was renamed to "block and remediate" with the optional generate alert setting.
The IoC API schema and the threat ids in advance hunting have been updated to align with the renaming of the IoC response actions. The API scheme changes applies to all IoC Types.
security Mde Device Control Device Installation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-device-control-device-installation.md
The following device properties are supported by Device Installation support:
- Hardware ID - Compatible ID - Device Class-- ΓÇÿRemovable DeviceΓÇÖ Device type: Some devices could be classified as Removable Device. A device is considered removable when the driver for the device to which it's connected indicates that the device is removable. For example, a USB device is reported to be removable by the drivers for the USB hub to which the device is connected.
+- 'Removable Device' Device type: Some devices could be classified as Removable Device. A device is considered removable when the driver for the device to which it's connected indicates that the device is removable. For example, a USB device is reported to be removable by the drivers for the USB hub to which the device is connected.
For more information, see [Device Installation in Windows](/windows/client-management/manage-device-installation-with-group-policy). ## Policies
In Microsoft Endpoint Manager [https://endpoint.microsoft.com/](https://endpoint
1. Configure **Prevent installation of devices using drivers that match these device setup classes**. - Open Endpoint security > Attack surface reduction > Create Policy > Platform: Windows 10 (and later) & Profile: Device control.
-
+ :::image type="content" source="../../media/devicepolicy-editprofile.png" alt-text="The Edit profile page" lightbox="../../media/devicepolicy-editprofile.png":::
-
+ 2. Plug in a USB, device and you will see following error message: :::image type="content" source="../../media/devicepolicy-errormsg.png" alt-text="The error message" lightbox="../../media/devicepolicy-errormsg.png":::
In Microsoft Endpoint Manager [https://endpoint.microsoft.com/](https://endpoint
3. Enable **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria**. - **only support OMA-URI for now**: Devices > Configuration profiles > Create profile > Platform: Windows 10 (and later) & Profile: Custom
-
+ :::image type="content" source="../../media/devicepolicy-editrow.png" alt-text="The Edit Row page" lightbox="../../media/devicepolicy-editrow.png"::: 4. Enable and add allowed USB Instance ID ΓÇô **Allow installation of devices that match any of these device IDs**. - Update the step 1 Device control profile
-
+ :::image type="content" source="../../media/devicepolicy-devicecontrol.png" alt-text="An identifier in the Device Control page" lightbox="../../media/devicepolicy-devicecontrol.png":::
-
- Adding PCI\CC_0C03; PCI\CC_0C0330; PCI\VEN_8086; PNP0CA1; PNP0CA1&HOST; USB\ROOT_HUB30; USB\ROOT_HUB20; USB\USB20_HUB on above screen capture is because it's not enough to enable only a single hardware ID to enable a single USB thumb-drive. You have to ensure all the USB devices that preceding the target one aren't blocked (allowed) as well. You can open Device Manager and change view to ΓÇÿDevices by connectionsΓÇÖ to see the way devices are installed in the PnP tree. In Our case the following devices has to be allowed so the target USB thumb-drive could be allowed as well:
- Adding PCI\CC_0C03; PCI\CC_0C0330; PCI\VEN_8086; PNP0CA1; PNP0CA1&HOST; USB\ROOT_HUB30; USB\ROOT_HUB20; USB\USB20_HUB on above screen capture is because it's not enough to enable only a single hardware ID to enable a single USB thumb-drive. You have to ensure all the USB devices that preceding the target one aren't blocked (allowed) as well. You can open Device Manager and change view to ΓÇÿDevices by connectionsΓÇÖ to see the way devices are installed in the PnP tree. In Our case the following devices has to be allowed so the target USB thumb-drive could be allowed as well:
+ Adding PCI\CC_0C03; PCI\CC_0C0330; PCI\VEN_8086; PNP0CA1; PNP0CA1&HOST; USB\ROOT_HUB30; USB\ROOT_HUB20; USB\USB20_HUB on above screen capture is because it's not enough to enable only a single hardware ID to enable a single USB thumb-drive. You have to ensure all the USB devices that preceding the target one aren't blocked (allowed) as well. You can open Device Manager and change view to 'Devices by connections' to see the way devices are installed in the PnP tree. In Our case the following devices has to be allowed so the target USB thumb-drive could be allowed as well:
+
+ Adding PCI\CC_0C03; PCI\CC_0C0330; PCI\VEN_8086; PNP0CA1; PNP0CA1&HOST; USB\ROOT_HUB30; USB\ROOT_HUB20; USB\USB20_HUB on above screen capture is because it's not enough to enable only a single hardware ID to enable a single USB thumb-drive. You have to ensure all the USB devices that preceding the target one aren't blocked (allowed) as well. You can open Device Manager and change view to 'Devices by connections' to see the way devices are installed in the PnP tree. In Our case the following devices has to be allowed so the target USB thumb-drive could be allowed as well:
- - ΓÇ£Intel(R) USB 3.0 eXtensible Host Controller ΓÇô 1.0 (Microsoft)ΓÇ¥ -> PCI\CC_0C03
- - ΓÇ£USB Root Hub (USB 3.0)ΓÇ¥ -> USB\ROOT_HUB30
- - ΓÇ£Generic USB HubΓÇ¥ -> USB\USB20_HUB
+ - "Intel(R) USB 3.0 eXtensible Host Controller ΓÇô 1.0 (Microsoft)" -> PCI\CC_0C03
+ - "USB Root Hub (USB 3.0)" -> USB\ROOT_HUB30
+ - "Generic USB Hub" -> USB\USB20_HUB
:::image type="content" source="../../media/devicepolicy-devicemgr.png" alt-text="The View menu item in the Device Manager page" lightbox="../../media/devicepolicy-devicemgr.png":::
In Microsoft Endpoint Manager [https://endpoint.microsoft.com/](https://endpoint
> > Different PC manufacturers sometimes have different ways to nest USB devices in the PnP tree, but in general this is how it's done.
-5. Plug in the allowed USB again. YouΓÇÖll see that it's now allowed and available.
+5. Plug in the allowed USB again. You'll see that it's now allowed and available.
:::image type="content" source="../../media/devicepolicy-removedrive.png" alt-text="The Remove drive details page" lightbox="../../media/devicepolicy-removedrive.png":::
DeviceRegistryEvents
It is not enough to enable only a single hardware ID to enable a single USB thumb-drive. Ensure that all the USB devices that precede the target one aren't blocked (allowed) as well. :::image type="content" source="../../media/devicemgrscrnshot.png" alt-text="The Device install faq" lightbox="../../media/devicemgrscrnshot.png":::-
security Mde P1 Maintenance Operations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-p1-maintenance-operations.md
To manage your security intelligence and product updates, see [Manage Microsoft
## Fine-tune and adjust Defender for Endpoint
-Defender for Endpoint offers you much flexibility and configuration options. You can adjust and fine-tune your settings to suit your organizationΓÇÖs needs. For example, you can use Microsoft Endpoint Manager, Group Policy, and other methods to manage your endpoint security settings.
+Defender for Endpoint offers you much flexibility and configuration options. You can adjust and fine-tune your settings to suit your organization's needs. For example, you can use Microsoft Endpoint Manager, Group Policy, and other methods to manage your endpoint security settings.
To learn more, see [Manage Defender for Endpoint](manage-mde-post-migration.md).
A false positive is an artifact, like a file or a process, that was detected as
:::image type="content" source="../../media/defender-endpoint/false-positives-overview.png" alt-text="False positives and negatives process overview" lightbox="../../media/defender-endpoint/false-positives-overview.png":::
-If youΓÇÖre seeing false positives/negatives in Defender for Endpoint, see [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
+If you're seeing false positives/negatives in Defender for Endpoint, see [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
## Next steps
security Mde P1 Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-p1-setup-configuration.md
The following table describes key roles to consider for Defender for Endpoint in
## Onboard to Defender for Endpoint
-When youΓÇÖre ready to onboard your organizationΓÇÖs endpoints, you can choose from several methods, as listed in the following table: <br/><br/>
+When you're ready to onboard your organization's endpoints, you can choose from several methods, as listed in the following table: <br/><br/>
|Endpoint Operating System | Onboarding methods| |||
Then, proceed to configure your next-generation protection and attack surface re
## Configure next-generation protection
-We recommend using [Microsoft Endpoint Manager](/mem) to manage your organizationΓÇÖs devices and security settings, as shown in the following image:
+We recommend using [Microsoft Endpoint Manager](/mem) to manage your organization's devices and security settings, as shown in the following image:
:::image type="content" source="../../medie-p1/endpoint-policies.png":::
To configure your next-generation protection in Microsoft Endpoint Manager, foll
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-2. Select **Endpoint security** > **Antivirus**, and then select an existing policy. (If you donΓÇÖt have an existing policy, create a new policy.)
+2. Select **Endpoint security** > **Antivirus**, and then select an existing policy. (If you don't have an existing policy, create a new policy.)
3. Set or change your antivirus configuration settings. Need help? Refer to the following resources: <br/>
security Mde Plan1 Getting Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-plan1-getting-started.md
The Microsoft 365 Defender portal ([https://security.microsoft.com](https://secu
## The Microsoft 365 Defender portal
-The Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is where you'll view alerts, manage devices, and view reports. When you sign into the Microsoft 365 Defender portal, youΓÇÖll start with the Home page, as shown in the following image:
+The Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is where you'll view alerts, manage devices, and view reports. When you sign into the Microsoft 365 Defender portal, you'll start with the Home page, as shown in the following image:
:::image type="content" source="../../medie-p1/m365-defender-portal.png":::
Use the **Alerts**, **Devices**, and **Users** tabs to view more information, su
## Manage devices
-To view and manage your organizationΓÇÖs devices, in the navigation bar, under **Endpoints**, select **Device inventory**. YouΓÇÖll see a list of devices as shown in the following image:
+To view and manage your organization's devices, in the navigation bar, under **Endpoints**, select **Device inventory**. You'll see a list of devices as shown in the following image:
:::image type="content" source="../../medie-p1/device-inventory.png":::
security Microsoft Defender Antivirus On Windows Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-on-windows-server.md
The process of setting up and running Microsoft Defender Antivirus on Windows Se
> [!IMPORTANT] > If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default. The GUI isnΓÇÖt required; you can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus. However, many organizations prefer to use the GUI for Microsoft Defender Antivirus. To install the GUI, use one of the procedures in the following table:
+By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default. The GUI isn't required; you can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus. However, many organizations prefer to use the GUI for Microsoft Defender Antivirus. To install the GUI, use one of the procedures in the following table:
| Procedure | What to do | |:|:|
sc query Windefend
The `sc query` command returns information about the Microsoft Defender Antivirus service. When Microsoft Defender Antivirus is running, the `STATE` value displays `RUNNING`.
-To view all the services that arenΓÇÖt running, run the following PowerShell cmdlet:
+To view all the services that aren't running, run the following PowerShell cmdlet:
```cmd sc query state= all
sc query state= all
To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Microsoft Defender Antivirus Security intelligence are approved for the computers you manage.
-By default, Windows Update doesnΓÇÖt download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
+By default, Windows Update doesn't download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
| Method | Description | |||
-| **Windows Update** in Control Panel | **Install updates automatically** results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **Download updates but let me choose whether to install them** allows Windows Defender to download and install Security intelligence updates automatically, but other updates arenΓÇÖt automatically installed. |
+| **Windows Update** in Control Panel | **Install updates automatically** results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **Download updates but let me choose whether to install them** allows Windows Defender to download and install Security intelligence updates automatically, but other updates aren't automatically installed. |
| **Group Policy** | You can set up and manage Windows Update by using the settings available in Group Policy, in the following path: **Administrative Templates\Windows Components\Windows Update\Configure Automatic Updates** |
-| The **AUOptions** registry key | The following two values allow Windows Update to automatically download and install Security intelligence updates: <br/><br/> **4** - **Install updates automatically**. This value results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **3** - **Download updates but let me choose whether to install them**. This value allows Windows Defender to download and install Security intelligence updates automatically, but other updates arenΓÇÖt automatically installed. |
+| The **AUOptions** registry key | The following two values allow Windows Update to automatically download and install Security intelligence updates: <br/><br/> **4** - **Install updates automatically**. This value results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **3** - **Download updates but let me choose whether to install them**. This value allows Windows Defender to download and install Security intelligence updates automatically, but other updates aren't automatically installed. |
To ensure that protection from malware is maintained, enable the following
The following table lists the services for Microsoft Defender Antivirus and the
## Submit samples
-Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware Security intelligence. We collect program executable files, such as .exe files and .dll files. We donΓÇÖt collect files that contain personal data, like Microsoft Word documents and PDF files.
+Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware Security intelligence. We collect program executable files, such as .exe files and .dll files. We don't collect files that contain personal data, like Microsoft Word documents and PDF files.
### Submit a file
To enable automatic sample submission, start a Windows PowerShell console as an
|Setting|Description| |||
-| **0** - **Always prompt** | The Microsoft Defender Antivirus service prompts you to confirm submission of all required files. This is the default setting for Microsoft Defender Antivirus, but isnΓÇÖt recommended for installations on Windows Server 2016 or 2019, or Windows Server 2022 without a GUI. |
+| **0** - **Always prompt** | The Microsoft Defender Antivirus service prompts you to confirm submission of all required files. This is the default setting for Microsoft Defender Antivirus, but isn't recommended for installations on Windows Server 2016 or 2019, or Windows Server 2022 without a GUI. |
| **1** - **Send safe samples automatically** | The Microsoft Defender Antivirus service sends all files marked as "safe" and prompts for the remainder of the files. |
-| **2** - **Never send** | The Microsoft Defender Antivirus service doesnΓÇÖt prompt and doesnΓÇÖt send any files. |
+| **2** - **Never send** | The Microsoft Defender Antivirus service doesn't prompt and doesn't send any files. |
| **3** - **Send all samples automatically** | The Microsoft Defender Antivirus service sends all files without a prompt for confirmation. | > [!NOTE]
See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](con
## Passive mode and Windows Server
-If youΓÇÖre using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disabled mode. If your Windows Server endpoint is onboarded to Microsoft Defender for Endpoint, you can set Microsoft Defender Antivirus to passive mode. If you're not using Microsoft Defender for Endpoint, set Microsoft Defender Antivirus to disabled mode.
+If you're using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disabled mode. If your Windows Server endpoint is onboarded to Microsoft Defender for Endpoint, you can set Microsoft Defender Antivirus to passive mode. If you're not using Microsoft Defender for Endpoint, set Microsoft Defender Antivirus to disabled mode.
> [!TIP] > See [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md).
The following table describes methods to set Microsoft Defender Antivirus to pas
| Set Microsoft Defender Antivirus to passive mode by using a registry key | Set the ForceDefenderPassiveMode registry key as follows: <br/>- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` <br/>- Name: `ForceDefenderPassiveMode` <br/>- Type: `REG_DWORD` <br/>- Value: `1` | | Turn off the Microsoft Defender Antivirus user interface using PowerShell | Open Windows PowerShell as an administrator, and run the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender-GUI` | Disable Microsoft Defender Antivirus using PowerShell | Use the following PowerShell cmdlet: `Set-MpPreference -DisableRealtimeMonitoring $true` |
-| Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard | See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**. <br/><br/>When you get to the **Features** step of the wizard, clear the **Windows Defender Features** option. <br/><br/> If you clear **Windows Defender** by itself under the **Windows Defender Features** section, youΓÇÖll be prompted to remove the interface option **GUI for Windows Defender**.<br/><br/>Microsoft Defender Antivirus will still run normally without the user interface, but the user interface canΓÇÖt be enabled if you disable the core **Windows Defender** feature. |
+| Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard | See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**. <br/><br/>When you get to the **Features** step of the wizard, clear the **Windows Defender Features** option. <br/><br/> If you clear **Windows Defender** by itself under the **Windows Defender Features** section, you'll be prompted to remove the interface option **GUI for Windows Defender**.<br/><br/>Microsoft Defender Antivirus will still run normally without the user interface, but the user interface can't be enabled if you disable the core **Windows Defender** feature. |
| Uninstall Microsoft Defender Antivirus using PowerShell | Use the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender` | | Disable Microsoft Defender Antivirus using Group Policy | In your Local Group Policy Editor, navigate to **Administrative Template** > **Windows Component** > **Endpoint Protection** > **Disable Endpoint Protection**, and then select **Enabled** > **OK**. |
security Microsoft Defender Endpoint Android https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-android.md
This topic describes how to install, configure, update, and use Defender for End
- Configure Microsoft Defender for Endpoint risk signals in app protection policy. > [!NOTE]
- > - Microsoft Defender for Endpoint now extends protection to an organizationΓÇÖs data within a managed application (MAM) for devices that are not enrolled using mobile device management (MDM), but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
+ > - Microsoft Defender for Endpoint now extends protection to an organization's data within a managed application (MAM) for devices that are not enrolled using mobile device management (MDM), but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
> - In addition, Microsoft Defender for Endpoint already supports devices that are enrolled using Intune mobile device management (MDM).
security Microsoft Defender Endpoint Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-ios.md
ms.technology: mde
> [!NOTE]
- > - Microsoft Defender for Endpoint now extends protection to an organizationΓÇÖs data within a managed application for those who arenΓÇÖt using mobile device management (MDM) but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
+ > - Microsoft Defender for Endpoint now extends protection to an organization's data within a managed application for those who aren't using mobile device management (MDM) but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
> - In addition, Microsoft Defender for Endpoint already supports devices that are enrolled using Intune mobile device management (MDM). **System Requirements**
security Onboard Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-configure.md
The following table lists the available tools based on the endpoint that you nee
The following table lists the available tools based on the endpoint that you need to onboard. ## Configure capabilities of the service
-Onboarding devices effectively enables the endpoint detection and response capability of Micorosft Defender for Endpoint.
+Onboarding devices effectively enables the endpoint detection and response capability of Microsoft Defender for Endpoint.
After onboarding the devices, you'll then need to configure the other capabilities of the service. The following table lists the capabilities you can configure to get the best protection for your environment.
security Prevent Changes To Security Settings With Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md
If you are an organization using [Microsoft Defender for Endpoint](/microsoft-36
### How does configuring tamper protection in Intune affect how I manage Microsoft Defender Antivirus with Group Policy?
-Group policy doesnΓÇÖt apply to tamper protection. Changes made to Microsoft Defender Antivirus settings are ignored when tamper protection is on.
+Group policy doesn't apply to tamper protection. Changes made to Microsoft Defender Antivirus settings are ignored when tamper protection is on.
### If we use Microsoft Intune to configure tamper protection, does it apply only to the entire organization?
security Respond File Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-file-alerts.md
By default, you should be able to download files that are in quarantine.
### Download quarantined files
-Files that have been quarantined by Microsoft Defender Antivirus or your security team will be saved in a compliant way according to your [sample submission configurations](enable-cloud-protection-microsoft-defender-antivirus.md). Your security team can download the files directly from the fileΓÇÖs detail page via the "Download file" button. **This preview feature is turned 'On' by default**.
+Files that have been quarantined by Microsoft Defender Antivirus or your security team will be saved in a compliant way according to your [sample submission configurations](enable-cloud-protection-microsoft-defender-antivirus.md). Your security team can download the files directly from the file's detail page via the "Download file" button. **This preview feature is turned 'On' by default**.
The location depends on your organization's geo settings (either EU, UK, or US). A quarantined file will only be collected once per organization. Learn more about Microsoft's data protection from the Service Trust Portal at https://aka.ms/STP.
security Security Config Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/security-config-management.md
ms.technology: mde
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
-Security Management for Microsoft Defender for Endpoint is a capability for devices that arenΓÇÖt managed by a Microsoft Endpoint Manager, either Microsoft Intune or Microsoft Endpoint Configuration Manager, to receive security configurations for Microsoft Defender directly from Endpoint Manager.
+Security Management for Microsoft Defender for Endpoint is a capability for devices that aren't managed by a Microsoft Endpoint Manager, either Microsoft Intune or Microsoft Endpoint Configuration Manager, to receive security configurations for Microsoft Defender directly from Endpoint Manager.
For more information on Security Configuration Management, including prerequisites, supported platforms and more, see [Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager](/mem/intune/protect/mde-security-integration).
security Troubleshoot Mdatp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-mdatp.md
Configure your browser to allow cookies.
## Elements or data missing on the portal
-If some elements or data is missing on Microsoft 365 Defender itΓÇÖs possible that proxy settings are blocking it.
+If some elements or data is missing on Microsoft 365 Defender it's possible that proxy settings are blocking it.
Make sure that `*.security.microsoft.com` is included the proxy allowlist.
security Troubleshoot Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus.md
Message:
Description: </td> <td >
-If Tamper protection is enabled then, any attempt to change any of DefenderΓÇÖs settings if blocked and Event ID 5013 is generated that states which setting change was blocked.
+If Tamper protection is enabled then, any attempt to change any of Defender's settings if blocked and Event ID 5013 is generated that states which setting change was blocked.
</td> </tr> <tr>
security Tune Performance Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus.md
To start recording system events, open PowerShell in administrative mode and per
3. Press **ENTER** to stop and save recording, or **Ctrl+C** to cancel recording.
-4. Analyze the results using the performance analyzerΓÇÖs `Get-MpPerformanceReport`parameter. For example, on executing the command `Get-MpPerformanceReport -Path <recording.etl> -TopFiles 3 -TopScansPerFile 10`, the user is provided with a list of top-ten scans for the top 3 files affecting performance.
+4. Analyze the results using the performance analyzer's `Get-MpPerformanceReport`parameter. For example, on executing the command `Get-MpPerformanceReport -Path <recording.etl> -TopFiles 3 -TopScansPerFile 10`, the user is provided with a list of top-ten scans for the top 3 files affecting performance.
