Monthly news – September 2024 by info.odysseyx@gmail.com September 3, 2024 written by info.odysseyx@gmail.com September 3, 2024 0 comment 4 views 4 Microsoft Defender Vulnerability Management (Preview) Enhance vulnerability prioritization with asset context and EPSS. In this articleLet’s take a closer look at each of these improvements, how they contribute to a more robust vulnerability prioritization process, and how you can use them. Microsoft Security Exposure Management new Predefined ID Classification Added to the list of critical assets. Please review the full list. Our Documents. Microsoft Defender for Endpoints Safe Deployment Practices for Microsoft Defender for Endpoint. This blog post Briefly describes how Microsoft uses secure deployment practices for Defender for Endpoint. We’re excited to share it. Microsoft again named a leader in endpoint security.! This demonstrates our commitment to keeping our customers safe with Defender’s AI-based end-to-end protection. In today’s digital world, securing your devices is more important than ever, and Microsoft Defender ensures comprehensive security across all your devices. Read About our detailed blog that. (preview) Global Exclusions for Linux is in public preview.. Global exclusions apply to Real-Time Protection (RTP), Behavior Monitoring (BM), and Endpoint Detection and Response (EDR). For more information, see Our Documents. Network protection features are enabled by default for all users of Defender for Endpoint for Android.. Learn more Our Documents. (preview) Streamlined onboarding for Defender for Endpoint for Android is in public preview. Learn more in this detailed article. Blog Posts. Evaluate Defender Antivirus using Defender Endpoint Security Settings Management. This document describes the configuration. Options that guide you through enabling and testing the key protections of Defender Antivirus and Defender Exploit Guard on Windows 10 and later and Windows Server 2016 and later. Also provides instructions and links to more information. (preview) Motion Monitoring for macOS is now available in public preview.. Behavioral monitoring monitors process behavior to detect and analyze potential threats based on the behavior of applications, daemons, and files within the system. Behavioral monitoring observes how software behaves in real time, allowing you to quickly adapt and block new and evolving threats. For more information, see: Behavior monitoring in Defender for Endpoint on macOS. I am pleased to announce this. Defender for Endpoint and Defender for Identity now support local data residency in India. For more details, check out this blog post. Microsoft Defender for Cloud Apps Defender for Cloud Apps delivers a new, seamless app onboarding experience for inline capabilities.. We are eliminating all manual Entra ID app onboarding steps and automating the experience of enforcing session and access policies. Customers will also receive notifications on how to resolve common errors during the onboarding process. This new experience Customers can create on-the-go data insurance policies using the Entra ID app directly from the Entra catalog, eliminating the need for MDA onboarding configuration. (Preview) New Defender features for cloud apps”Large-scale export of activity logs” is now available in public preview! This new feature allows users to export records from the “Activity Log” page going back up to 6 months or 100,000 records, greatly improving your ability to investigate events and suspicious activity in your environment! For more information, visit: Export activities 6 months ago. We are extending the capabilities of the Defender for Cloud app and Microsoft Edge browser to accommodate more use cases by implementing the following policies:: Threat Protection: – Prevents malware from being downloaded from business SaaS apps to end-user devices. – Prevents malware from being uploaded from devices to business SaaS apps. Information Protection: – Block sensitive file uploads to SaaS apps -Paste block Additionally, we now provide support for end users accessing SaaS apps on macOS. With in-browser protection, Edge browser users (BYOD or company-owned devices) can enjoy a seamless app experience with no lag, no app compatibility issues, and a higher level of security, depending on session policies. Click here For more details. Defender Reconfiguration Guide for Cloud AppsWe’ve reorganized the Defender for Cloud Apps documentation to highlight key product elements and use cases and align with the overall Microsoft Defender documentation. To provide feedback on the Defender for Cloud Apps documentation, please use the feedback mechanisms located at the top and bottom of each documentation page. Microsoft Defender for Office 365 Automating tenant allow/block list entries. We are excited to announce that we have recently launched:Last used date For domains, email addresses, URLs, or files that are allowed or blocked in Defender for Office 365. For blocked items, the last used date is updated when the filtering system detects the entity (either on click or in mail flow). For allowed items, an allowed item is triggered and the last used date is updated when the filtering system determines the entity is malicious (either on click or in mail flow). For more information, This blog post. Security Architecture Design – How Defender for Office 365 Protects Against EchoSpoofing. This blog We provide short Overview Method This particular attack is exploited Their specific architecture and explain Architectural best practices implemented by Microsoft Defender for Office 365 help prevent security issues such as: echoSPuffing and Spoofing attack generally. Availability of attack simulations and training in additional areas (ITA, ESP, MEX and ISR). Check Instructions on how to start attack simulation training. Use Outlook’s built-in report buttons: Built-in report Buttons are now supported in Outlook for Microsoft 365 and Outlook 2021. User-reported settings How to report a message as phishing, junk, or not junk (Preview) YNow you can run it simulation Include QR code payload Attack simulation trainingYou can track user responses and assign training to end users. Microsoft Defender for Identity New Microsoft Defender for Identity sensor for Entra Connect servers. As part of our ongoing efforts to improve Microsoft Defender for Identity coverage in hybrid identity environments, we are introducing new sensors for Entra Connect servers. We are also releasing three new hybrid security detections and four new identity posture recommendations specifically for Entra Connect to help customers stay protected and mitigate potential risks. For more information, visit: Entra Connect Blog Post. Defender for Identity PowerShell Module Updatethat Module improvements It is designed to address some of the feedback provided by the community and add new features. Source link Share 0 FacebookTwitterPinterestEmail info.odysseyx@gmail.com previous post Improvements to the title area at the top of SharePoint Pages and News next post Post-