For more information on command-line parameters and options, see the [New-MpPerformanceRecording](#new-mpperformancerecording) and [Get-MpPerformanceReport](#get-mpperformancereport).
New-MpPerformanceRecording -RecordTo <String >
#### Description: New-MpPerformanceRecording The `New-MpPerformanceRecording` cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the [Get-MpPerformanceReport](#get-mpperformancereport) cmdlet.
-This `New-MpPerformanceRecording` cmdlet provides an insight into problematic files that could cause a degradation in the performance of Microsoft Defender Antivirus. This tool is provided ΓÇ£AS ISΓÇ¥, and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution.
+This `New-MpPerformanceRecording` cmdlet provides an insight into problematic files that could cause a degradation in the performance of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution.
For more information on the performance analyzer, see [Performance Analyzer](/windows-hardware/test/wpt/windows-performance-analyzer) docs.
Accept wildcard characters: False
``` ### -TopExtensions
-Specifies how many top extensions to output, sorted by "DurationΓÇ¥.
+Specifies how many top extensions to output, sorted by "Duration".
```yaml Type: Int32
Accept wildcard characters: False
``` ### -TopExtensionsPerProcess
-Specifies how many top extensions to output for each top process, sorted by "DurationΓÇ¥.
+Specifies how many top extensions to output for each top process, sorted by "Duration".
```yaml Type: Int32
Accept wildcard characters: False
``` ### -TopProcesses
-Requests a top-processes report and specifies how many of the top processes to output, sorted by "DurationΓÇ¥.
+Requests a top-processes report and specifies how many of the top processes to output, sorted by "Duration".
```yaml Type: Int32
Accept wildcard characters: False
``` ### -TopProcessesPerExtension
-Specifies how many top processes to output for each top extension, sorted by "DurationΓÇ¥.
+Specifies how many top processes to output for each top extension, sorted by "Duration".
```yaml
Accept wildcard characters: False
### -TopProcessesPerFile
-Specifies how many top processes to output for each top file, sorted by "Duration ΓÇ£.
+Specifies how many top processes to output for each top file, sorted by "Duration ".
```yaml
Accept wildcard characters: False
### -TopScansPerExtensionPerProcess
-Specifies how many top scans to output for each top extension for each top process, sorted by "DurationΓÇ¥.
+Specifies how many top scans to output for each top extension for each top process, sorted by "Duration".
```yaml
Accept wildcard characters: False
### -TopScansPerFile
-Specifies how many top scans to output for each top file, sorted by "DurationΓÇ¥.
+Specifies how many top scans to output for each top file, sorted by "Duration".
```yaml
Accept wildcard characters: False
### -TopScansPerFilePerProcess
-Specifies how many top scans for output for each top file for each top process, sorted by "DurationΓÇ¥.
+Specifies how many top scans for output for each top file for each top process, sorted by "Duration".
```yaml
Accept wildcard characters: False
### -TopScansPerProcess
-Specifies how many top scans to output for each top process in the Top Processes report, sorted by "DurationΓÇ¥.
+Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration".
```yaml
Accept wildcard characters: False
``` ### -TopScansPerProcessPerExtension
-Specifies how many top scans for output for each top process for each top extension, sorted by "DurationΓÇ¥.
+Specifies how many top scans for output for each top process for each top extension, sorted by "Duration".
```yaml
Accept wildcard characters: False
``` ### -TopScansPerProcessPerFile
-Specifies how many top scans for output for each top process for each top file, sorted by "DurationΓÇ¥.
+Specifies how many top scans for output for each top process for each top file, sorted by "Duration".
```yaml
security Web Protection Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-protection-overview.md
To list blocks that are due to other features (like Custom Indicators), refer to
## User experience
-If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge will trigger a block page that reads ΓÇÿThis site has been reported as unsafeΓÇÖ along with information related to the threat.
+If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge will trigger a block page that reads 'This site has been reported as unsafe' along with information related to the threat.
> [!div class="mx-imgBorder"] > :::image type="content" source="../../media/web-protection-malicious-block.png" alt-text="The page blocked by Microsoft Edge" lightbox="../../media/web-protection-malicious-block.png":::
If blocked by WCF or a custom indicator, a block page shows in Microsoft Edge th
> [!div class="mx-imgBorder"] > :::image type="content" source="../../media/web-protection-indicator-blockpage.png" alt-text="The page blocked by your organization" lightbox="../../media/web-protection-indicator-blockpage.png":::
-In any case, no block pages are shown in third-party browsers, and the user sees a ΓÇÿSecure Connection FailedΓÇÖ page along with a toast notification. Depending on the policy responsible for the block, a user will see a different message in the toast notification. For example, web content filtering will display the message ΓÇÿThis content is blockedΓÇÖ.
+In any case, no block pages are shown in third-party browsers, and the user sees a "Secure Connection Failed' page along with a toast notification. Depending on the policy responsible for the block, a user will see a different message in the toast notification. For example, web content filtering will display the message 'This content is blocked'.
> [!div class="mx-imgBorder"] > :::image type="content" source="../../media/web-protection-np-block.png" alt-text="The page blocked by WCF" lightbox="../../media/web-protection-np-block.png":::
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
For more information on Microsoft Defender for Endpoint on other operating syste
## November 2021 -- [Security configuration management](security-config-management.md) <br/> A capability for devices that arenΓÇÖt managed by a Microsoft Endpoint Manager, either Microsoft Intune or Microsoft Endpoint Configuration Manager, to receive security configurations for Microsoft Defender directly from Endpoint Manager.
+- [Security configuration management](security-config-management.md) <br/> A capability for devices that aren't managed by a Microsoft Endpoint Manager, either Microsoft Intune or Microsoft Endpoint Configuration Manager, to receive security configurations for Microsoft Defender directly from Endpoint Manager.
- Enhancements to cross-platform support.
security Advanced Hunting Cloudappevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-cloudappevents-table.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH
ms.technology: m365d
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:** - Microsoft 365 Defender
+The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps. For a complete list, jump to [Apps and services covered](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
-
-The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps. For a complete list, jump to [Apps and services covered](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
-
->[!IMPORTANT]
->This table includes information that used to be available in the `AppFileEvents` table. Starting March 7, 2021, users hunting through file-related activities in cloud services on and beyond this date should use the `CloudAppEvents` table instead. <br><br>Make sure to search for queries and custom detection rules that still use the `AppFileEvents` table and edit them to use the `CloudAppEvents` table. More guidance about converting affected queries can be found in [Hunt across cloud app activities with Microsoft 365 Defender advanced hunting](https://techcommunity.microsoft.com/t5/microsoft-365-defender/hunt-across-cloud-app-activities-with-microsoft-365-defender/ba-p/1893857).
-
+> [!IMPORTANT]
+> This table includes information that used to be available in the `AppFileEvents` table. Starting March 7, 2021, users hunting through file-related activities in cloud services on and beyond this date should use the `CloudAppEvents` table instead. <br><br>Make sure to search for queries and custom detection rules that still use the `AppFileEvents` table and edit them to use the `CloudAppEvents` table. More guidance about converting affected queries can be found in [Hunt across cloud app activities with Microsoft 365 Defender advanced hunting](https://techcommunity.microsoft.com/t5/microsoft-365-defender/hunt-across-cloud-app-activities-with-microsoft-365-defender/ba-p/1893857).
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
For information on other tables in the advanced hunting schema, [see the advance
| `AccountId` | `string` | An identifier for the account as found by Microsoft Defender for Cloud Apps. Could be Azure Active Directory ID, user principal name, or other identifiers. | | `AccountDisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initiation, and a last name or surname. | | `IsAdminOperation` | `string` | Indicates whether the activity was performed by an administrator |
-| `DeviceType` | `string` | Type of device based on purpose and functionality, such as "Network device", "Workstation", "Server", "Mobile", "Gaming console", or "Printer" |
+| `DeviceType` | `string` | Type of device based on purpose and functionality, such as "Network device", "Workstation", "Server", "Mobile", "Gaming console", or "Printer" |
| `OSPlatform` | `string` | Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. | | `IPAddress` | `string` | IP address assigned to the endpoint and used during related network communications | | `IsAnonymousProxy` | `string` | Indicates whether the IP address belongs to a known anonymous proxy |
For information on other tables in the advanced hunting schema, [see the advance
| `ReportId` | `string` | Unique identifier for the event | | `RawEventData` | `string` | Raw event information from the source application or service in JSON format | | `AdditionalFields` | `dynamic` | Additional information about the entity or event |
-| `AccountType` | `string` | Type of user account, indicating its general role and access levels, such as Regular, System, Admin, DcAdmin, System, Application |
-| `IsExternalUser` | `boolean` | Indicates whether a user inside the network doesn't belong to the organizationΓÇÖs domain |
-| `IsImpersonated` | `boolean` | Indicates whether the activity was performed by one user for another (impersonated) user |
-| `IPTags` | `dynamic` | Customer-defined information applied to specific IP addresses and IP address ranges |
-| `IPCategory` | `string` | Additional information about the IP address |
-| `UserAgentTags` | `dynamic` | More information provided by Microsoft Defender for Cloud Apps in a tag in the user agent field. Can have any of the following values: Native client, Outdated browser, Outdated operating system, Robot |
+| `AccountType` | `string` | Type of user account, indicating its general role and access levels, such as Regular, System, Admin, DcAdmin, System, Application |
+| `IsExternalUser` | `boolean` | Indicates whether a user inside the network doesn't belong to the organization's domain |
+| `IsImpersonated` | `boolean` | Indicates whether the activity was performed by one user for another (impersonated) user |
+| `IPTags` | `dynamic` | Customer-defined information applied to specific IP addresses and IP address ranges |
+| `IPCategory` | `string` | Additional information about the IP address |
+| `UserAgentTags` | `dynamic` | More information provided by Microsoft Defender for Cloud Apps in a tag in the user agent field. Can have any of the following values: Native client, Outdated browser, Outdated operating system, Robot |
## Apps and services covered
For information on other tables in the advanced hunting schema, [see the advance
- SharePoint Online - Skype for Business - Office 365-- Yammer
+- Yammer
## Related topics+ - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md) - [Use shared queries](advanced-hunting-shared-queries.md)
security Advanced Hunting Emailattachmentinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table.md
For information on other tables in the advanced hunting schema, [see the advance
| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Microsoft 365 | | `SenderFromAddress` | `string` | Sender email address in the FROM header, which is visible to email recipients on their email clients | | `SenderDisplayName` | `string` | Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname |
-| `SenderObjectId` | `string` | Unique identifier for the senderΓÇÖs account in Azure AD |
+| `SenderObjectId` | `string` | Unique identifier for the sender's account in Azure AD |
| `RecipientEmailAddress` | `string` | Email address of the recipient, or email address of the recipient after distribution list expansion | | `RecipientObjectId` | `string` | Unique identifier for the email recipient in Azure AD | | `FileName` | `string` | Name of the file that the recorded action was applied to |
security Advanced Hunting Emailevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailevents-table.md
ms.technology: m365d
The `EmailEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving the processing of emails on Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.
->[!TIP]
+> [!TIP]
> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in the Defender for Cloud. For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
For information on other tables in the advanced hunting schema, [see the advance
| `SenderMailFromAddress` | `string` | Sender email address in the MAIL FROM header, also known as the envelope sender or the Return-Path address | | `SenderFromAddress` | `string` | Sender email address in the FROM header, which is visible to email recipients on their email clients | | `SenderDisplayName` | `string` | Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname |
-| `SenderObjectId` | `string` |Unique identifier for the senderΓÇÖs account in Azure AD |
+| `SenderObjectId` | `string` |Unique identifier for the sender's account in Azure AD |
| `SenderMailFromDomain` | `string` | Sender domain in the MAIL FROM header, also known as the envelope sender or the Return-Path address | | `SenderFromDomain` | `string` | Sender domain in the FROM header, which is visible to email recipients on their email clients | | `SenderIPv4` | `string` | IPv4 address of the last detected mail server that relayed the message |
security Advanced Hunting Expert Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-expert-training.md
ms.technology: m365d
Boost your knowledge of advanced hunting quickly with _Tracking the adversary_, a webcast series for new security analysts and seasoned threat hunters. The series guides you through the basics all the way to creating your own sophisticated queries. Start with the first video on fundamentals or jump to more advanced videos that suit your level of experience. | Title | Description | Watch | Queries |
-|--|--|--|--|
+|||||
| Episode 1: KQL fundamentals | This episode covers the basics of advanced hunting in Microsoft 365 Defender. Learn about available advanced hunting data and basic KQL syntax and operators. | [YouTube](https://youtu.be/0D9TkGjeJwM?t=351) (54:14) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%201%20-%20KQL%20Fundamentals.txt) | | Episode 2: Joins | Continue learning about data in advanced hunting and how to join tables together. Learn about `inner`, `outer`, `unique`, and `semi` joins, and understand the nuances of the default Kusto `innerunique` join. | [YouTube](https://youtu.be/LMrO6K5TWOU?t=297) (53:33) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%202%20-%20Joins.txt) |
-| Episode 3: Summarizing, pivoting, and visualizing data | Now that you've learned to filter, manipulate, and join data, itΓÇÖs time to summarize, quantify, pivot, and visualize. This episode discusses the `summarize` operator and various calculations, while introducing additional tables in the schema. You'll also learn to turn datasets into charts that can help you extract insight. | [YouTube](https://youtu.be/UKnk9U1NH6Y?t=296) (48:52) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%203%20-%20Summarizing%2C%20Pivoting%2C%20and%20Joining.txt) |
-| Episode 4: LetΓÇÖs hunt! Applying KQL to incident tracking | In this episode, you learn to track some attacker activity. We use our improved understanding of Kusto and advanced hunting to track an attack. Learn actual tricks used in the field, including the ABCs of cybersecurity and how to apply them to incident response. | [YouTube](https://youtu.be/2EUxOc_LNd8?t=291) (59:36) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%204%20-%20Lets%20Hunt.txt)
+| Episode 3: Summarizing, pivoting, and visualizing data | Now that you've learned to filter, manipulate, and join data, it's time to summarize, quantify, pivot, and visualize. This episode discusses the `summarize` operator and various calculations, while introducing additional tables in the schema. You'll also learn to turn datasets into charts that can help you extract insight. | [YouTube](https://youtu.be/UKnk9U1NH6Y?t=296) (48:52) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%203%20-%20Summarizing%2C%20Pivoting%2C%20and%20Joining.txt) |
+| Episode 4: Let's hunt! Applying KQL to incident tracking | In this episode, you learn to track some attacker activity. We use our improved understanding of Kusto and advanced hunting to track an attack. Learn actual tricks used in the field, including the ABCs of cybersecurity and how to apply them to incident response. | [YouTube](https://youtu.be/2EUxOc_LNd8?t=291) (59:36) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%204%20-%20Lets%20Hunt.txt)
Get more expert training with *L33TSP3AK: Advanced hunting in Microsoft 365 Defender*, a webcast series for analysts looking to expand their technical knowledge and practical skills in conducting security investigations using advanced hunting in Microsoft 365 Defender. | Title | Description | Watch | Queries |
-|--|--|--|--|
+|||||
| Episode 1 | In this episode, you will learn different best practices in running advanced hunting queries. Among the topics covered are: how to optimize your queries, use advanced hunting for ransomware, handle JSON as a dynamic type, and work with external data operators. | [YouTube](https://www.youtube.com/watch?v=nMGbK-ALaVg&feature=youtu.be) (56:34) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/l33tSpeak/Performance%2C%20Json%20and%20dynamics%20operator%2C%20external%20data.txt) | | Episode 2 | In this episode, you will learn how to investigate and respond to suspicious or unusual logon locations and data exfiltration via inbox forwarding rules. Sebastien Molendijk, Senior Program Manager for Cloud Security CxE, shares how to use advanced hunting to investigate multi-stage incidents with Microsoft Defender for Cloud Apps data. | [YouTube](https://www.youtube.com/watch?v=QaUxdtNfbd8) (57:07) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/l33tSpeak/MCAS%20-%20The%20Hunt.txt) | Episode 3 | In this episode we will cover the latest improvements to advanced hunting, how to import an external data source into your query, and how to use partitioning to segment large query results into smaller result sets to avoid hitting API limits. | [YouTube](https://www.youtube.com/watch?v=vd5lgIJKmYs) (40:59) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/l33tSpeak/l33tspeak%2011%20Oct%202021%20-%20externaldata%20and%20query%20partitioning.csl)
security Advanced Hunting Migrate From Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-migrate-from-mde.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance
Move your advanced hunting workflows from Microsoft Defender for Endpoint to pro
>[!NOTE] >Most Microsoft Defender for Endpoint customers can [use Microsoft 365 Defender without additional licenses](prerequisites.md#licensing-requirements). To start transitioning your advanced hunting workflows from Defender for Endpoint, [turn on Microsoft 365 Defender](m365d-enable.md).
-You can transition without affecting your existing Defender for Endpoint workflows. Saved queries remain intact, and custom detection rules continue to run and generate alerts. They will, however, be visible in Microsoft 365 Defender.
+You can transition without affecting your existing Defender for Endpoint workflows. Saved queries remain intact, and custom detection rules continue to run and generate alerts. They will, however, be visible in Microsoft 365 Defender.
## Schema tables in Microsoft 365 Defender only+ The [Microsoft 365 Defender advanced hunting schema](advanced-hunting-schema-tables.md) provides additional tables containing data from various Microsoft 365 security solutions. The following tables are available only in Microsoft 365 Defender: | Table name | Description |
The [Microsoft 365 Defender advanced hunting schema](advanced-hunting-schema-tab
> Queries and custom detections which use schema tables that are only available in Microsoft 365 Defender can only be viewed in Microsoft 365 Defender. ## Map DeviceAlertEvents table+ The `AlertInfo` and `AlertEvidence` tables replace the `DeviceAlertEvents` table in the Microsoft Defender for Endpoint schema. In addition to data about device alerts, these two tables include data about alerts for identities, apps, and emails. Use the following table to check how `DeviceAlertEvents` columns map to columns in the `AlertInfo` and `AlertEvidence` tables.
->[!TIP]
->In addition to the columns in the following table, the `AlertEvidence` table includes many other columns that provide a more holistic picture of alerts from various sources. [See all AlertEvidence columns](advanced-hunting-alertevidence-table.md)
+> [!TIP]
+> In addition to the columns in the following table, the `AlertEvidence` table includes many other columns that provide a more holistic picture of alerts from various sources. [See all AlertEvidence columns](advanced-hunting-alertevidence-table.md)
| DeviceAlertEvents column | Where to find the same data in Microsoft 365 Defender | |-|--|-|-|
Use the following table to check how `DeviceAlertEvents` columns map to columns
| `Table` | This column is typically used in Microsoft Defender for Endpoint for additional event information in other tables. In Microsoft 365 Defender, you can get related data directly from the `AlertEvidence` table. | ## Adjust existing Microsoft Defender for Endpoint queries+ Microsoft Defender for Endpoint queries will work as-is unless they reference the `DeviceAlertEvents` table. To use these queries in Microsoft 365 Defender, apply these changes: - Replace `DeviceAlertEvents` with `AlertInfo`. - Join the `AlertInfo` and the `AlertEvidence` tables on `AlertId` to get equivalent data. ### Original query+ The following query uses `DeviceAlertEvents` in Microsoft Defender for Endpoint to get the alerts that involve _powershell.exe_: ```kusto DeviceAlertEvents
-| where Timestamp > ago(7d)
+| where Timestamp > ago(7d)
| where AttackTechniques has "PowerShell (T1086)" and FileName == "powershell.exe" ```+ ### Modified query+ The following query has been adjusted for use in Microsoft 365 Defender. Instead of checking the file name directly from `DeviceAlertEvents`, it joins `AlertEvidence` and checks for the file name in that table. ```kusto
-AlertInfo
-| where Timestamp > ago(7d)
-| where AttackTechniques has "PowerShell (T1086)"
+AlertInfo
+| where Timestamp > ago(7d)
+| where AttackTechniques has "PowerShell (T1086)"
| join AlertEvidence on AlertId | where FileName == "powershell.exe" ``` ## Migrate custom detection rules
-When Microsoft Defender for Endpoint rules are edited on Microsoft 365 Defender, they continue to function as before if the resulting query looks at device tables only.
+When Microsoft Defender for Endpoint rules are edited on Microsoft 365 Defender, they continue to function as before if the resulting query looks at device tables only.
-For example, alerts generated by custom detection rules that query only device tables will continue to be delivered to your SIEM and generate email notifications, depending on how youΓÇÖve configured these in Microsoft Defender for Endpoint. Any existing suppression rules in Defender for Endpoint will also continue to apply.
+For example, alerts generated by custom detection rules that query only device tables will continue to be delivered to your SIEM and generate email notifications, depending on how you've configured these in Microsoft Defender for Endpoint. Any existing suppression rules in Defender for Endpoint will also continue to apply.
-Once you edit a Defender for Endpoint rule so that it queries identity and email tables, which are only available in Microsoft 365 Defender, the rule is automatically moved to Microsoft 365 Defender.
+Once you edit a Defender for Endpoint rule so that it queries identity and email tables, which are only available in Microsoft 365 Defender, the rule is automatically moved to Microsoft 365 Defender.
Alerts generated by the migrated rule:
If you edit a rule this way, you will be prompted for confirmation before such c
New alerts generated by custom detection rules in Microsoft 365 Defender are displayed in an alert page that provides the following information: -- Alert title and description
+- Alert title and description
- Impacted assets - Actions taken in response to the alert-- Query results that triggered the alert -- Information on the custom detection rule
-
+- Query results that triggered the alert
+- Information on the custom detection rule
+ > [!div class="mx-imgBorder"] > :::image type="content" source="../../media/new-alert-page.png" alt-text="An example of an alert page that displays new alerts generated by custom detection rules in Microsoft 365 Defender portal" lightbox="../../media/new-alert-page.png"::: ## Write queries without DeviceAlertEvents
-In the Microsoft 365 Defender schema, the `AlertInfo` and `AlertEvidence` tables are provided to accommodate the diverse set of information that accompany alerts from various sources.
+In the Microsoft 365 Defender schema, the `AlertInfo` and `AlertEvidence` tables are provided to accommodate the diverse set of information that accompany alerts from various sources.
-To get the same alert information that you used to get from the `DeviceAlertEvents` table in the Microsoft Defender for Endpoint schema, filter the `AlertInfo` table by `ServiceSource` and then join each unique ID with the `AlertEvidence` table, which provides detailed event and entity information.
+To get the same alert information that you used to get from the `DeviceAlertEvents` table in the Microsoft Defender for Endpoint schema, filter the `AlertInfo` table by `ServiceSource` and then join each unique ID with the `AlertEvidence` table, which provides detailed event and entity information.
See the sample query below:
AlertInfo
| where ServiceSource == "Microsoft Defender for Endpoint" and AttackTechniques has "powershell" | join AlertEvidence on AlertId
-| project Timestamp, Title, AlertId, DeviceName, FileName, ProcessCommandLine
+| project Timestamp, Title, AlertId, DeviceName, FileName, ProcessCommandLine
``` If you'd like to filter for specific entities involved in the alerts, you can do so by specifying the entity type in `EntityType` and the value you would like to filter for. The following example looks for a specific IP address:
If you'd like to filter for specific entities involved in the alerts, you can do
```kusto AlertInfo | where Title == "Insert_your_alert_title"
-| join AlertEvidence on AlertId
-| where EntityType == "Ip" and RemoteIP == "192.88.99.01"
+| join AlertEvidence on AlertId
+| where EntityType == "Ip" and RemoteIP == "192.88.99.01"
``` ## See also+ - [Turn on Microsoft 365 Defender](advanced-hunting-query-language.md) - [Advanced hunting overview](advanced-hunting-overview.md) - [Understand the schema](advanced-hunting-schema-tables.md)
security Advanced Hunting Query Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-results.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance - m365initiative-m365-defender
ms.technology: m365d
[!INCLUDE [Microsoft 365 Defender rebranding](../includes/microsoft-defender.md)] - **Applies to:** - Microsoft 365 Defender - Microsoft Defender for Endpoint
While you can construct your [advanced hunting](advanced-hunting-overview.md) qu
- Tweak your queries directly from the results or apply filters ## View query results as a table or chart+ By default, advanced hunting displays query results as tabular data. You can also display the same data as a chart. Advanced hunting supports the following views: | View type | Description |
By default, advanced hunting displays query results as tabular data. You can als
| **Area chart** | Plots numeric values for a series of unique items and fills the sections below the plotted values | ### Construct queries for effective charts+ When rendering charts, advanced hunting automatically identifies columns of interest and the numeric values to aggregate. To get meaningful charts, construct your queries to return the specific values you want to see visualized. Here are some sample queries and the resulting charts. #### Alerts by severity+ Use the `summarize` operator to obtain a numeric count of the values you want to chart. The query below uses the `summarize` operator to get the number of alerts by severity. ```kusto AlertInfo | summarize Total = count() by Severity ```+ When rendering the results, a column chart displays each severity value as a separate column: :::image type="content" source="../../media/advanced-hunting-column-chart-new.png" alt-text="An example of a chart that displays advanced hunting results in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-column-chart-new.png"::: *Query results for alerts by severity displayed as a column chart* - #### Phishing emails across top ten sender domains
-If you're dealing with a list of values that isnΓÇÖt finite, you can use the `Top` operator to chart only the values with the most instances. For example, to get the top 10 sender domains with the most phishing emails, use the query below:
+
+If you're dealing with a list of values that isn't finite, you can use the `Top` operator to chart only the values with the most instances. For example, to get the top 10 sender domains with the most phishing emails, use the query below:
```kusto EmailEvents
-| where ThreatTypes has "Phish"
-| summarize Count = count() by SenderFromDomain
+| where ThreatTypes has "Phish"
+| summarize Count = count() by SenderFromDomain
| top 10 by Count ```+ Use the pie chart view to effectively show distribution across the top domains: :::image type="content" source="../../media/advanced-hunting-pie-chart-new.png" alt-text="The pie chart that displays advanced hunting results in the Microsoft 365 Defender portal" lightbox="../../media/advanced-hunting-pie-chart-new.png":::
CloudAppEvents
| where FileName == "invoice.doc" | summarize FileCount = count() by bin(Timestamp, 30m) ```
-The line chart below clearly highlights time periods with more activity involving `invoice.doc`:
+
+The line chart below clearly highlights time periods with more activity involving `invoice.doc`:
:::image type="content" source="../../media/line-chart-a.png" alt-text="The line chart that displays advanced hunting results in the Microsoft 365 Defender portal" lightbox="../../media/line-chart-a.png"::: *Line chart showing the number of events involving a file over time* - ## Export tables and charts+ After running a query, select **Export** to save the results to local file. Your chosen view determines how the results are exported: - **Table view**ΓÇöThe query results are exported in tabular form as a Microsoft Excel workbook - **Any chart**ΓÇöThe query results are exported as a JPEG image of the rendered chart ## Drill down from query results+ To quickly inspect a record in your query results, select the corresponding row to open the **Inspect record** panel. The panel provides the following information based on the selected record: - **Assets**ΓÇöSummarized view of the main assets (mailboxes, devices, and users) found in the record, enriched with available information, such as risk and exposure levels-- **All details**ΓÇöAll the values from the columns in the record
+- **All details**ΓÇöAll the values from the columns in the record
:::image type="content" source="../../media/results-inspect-record.png" alt-text="The selected record with panel for inspecting the record in the Microsoft 365 Defender portal" lightbox="../../media/results-inspect-record.png"::: To view more information about a specific entity in your query results, such as a machine, file, user, IP address, or URL, select the entity identifier to open a detailed profile page for that entity. ## Tweak your queries from the results+ Select the three dots to the right of any column in the **Inspect record** panel. You can use the options to: - Explicitly look for the selected value (`==`) - Exclude the selected value from the query (`!=`)-- Get more advanced operators for adding the value to your query, such as `contains`, `starts with`, and `ends with`
+- Get more advanced operators for adding the value to your query, such as `contains`, `starts with`, and `ends with`
:::image type="content" source="../../media/work-with-query-tweak-query.png" alt-text="The Action Type pane on the Inspect record page in the Microsoft 365 Defender portal " lightbox="../../media/work-with-query-tweak-query.png"::: --
->[!NOTE]
->Some tables in this article might not be available at Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
+> [!NOTE]
+> Some tables in this article might not be available at Microsoft Defender for Endpoint. [Turn on Microsoft 365 Defender](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft 365 Defender by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
## Related topics+ - [Advanced hunting overview](advanced-hunting-overview.md) - [Learn the query language](advanced-hunting-query-language.md) - [Use shared queries](advanced-hunting-shared-queries.md)
security Alert Grading Playbook Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-email-forwarding.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance - m365initiative-m365-defender
+search.appverid:
- MOE150 ms.technology: m365d
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-Threat actors can use compromised user accounts for several malicious purposes, including reading emails in a userΓÇÖs inbox, forwarding emails to external recipients, and sending phishing mails, among others. The targeted user might be unaware that their emails are being forwarded. This is a very common tactic that attackers use when user accounts are compromised.
+Threat actors can use compromised user accounts for several malicious purposes, including reading emails in a user's inbox, forwarding emails to external recipients, and sending phishing mails, among others. The targeted user might be unaware that their emails are being forwarded. This is a very common tactic that attackers use when user accounts are compromised.
Emails can be forwarded either manually or automatically using forwarding rules. Automatic forwarding can be implemented in multiple ways like Inbox Rules, Exchange Transport Rule (ETR), and SMTP Forwarding. While manual forwarding requires direct action from users, they might not be aware of all the auto-forwarded emails. In Microsoft 365, an alert is raised when a user auto-forwards an email to a potentially malicious email address.
Email forwarding rules allow users to create a rule to forward email messages se
### Suspicious email forwarding activity
-Attackers might set up email rules to hide incoming emails in the compromised user mailbox to obscure their malicious activities from the user. They might also set rules in the compromised user mailbox to delete emails, move the emails into another less noticeable folder such as an RSS folder, or forward emails to an external account.
+Attackers might set up email rules to hide incoming emails in the compromised user mailbox to obscure their malicious activities from the user. They might also set rules in the compromised user mailbox to delete emails, move the emails into another less noticeable folder such as an RSS folder, or forward emails to an external account.
+
+Some rules might move all the emails to another folder and mark them as "read", while some rules might move only mails which contain specific keywords in the email message or subject. For example, the inbox rule might be set to look for keywords like "invoice", "phish", "do not reply", "suspicious email", or "spam" among others, and move them to an external email account. Attackers might also use the compromised user mailbox to distribute spam, phishing emails, or malware.
-Some rules might move all the emails to another folder and mark them as ΓÇ£readΓÇ¥, while some rules might move only mails which contain specific keywords in the email message or subject. For example, the inbox rule might be set to look for keywords like ΓÇ£invoiceΓÇ¥, ΓÇ£phishΓÇ¥, ΓÇ£do not replyΓÇ¥, ΓÇ£suspicious emailΓÇ¥, or ΓÇ£spamΓÇ¥ among others, and move them to an external email account. Attackers might also use the compromised user mailbox to distribute spam, phishing emails, or malware.
-
Microsoft Defender for Office 365 can detect and alert on suspicious email forwarding rules, allowing you to find and delete hidden rules at the source. For more information, see these blog posts:
For more information, see these blog posts:
- [Business Email Compromise](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/business-email-uncompromised-part-one/ba-p/2159900) - [Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign](https://www.microsoft.com/security/blog/2021/06/14/behind-the-scenes-of-business-email-compromise-using-cross-domain-threat-data-to-disrupt-a-large-bec-infrastructure/) - ## Alert details To review the Suspicious Email Forwarding Activity alert, open the **Alerts** page to see the **Activity list** section. Here's an example.
-
+ :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-activity-list.png" alt-text="List of activities related to the alert" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-activity-list.png"::: Select **Activity** to view the details of that activity in the sidebar. Here's an example.
-
+ :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-activity-details.png" alt-text="Details of the activity" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-activity-details.png"::: The **Reason** field contains the following information related to this alert. - Forwarding Type (FT) is one of the following:-
- - Exchange Transport Rule (ETR): Forwarded using and Exchange Transport Rule
-
- - SMTP: Forwarded using Mailbox Forwarding
-
- - InboxRule: Forwarded using an Inbox Rule
+ - Exchange Transport Rule (ETR): Forwarded using and Exchange Transport Rule
+ - SMTP: Forwarded using Mailbox Forwarding
+ - InboxRule: Forwarded using an Inbox Rule
- Message Trace ID (MTI): This is the identifier (NetworkMessageId) of the forwarded email that triggered this alert. NetworkMessageId is the unique identifier of an email in your organization. - Forwarder (F): The user who forwarded this email.
While investigating this alert, you must determine:
### Is the user account and its mailbox compromised?
-By looking at senderΓÇÖs past behavior and recent activities, you should be able to determine whether the user's account should be considered compromised or not. You can see the details of alerts raised from the userΓÇÖs page in the Microsoft 365 Defender portal.
+By looking at sender's past behavior and recent activities, you should be able to determine whether the user's account should be considered compromised or not. You can see the details of alerts raised from the user's page in the Microsoft 365 Defender portal.
You can also analyze these additional activities for the affected mailbox: - Use Threat Explorer to understand email related threats-
- - Observe how many of the recent email sent by the sender are detected as phish, spam or malware.
-
- - Observe how many of the sent emails contain sensitive information.
+ - Observe how many of the recent email sent by the sender are detected as phish, spam or malware.
+ - Observe how many of the sent emails contain sensitive information.
- Assess risky sign-in behavior in the Microsoft Azure portal.-- Check for any malicious activities on the userΓÇÖs device.
+- Check for any malicious activities on the user's device.
### Are the activities malicious?
-Investigate the email forwarding activity. For instance, check the type of email, recipient of this email, or the manner in which the email is forwarded.
+Investigate the email forwarding activity. For instance, check the type of email, recipient of this email, or the manner in which the email is forwarded.
For more information, see the following articles:
You can investigate an email forwarding alert using Threat Explorer or with adva
Threat Explorer provides an interactive investigation experience for email related threats to determine whether this activity is suspicious or not. You can use the following indicators from the alert information: - SRL/RL: Use the (Suspicious) Recipients List (SRL) to find these details:
-
- :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-recipients-list.png" alt-text="Example of the list of recipients" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-recipients-list.png":::
-
- - Who else has forwarded emails to these recipients?
- - How many emails have been forwarded to these recipients?
+ :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-recipients-list.png" alt-text="Example of the list of recipients" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-recipients-list.png":::
- - How frequently are emails forwarded to these recipients?
-
+ - Who else has forwarded emails to these recipients?
+ - How many emails have been forwarded to these recipients?
+ - How frequently are emails forwarded to these recipients?
- MTI: Use the Message Trace ID/Network Message ID to find these details: :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-network-message-id.png" alt-text="Example of the Network Message ID" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-network-message-id.png":::
- - What additional details are available for this email? For example: subject, return path, and timestamp.
-
- - What is the origin of this email? Are there any similar emails?
-
- - Does this email contain any URLs? Does the URL point to any sensitive data?
-
- - Does the email contain any attachments? Do the attachments contain sensitive information?
-
- - What was the action taken on the email? Was it deleted, marked as read, or moved to another folder?
-
- - Are there any threats associated with this email? Is this email part of any campaign?
+ - What additional details are available for this email? For example: subject, return path, and timestamp.
+ - What is the origin of this email? Are there any similar emails?
+ - Does this email contain any URLs? Does the URL point to any sensitive data?
+ - Does the email contain any attachments? Do the attachments contain sensitive information?
+ - What was the action taken on the email? Was it deleted, marked as read, or moved to another folder?
+ - Are there any threats associated with this email? Is this email part of any campaign?
Based on answers to these questions, you should be able to determine whether an email is malicious or benign.
To use [advanced Hunting](advanced-hunting-overview.md) queries to gather inform
- IdentityLogonEvents - Contains login information for all users.
->[!Note]
->Certain parameters are unique to your organization or network. Fill in these specific parameters as instructed in each query.
->
+> [!NOTE]
+> Certain parameters are unique to your organization or network. Fill in these specific parameters as instructed in each query.
Run this query to find out who else has forwarded emails to these recipients (SRL/RL).
EmailEvents
``` Run this query to find out if the email contains any URLs.
-
+ ```kusto let mti='{MTI}'; //Replace {MTI} with MTI from alert EmailUrlInfo
Run this query to find out if the Forwarder (sender) has created any new rules.
```kusto let sender = "{SENDER}"; //Replace {SENDER} with display name of Forwarder let action_types = pack_array(
- "New-InboxRule",
- "UpdateInboxRules",
- "Set-InboxRule",
- "Set-Mailbox",
+ "New-InboxRule",
+ "UpdateInboxRules",
+ "Set-InboxRule",
+ "Set-Mailbox",
"New-TransportRule", "Set-TransportRule"); CloudAppEvents
CloudAppEvents
Run this query to find out if there were any anomalous login events from this user. For example: unknown IPs, new applications, uncommon countries, multiple LogonFailed events. ```kusto
-let sender = "{SENDER}"; //Replace {SENDER} with email of the Forwarder
+let sender = "{SENDER}"; //Replace {SENDER} with email of the Forwarder
IdentityLogonEvents | where AccountUpn == sender ```
IdentityLogonEvents
You can also find suspicious forwarding rules using the Exchange admin center, based on the rule type (the FT value in the alert). -- ETR
+- ETR
Exchange transport rules are listed in the **Rules** section. Verify that all rules are as expected. - SMTP
- You can see mailbox forwarding rules by selecting the senderΓÇÖs mailbox **\> Manage mail flow settings \> Email forwarding \> Edit**.
+ You can see mailbox forwarding rules by selecting the sender's mailbox **\> Manage mail flow settings \> Email forwarding \> Edit**.
- InboxRule
Along with the evidence discovered so far, you can determine if there are new fo
Once you determine that the activities associated make this alert a True Positive, classify the alert and take these actions for remediation: 1. Disable and delete the inbox forwarding rule.
-2. For the InboxRule forwarding type, reset the userΓÇÖs account credentials.
+2. For the InboxRule forwarding type, reset the user's account credentials.
3. For the SMTP or ETR forwarding type, investigate the activities of the user account that created the alert. - Investigate any other suspicious admin activities.
- - Reset the user accountΓÇÖs credentials.
+ - Reset the user account's credentials.
4. Check for additional activities originated from impacted accounts, IP addresses, and suspicious senders.
security Alert Grading Playbook Inbox Forwarding Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-forwarding-rules.md
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-Threat actors can use compromised user accounts for several malicious purposes including reading emails in a userΓÇÖs inbox, creating inbox rules to forward emails to external accounts, sending phishing mails, among others. Malicious inbox rules are widely common during business email compromise (BEC) and phishing campaigns, and it important to monitor them consistently.
+Threat actors can use compromised user accounts for several malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, sending phishing mails, among others. Malicious inbox rules are widely common during business email compromise (BEC) and phishing campaigns, and it important to monitor them consistently.
-This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a True Positive (TP) or a False Positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
+This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a True Positive (TP) or a False Positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
For an overview of alert grading for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
You configure inbox rules to automatically manage email messages based on predef
### Suspicious inbox forwarding rules
-After gaining access to users' mailboxes, attackers often create an inbox rule that allows them to exfiltrate sensitive data to an external email address and use it for malicious purposes.
+After gaining access to users' mailboxes, attackers often create an inbox rule that allows them to exfiltrate sensitive data to an external email address and use it for malicious purposes.
-Malicious inbox rules automate the exfiltration process. With specific rules, every email in the target userΓÇÖs inbox that matches the rule criteria will be forwarded to the attackerΓÇÖs mailbox. For example, an attacker might want to gather sensitive data related to finance. They create an inbox rule to forward all emails that contain keywords, such as ΓÇÿfinanceΓÇÖ and ΓÇÿinvoiceΓÇÖ in the subject or message body, to their mailbox.
+Malicious inbox rules automate the exfiltration process. With specific rules, every email in the target user's inbox that matches the rule criteria will be forwarded to the attacker's mailbox. For example, an attacker might want to gather sensitive data related to finance. They create an inbox rule to forward all emails that contain keywords, such as 'finance' and 'invoice' in the subject or message body, to their mailbox.
-Suspicious inbox forwarding rules might be very difficult to detect because maintenance of inbox rules is common task done by users. Therefore, itΓÇÖs important to monitor the alerts.
+Suspicious inbox forwarding rules might be very difficult to detect because maintenance of inbox rules is common task done by users. Therefore, it's important to monitor the alerts.
## Workflow Here is the workflow to identify suspicious email forwarding rules.
-
+ :::image type="content" source="../../media/alert-grading-playbook-inbox-forwarding-rules/alert-grading-playbook-inbox-forwarding-rules-workflow.png" alt-text="Alert investigation workflow for inbox forwarding rules" lightbox="../../media/alert-grading-playbook-inbox-forwarding-rules/alert-grading-playbook-inbox-forwarding-rules-workflow.png"::: ## Investigation steps
Here's an example of the details of alert that was triggered by a malicious inbo
:::image type="content" source="../../media/alert-grading-playbook-inbox-forwarding-rules/alert-grading-playbook-inbox-forwarding-rules-alert-description.png" alt-text="Details of alert that was triggered by a malicious inbox forwarding rule" lightbox="../../media/alert-grading-playbook-inbox-forwarding-rules/alert-grading-playbook-inbox-forwarding-rules-alert-description.png":::
-### Investigate rule parameters
+### Investigate rule parameters
The purpose of this stage is to determine if the rules look suspicious by certain criteria: Recipients of the forwarding rule: -- Validate destination email address is not an additional mailbox owned by the same user (avoiding cases where the user is self-forwarding emails between personal mailboxes).
+- Validate destination email address is not an additional mailbox owned by the same user (avoiding cases where the user is self-forwarding emails between personal mailboxes).
- Validate the destination email address is not an internal address or sub-domain that belong to the company. Filters:
-
-- If the inbox rule contains filters which search for specific keywords in the subject or body of the email, check whether the provided keywords, such as finance, credentials, and networking, among others, seem related to malicious activity. You can find these filters under the following attributes (which shows up in the event RawEventData column): ΓÇ£BodyContainsWordsΓÇ¥, ΓÇ£SubjectContainsWordsΓÇ¥ or ΓÇ£SubjectOrBodyContainsWordsΓÇ¥-- If the attacker chooses not to set any filter to the mails, and instead the inbox rule forwards all the mailbox items to the attackerΓÇÖs mailbox), then this behavior is suspicious as well. +
+- If the inbox rule contains filters which search for specific keywords in the subject or body of the email, check whether the provided keywords, such as finance, credentials, and networking, among others, seem related to malicious activity. You can find these filters under the following attributes (which shows up in the event RawEventData column): "BodyContainsWords", "SubjectContainsWords" or "SubjectOrBodyContainsWords"
+- If the attacker chooses not to set any filter to the mails, and instead the inbox rule forwards all the mailbox items to the attacker's mailbox), then this behavior is suspicious as well.
### Investigate IP address Review the attributes that related to the IP address that performed the relevant event of rule creation:
-1. Search for other suspicious cloud activities that originated from the same IP in the tenant. For instance, suspicious activity might be multiple failed logins attempts.
+1. Search for other suspicious cloud activities that originated from the same IP in the tenant. For instance, suspicious activity might be multiple failed logins attempts.
2. Is the ISP common and reasonable for this user? 3. Is the location common and reasonable for this user? ### Investigate any suspicious activity with the user inbox before creating rules
-You can review all user activities before creating rules, check for indicators of compromise, and investigate user actions that seem suspicious. For instance, multiple failed sign ins.
--- Sign ins: -
- Validate that the sign in activity prior to the rule creation event is not suspicious (such as the common location, ISP, or user-agent).
+You can review all user activities before creating rules, check for indicators of compromise, and investigate user actions that seem suspicious. For instance, multiple failed sign ins.
-- Other alerts or incidents
+- Sign ins:
- - Did other alerts trigger for the user prior to the rule creation. If so, then this might indicate that the user got compromised.
+ Validate that the sign in activity prior to the rule creation event is not suspicious (such as the common location, ISP, or user-agent).
- - If the alert correlates with other alerts to indicate an incident, then does the incident contain other true positive alerts?
+- Other alerts or incidents
+ - Did other alerts trigger for the user prior to the rule creation. If so, then this might indicate that the user got compromised.
+ - If the alert correlates with other alerts to indicate an incident, then does the incident contain other true positive alerts?
## Advanced hunting queries
-[Advanced Hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
+[Advanced Hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
-Run this query to find all the new inbox rule events during a specific time window.
+Run this query to find all the new inbox rule events during a specific time window.
```kusto
-let start_date = now(-10h);
+let start_date = now(-10h);
let end_date = now(); let user_id = ""; // enter here the user id CloudAppEvents
CloudAppEvents
Run this query to check whether the ISP is common for the user by looking at the history of the user. ```kusto
-let alert_date = now(); //enter alert date
-let timeback = 30d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by ISP
+let alert_date = now(); //enter alert date
+let timeback = 30d;
+let userid = ""; //enter here user id
+CloudAppEvents
+| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
+| where AccountObjectId == userid
+| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by ISP
``` Run this query to check whether the country is common for the user by looking at the history of the user. ```kusto
-let alert_date = now(); //enter alert date
-let timeback = 30d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
+let alert_date = now(); //enter alert date
+let timeback = 30d;
+let userid = ""; //enter here user id
+CloudAppEvents
+| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
+| where AccountObjectId == userid
| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by CountryCode ``` Run this query to check whether the user-agent is common for the user by looking at the history of the user. ```kusto
-let alert_date = now(); //enter alert date
-let timeback = 30d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
+let alert_date = now(); //enter alert date
+let timeback = 30d;
+let userid = ""; //enter here user id
+CloudAppEvents
+| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
+| where AccountObjectId == userid
| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by UserAgent ``` Run this query to check if other users created forward rule to the same destination (could indicate that other users are compromised as well). ```kusto
-let start_date = now(-10h);
+let start_date = now(-10h);
let end_date = now(); let dest_email = ""; // enter here destination email as seen in the alert CloudAppEvents
CloudAppEvents
## Recommended actions
-1. Disable the malicious inbox rule.
-2. Reset the userΓÇÖs account credentials. You can also verify if the user account has been compromised with Microsoft Defender for Cloud Apps, which gets security signals from Azure Active Directory (Azure AD) Identity Protection.
+1. Disable the malicious inbox rule.
+2. Reset the user's account credentials. You can also verify if the user account has been compromised with Microsoft Defender for Cloud Apps, which gets security signals from Azure Active Directory (Azure AD) Identity Protection.
3. Search for other malicious activities performed by the impacted user. 4. Check for other suspicious activity in the tenant originated from the same IP or from the same ISP (if the ISP is uncommon) to find other compromised users.
security Alert Grading Playbook Inbox Manipulation Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-manipulation-rules.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance - m365initiative-m365-defender
+search.appverid:
- MOE150 ms.technology: m365d
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-Threat actors can use compromised user accounts for many malicious purposes including reading emails in a userΓÇÖs inbox, creating inbox rules to forward emails to external accounts, deleting traces, and sending phishing mails. Malicious inbox rules are common during business email compromise (BEC) and phishing campaigns and it is important to monitor for them consistently.
+Threat actors can use compromised user accounts for many malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, deleting traces, and sending phishing mails. Malicious inbox rules are common during business email compromise (BEC) and phishing campaigns and it is important to monitor for them consistently.
-This playbook helps you investigate any incident related to suspicious inbox manipulation rules configured by attackers and take recommended actions to remediate the attack and protect your network. This playbook is for security teams, including security operations center (SOC) analysts and IT administrators who review, investigate, and grade the alerts. You can quickly grade alerts as either a True Positive (TP) or a False Positive (TP) and take recommended actions for the TP alerts to remediate the attack.
+This playbook helps you investigate any incident related to suspicious inbox manipulation rules configured by attackers and take recommended actions to remediate the attack and protect your network. This playbook is for security teams, including security operations center (SOC) analysts and IT administrators who review, investigate, and grade the alerts. You can quickly grade alerts as either a True Positive (TP) or a False Positive (TP) and take recommended actions for the TP alerts to remediate the attack.
The results of using this playbook are:
Inbox rules are set to automatically manage email messages based on predefined c
### Malicious inbox manipulation rules
-Attackers might set up email rules to hide incoming emails in the compromised user mailbox to obscure their malicious activities from the user. They might also set rules in the compromised user mailbox to delete emails, move the emails into another less noticeable folder (like RSS), or forward mails to an external account. Some rules might move all the emails to another folder and mark them as ΓÇ£readΓÇ¥, while some rules might move only mails which contain specific keywords in the email message or subject.
+Attackers might set up email rules to hide incoming emails in the compromised user mailbox to obscure their malicious activities from the user. They might also set rules in the compromised user mailbox to delete emails, move the emails into another less noticeable folder (like RSS), or forward mails to an external account. Some rules might move all the emails to another folder and mark them as "read", while some rules might move only mails which contain specific keywords in the email message or subject.
-For example, the inbox rule might be set to look for keywords like ΓÇ£invoiceΓÇ¥, ΓÇ£phishΓÇ¥, ΓÇ£do not replyΓÇ¥, ΓÇ£suspicious emailΓÇ¥, or ΓÇ£spamΓÇ¥ among others, and move them to an external email account. Attackers might also use the compromised user mailbox to distribute spam, phishing emails, or malware.
+For example, the inbox rule might be set to look for keywords like "invoice", "phish", "do not reply", "suspicious email", or "spam" among others, and move them to an external email account. Attackers might also use the compromised user mailbox to distribute spam, phishing emails, or malware.
## Workflow
Here is the workflow to identify suspicious inbox manipulation rule activities.
:::image type="content" source="../../media/alert-grading-playbook-inbox-manipulation-rules/alert-grading-playbook-inbox-manipulation-rules-workflow.png" alt-text="Alert investigation workflow for inbox manipulation rules" lightbox="../../media/alert-grading-playbook-inbox-manipulation-rules/alert-grading-playbook-inbox-manipulation-rules-workflow.png"::: - ## Investigation steps This section contains detailed step-by-step guidance to respond to the incident and take the recommended steps to protect your organization from further attacks.
Here's an example of the details of an alert that was triggered by a malicious i
:::image type="content" source="../../media/alert-grading-playbook-inbox-manipulation-rules/alert-grading-playbook-inbox-manipulation-rules-alert-description.png" alt-text="Details of alert that was triggered by a malicious inbox manipulation rule" lightbox="../../media/alert-grading-playbook-inbox-manipulation-rules/alert-grading-playbook-inbox-manipulation-rules-alert-description.png"::: -
-### 2. Investigate inbox manipulation rule parameters
+### 2. Investigate inbox manipulation rule parameters
Determine if the rules look suspicious according to the following rule parameters or criteria: - Keywords
- The attacker might apply the manipulation rule only to emails that contains certain words. You can find these keywords under certain attributes such as: ΓÇ£BodyContainsWordsΓÇ¥, ΓÇ£SubjectContainsWordsΓÇ¥ or ΓÇ£SubjectOrBodyContainsWordsΓÇ¥.
+ The attacker might apply the manipulation rule only to emails that contains certain words. You can find these keywords under certain attributes such as: "BodyContainsWords", "SubjectContainsWords" or "SubjectOrBodyContainsWords".
- If there are filtering by keywords, then check whether the keywords seem suspicious to you (common scenarios are to filter emails related to the attacker activities, such as ΓÇ£phishΓÇ¥, ΓÇ£spamΓÇ¥, ΓÇ£do not replyΓÇ¥, among others).
+ If there are filtering by keywords, then check whether the keywords seem suspicious to you (common scenarios are to filter emails related to the attacker activities, such as "phish", "spam", "do not reply", among others).
If there is no filter at all, it might be suspicious as well. - Destination folder
- To evade security detection, the attacker might move the emails to a less noticeable folder and mark the emails as read (for example, ΓÇ£RSSΓÇ¥ folder). If the attacker applies ΓÇ£MoveToFolderΓÇ£ and ΓÇ£MarkAsReadΓÇ¥ action, check whether the destination folder is somehow related to the keywords in the rule to decide if it seems suspicious or not.
+ To evade security detection, the attacker might move the emails to a less noticeable folder and mark the emails as read (for example, "RSS" folder). If the attacker applies "MoveToFolder" and "MarkAsRead" action, check whether the destination folder is somehow related to the keywords in the rule to decide if it seems suspicious or not.
- Delete all
- Some attackers will just delete all the incoming emails to hide their activity. Mostly, a rule of ΓÇ£delete all incoming emailsΓÇ¥ without filtering them with keywords is an indicator of malicious activity.
-
-Here's an example of a ΓÇ£delete all incoming emailsΓÇ¥ rule configuration (as seen on RawEventData.Parameters) of the relevant event log.
+ Some attackers will just delete all the incoming emails to hide their activity. Mostly, a rule of "delete all incoming emails" without filtering them with keywords is an indicator of malicious activity.
+Here's an example of a "delete all incoming emails" rule configuration (as seen on RawEventData.Parameters) of the relevant event log.
### 3. Investigate the IP address Review the attributes of the IP address that performed the relevant event of rule creation: -- Search for other suspicious cloud activities that originated from the same IP in the tenant. For instance, suspicious activity might be multiple failed login attempts.
+- Search for other suspicious cloud activities that originated from the same IP in the tenant. For instance, suspicious activity might be multiple failed login attempts.
- Is the ISP common and reasonable for this user? - Is the location common and reasonable for this user? ### 4. Investigate suspicious activity by the user prior to creating the rules
-You can review all user activities before rules were created, check for indicators of compromise, and investigate user actions that seem suspicious.
+You can review all user activities before rules were created, check for indicators of compromise, and investigate user actions that seem suspicious.
-For instance, for multiple failed logins, examine:
+For instance, for multiple failed logins, examine:
-- Login activity
+- Login activity
- Validate that the login activity prior to the rule creation is not suspicious. (common location / ISP / user-agent).
+ Validate that the login activity prior to the rule creation is not suspicious. (common location / ISP / user-agent).
- Alerts
For instance, for multiple failed logins, examine:
## Advanced hunting queries
-[Advanced Hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network to locate threat indicators.
+[Advanced Hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network to locate threat indicators.
-Use this query to find all the new inbox rule events during specific time window.
+Use this query to find all the new inbox rule events during specific time window.
```kusto
-let start_date = now(-10h);
+let start_date = now(-10h);
let end_date = now(); let user_id = ""; // enter here the user id CloudAppEvents
The *RuleConfig* column will provide the new inbox rule configuration.
Use this query to check whether the ISP is common for the user by looking at the history of the user. ```kusto
-let alert_date = now(); //enter alert date
-let timeback = 60d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by ISP
+let alert_date = now(); //enter alert date
+let timeback = 60d;
+let userid = ""; //enter here user id
+CloudAppEvents
+| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
+| where AccountObjectId == userid
+| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by ISP
``` Use this query to check whether the country is common for the user by looking at the history of the user. ```kusto
-let alert_date = now(); //enter alert date
-let timeback = 60d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
+let alert_date = now(); //enter alert date
+let timeback = 60d;
+let userid = ""; //enter here user id
+CloudAppEvents
+| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
+| where AccountObjectId == userid
| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by CountryCode ``` Use this query to check whether the user agent is common for the user by looking at the history of the user. ```kusto
-let alert_date = now(); //enter alert date
-let timeback = 60d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
+let alert_date = now(); //enter alert date
+let timeback = 60d;
+let userid = ""; //enter here user id
+CloudAppEvents
+| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
+| where AccountObjectId == userid
| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by UserAgent ```
security Api Partner Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-partner-access.md
This article explains how to:
Microsoft 365 Defender exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate work flows and innovate based on Microsoft 365 Defender capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-In general, youΓÇÖll need to take the following steps to use the APIs:
+In general, you'll need to take the following steps to use the APIs:
- Create a **multi-tenant** Azure AD application. - Get authorized (consent) by your user administrator for your application to access Microsoft 365 Defender resources it needs.
In the following image, you can see a decoded token acquired from an app, with `
:::image type="content" source="../../media/webapp-decoded-token.png" alt-text="The Decoded Token pane in the Microsoft 365 Defender portal" lightbox="../../media/webapp-decoded-token.png"::: - ## Use the token to access the Microsoft 365 Defender API 1. Choose the API you want to use (incidents, or advanced hunting). For more information, see [Supported Microsoft 365 Defender APIs](api-supported.md).
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-microsoft-threat-experts.md
Watch this video for a quick overview of the Microsoft Services Hub.
- We saw a new type of alert for a living-off-the-land binary. We can provide the alert ID. Can you tell us more about this alert and how we can investigate it further? - We've observed two similar attacks, which both try to execute malicious PowerShell scripts but generate different alerts. One is "Suspicious PowerShell command line" and the other is "A malicious file was detected based on indication provided by O365". What is the difference?-- We received an odd alert today about an abnormal number of failed logins from a high profile userΓÇÖs device. We can't find any further evidence for these attempts. How can Microsoft 365 Defender see these attempts? What type of logins are being monitored?
+- We received an odd alert today about an abnormal number of failed logins from a high profile user's device. We can't find any further evidence for these attempts. How can Microsoft 365 Defender see these attempts? What type of logins are being monitored?
- Can you give more context or insight about the alert, "Suspicious behavior by a system utility was observed"? - I observed an alert titled "Creation of forwarding/redirect rule". I believe the activity is benign. Can you tell me why I received an alert?
Watch this video for a quick overview of the Microsoft Services Hub.
- We recently saw a blog post about a threat that is targeting our industry. Can you help us understand what protection Microsoft 365 Defender provides against this threat actor? - We recently observed a phishing campaign conducted against our organization. Can you tell us if this was targeted specifically to our company or vertical?
-### Microsoft Threat ExpertsΓÇÖ alert communications
+### Microsoft Threat Experts' alert communications
- Can your incident response team help us address the targeted attack notification that we got?-- We received this targeted attack notification from Microsoft Threat Experts. We donΓÇÖt have our own incident response team. What can we do now, and how can we contain the incident?
+- We received this targeted attack notification from Microsoft Threat Experts. We don't have our own incident response team. What can we do now, and how can we contain the incident?
- We received a targeted attack notification from Microsoft Threat Experts. What data can you provide to us that we can pass on to our incident response team? > [!NOTE]
-> Microsoft Threat Experts is a managed threat hunting service and not an incident response service. However, you can engage with your own incident response team to address issues that require an incident response. If you donΓÇÖt have your own incident response team and would like MicrosoftΓÇÖs help, you can engage with the CSS Cybersecurity Incident Response Team (CIRT). They can open a ticket to help address your inquiry.
+> Microsoft Threat Experts is a managed threat hunting service and not an incident response service. However, you can engage with your own incident response team to address issues that require an incident response. If you don't have your own incident response team and would like Microsoft's help, you can engage with the CSS Cybersecurity Incident Response Team (CIRT). They can open a ticket to help address your inquiry.
## Scenario
security Deploy Supported Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-supported-services.md
ms.technology: m365d
[Microsoft 365 Defender](microsoft-365-defender.md) integrates various Microsoft security services to provide centralized detection, prevention, and investigation capabilities against sophisticated attacks. This article describes the supported services, their licensing requirements, the advantages and limitations associated with deploying one or more services, and links to how you can fully deploy them individually. ## Supported services+ A Microsoft 365 E5, E5 Security, A5, or A5 Security license or a valid combination of licenses provides access to the following supported services and entitles you to use Microsoft 365 Defender. [See licensing requirements](prerequisites.md#licensing-requirements) | Supported service | Description |
A Microsoft 365 E5, E5 Security, A5, or A5 Security license or a valid combinati
| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and third-party cloud services | ## Deployed services and functionality+ Microsoft 365 Defender provides better visibility, correlation, and remediation as you deploy more supported services. ### Benefits of full deployment+ To get the complete benefits of Microsoft 365 Defender, we recommend deploying all supported services. Here are some of the key benefits of full deployment:+ - Incidents are identified and correlated based on alerts and event signals from all available sensors and service-specific analysis capabilities - Automated investigation and remediation (AIR) playbooks apply across various entity types, including devices, mailboxes, and user accounts - A more comprehensive advanced hunting schema can be queried for event and entity data from devices, mailboxes, and other entities ### Limited deployment scenarios
-Each supported service that you deploy provides an extremely rich set of raw signals as well as correlated information. While limited deployment doesnΓÇÖt cause Microsoft 365 Defender functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that can be managed by the services youΓÇÖve deployed.
+
+Each supported service that you deploy provides an extremely rich set of raw signals as well as correlated information. While limited deployment doesn't cause Microsoft 365 Defender functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that can be managed by the services you've deployed.
The table below lists how each supported service provides additional data, opportunities to obtain additional insight by correlating the data, and better remediation and response capabilities. | Service | Data (signals & correlated info) | Remediation & response scope | | | | |
-| Microsoft Defender for Endpoint | - Endpoint states and raw events<br />- Endpoint detections and alerts, including antivirus, EDR, attack surface reduction<br />- Info on files and other entities observed on endpoints | Endpoints |
-|Microsoft Defender for Office 365 | - Mail and mailbox states and raw events<br />- Email, attachment, and link detections | - Mailboxes<br />- Microsoft 365 accounts |
-| Microsoft Defender for Identity | - Active Directory signals, including authentication events<br />- Identity-related behavioral detections | Identities |
-| Microsoft Defender for Cloud Apps | - Detection of unsanctioned cloud apps and services (shadow IT)<br />- Exposure of data to cloud apps<br />- Threat activity associated with cloud apps | Cloud apps |
+| Microsoft Defender for Endpoint |<ul><li>Endpoint states and raw events</li><li>Endpoint detections and alerts, including antivirus, EDR, attack surface reduction</li><li>Info on files and other entities observed on endpoints</li></ul> | Endpoints |
+|Microsoft Defender for Office 365 |<ul><li>Mail and mailbox states and raw events</li><li>Email, attachment, and link detections</li></ul> | <ul><li>Mailboxes</li><li>Microsoft 365 accounts</li></ul> |
+| Microsoft Defender for Identity |<ul><li>Active Directory signals, including authentication events</li><li>Identity-related behavioral detections</li></ul> | Identities |
+| Microsoft Defender for Cloud Apps |<ul><li>Detection of unsanctioned cloud apps and services (shadow IT)</li><li>Exposure of data to cloud apps</li><li>Threat activity associated with cloud apps</li></ul> | Cloud apps |
## Deploy the services+ Deploying each service typically requires provisioning to your tenant and some initial configuration. See the following table to understand how each of these services are deployed. | Service | Provisioning instructions | Initial configuration |
Deploying each service typically requires provisioning to your tenant and some i
| Microsoft Defender for Identity | [Quickstart: Create your Microsoft Defender for Identity instance](/azure-advanced-threat-protection/install-atp-step1) | *See provisioning instructions* | | Microsoft Defender for Cloud Apps | *None* | [Quickstart: Get started with Microsoft Defender for Cloud Apps](/cloud-app-security/getting-started-with-cloud-app-security) |
-Once youΓÇÖve deployed the supported services, [turn on Microsoft 365 Defender](m365d-enable.md).
+Once you've deployed the supported services, [turn on Microsoft 365 Defender](m365d-enable.md).
## Related topics
security First Incident Analyze https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-analyze.md
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-As you spend some time establishing, implementing, and maintaining security measures according to the organizationΓÇÖs standards, you can set up security solutions to help you quickly identify security risks and threats. Microsoft 365 Defender allows you to detect, triage, and investigate incidents through its single-pane-of-glass experience where you can find the information you need to make timely decisions.
+As you spend some time establishing, implementing, and maintaining security measures according to the organization's standards, you can set up security solutions to help you quickly identify security risks and threats. Microsoft 365 Defender allows you to detect, triage, and investigate incidents through its single-pane-of-glass experience where you can find the information you need to make timely decisions.
Once a security incident is detected, Microsoft 365 Defender presents details you will need to triage or prioritize an incident or incidents over others. After determining prioritization, analysts can then focus their energy on investigating cases assigned to them.
In Microsoft 365 Defender, [incidents](incidents-overview.md) are identified by
## Triage your incidents
-Incident response in Microsoft 365 Defender starts once you triage the list of incidents using your organizationΓÇÖs recommended method of prioritization. To triage means to assign a level of importance or urgency to incidents, which then determines the order in which they will be investigated.
+Incident response in Microsoft 365 Defender starts once you triage the list of incidents using your organization's recommended method of prioritization. To triage means to assign a level of importance or urgency to incidents, which then determines the order in which they will be investigated.
A useful sample guide for determining which incident to prioritize in Microsoft 365 Defender can be summarized by the formula: *Severity + Impact = Priority*.
One approach to triage is described below:
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-incident-flyout.png" alt-text="The Incidents page showing example of an incident side pane in the Microsoft 365 security portal" lightbox="../../media/first-incident-analyze/first-incident-analyze-incident-flyout.png":::
- For example, by looking at which [MITRE ATT&CK](https://attack.mitre.org/) tactics the attacker used based on the incidentΓÇÖs categories, you might prioritize this incident because the attacker used stolen credentials, established command and control, performed lateral movement, and exfiltrated some data. These actions suggest that the attacker has already gone deep into the network and possibly stolen confidential information.
+ For example, by looking at which [MITRE ATT&CK](https://attack.mitre.org/) tactics the attacker used based on the incident's categories, you might prioritize this incident because the attacker used stolen credentials, established command and control, performed lateral movement, and exfiltrated some data. These actions suggest that the attacker has already gone deep into the network and possibly stolen confidential information.
Additionally, if your organization has implemented the Zero Trust framework, you would consider credential access as an important security violation worth prioritizing.
Here's an example:
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-link-to-mcas.png" alt-text="A corresponding page in the Microsoft Defender for Cloud Apps" lightbox="../../media/first-incident-analyze/first-incident-analyze-link-to-mcas.png":::
-3. To investigate our example further, scrolling to the bottom of the page to view the **Users affected**. To see the activity and context surrounding the malware detection, select Annette HillΓÇÖs user page.
+3. To investigate our example further, scrolling to the bottom of the page to view the **Users affected**. To see the activity and context surrounding the malware detection, select Annette Hill's user page.
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-user-page.png" alt-text="A user page" lightbox="../../media/first-incident-analyze/first-incident-analyze-user-page.png":::
Here's an example:
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-user-event-list.png" alt-text="The chronological list of events for a user" lightbox="../../media/first-incident-analyze/first-incident-analyze-user-event-list.png":::
-5. Each alert can be selected to obtain more information on the activity. For example, selecting **Activity from a Tor IP Address** alert leads you to that alertΓÇÖs own page. Annette is an Administrator of Office 365, which indicates elevated privileges and that the source incident might have led to access to confidential information.
+5. Each alert can be selected to obtain more information on the activity. For example, selecting **Activity from a Tor IP Address** alert leads you to that alert's own page. Annette is an Administrator of Office 365, which indicates elevated privileges and that the source incident might have led to access to confidential information.
:::image type="content" source="../../media/first-incident-analyze/first-incident-analyze-mcas-alert.png" alt-text="The alerts details for the Microsoft Defender for Cloud Apps" lightbox="../../media/first-incident-analyze/first-incident-analyze-mcas-alert.png" :::
security First Incident Post https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-post.md
By mapping alerts to this industry framework, you can:
- Identify skill gaps in attack method awareness. - Create a Power Automate Playbook for faster remediation.
-Post-incident review activity can also result in fine-tuning your security configuration and security team's processes to streamline your organizationΓÇÖs response capabilities.
+Post-incident review activity can also result in fine-tuning your security configuration and security team's processes to streamline your organization's response capabilities.
## Next step
security First Incident Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-prepare.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance - m365initiative-m365-defender
+search.appverid:
- MOE150 - MET150 ms.technology: m365d
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-Preparing for incident handling involves setting up sufficient protection of an organization's network from different kinds of security incidents. To reduce the risk of security incidents, National Institute of Standards and Technology (NIST) recommends several security practices including risk assessments, hardening host security, configuring networks securely, and preventing malware.
+Preparing for incident handling involves setting up sufficient protection of an organization's network from different kinds of security incidents. To reduce the risk of security incidents, National Institute of Standards and Technology (NIST) recommends several security practices including risk assessments, hardening host security, configuring networks securely, and preventing malware.
-Microsoft 365 Defender can help address several aspects of incident prevention:
+Microsoft 365 Defender can help address several aspects of incident prevention:
- Implementing a [Zero Trust](/security/zero-trust/) framework - Determining your security posture by assigning a score with [Microsoft Secure Score](microsoft-secure-score.md)
Microsoft 365 Defender can help address several aspects of incident prevention:
## Step 1. Implement Zero Trust
-[Zero Trust](/security/zero-trust/) is an integrated security philosophy and end-to-end strategy that considers the complex nature of any modern environment, including the mobile workforce and the users, devices, applications and data, wherever they may be located. By providing a single pane of glass to manage all detections in a consistent way, Microsoft 365 Defender can make it easier for your security operations team to implement the [guiding principles](/security/zero-trust/#guiding-principles-of-zero-trust) of Zero Trust.
+[Zero Trust](/security/zero-trust/) is an integrated security philosophy and end-to-end strategy that considers the complex nature of any modern environment, including the mobile workforce and the users, devices, applications and data, wherever they may be located. By providing a single pane of glass to manage all detections in a consistent way, Microsoft 365 Defender can make it easier for your security operations team to implement the [guiding principles](/security/zero-trust/#guiding-principles-of-zero-trust) of Zero Trust.
-Components of Microsoft 365 Defender can display violations of rules that have been implemented to establish Conditional Access policies for Zero Trust by integrating data from Microsoft Defender for Endpoint or other mobile security vendors as an information source for device compliance policies and implementation of device-based Conditional Access policies.
+Components of Microsoft 365 Defender can display violations of rules that have been implemented to establish Conditional Access policies for Zero Trust by integrating data from Microsoft Defender for Endpoint or other mobile security vendors as an information source for device compliance policies and implementation of device-based Conditional Access policies.
Device risk directly influences what resources will be accessible by the user of that device. The denial of access to resources based on certain criteria is the main theme of Zero Trust and Microsoft 365 Defender provides information needed to determine the trust level criteria. For example, Microsoft 365 Defender can provide the software version level of a device through the Threat and Vulnerability Management page while Conditional Access policies restrict devices that have outdated or vulnerable versions. Automation is a crucial part of implementing and maintaining a Zero Trust environment while also reducing the number of alerts that would potentially lead to incident response (IR) events. Components of Microsoft 365 Defender can be automated such as [remediation actions](m365d-autoir.md) (known as investigations for an incident in the Microsoft 365 Defender portal), notification actions, and even the creation of support tickets such as in [ServiceNow](https://microsoft.service-now.com/sp/).
-## Step 2. Determine your organizationΓÇÖs security posture
+## Step 2. Determine your organization's security posture
-Next, organizations can use the [Microsoft Secure Score](microsoft-secure-score.md) in Microsoft 365 Defender to determine your current security posture and consider recommendations on how to improve it. The higher the score is, the more security recommendations and improvement actions have been taken by the organization. Secure Score recommendations can be taken across different products and allow organizations to raise their scores even higher.
+Next, organizations can use the [Microsoft Secure Score](microsoft-secure-score.md) in Microsoft 365 Defender to determine your current security posture and consider recommendations on how to improve it. The higher the score is, the more security recommendations and improvement actions have been taken by the organization. Secure Score recommendations can be taken across different products and allow organizations to raise their scores even higher.
:::image type="content" source="../../media/first-incident-prepare/first-incident-secure-score.png" alt-text="The Microsoft Secure Score page in the Microsoft 365 Defender portal" lightbox="../../media/first-incident-prepare/first-incident-secure-score.png":::
-
-## Step 3. Assess your organizationΓÇÖs vulnerability exposure
+
+## Step 3. Assess your organization's vulnerability exposure
Preventing incidents can help streamline security operations efforts to focus on on-going critical and important security incidents. Software vulnerabilities are often a preventable entry point for attacks that can lead to data theft, data loss, or disruption of business operations. If no attacks are on-going, security operations must strive to achieve and maintain an acceptable level of [vulnerability exposure](../defender-endpoint/tvm-exposure-score.md) in their organization. To check your software patching progress, visit the [Threat and Vulnerability Management](../defender-endpoint/next-gen-threat-and-vuln-mgt.md) page in Defender for Endpoint, which you can access from Microsoft 365 Defender through the **More resources** tab.
-
+ ## 4. Understand emerging threats Use [threat analytics](threat-analytics.md) in the Microsoft 365 Defender portal to keep up-to-date with the current security threat landscape. Expert Microsoft security researchers create reports that describe the latest cyber-threats in detail so you can understand how they might affect your Microsoft 365 subscription, devices, and users. These reports can include:
security Incidents Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incidents-overview.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance - m365initiative-m365-defender
+search.appverid:
- MOE150 - MET150 ms.technology: m365d
ms.technology: m365d
> Want to experience Microsoft 365 Defender? You can [evaluate it in a lab environment](m365d-evaluation.md?ocid=cx-docs-MTPtriallab) or [run your pilot project in production](m365d-pilot.md?ocid=cx-evalpilot). >
-An incident in Microsoft 365 Defender is a collection of correlated alerts and associated data that make up the story of an attack.
+An incident in Microsoft 365 Defender is a collection of correlated alerts and associated data that make up the story of an attack.
-Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. However, attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple entities in your tenant.
+Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. However, attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple entities in your tenant.
Because piecing the individual alerts together to gain insight into an attack can be challenging and time-consuming, Microsoft 365 Defender automatically aggregates the alerts and their associated information into an incident.
Grouping related alerts into an incident gives you a comprehensive view of an at
- Where the attack started. - What tactics were used. - How far the attack has gone into your tenant.-- The scope of the attack, such as how many devices, users, and mailboxes were impacted.
+- The scope of the attack, such as how many devices, users, and mailboxes were impacted.
- All of the data associated with the attack.
-If [enabled](m365d-enable.md), Microsoft 365 Defender can [automatically investigate and resolve](m365d-autoir.md) alerts through automation and artificial intelligence. You can also perform additional remediation steps to resolve the attack.
+If [enabled](m365d-enable.md), Microsoft 365 Defender can [automatically investigate and resolve](m365d-autoir.md) alerts through automation and artificial intelligence. You can also perform additional remediation steps to resolve the attack.
## Incidents and alerts in the Microsoft 365 Defender portal
You manage incidents from **Incidents & alerts > Incidents** on the quick launch
:::image type="content" source="../../media/incidents-queue/incidents-ss-incidents.png" alt-text="The Incidents page in the Microsoft 365 Defender portal." lightbox="../../media/incidents-queue/incidents-ss-incidents.png":::
-Selecting an incident name displays a summary of the incident and provides access to tabs with additional information. HereΓÇÖs an example.
+Selecting an incident name displays a summary of the incident and provides access to tabs with additional information. Here's an example.
The additional tabs for an incident are: -- Alerts
+- Alerts
All the alerts related to the incident and their information.
On an ongoing basis, identify the highest priority incidents for analysis and re
Consider these steps for your own incident response workflow: 1. For each incident, begin an [attack and alert investigation and analysis](investigate-incidents.md):
-
+ 1. View the summary of the incident to understand its scope and severity and what entities are affected with the **Summary** and **Graph** (Preview) tabs. 1. Begin analyzing the alerts to understand their origin, scope, and severity with the **Alerts** tab.
Consider these steps for your own incident response workflow:
1. As needed, gather information on impacted devices, users, and mailboxes with the **Devices**, **Users**, and **Mailboxes** tabs. 1. See how Microsoft 365 Defender has [automatically resolved some alerts](m365d-autoir.md) with the **Investigations** tab.
-
+ 1. As needed, use information in the data set for the incident for more information with the **Evidence and Response** tab. 2. After or during your analysis, perform containment to reduce any additional impact of the attack and eradication of the security threat.
Monthly tasks can include:
Quarterly tasks can include a report and briefing of security results to the Chief Information Security Officer (CISO).
-Annual tasks can include conducting a major incident or breach exercise to test your staff, systems, and processes.
+Annual tasks can include conducting a major incident or breach exercise to test your staff, systems, and processes.
Daily, monthly, quarterly, and annual tasks can be used to update or refine processes, policies, and security configurations.
-See [ Integrating Microsoft 365 Defender into your security operations](integrate-microsoft-365-defender-secops.md) for more details.
+See [Integrating Microsoft 365 Defender into your security operations](integrate-microsoft-365-defender-secops.md) for more details.
### SecOps resources across Microsoft products
For more information about SecOps across Microsoft's products, see these resourc
- [Best practices](/security/compass/security-operations) - [Videos and slides](/security/compass/security-operations-videos-and-decks) - ## Get incident notifications by email You can set up Microsoft 365 Defender to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
You can set up Microsoft 365 Defender to notify your staff with an email about n
The email notification contains important details about the incident like the incident name, severity, and categories, among others. You can also go directly to the incident and start your analysis right away. For more information, see [Investigate incidents](investigate-incidents.md).
-You can add or remove recipients in the email notifications. New recipients get notified about incidents after they're added.
+You can add or remove recipients in the email notifications. New recipients get notified about incidents after they're added.
->[!NOTE]
->You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. <br> <br>
+> [!NOTE]
+> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. <br> <br>
Likewise, if your organization is using role-based access control (RBAC), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage. ### Create a rule for email notifications
Follow these steps to create a new rule and customize email notification setting
:::image type="content" source="../../media/get-incident-notifications/incidents-ss-email-notification-settings.png" alt-text="The Notification settings page for incident email notifications in the Microsoft 365 Defender portal." lightbox="../../media/get-incident-notifications/incidents-ss-email-notification-settings.png":::
-5. Select **Next**. On the **Recipients** page, add the email addresses that will receive the incident notifications. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
+5. Select **Next**. On the **Recipients** page, add the email addresses that will receive the incident notifications. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
6. Select **Next**. On the **Review rule** page, review the settings of the rule, and then select **Create rule**. Recipients will start receiving incident notifications through email based on the settings. To edit an existing rule, select it from the list of rules. On the pane with the rule name, select **Edit rule** and make your changes on the **Basics**, **Notification settings**, and **Recipients** pages. To delete a rule, select it from the list of rules. On the pane with the rule name, select **Delete**. - ## Training for security analysts Use this learning module from Microsoft Learn to understand how to use Microsoft 365 Defender to manage incidents and alerts.
Follow this table for your level of experience with security analysis and incide
| **New** | <ol><li> See the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review in the Microsoft 365 Defender portal with an example attack. </li><li> See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. </li><li> [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow.</li></ol> | | **Experienced** | <ol><li> Get started with the incident queue from the **Incidents** page of the Microsoft 365 Defender portal. From here you can: </li> <ul><li> See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. </li><li> [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. </li><li> Perform [investigations](investigate-incidents.md) of incidents. </li></ul> </li><li> Track and respond to emerging threats with [threat analytics](threat-analytics.md). </li><li> Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). </li><li> See these [incident response playbooks](/security/compass/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. </li></ol> | - ### Security team role Follow this table based on your security team role. | Role | Steps |
-|:-|:--|
+|||
| Incident responder (Tier 1) | Get started with the incident queue from the **Incidents** page of the Microsoft 365 Defender portal. From here you can: <ul><li> See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. </li><li> [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. </li></ul> | | Security investigator or analyst (Tier 2) | <ol><li> Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft 365 Defender portal. </li><li> See these [incident response playbooks](/security/compass/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. </li></ol> | | Advanced security analyst or threat hunter (Tier 3) | <ol><li>Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft 365 Defender portal. </li><li> Track and respond to emerging threats with [threat analytics](threat-analytics.md). </li><li> Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). </li><li> See these [incident response playbooks](/security/compass/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. | | SOC manager | See how to [integrate Microsoft 365 Defender into your Security Operations Center (SOC)](integrate-microsoft-365-defender-secops.md). |-
security Integrate Microsoft 365 Defender Secops Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-plan.md
ms.prod: m365-security
ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security
+f1.keywords:
- NOCSH ms.localizationpriority: medium audience: ITPro-+ - M365-security-compliance - m365solution-m365dsecops
+search.appverid:
- MOE150 - MET150 ms.technology: m365d
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-Whatever the current maturity of your security operations, it is important for you to align with your Security Operations Center (SOC). While there is no single model that fits every organization, there are certain aspects that are more common than others.
+Whatever the current maturity of your security operations, it is important for you to align with your Security Operations Center (SOC). While there is no single model that fits every organization, there are certain aspects that are more common than others.
The following sections describe the core functions of the SOC.
A SOC team prepares for and hunts new and incoming threats so that they can work
The SOC is the frontline of defense to security events and incidents. When an event, threat, attack, policy violation, or audit finding triggers an alert or call to action, the SOC team makes an assessment to triage and contain it or escalate it for investigation. Therefore, the SOC first line responders must have broad technical knowledge of security events and indicators.
-## Centralize monitoring and logging of your organizationΓÇÖs security sources
+## Centralize monitoring and logging of your organization's security sources
-Usually, the SOC teamΓÇÖs core function is to make sure all security devices such as firewalls, intrusion prevention systems, data loss prevention systems, threat and vulnerability management systems, and identity systems are functioning correctly and being monitored. The SOC teams will work with the broader network operations such as identity, DevOps, cloud, application, data science, and other business teams to ensure the analysis of security information is centralized and secured. Additionally, the SOC team is responsible for maintaining logs of the data in useable and readable formats, which could include parsing and normalizing disparate formats.
+Usually, the SOC team's core function is to make sure all security devices such as firewalls, intrusion prevention systems, data loss prevention systems, threat and vulnerability management systems, and identity systems are functioning correctly and being monitored. The SOC teams will work with the broader network operations such as identity, DevOps, cloud, application, data science, and other business teams to ensure the analysis of security information is centralized and secured. Additionally, the SOC team is responsible for maintaining logs of the data in useable and readable formats, which could include parsing and normalizing disparate formats.
## Establish Red, Blue, and Purple team operational readiness
security Integrate Microsoft 365 Defender Secops Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-roles.md
Many modern SOCs assign its team members to categories based on their skillsets
SOC team roles and responsibilities for Microsoft 365 Defender would naturally integrate into these teams.
-The following table breaks out each SOC teamΓÇÖs roles and responsibilities and how their roles integrate with Microsoft 365 Defender.
+The following table breaks out each SOC team's roles and responsibilities and how their roles integrate with Microsoft 365 Defender.
| SOC team | Roles and responsibilities | Microsoft 365 Defender tasks | |:-|:--|:-|
security Integrate Microsoft 365 Defender Secops Use Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-use-cases.md
ms.technology: m365d
**Applies to:** - Microsoft 365 Defender
-The recommended methods to deploy Microsoft 365 Defender in your Security Operations Center (SOC) will depend on the SOC teamΓÇÖs current set of tools, processes, and skillsets. Maintaining cyber hygiene across platforms can be challenging because of the vast amount of data coming from dozens if not hundreds of security sources.
+The recommended methods to deploy Microsoft 365 Defender in your Security Operations Center (SOC) will depend on the SOC team's current set of tools, processes, and skillsets. Maintaining cyber hygiene across platforms can be challenging because of the vast amount of data coming from dozens if not hundreds of security sources.
Security tools are interrelated. Turning on one feature in a security technology or changing a process may in turn break another. For this reason, Microsoft recommends that your SOC team formalize a method for defining and prioritizing use cases. Use cases help define requirements and test processes for SOC operations across various teams. It creates a methodology for capturing metrics to determine if the right roles and mix of tasks are aligned to the right team with the right skillsets. ## Develop and formalize use case process
-The SOC should define a high-level standard and process for developing use cases, which would be regulated by the SOC Oversight team. The SOC Oversight team should work with your business, IT, legal, HR, and other groups to prioritize use cases for the SOC that will eventually make their way into the SOC teamΓÇÖs runbooks and playbooks. Priority of use cases are based on objectives, such as compliance or privacy.
+The SOC should define a high-level standard and process for developing use cases, which would be regulated by the SOC Oversight team. The SOC Oversight team should work with your business, IT, legal, HR, and other groups to prioritize use cases for the SOC that will eventually make their way into the SOC team's runbooks and playbooks. Priority of use cases are based on objectives, such as compliance or privacy.
SOC Oversight activities related to use case development include:
Once a high-level use case standard has been defined and approved, the next step
## Use case example 1: New phishing variant
-The first step in creating a use case is to outline the workflow using a story board. HereΓÇÖs an example of a high-level story board for a new phishing exploit notification to a Threat Intelligence team.
+The first step in creating a use case is to outline the workflow using a story board. Here's an example of a high-level story board for a new phishing exploit notification to a Threat Intelligence team.
:::image type="content" source="../../media/integrate-microsoft-365-defender-secops/example-use-case-workflow-storyboard-phishing.png" alt-text="The workflow of a use case for an anti-phishing campaign" lightbox="../../media/integrate-microsoft-365-defender-secops/example-use-case-workflow-storyboard-phishing.png":::
Additionally, the SOC teams could have made the discoveries outlined in the tabl
| Monitoring Teams | Threat and vulnerability status is reported via company intranet portal | Tier 2 SOC analyst | Auto-generated reports from Microsoft 365 Defender showing remediation progress of assets | [Alerts in Security & Compliance Center](/microsoft-365/security/office-365-security/alerts) <br><br> Secure Score monitoring | No views or dashboard reports being communicated to asset owners regarding threat and vulnerability status of assets. | Create automation script to populate status of high risk and critical asset vulnerability remediation to the organization. | N | |||||||||
-In these example use cases, the testing revealed several gaps in the SOC teamΓÇÖs requirements that were established as baselines for the responsibilities of each team. The use case checklist can be as comprehensive as needed to ensure that the SOC team is prepared for the Microsoft 365 Defender integration with new or existing SOC requirements. Since this will be an iterative process, the use case development process and the use case output content will naturally serve to update and mature the SOCΓÇÖs runbooks with lessons learned.
+In these example use cases, the testing revealed several gaps in the SOC team's requirements that were established as baselines for the responsibilities of each team. The use case checklist can be as comprehensive as needed to ensure that the SOC team is prepared for the Microsoft 365 Defender integration with new or existing SOC requirements. Since this will be an iterative process, the use case development process and the use case output content will naturally serve to update and mature the SOC's runbooks with lessons learned.
## Update production runbooks and playbooks
-Once use case testing has been remediated for all gaps, the lessons learned and metrics collected in them can be incorporated into your SOC teamΓÇÖs production runbooks (operating processes) and playbooks (incident responses and escalation procedures).
+Once use case testing has been remediated for all gaps, the lessons learned and metrics collected in them can be incorporated into your SOC team's production runbooks (operating processes) and playbooks (incident responses and escalation procedures).
Maintenance of the SOC team runbooks and playbooks can be organized in a multitude of ways. Each SOC team may be responsible for their own, or there may be a single centralized version for all teams to share in a central repository. Runbook and playbook management for individual organizations is based on size, skillsets, roles, and segregation of duties. Once a runbook has been updated, the playbook update process should follow.
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
You can filter alerts according to these criteria:
## Required roles for Defender for Office 365 alerts
-YouΓÇÖll need to have any of the following roles to access Microsoft Defender for Office 365 alerts:
+You'll need to have any of the following roles to access Microsoft Defender for Office 365 alerts:
- For Azure Active Directory (Azure AD) global roles:
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-incidents.md
You can also open the main page for an incident by selecting the incident name f
The **Summary** page gives you a snapshot glance at the top things to notice about the incident. Information is organized in these sections.
security M365d Autoir Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-actions.md
It's important to approve (or reject) pending actions as soon as possible so tha
## Undo completed actions
-If youΓÇÖve determined that a device or a file is not a threat, you can undo remediation actions that were taken, whether those actions were taken automatically or manually. In the Action center, on the **History** tab, you can undo any of the following actions:
+If you've determined that a device or a file is not a threat, you can undo remediation actions that were taken, whether those actions were taken automatically or manually. In the Action center, on the **History** tab, you can undo any of the following actions:
| Action source | Supported Actions | |:|:|
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
Read responses to the most commonly asked questions about turning on [Microsoft
For instructions on how to turn on the service, [read Turn on Microsoft 365 Defender](m365d-enable.md).
-## I donΓÇÖt have a Microsoft 365 E5 license. Can I still use Microsoft 365 Defender?
+## I don't have a Microsoft 365 E5 license. Can I still use Microsoft 365 Defender?
Customers with the following non-E5 licenses can use Microsoft 365 Defender:
security Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md
This single pane of glass brings together functionality from existing Microsoft
- **[Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)** Microsoft Defender for Office 365 helps organizations secure their enterprise with a set of prevention, detection, investigation and hunting features to protect email, and Office 365 resources. - **[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-advanced-threat-protection)** delivers preventative protection, post-breach detection, automated investigation, and response for devices in your organization.-- **[Microsoft 365 Defender](microsoft-365-defender.md)** is part of MicrosoftΓÇÖs *Extended Detection and Response* (XDR) solution that leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, and build a picture of an attack on a single dashboard.
+- **[Microsoft 365 Defender](microsoft-365-defender.md)** is part of Microsoft's *Extended Detection and Response* (XDR) solution that leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, and build a picture of an attack on a single dashboard.
- **[Microsoft Defender for Cloud Apps](/cloud-app-security/)** is a comprehensive cross-SaaS and PaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps. If you need information about what's changed from the Office 365 Security & Compliance center or the Microsoft 365 Defender portal, see:
You can search across the following entities in Defender for Endpoint and Defend
- **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. >[!NOTE]
- >IP and URL searches are exact match and donΓÇÖt appear in the search results page ΓÇô they lead directly to the entity page.
+ >IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page.
- **TVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations).
Track and respond to emerging threats with the following Microsoft 365 Defender
Inside the learning hub, Email & Collaboration (Microsoft Defender for Office 365) guidance is side-by-side with Endpoint (Microsoft Defender for Endpoint) and Microsoft 365 Defender learning resources.
-The learning hub opens with Learning paths organized around topics such as ΓÇ£How to Investigate Using Microsoft 365 Defender?ΓÇ¥ and ΓÇ£Microsoft Defender for Office 365 Best PracticesΓÇ¥. This section is currently curated by the security Product Group inside Microsoft. Each Learning path reflects a projected time it takes to get through the concepts. For example 'Steps to take when a Microsoft Defender for Office 365 user account is compromised' is projected to take 8 minutes, and is valuable learning on the fly.
+The learning hub opens with Learning paths organized around topics such as "How to Investigate Using Microsoft 365 Defender?" and "Microsoft Defender for Office 365 Best Practices". This section is currently curated by the security Product Group inside Microsoft. Each Learning path reflects a projected time it takes to get through the concepts. For example 'Steps to take when a Microsoft Defender for Office 365 user account is compromised' is projected to take 8 minutes, and is valuable learning on the fly.
After clicking through to the content, it may be useful to bookmark this site and organize bookmarks into a 'Security' or 'Critical' folder. To see all Learning paths, click the Show all link in the main panel.
security Microsoft 365 Security Center Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mde.md
This table is a quick reference of the changes between the Microsoft Defender Se
| Area | Description of change | |||
-|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and donΓÇÖt appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **TVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
+|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **TVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
|[Dashboard](/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) | This is your security operations dashboard. See an overview of how many active alerts were triggered, which devices are at risk, which users are at risk, and severity level for alerts, devices, and users. You can also see if any devices have sensor issues, your overall service health, and how any unresolved alerts were detected. | |Device inventory | No changes. | |[Vulnerability management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) | Name was shortened to fit in the navigation pane. It's the same as the threat and vulnerability management section, with all the pages underneath. |
View reports, change your settings, and modify user roles.
### SIEM API connections
-If you use the [Defender for Endpoint SIEM API](../defender-endpoint/enable-siem-integration.md), you can continue to do so. WeΓÇÖve added new links on the API payload that point to the alert page or the incident page in the Microsoft 365 security portal. New API fields include LinkToMTP and IncidentLinkToMTP. For more information, see [Redirecting accounts from Microsoft Defender for Endpoint to Microsoft 365 Defender](./microsoft-365-security-mde-redirection.md).
+If you use the [Defender for Endpoint SIEM API](../defender-endpoint/enable-siem-integration.md), you can continue to do so. We've added new links on the API payload that point to the alert page or the incident page in the Microsoft 365 security portal. New API fields include LinkToMTP and IncidentLinkToMTP. For more information, see [Redirecting accounts from Microsoft Defender for Endpoint to Microsoft 365 Defender](./microsoft-365-security-mde-redirection.md).
### Email alerts
security Microsoft Secure Score History Metrics Trends https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-history-metrics-trends.md
The comparison bar chart is available on the **Overview** tab. Hover over the ch
:::image type="content" source="../../media/secure-score/secure-score-comparison-bar.png" alt-text="An example of the bar graph of similar organization's scores in the Microsoft 365 Defender portal" lightbox="../../media/secure-score/secure-score-comparison-bar.png":::
-The comparison data is anonymized so we donΓÇÖt know exactly which others tenants are in the mix.
+The comparison data is anonymized so we don't know exactly which others tenants are in the mix.
![Bar graph of similar organization's scores.](../../media/secure-score/secure-score-comparison-screenshot.png)
security Setup M365deval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/setup-m365deval.md
This topic guides you to set up a dedicated lab environment. For information on
:::image type="content" source="../../media/mtp-eval-16.png" alt-text="The Office 365 E5 Setup page where you should personalize your sign-in and email" lightbox="../../media/mtp-eval-16.png":::
-9. Add a TXT or MX record to validate the domain ownership. Once youΓÇÖve added the TXT or MX record to your domain, select **Verify**.
+9. Add a TXT or MX record to validate the domain ownership. Once you've added the TXT or MX record to your domain, select **Verify**.
:::image type="content" source="../../media/mtp-eval-17.png" alt-text="The Office 365 E5 setup page where you should add a TXT of MX record to verify your domain" lightbox="../../media/mtp-eval-17.png":::
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics.md
Watch this short video to learn more about how threat analytics can help you tra
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
-You can access threat analytics either from the upper left-hand side of Microsoft 365 security portalΓÇÖs navigation bar, or from a dedicated dashboard card that shows the top threats to your org, both in terms of impact, and in terms of exposure.
+You can access threat analytics either from the upper left-hand side of Microsoft 365 security portal's navigation bar, or from a dedicated dashboard card that shows the top threats to your org, both in terms of impact, and in terms of exposure.
:::image type="content" source="../../media/threat-analytics/ta_inlandingpage_mtp.png" alt-text="The threat analytics landing page" lightbox="../../media/threat-analytics/ta_inlandingpage_mtp.png":::
security Coinminer Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/coinminer-malware.md
Mining is the process of running complex mathematical calculations necessary to
Coin miners aren't inherently malicious. Some individuals and organizations invest in hardware and electric power for legitimate coin mining operations. However, others look for alternative sources of computing power and try to find their way into corporate networks. These coin miners aren't wanted in enterprise environments because they eat up precious computing resources.
-Cybercriminals see an opportunity to make money by running malware campaigns that distribute, install, and run trojanized miners at the expense of other peopleΓÇÖs computing resources.
+Cybercriminals see an opportunity to make money by running malware campaigns that distribute, install, and run trojanized miners at the expense of other people's computing resources.
### Examples
security Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/criteria.md
The next sections provide an overview of the classifications we use for applicat
## Unknown ΓÇô Unrecognized software
-No antivirus or protection technology is perfect. It takes time to identify and block malicious sites and applications, or trust newly released programs and certificates.ΓÇ» With almost 2 billion websites on the internet and software continuously updated and released, it's impossible to have information about every single site and program.
+No antivirus or protection technology is perfect. It takes time to identify and block malicious sites and applications, or trust newly released programs and certificates. With almost 2 billion websites on the internet and software continuously updated and released, it's impossible to have information about every single site and program.
Think of Unknown/Uncommonly downloaded warnings as an early warning system for potentially undetected malware. There's generally a delay from the time new malware is released until it's identified. Not all uncommon programs are malicious, but the risk in the unknown category is much higher for the typical user. Warnings for unknown software aren't blocks. Users can choose to download and run the application normally if they wish to.
Microsoft classifies most malicious software into one of the following categorie
* **Backdoor:** A type of malware that gives malicious hackers remote access to and control of your device.
-* **Command and Control:** A type of malware that infects your device and establishes communication with the hackersΓÇÖ command-and-control server to receive instructions. Once communication is established, hackers can send commands that can steal data, shut down and reboot the device, and disrupt web services.
+* **Command and Control:** A type of malware that infects your device and establishes communication with the hackers' command-and-control server to receive instructions. Once communication is established, hackers can send commands that can steal data, shut down and reboot the device, and disrupt web services.
* **Downloader:** A type of malware that downloads other malware onto your device. It must connect to the internet to download files.
-* **Dropper:** A type of malware that installs other malware files onto your device. Unlike a downloader, a dropper doesn't have to connect to the internet to drop malicious files. The dropped files are typically embedded in the dropper itself.
+* **Dropper:** A type of malware that installs other malware files onto your device. Unlike a downloader, a dropper doesn't have to connect to the internet to drop malicious files. The dropped files are typically embedded in the dropper itself.
* **Exploit:** A piece of code that uses software vulnerabilities to gain access to your device and perform other tasks, such as installing malware. [See more information about exploits](exploits-malware.md).
security Fileless Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/fileless-threats.md
A fully fileless malware can be considered one that never requires writing a fil
A compromised device may also have malicious code hiding in device firmware (such as a BIOS), a USB peripheral (like the BadUSB attack), or in the firmware of a network card. All these examples don't require a file on the disk to run, and can theoretically live only in memory. The malicious code would survive reboots, disk reformats, and OS reinstalls.
-Infections of this type can be particularly difficult to detect because most antivirus products donΓÇÖt have the capability to inspect firmware. In cases where a product does have the ability to inspect and detect malicious firmware, there are still significant challenges associated with remediation of threats at this level. This type of fileless malware requires high levels of sophistication and often depends on particular hardware or software configuration. ItΓÇÖs not an attack vector that can be exploited easily and reliably. While dangerous, threats of this type are uncommon and not practical for most attacks.
+Infections of this type can be particularly difficult to detect because most antivirus products don't have the capability to inspect firmware. In cases where a product does have the ability to inspect and detect malicious firmware, there are still significant challenges associated with remediation of threats at this level. This type of fileless malware requires high levels of sophistication and often depends on particular hardware or software configuration. It's not an attack vector that can be exploited easily and reliably. While dangerous, threats of this type are uncommon and not practical for most attacks.
## Type II: Indirect file activity There are other ways that malware can achieve fileless presence on a machine without requiring significant engineering effort. Fileless malware of this type doesn't directly write files on the file system, but they can end up using files indirectly. For example, with the [Poshspy backdoor](https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html) attackers installed a malicious PowerShell command within the WMI repository and configured a WMI filter to run the command periodically.
-ItΓÇÖs possible to carry out such installation via command line without requiring a backdoor to already be on the file. The malware can be installed and theoretically run without ever touching the file system. However, the WMI repository is stored on a physical file in a central storage area managed by the CIM Object Manager, and usually contains legitimate data. Even though the infection chain does technically use a physical file, itΓÇÖs considered a fileless attack because the WMI repository is a multi-purpose data container that can't be detected and removed.
+It's possible to carry out such installation via command line without requiring a backdoor to already be on the file. The malware can be installed and theoretically run without ever touching the file system. However, the WMI repository is stored on a physical file in a central storage area managed by the CIM Object Manager, and usually contains legitimate data. Even though the infection chain does technically use a physical file, it's considered a fileless attack because the WMI repository is a multi-purpose data container that can't be detected and removed.
## Type III: Files required to operate Some malware can have a sort of fileless persistence, but not without using files to operate. An example for this scenario is Kovter, which creates a shell open verb handler in the registry for a random file extension. Opening a file with such extension will lead to the execution of a script through the legitimate tool mshta.exe. ![Image of Kovter's registry key.](../../media/security-intelligence-images/kovter-reg-key.png)<br>
-*Figure 2. KovterΓÇÖs registry key*
+*Figure 2. Kovter's registry key*
When the open verb is invoked, the associated command from the registry is launched, which results in the execution of a small script. This script reads data from a further registry key and executes it, in turn leading to the loading of the final payload. However, to trigger the open verb in the first place, Kovter has to drop a file with the same extension targeted by the verb (in the example above, the extension is .bbf5590fd). It also has to set an autorun key configured to open such file when the machine starts.
Having described the broad categories, we can now dig into the details and provi
**Device-based** (Type I: network card, hard disk): Devices like hard disks and network cards require chipsets and dedicated software to function. Software residing and running in the chipset of a device is called firmware. Although a complex task, the firmware can be infected by malware, as the [Equation espionage group has been caught doing](https://www.kaspersky.com/blog/equation-hdd-malware/7623/).
-**CPU-based** (Type I): Modern CPUs are complex and may include subsystems running firmware for management purposes. Such firmware may be vulnerable to hijacking and allow the execution of malicious code that would operate from within the CPU. In December 2017, two researchers reported a vulnerability that can allow attackers to execute code inside the [Management Engine (ME)](https://en.wikipedia.org/wiki/Intel_Management_Engine) present in any modern CPU from Intel. Meanwhile, the attacker group PLATINUM has been observed to have the capability to use Intel's [Active Management Technology (AMT)](https://en.wikipedia.org/wiki/Intel_Active_Management_Technology) to perform [invisible network communications](https://cloudblogs.microsoft.com/microsoftsecure/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/), bypassing the installed operating system. ME and AMT are essentially autonomous micro-computers that live inside the CPU and that operate at a very low level. Because these technologiesΓÇÖ purpose is to provide remote manageability, they have direct access to hardware, are independent of the operating system, and can run even if the computer is turned off.
+**CPU-based** (Type I): Modern CPUs are complex and may include subsystems running firmware for management purposes. Such firmware may be vulnerable to hijacking and allow the execution of malicious code that would operate from within the CPU. In December 2017, two researchers reported a vulnerability that can allow attackers to execute code inside the [Management Engine (ME)](https://en.wikipedia.org/wiki/Intel_Management_Engine) present in any modern CPU from Intel. Meanwhile, the attacker group PLATINUM has been observed to have the capability to use Intel's [Active Management Technology (AMT)](https://en.wikipedia.org/wiki/Intel_Active_Management_Technology) to perform [invisible network communications](https://cloudblogs.microsoft.com/microsoftsecure/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/), bypassing the installed operating system. ME and AMT are essentially autonomous micro-computers that live inside the CPU and that operate at a very low level. Because these technologies' purpose is to provide remote manageability, they have direct access to hardware, are independent of the operating system, and can run even if the computer is turned off.
Besides being vulnerable at the firmware level, CPUs could be manufactured with backdoors inserted directly in the hardware circuitry. This attack has been [researched and proved possible](https://www.emsec.rub.de/media/crypto/veroeffentlichungen/2015/03/19/beckerStealthyExtended.pdf) in the past. It has been reported that certain models of x86 processors contain a secondary embedded RISC-like CPU core that can [effectively provide a backdoor](https://www.theregister.co.uk/2018/08/10/via_c3_x86_processor_backdoor/) through which regular applications can gain privileged execution. **USB-based** (Type I): USB devices of all kinds can be reprogrammed with malicious firmware capable of interacting with the operating system in nefarious ways. For example, the [BadUSB technique](https://arstechnica.com/information-technology/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/) allows a reprogrammed USB stick to act as a keyboard that sends commands to machines via keystrokes, or as a network card that can redirect traffic at will.
-**BIOS-based** (Type I): A BIOS is a firmware running inside a chipset. It executes when a machine is powered on, initializes the hardware, and then transfers control to the boot sector. The BIOS is an important component that operates at a low level and executes before the boot sector. ItΓÇÖs possible to reprogram the BIOS firmware with malicious code, as has happened in the past with the [Mebromi rootkit](https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/).
+**BIOS-based** (Type I): A BIOS is a firmware running inside a chipset. It executes when a machine is powered on, initializes the hardware, and then transfers control to the boot sector. The BIOS is an important component that operates at a low level and executes before the boot sector. It's possible to reprogram the BIOS firmware with malicious code, as has happened in the past with the [Mebromi rootkit](https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/).
**Hypervisor-based** (Type I): Modern CPUs provide hardware hypervisor support, allowing the operating system to create robust virtual machines. A virtual machine runs in a confined, simulated environment, and is in theory unaware of the emulation. A malware taking over a machine may implement a small hypervisor to hide itself outside of the realm of the running operating system. Malware of this kind has been theorized in the past, and eventually real hypervisor rootkits [have been observed](http://seclists.org/fulldisclosure/2017/Jun/29), although few are known to date.
Besides being vulnerable at the firmware level, CPUs could be manufactured with
**Script-based** (Type II: file, service, registry, WMI repo, shell): The JavaScript, VBScript, and PowerShell scripting languages are available by default on Windows platforms. Scripts have the same advantages as macros, they are textual files (not binary executables) and run within the context of the interpreter (like wscript.exe, powershell.exe), which is a clean and legitimate component. Scripts are versatile and can be run from a file (by double-clicking them) or executed directly on the command line of an interpreter. Running on the command line allows malware to encode malicious scripts as autostart services inside [autorun registry keys](https://www.gdatasoftware.com/blog/2014/07/23947-poweliks-the-persistent-malware-without-a-file) as [WMI event subscriptions](https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html) from the WMI repo. Furthermore, an attacker who has gained access to an infected machine may input the script on the command prompt.
-**Disk-based** (Type II: Boot Record): The Boot Record is the first sector of a disk or volume, and contains executable code required to start the boot process of the operating system. Threats like [Petya](https://cloudblogs.microsoft.com/microsoftsecure/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/?source=mmpc) are capable of infecting the Boot Record by overwriting it with malicious code. When the machine is booted, the malware immediately gains control. The Boot Record resides outside the file system, but itΓÇÖs accessible by the operating system. Modern antivirus products have the capability to scan and restore it.
+**Disk-based** (Type II: Boot Record): The Boot Record is the first sector of a disk or volume, and contains executable code required to start the boot process of the operating system. Threats like [Petya](https://cloudblogs.microsoft.com/microsoftsecure/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/?source=mmpc) are capable of infecting the Boot Record by overwriting it with malicious code. When the machine is booted, the malware immediately gains control. The Boot Record resides outside the file system, but it's accessible by the operating system. Modern antivirus products have the capability to scan and restore it.
## Defeating fileless malware
security Macro Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/macro-malware.md
We've seen macro malware download threats from the following families:
* Make sure macros are disabled in your Microsoft Office applications. In enterprises, IT admins set the default setting for macros: * [Enable or disable macros](https://support.office.com/article/Enable-or-disable-macros-in-Office-documents-7b4fdd2e-174f-47e2-9611-9efe4f860b12) in Office documents
-* DonΓÇÖt open suspicious emails or suspicious attachments.
+* Don't open suspicious emails or suspicious attachments.
* Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads.
security Phishing Trends https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/phishing-trends.md
Whaling is a form of phishing directed at high-level or senior executives within
## Business email compromise
-Business email compromise (BEC) is a sophisticated scam that targets businesses who frequently work with foreign suppliers or do money wire transfers. One of the most common schemes used by BEC attackers involves gaining access to a companyΓÇÖs network through a spear phishing attack. The attacker creates a domain similar to the company they're targeting, or spoofs their email to scam users into releasing personal account information for money transfers.
+Business email compromise (BEC) is a sophisticated scam that targets businesses who frequently work with foreign suppliers or do money wire transfers. One of the most common schemes used by BEC attackers involves gaining access to a company's network through a spear phishing attack. The attacker creates a domain similar to the company they're targeting, or spoofs their email to scam users into releasing personal account information for money transfers.
## More information about phishing attacks
security Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/phishing.md
Social engineering attacks are designed to take advantage of a user's possible l
## Learn the signs of a phishing scam
-The best protection is awareness and education. DonΓÇÖt open attachments or links in unsolicited emails, even if the emails came from a recognized source. If the email is unexpected, be wary about opening the attachment and verify the URL.
+The best protection is awareness and education. Don't open attachments or links in unsolicited emails, even if the emails came from a recognized source. If the email is unexpected, be wary about opening the attachment and verify the URL.
-Enterprises should educate and train their employees to be wary of any communication that requests personal or financial information. They should also instruct employees to report the threat to the companyΓÇÖs security operations team immediately.
+Enterprises should educate and train their employees to be wary of any communication that requests personal or financial information. They should also instruct employees to report the threat to the company's security operations team immediately.
Here are several telltale signs of a phishing scam:
Here are several telltale signs of a phishing scam:
* The **sender address doesn't match the signature** on the message itself. For example, an email is purported to be from Mary of Contoso Corp, but the sender address is john<span></span>@example.com.
-* There are **multiple recipients** in the ΓÇ£ToΓÇ¥ field and they appear to be random addresses. Corporate messages are normally sent directly to individual recipients.
+* There are **multiple recipients** in the "To" field and they appear to be random addresses. Corporate messages are normally sent directly to individual recipients.
* The greeting on the message itself **doesn't personally address you**. Apart from messages that mistakenly address a different person, greetings that misuse your name or pull your name directly from your email address tend to be malicious.
If you feel you've been a victim of a phishing attack:
- **Anti-Phishing Working Group**: phishing-report@us-cert.gov. The group uses reports generated from emails sent to fight phishing scams and hackers. ISPs, security vendors, financial institutions, and law enforcement agencies are involved.
-### If youΓÇÖre on a suspicious website
+### If you're on a suspicious website
-- **Microsoft Edge**: While you’re on a suspicious site, select the **More (…) icon** > **Help and feedback** > **Report Unsafe site**. Follow the instructions on the webpage that displays to report the website.
+- **Microsoft Edge**: While you're on a suspicious site, select the **More (...) icon** > **Help and feedback** > **Report Unsafe site**. Follow the instructions on the webpage that displays to report the website.
-- **Internet Explorer**: While youΓÇÖre on a suspicious site, select the gear icon, point to **Safety**, and then select **Report Unsafe Website**. Follow the instructions on the webpage that displays to report the website.
+- **Internet Explorer**: While you're on a suspicious site, select the gear icon, point to **Safety**, and then select **Report Unsafe Website**. Follow the instructions on the webpage that displays to report the website.
## More information about phishing attacks
security Portal Submission Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/portal-submission-troubleshooting.md
Title: Troubleshoot MSI portal errors caused by admin block description: Troubleshoot MSI portal errors-
-keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesnΓÇÖt detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesnΓÇÖt detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
+
+keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesn't detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesn't detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
ms.prod: m365-security ms.mktglfcycl: secure ms.sitesec: library
ms.technology: m365d
# Troubleshooting malware submission errors caused by administrator block+ In some instances, an administrator block might cause submission issues when you try to submit a potentially infected file to the [Microsoft Security intelligence website](https://www.microsoft.com/wdsi) for analysis. The following process shows how to resolve this problem. ## Review your settings+ Open your Azure [Enterprise application settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/). Under **Enterprise Applications** > **Users can consent to apps accessing company data on their behalf**, check whether Yes or No is selected. -- If **No** is selected, an Azure AD administrator for the customer tenant will need to provide consent for the organization. Depending on the configuration with Azure AD, users might be able to submit a request right from the same dialog box. If there’s no option to ask for admin consent, users need to request for these permissions to be added to their Azure AD admin. Go to the following section for more information.
+- If **No** is selected, an Azure AD administrator for the customer tenant will need to provide consent for the organization. Depending on the configuration with Azure AD, users might be able to submit a request right from the same dialog box. If there's no option to ask for admin consent, users need to request for these permissions to be added to their Azure AD admin. Go to the following section for more information.
+
+- If **Yes** is selected, ensure the Windows Defender Security Intelligence app setting **Enabled for users to sign in?** is set to **Yes** [in Azure](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Properties/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/4a918a14-4069-4108-9b7d-76486212d75d). If **No** is selected, you'll need to request an Azure AD admin enable it.
+
+## Implement Required Enterprise Application permissions
-- If **Yes** is selected, ensure the Windows Defender Security Intelligence app setting **Enabled for users to sign in?** is set to **Yes** [in Azure](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Properties/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/4a918a14-4069-4108-9b7d-76486212d75d). If **No** is selected, you'll need to request an Azure AD admin enable it.
-ΓÇ»
-## Implement Required Enterprise Application permissions
This process requires a global or application admin in the tenant.
- 1. Open [Enterprise Application settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Permissions/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/4a918a14-4069-4108-9b7d-76486212d75d).
- 2. Select **Grant admin consent for organization**.
- 3. If you're able to do so, review the API permissions required for this application, as the following image shows. Provide consent for the tenant.
+
+1. Open [Enterprise Application settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Permissions/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/4a918a14-4069-4108-9b7d-76486212d75d).
+2. Select **Grant admin consent for organization**.
+3. If you're able to do so, review the API permissions required for this application, as the following image shows. Provide consent for the tenant.
![grant consent image.](../../media/security-intelligence-images/msi-grant-admin-consent.jpg)
- 4. If the administrator receives an error while attempting to provide consent manually, try either [Option 1](#option-1-approve-enterprise-application-permissions-by-user-request) or [Option 2](#option-2-provide-admin-consent-by-authenticating-the-application-as-an-admin) as possible workarounds.
-ΓÇ»
+4. If the administrator receives an error while attempting to provide consent manually, try either [Option 1](#option-1-approve-enterprise-application-permissions-by-user-request) or [Option 2](#option-2-provide-admin-consent-by-authenticating-the-application-as-an-admin) as possible workarounds.
+ ## Option 1 Approve enterprise application permissions by user request
-> [!Note]
+
+> [!NOTE]
> This is currently a preview feature. Azure Active Directory admins will need to allow for users to request admin consent to apps. Verify the setting is configured to **Yes** in [Enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/).
Once this setting is verified, users can go through the enterprise customer sign
Admin will be able to review and approve the application permissions [Azure admin consent requests](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AccessRequests/menuId/). After providing consent, all users in the tenant will be able to use the application.
-ΓÇ»
-## Option 2 Provide admin consent by authenticating the application as an admin
+
+## Option 2 Provide admin consent by authenticating the application as an admin
+ This process requires that global admins go through the Enterprise customer sign-in flow at [Microsoft security intelligence](https://www.microsoft.com/wdsi/filesubmission). ![Consent sign in flow.](../../media/security-intelligence-images/msi-microsoft-permission-required.jpg)
Then, admins review the permissions and make sure to select **Consent on behalf
All users in the tenant will now be able to use this application. ## Option 3: Delete and readd app permissions+ If neither of these options resolve the issue, try the following steps (as an admin): 1. Remove previous configurations for the application. Go to [Enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Properties/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/982e94b2-fea9-4d1f-9fca-318cda92f90b)
and select **delete**.
2. Capture TenantID from [Properties](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties).
-3. Replace {tenant-id} with the specific tenant that needs to grant consent to this application in the URL below. Copy this URL into browser. The rest of the parameters are already completed.
+3. Replace {tenant-id} with the specific tenant that needs to grant consent to this application in the URL below. Copy this URL into browser. The rest of the parameters are already completed.
``https://login.microsoftonline.com/{tenant-id}/v2.0/adminconsent?client_id=f0cf43e5-8a9b-451c-b2d5-7285c785684d&state=12345&redirect_uri=https%3a%2f%2fwww.microsoft.com%2fwdsi%2ffilesubmission&scope=openid+profile+email+offline_access`` ![Permissions needed.](../../media/security-intelligence-images/msi-microsoft-permission-requested-your-organization.png)
-4. Review the permissions required by the application, and then select **Accept**.
+4. Review the permissions required by the application, and then select **Accept**.
5. Confirm the permissions are applied in the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Permissions/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/ce60a464-5fca-4819-8423-bcb46796b051). ![Review that permissions are applied.](../../media/security-intelligence-images/msi-permissions.jpg)
-
+ 6. Sign in to [Microsoft security intelligence](https://www.microsoft.com/wdsi/filesubmission) as an enterprise user with a non-admin account to see if you have access. If the warning is not resolved after following these troubleshooting steps, call Microsoft support.
security Prevent Malware Infection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/prevent-malware-infection.md
To identify potentially harmful websites, keep the following in mind:
To block malicious websites, use a modern web browser like [Microsoft Edge](https://www.microsoft.com/windows/microsoft-edge?ocid=cx-wdsi-articles) that identifies phishing and malware websites and checks downloads for malware.
-If you encounter an unsafe site, click **More […] > Send feedback** on Microsoft Edge. You can also [report unsafe sites directly to Microsoft](https://www.microsoft.com/wdsi/support/report-unsafe-site).
+If you encounter an unsafe site, click **More [...] > Send feedback** on Microsoft Edge. You can also [report unsafe sites directly to Microsoft](https://www.microsoft.com/wdsi/support/report-unsafe-site).
### Pirated material on compromised websites
security Rootkits Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/rootkits-malware.md
Malware authors use rootkits to hide malware on your device, allowing malware to
## How rootkits work
-Rootkits intercept and change standard operating system processes. After a rootkit infects a device, you canΓÇÖt trust any information that device reports about itself.
+Rootkits intercept and change standard operating system processes. After a rootkit infects a device, you can't trust any information that device reports about itself.
-If you were to ask a device to list all of the programs that are running, the rootkit might stealthily remove any programs it doesnΓÇÖt want you to know about. Rootkits are all about hiding things. They want to hide both themselves and their malicious activity on a device.
+If you were to ask a device to list all of the programs that are running, the rootkit might stealthily remove any programs it doesn't want you to know about. Rootkits are all about hiding things. They want to hide both themselves and their malicious activity on a device.
Many modern malware families use rootkits to try to avoid detection and removal, including:
For more general tips, see [prevent malware infection](prevent-malware-infection
### What if I think I have a rootkit on my device?
-Microsoft security software includes a number of technologies designed specifically to remove rootkits. If you think you have a rootkit that your antimalware software isnΓÇÖt detecting, you may need an extra tool that lets you boot to a known trusted environment.
+Microsoft security software includes a number of technologies designed specifically to remove rootkits. If you think you have a rootkit that your antimalware software isn't detecting, you may need an extra tool that lets you boot to a known trusted environment.
-[Microsoft Defender Offline](https://support.microsoft.com/help/17466/microsoft-defender-offline-help-protect-my-pc) can be launched from the Windows Security app and has the latest antimalware updates from Microsoft. ItΓÇÖs designed to be used on devices that aren't working correctly because of a possible malware infection.
+[Microsoft Defender Offline](https://support.microsoft.com/help/17466/microsoft-defender-offline-help-protect-my-pc) can be launched from the Windows Security app and has the latest antimalware updates from Microsoft. It's designed to be used on devices that aren't working correctly because of a possible malware infection.
[System Guard](https://cloudblogs.microsoft.com/microsoftsecure/2017/10/23/hardening-the-system-and-maintaining-integrity-with-windows-defender-system-guard/) in Windows 10 protects against rootkits and threats that impact system integrity.
-### What if I canΓÇÖt remove a rootkit?
+### What if I can't remove a rootkit?
If the problem persists, we strongly recommend reinstalling the operating system and security software. Then restore your data from a backup.
security Submission Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/submission-guide.md
Title: Submit files for analysis by Microsoft description: Learn how to submit files to Microsoft for malware analysis, how to track your submissions, and dispute detections.-
-keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesnΓÇÖt detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesnΓÇÖt detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
+
+keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesn't detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesn't detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
ms.prod: m365-security ms.mktglfcycl: secure ms.sitesec: library
If you have a file that you suspect might be malware or is being incorrectly det
## How do I send a malware file to Microsoft?
-You can send us files that you think might be malware or files that have been incorrectly detected through the [sample submission portal](https://www.microsoft.com/en-us/wdsi/filesubmission).
+You can send us files that you think might be malware or files that have been incorrectly detected through the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission).
We receive a large number of samples from many sources. Our analysis is prioritized by the number of file detections and the type of submission. You can help us complete a quick analysis by providing detailed information about the product you were using and what you were doing when you found the file.
After you sign in, you will be able to track your submissions.
## Can I send a sample by email?
-No, we only accept submissions through our [sample submission portal](https://www.microsoft.com/en-us/wdsi/filesubmission).
+No, we only accept submissions through our [sample submission portal](https://www.microsoft.com/wdsi/filesubmission).
## Can I submit a sample without signing in?
The [Software Assurance ID (SAID)](https://www.microsoft.com/licensing/licensing
### How do I dispute the detection of my program?
-[Submit the file](https://www.microsoft.com/en-us/wdsi/filesubmission) in question as a software developer. Wait until your submission has a final determination.
+[Submit the file](https://www.microsoft.com/wdsi/filesubmission) in question as a software developer. Wait until your submission has a final determination.
-If youΓÇÖre not satisfied with our determination of the submission, use the developer contact form provided with the submission results to reach Microsoft. We will use the information you provide to investigate further if necessary.
+If you're not satisfied with our determination of the submission, use the developer contact form provided with the submission results to reach Microsoft. We will use the information you provide to investigate further if necessary.
We encourage all software vendors and developers to read about [how Microsoft identifies malware and unwanted software](criteria.md). ## How do I track or view past sample submissions?
-You can track your submissions through the [submission history page](https://www.microsoft.com/en-us/wdsi/submissionhistory).
+You can track your submissions through the [submission history page](https://www.microsoft.com/wdsi/submissionhistory).
## What does the submission status mean?
Each submission is shown to be in one of the following status types:
* ClosedΓÇöa final determination has been given by an analyst
-You can see the status of any files you submit to us on the [submission history page](https://www.microsoft.com/en-us/wdsi/submissionhistory).
+You can see the status of any files you submit to us on the [submission history page](https://www.microsoft.com/wdsi/submissionhistory).
## How does Microsoft prioritize submissions
security Supply Chain Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/supply-chain-malware.md
Supply chain attacks are an emerging kind of threat that target software develop
Attackers hunt for unsecure network protocols, unprotected server infrastructures, and unsafe coding practices. They break in, change source codes, and hide malware in build and update processes.
-Because software is built and released by trusted vendors, these apps and updates are signed and certified. In software supply chain attacks, vendors are likely unaware that their apps or updates are infected with malicious code when theyΓÇÖre released to the public. The malicious code then runs with the same trust and permissions as the app.
+Because software is built and released by trusted vendors, these apps and updates are signed and certified. In software supply chain attacks, vendors are likely unaware that their apps or updates are infected with malicious code when they're released to the public. The malicious code then runs with the same trust and permissions as the app.
The number of potential victims is significant, given the popularity of some apps. A case occurred where a free file compression app was poisoned and deployed to customers in a country where it was the top utility app.
To learn more about supply chain attacks, read this blog post called [attack inc
* Build secure software updaters as part of the software development lifecycle. * Require SSL for update channels and implement certificate pinning. * Sign everything, including configuration files, scripts, XML files, and packages.
- * Check for digital signatures, and donΓÇÖt let the software updater accept generic input and commands.
+ * Check for digital signatures, and don't let the software updater accept generic input and commands.
* Develop an incident response process for supply chain attacks. * Disclose supply chain incidents and notify customers with accurate and timely information
security Support Scams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/support-scams.md
Scammers may call you directly on your phone and pretend to be representatives o
Scammers might also initiate contact by displaying fake error messages on websites you visit, displaying support numbers and enticing you to call. They can also put your browser on full screen and display pop-up messages that won't go away, essentially locking your browser. These fake error messages aim to trick you into calling an indicated technical support hotline. Note that Microsoft error and warning messages never include phone numbers.
-When you engage with the scammers, they can offer fake solutions for your ΓÇ£problemsΓÇ¥ and ask for payment in the form of a one-time fee or subscription to a purported support service.
+When you engage with the scammers, they can offer fake solutions for your "problems" and ask for payment in the form of a one-time fee or subscription to a purported support service.
**For more information, view [known tech support scam numbers and popular web scams](https://support.microsoft.com/help/4013405/windows-protect-from-tech-support-scams).**
It is also important to keep the following in mind:
* Any communication with Microsoft has to be initiated by you.
-* DonΓÇÖt call the number in the pop-ups. MicrosoftΓÇÖs error and warning messages never include a phone number.
+* Don't call the number in the pop-ups. Microsoft's error and warning messages never include a phone number.
-* Download software only from official vendor websites or the Microsoft Store. Be wary of downloading software from third-party sites, as some of them might have been modified without the authorΓÇÖs knowledge to bundle support scam malware and other threats.
+* Download software only from official vendor websites or the Microsoft Store. Be wary of downloading software from third-party sites, as some of them might have been modified without the author's knowledge to bundle support scam malware and other threats.
* Use [Microsoft Edge](https://www.microsoft.com/windows/microsoft-edge) when browsing the internet. It blocks known support scam sites using Windows Defender SmartScreen (which is also used by Internet Explorer). Furthermore, Microsoft Edge can stop pop-up dialogue loops used by these sites.
security Trojans Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/trojans-malware.md
ms.technology: m365d
# Trojans
-Trojans are a common type of malware which, unlike viruses, canΓÇÖt spread on their own. This means they either have to be downloaded manually or another malware needs to download and install them.
+Trojans are a common type of malware which, unlike viruses, can't spread on their own. This means they either have to be downloaded manually or another malware needs to download and install them.
Trojans often use the same file names as real and legitimate apps. It is easy to accidentally download a trojan thinking that it is a legitimate app.
security Unwanted Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/unwanted-software.md
Here are some indications of unwanted software:
- There are programs that you did not install and that may be difficult to uninstall -- Browser features or settings have changed, and you canΓÇÖt view or modify them
+- Browser features or settings have changed, and you can't view or modify them
- There are excessive messages about your device's health or about files and programs
security Virus Information Alliance Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/virus-information-alliance-criteria.md
To be eligible for VIA your organization must:
2. Fit into one of the following categories:
- - Your organization develops anti-malware technology that can run on Windows and your organizationΓÇÖs product is commercially available.
+ - Your organization develops anti-malware technology that can run on Windows and your organization's product is commercially available.
- Your organization provides security services to Microsoft customers or for Microsoft products. - Your organization publishes anti-malware testing reports regularly. - Your organization has a research or response team dedicated to fighting malware to protect your organization, your customers, or the general public.
security Virus Initiative Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/virus-initiative-criteria.md
To qualify for the MVI program, your organization must meet all the following re
Test Provider | Lab Test Type | Minimum Level / Score - ||-
-AV-Comparatives | Real-World Protection Test </br> https://www.av-comparatives.org/testmethod/real-world-protection-tests/ |ΓÇ£ApprovedΓÇ¥ rating from AV Comparatives
-AV-Test | Must pass tests for Windows. Certifications for Mac and Linux aren't accepted </br> https://www.av-test.org/en/about-the-institute/certification/ | Achieve "AV-TEST Certified" (for home users) or "AV-TEST ApprovedΓÇ¥ (for corporate users)
+AV-Comparatives | Real-World Protection Test </br> https://www.av-comparatives.org/testmethod/real-world-protection-tests/ |"Approved" rating from AV Comparatives
+AV-Test | Must pass tests for Windows. Certifications for Mac and Linux aren't accepted </br> https://www.av-test.org/en/about-the-institute/certification/ | Achieve "AV-TEST Certified" (for home users) or "AV-TEST Approved" (for corporate users)
ICSA Labs | Endpoint Anti-Malware Detection </br> https://www.icsalabs.com/technology-program/anti-virus/criteria |PASS/Certified SKD Labs | Certification Requirements Product: Anti-virus or Antimalware </br> http://www.skdlabs.com/html/english/ </br> http://www.skdlabs.com/cert/ |SKD Labs Star Check Certification Requirements Pass >= 98.5% with On Demand, On Access and Total Detection tests VB 100 | VB100 Certification Test V1.1 </br> https://www.virusbulletin.com/testing/vb100/vb100-methodology/vb100-methodology-ver1-1/ | VB100 Certification
-West Coast Labs | Checkmark Certified </br> http://www.checkmarkcertified.com/sme/ | ΓÇ£AΓÇ¥ Rating on Product Security Performance
+West Coast Labs | Checkmark Certified </br> http://www.checkmarkcertified.com/sme/ | "A" Rating on Product Security Performance
## Apply now
security Worms Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/intelligence/worms-malware.md
Jenxcus (also known as Dunihi), Gamarue (also known as Androm), and Bondat have
* **Jenxcus** has capabilities of not only infecting removable drives but can also act as a backdoor that connects back to its server. This threat typically gets into a device from a drive-by download attack, meaning it's installed when users just visit a compromised web page.
-* **Gamarue** typically arrives through spam campaigns, exploits, downloaders, social networking sites, and removable drives. When Gamarue infects a device, it becomes a distribution channel for other malware. WeΓÇÖve seen it distribute other malware such as info stealers, spammers, clickers, downloaders, and rogues.
+* **Gamarue** typically arrives through spam campaigns, exploits, downloaders, social networking sites, and removable drives. When Gamarue infects a device, it becomes a distribution channel for other malware. We've seen it distribute other malware such as info stealers, spammers, clickers, downloaders, and rogues.
* **Bondat** typically arrives through fictitious Nullsoft Scriptable Install System (NSIS), Java installers, and removable drives. When Bondat infects a system, it gathers information about the machine such as device name, Globally Unique Identifier (GUID), and OS build. It then sends that information to a remote server.
security Secure By Default https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/secure-by-default.md
You should only consider using overrides in the following scenarios:
- Phishing simulations: Simulated attacks can help you identify vulnerable users before a real attack impacts your organization. To prevent phishing simulation messages from being filtered, see [Configure third-party phishing simulations in the advanced delivery policy](/microsoft-365/security/office-365-security/configure-advanced-delivery#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy). - Security/SecOps mailboxes: Dedicated mailboxes used by security teams to get unfiltered messages (both good and bad). Teams can then review to see if they contain malicious content. For more information, see [Configure SecOps mailboxes in the advanced delivery policy](/microsoft-365/security/office-365-security/configure-advanced-delivery#use-the-microsoft-365-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy).-- Third-party filters: Secure by default only applies when the MX record for your domain is set to Exchange Online Protection (contoso.mail.protection.outlook.com). If itΓÇÖs set to another service or device, it is possible to override Secure by default with a [Transport Rule](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl) to bypass all spam filtering. When Microsoft detects messages as High Confidence Phish with this rule in place, they still deliver to the Inbox.
+- Third-party filters: Secure by default only applies when the MX record for your domain is set to Exchange Online Protection (contoso.mail.protection.outlook.com). If it's set to another service or device, it is possible to override Secure by default with a [Transport Rule](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl) to bypass all spam filtering. When Microsoft detects messages as High Confidence Phish with this rule in place, they still deliver to the Inbox.
- False positives: You might want to temporarily allow certain messages that are still being analyzed by Microsoft [via Admin submissions](admin-submission.md). As with all overrides, it is recommended that they are temporary.
security Threat Trackers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-trackers.md
Typically Noteworthy trackers will be posted for just a couple of weeks when we
### Trending trackers
-Trending trackers (formerly called Campaigns) highlight new threats received in your organization's email in the past week. The Trending trackers view provides dynamic assessments of email threats impacting your organizationΓÇÖs Office 365 environment. This view shows tenant level malware trends, identifying malware families on the rise, flat, or declining, giving admins greater insight into which threats require further attention.
+Trending trackers (formerly called Campaigns) highlight new threats received in your organization's email in the past week. The Trending trackers view provides dynamic assessments of email threats impacting your organization's Office 365 environment. This view shows tenant level malware trends, identifying malware families on the rise, flat, or declining, giving admins greater insight into which threats require further attention.
:::image type="content" source="../../media/d2ccc1a0-2a1d-4e36-99b5-6766c207772f.png" alt-text="The example of trending malware campaigns widget" lightbox="../../media/d2ccc1a0-2a1d-4e36-99b5-6766c207772f.png":::
security Try Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/try-microsoft-defender-for-office-365.md
When you evaluate Defender for Office 365, the policies that control protection
As explained in the previous step, Enhanced Filtering for Connectors is automatically configured on the connector that you specify as the source of mail from the protection service.
- Turning on Enhanced Filtering for Connectors without an SCL=-1 rule for incoming mail from the protection service will vastly improve the detection capabilities of EOP protection features like [spoof intelligence](anti-spoofing-protection.md), and could impact the delivery of those newly-detected message (for example, move to the Junk Email folder or to quarantine). This impact is limited to EOP policies; as previously explained, Defender for Office 365 policies are created in audit mode.
+ Turning on Enhanced Filtering for Connectors without an SCL=-1 rule for incoming mail from the protection service will vastly improve the detection capabilities of EOP protection features like [spoof intelligence](anti-spoofing-protection.md), and could impact the delivery of those newly-detected messages (for example, move to the Junk Email folder or to quarantine). This impact is limited to EOP policies; as previously explained, Defender for Office 365 policies are created in audit mode.
To create an SCL=-1 mail flow rule or to review your existing rules, click the **Go to Exchange admin center** button on the page. For more information, see [Use mail flow rules to set the spam confidence level (SCL) in messages in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl). When you're finished, click **Finish**.
- - **I'm only using Microsoft Exchange Online**: Yhe MX records for your domain point to Microsoft 365. There's nothing left to configure, so click **Finish**.
+ - **I'm only using Microsoft Exchange Online**: The MX records for your domain point to Microsoft 365. There's nothing left to configure, so click **Finish**.
5. A progress dialog appears as your evaluation is set up. When set up is complete, click **Done**.
When you evaluate Defender for Office 365, the policies that control protection
- The [Threat protection status report](view-email-security-reports.md#threat-protection-status-report) shows detections by Defender for Office 365 in the following views: - [View data by Email \> Malware and Chart breakdown by Detection Technology](view-email-security-reports.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology)
- - [View data by Email \> Spam and Chart breakdown by Detection Technology](view-email-security-reports.md#view-data-by-email--spam-and-chart-breakdown-by-detection-technology)
- [View data by Email \> Phish and Chart breakdown by Detection Technology](view-email-security-reports.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology) - In [Threat Explorer](threat-explorer.md), messages that were detected by the Defender for Office 365 evaluation show the following banner in the details of the entry:
security View Email Security Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/view-email-security-reports.md
The Exchange Online Protection (EOP) and Microsoft Defender for Office 365 repor
|**URL trace** <p> Get-URLTrace|[URL protection report](view-reports-for-mdo.md#url-protection-report) <p> [Get-SafeLinksAggregateReport](/powershell/module/exchange/get-safelinksaggregatereport) <br> [Get-SafeLinksDetailReport](/powershell/module/exchange/get-safelinksdetailreport)|MC239999|June 2021| |**Sent and received email report** <p> Get-MailTrafficReport <br> Get-MailDetailReport|[Threat protection status report](#threat-protection-status-report) <br> [Mailflow status report](#mailflow-status-report) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport) <br> [Get-MailFlowStatusReport](/powershell/module/exchange/get-mailflowstatusreport)|MC236025|June 2021| |**Forwarding report** <p> no cmdlets|[Auto-forwarded messages report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report) <p> no cmdlets|MC250533|June 2021|
-|**Safe Attachments file types report** <p> Get-AdvancedThreatProtectionTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250532|June 2021|
-|**Safe Attachments message disposition report** <p> Get-AdvancedThreatProtectionTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250531|June 2021|
-|**Malware detected in email report** <p> Get-MailTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250530|June 2021|
+|**Safe Attachments file types report** <p> Get-AdvancedThreatProtectionTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250532|June 2021|
+|**Safe Attachments message disposition report** <p> Get-AdvancedThreatProtectionTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250531|June 2021|
+|**Malware detected in email report** <p> Get-MailTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250530|June 2021|
|**Spam detection report** <p> Get-MailTrafficReport <br> Get-MailDetailSpamReport|[Threat protection status report: View data by Email \> Spam](#view-data-by-email--spam-and-chart-breakdown-by-detection-technology) <p> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250529|October 2021| |Get-AdvancedThreatProtectionDocumentReport <p> Get-AdvancedThreatProtectionDocumentDetail|[Get-ContentMalwareMdoAggregateReport](/powershell/module/exchange/get-contentmalwaremdoaggregatereport) <p> [Get-ContentMalwareMdoDetailReport](/powershell/module/exchange/get-contentmalwaremdodetailreport)|TBA|May 2022| |**Exchange transport rule report** <p> [Get-MailTrafficPolicyReport](/powershell/module/exchange/get-mailtrafficpolicyreport) <br> [Get-MailDetailTransportRuleReport](/powershell/module/exchange/get-maildetailtransportrulereport)|[Exchange transport rule report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-exchange-transport-rule-report) <p> [Get-MailTrafficPolicyReport](/powershell/module/exchange/get-mailtrafficpolicyreport) <br> [Get-MailDetailTransportRuleReport](/powershell/module/exchange/get-maildetailtransportrulereport)|MC316157|April 2022|
solutions Manage Devices With Intune App Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-devices-with-intune-app-protection.md
To configure these policies, use the recommended guidance and settings prescribe
## Next steps
-Go to [Step 2. Enroll devices into management with Intune](manage-devices-with-intune-enroll.md).
+Go to [Step 2. Enroll devices to Intune](manage-devices-with-intune-enroll.md).
solutions Manage Devices With Intune Compliance Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-devices-with-intune-compliance-policies.md
keywords:
# Step 3. Set up compliance policies for devices with Intune
-Enrolling devices into management gives you the ability to achieve even greater security and control of data in your environment. [Step 2. Enroll devices into management](manage-devices-with-intune-enroll.md) details how to accomplish this using Intune and Autopilot. This article covers the next step, which is to configure device compliance policies.
+Enrolling devices to Intune gives you the ability to achieve even greater security and control of data in your environment. [Step 2. Enroll devices to Intune](manage-devices-with-intune-enroll.md) details how to accomplish this using Intune. This article covers the next step, which is to configure device compliance policies.
![Steps managing devices](../medim-step-2.png#lightbox)
solutions Manage Devices With Intune Dlp Mip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-devices-with-intune-dlp-mip.md
If your information protection and governance team is ready to extend DLP polici
![Endpoint DLP steps for the device admin](../media/devices/endpoint-dlp-steps.png#lightbox)
-If you completed [Step 2. Enroll devices into management](manage-devices-with-intune-enroll.md) and [Step 6. Enroll devices into Defender for Endpoint to monitor device risk and compliance to security baselines](manage-devices-with-intune-monitor-risk.md), your devices are already enabled for Endpoint DLP.
+If you completed [Step 2. Enroll devices to Intune](manage-devices-with-intune-enroll.md) and [Step 6. Enroll devices into Defender for Endpoint to monitor device risk and compliance to security baselines](manage-devices-with-intune-monitor-risk.md), your devices are already enabled for Endpoint DLP.
Use the following steps to work with your information protection team.
solutions Manage Devices With Intune Enroll https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-devices-with-intune-enroll.md
keywords:
-# Step 2. Enroll devices into management with Intune
+# Step 2. Enroll devices to Intune
-There are several ways to secure the endpoint, a term often used to refer to the combined entity including devices, apps, and user identity. Security policies must be enforced consistently and reliably not only on the apps but the device itself. Enrolling the device into management and registering with a cloud identity provider, such as Azure Active Directory, is a great start.
+There are several ways to secure the endpoint, a term often used to refer to the combined entity including devices, apps, and user identity. Security policies must be enforced consistently and reliably not only on the apps but the device itself. Enrolling the device to Intune and registering with a cloud identity provider, such as Azure Active Directory, is a great start.
Whether a device is a personally owned BYOD device or a corporate-owned and fully managed device, it's good to have visibility into the endpoints accessing your organizationΓÇÖs resources to ensure youΓÇÖre only allowing healthy and compliant devices. This includes the health and trustworthiness of mobile and desktop apps that run on endpoints. You want to ensure those apps are healthy and compliant and that they prevent corporate data from leaking to consumer apps or services through malicious intent or accidental means. The device enrollment process establishes a relationship between the user, the device, and the Microsoft Intune service. Using Microsoft Intune as a standalone service enables you to use a single web-based administration console to manage Windows PCs, macOS, and the most popular mobile device platforms.
-This article recommends methods for enrolling devices into management using Intune. For more information about these methods and how to deploy each one, see [Deployment guidance: Enroll devices in Microsoft Intune](/mem/intune/fundamentals/deployment-guide-enrollment).
+This article recommends methods for enrolling devices to Intune. For more information about these methods and how to deploy each one, see [Deployment guidance: Enroll devices in Microsoft Intune](/mem/intune/fundamentals/deployment-guide-enrollment).
![Steps for managing devices](../medim-steps-1.png#lightbox)
solutions Manage Devices With Intune Monitor Risk https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-devices-with-intune-monitor-risk.md
keywords:
After your organization has deployed Microsoft Defender for Endpoint, you can gain greater insights and protection of your devices by integrating Microsoft Intune with Defender for Endpoint. For mobile devices, this includes the ability to monitor device risk as a condition for access. For Windows devices, you can monitor compliance of these devices to security baselines.
+Note: Deploying Microsoft Defender for Endpoint includes onboarding endpoints. For more information about onboarding devices for Microsoft 365 capabilties, see [Enrolling devices vs. onboarding devices](manage-devices-with-intune-overview.md#enrolling-devices-vs-onboarding-devices).
+ ![Defender for Endpoint and Microsoft Intune integration illustration](../media/devices/devices-defender-for-endpoint-steps.png#lightbox) In this illustration: - Microsoft Defender for Endpoint greatly increases the sophistication of threat protection for devices. - While Microsoft Intune allows you to set App Protection Policies and manage devices (including configuration changes), Defender for Endpoint continuously monitors your devices for threats and can take automated action to remediate attacks. -- You can use Intune to onboard devices to Defender for Endpoint. When you do this, you are also enabling these devices to work with Microsoft 365 Endpoint data loss prevention (Endpoint DLP).
+- You can use Intune to onboard devices to Defender for Endpoint. When you do this, you are also enabling these devices to work with Microsoft 365 Compliance capabilities, including endpoint data loss prevention (DLP).
This article includes these steps: - Connect Microsoft Intune to Defender for Endpoint
solutions Manage Devices With Intune Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/manage-devices-with-intune-overview.md
While Microsoft 365 includes several tools and methodologies for managing and pr
- Plan to enroll devices into Intune through Azure AD Join (including Hybrid Azure AD Join). - Plan to manually enroll devices into Intune.-- Allow BYOD devices with plans to implement protection for apps and data and/or enroll these devices into management.
+- Allow BYOD devices with plans to implement protection for apps and data and/or enroll these devices to Intune.
On the other hand, if your environment includes plans for co-management including Microsoft Endpoint Configuration Manager, see [Co-management documentation](/mem/configmgr/comanage/) to develop the best path for your organization. If your environment includes plans for Windows 365 Cloud PC, see [Windows 365 Enterprise documentation](/windows-365/enterprise/) to develop the best path for your organization.
This series of articles walks through a recommended process for managing devices
## Implementing the layers of protection on and for devices
-Protecting the data and apps on devices and the devices themselves is a multi-layer process. There are some protections you can gain on unmanaged devices. After enrolling devices into management, you can implement more sophisticated controls. When threat protection is deployed across your endpoints, you gain even more insights and the ability to automatically remediate some attacks. Finally, if your organization has put the work into identifying sensitive data, applying classification and labels, and configuring data loss prevention policies, you can obtain even more granular protection for data on your endpoints.
+Protecting the data and apps on devices and the devices themselves is a multi-layer process. There are some protections you can gain on unmanaged devices. After enrolling devices to Intune, you can implement more sophisticated controls. When threat protection is deployed across your endpoints, you gain even more insights and the ability to automatically remediate some attacks. Finally, if your organization has put the work into identifying sensitive data, applying classification and labels, and configuring data loss prevention policies, you can obtain even more granular protection for data on your endpoints.
The following diagram illustrates building blocks to achieve a Zero Trust security posture for Microsoft 365 and other SaaS apps that you introduce to this environment. The elements related to devices are numbered 1 through 7. These are the layers of protection device admins will coordinate with other administrators to accomplish.
In this illustration:
|&nbsp;|Step|Description|Licensing requirements| ||||| |1|Configure starting-point Zero Trust identity and device access policies|Work with your identity administrator to [Implement Level 2 App Protection Policies (APP) data protection](manage-devices-with-intune-app-protection.md). These policies do not require that you manage devices. You configure the APP policies in Intune. Your identity admin configures a Conditional Access policy to require approved apps.|E3, E5, F1, F3, F5|
-|2|Enroll devices into management|This task requires more planning and time to implement. Microsoft recommends using Intune to enroll devices because this tool provides optimal integration. There are several options for enrolling devices, depending on the platform. For example, Windows devices can be enrolled by using Azure AD Join or by using Autopilot. You need to review the options for each platform and decide which enrollment option is best for your environment. See [Step 3ΓÇöEnroll devices into management](manage-devices-with-intune-enroll.md) for more information.|E3, E5, F1, F3, F5|
+|2|Enroll devices to Intune|This task requires more planning and time to implement. Microsoft recommends using Intune to enroll devices because this tool provides optimal integration. There are several options for enrolling devices, depending on the platform. For example, Windows devices can be enrolled by using Azure AD Join or by using Autopilot. You need to review the options for each platform and decide which enrollment option is best for your environment. See [Step 3ΓÇöEnroll devices to Intune](manage-devices-with-intune-enroll.md) for more information.|E3, E5, F1, F3, F5|
|3|Configure compliance policies|You want to be sure devices that are accessing your apps and data meet minimum requirements, for example devices are password or pin-protected and the operating system is up to date. Compliance policies are the way to define the requirements that devices must meet. [Step 3. Set up compliance policies](manage-devices-with-intune-compliance-policies.md) helps you configure these policies.|E3, E5, F3, F5| |4|Configure Enterprise (recommended) Zero Trust identity and device access policies|Now that your devices are enrolled, you can work with your identity admin to [tune Conditional Access policies to require healthy and compliant devices](manage-devices-with-intune-require-compliance.md).|E3, E5, F3, F5| |5|Deploy configuration profiles|As opposed to device compliance policies that simply mark a device as compliant or not based on criteria you configure, configuration profiles actually change the configuration of settings on a device. You can use configuration policies to harden devices against cyberthreats. See [Step 5. Deploy configuration profiles](manage-devices-with-intune-configuration-profiles.md).|E3, E5, F3, F5|
HereΓÇÖs an illustration of the recommended policy set with step callouts for th
In this illustration: - In Step 1, [Implement Level 2 App Protection Policies (APP)](manage-devices-with-intune-app-protection.md) you configure the recommended level of data protection with APP policies. Then you work with your identity team to configure the related Conditional Access rule to require use of this protection.-- In Steps 2, 3 and 4, you enroll devices into management with Intune/MEM, define device compliance policies, and then coordinate with your identity team to configure the related Conditional Access rule to only allow access to compliant devices.
+- In Steps 2, 3 and 4, you enroll devices into management with Intune, define device compliance policies, and then coordinate with your identity team to configure the related Conditional Access rule to only allow access to compliant devices.
<! ## Managing change with users
In this illustration:
## Enrolling devices vs. onboarding devices
-If you follow this guidance, you will enroll devices into management using Intune (or another tool) and you will onboard devices for two
+If you follow this guidance, you will enroll devices into management using Intune and you will onboard devices for the following Microsoft 365 capabilities:
-- Defender for Endpoint-- Endpoint DLP
+- Microsoft Defender for Endpoint
+- Microsoft 365 Compliance (for endpoint data loss prevention (DLP))
The following illustration details how this works using Intune.
The following illustration details how this works using Intune.
In the illustration: 1. Enroll devices into management with Intune.
-2. Use Intune to onboard devices to Defender for Endpoint.
-3. Devices that are onboarded to Defender for Endpoint are also onboarded for Microsoft 365 compliance features, including Endpoint DLP.
+2. Use Intune to onboard devices to Microsoft Defender for Endpoint.
+3. Devices that are onboarded to Defender for Endpoint are also onboarded for Microsoft 365 compliance features, including endpoint DLP.
-Note that only Intune is managing devices. Onboarding refers to the ability for a device to share information with a specific service. The following table summarizes the differences between enrolling devices into management and onboarding devices for a specific service.
+Note that only Intune is managing devices. Onboarding refers to the ability for a device to share information with a specific service capability. The following table summarizes the differences between enrolling devices into management and onboarding devices for a specific capability.
|&nbsp;|Enroll|Onboard| |||| |Description|Enrollment applies to managing devices. Devices are enrolled for management with Intune or Configuration Manager.|Onboarding configures a device to work with a specific set of capabilities in Microsoft 365. Currently, onboarding applies to Microsoft Defender for Endpoint and Microsoft compliance capabilities. <br/><br/> On Windows devices, onboarding involves toggling a setting in Windows Defender that allows Defender to connect to the online service and accept policies that apply to the device.|
-|Scope|These device management tools manage the entire device, including configuring the device to meet specific objectives, like security.|Onboarding only affects the services that apply.|
+|Scope|These device management tools manage the entire device, including configuring the device to meet specific objectives, like security.|Onboarding only affects the capabilities that apply.|
|Recommended method|Azure Active Directory join automatically enrolls devices into Intune.|Intune is the preferred method for onboarding devices to Windows Defender for Endpoint, and consequently Microsoft 365 compliance capabilities. <br/><br/> Note that devices that are onboarded to Microsoft 365 compliance capabilities using other methods are not automatically enrolled for Defender for Endpoint.| |Other methods|Other methods of enrollment depend on the platform of the device and whether it is BYOD or managed by your organization.|Other methods for onboarding devices include, in recommended order: <ul><li>Configuration Manager</li><li>Other mobile device management tool (if the device is managed by one)</li><li>Local script</li><li>VDI configuration package for onboarding non-persistent virtual desktop infrastructure (VDI) devices</li><li>Group Policy</li></ul>|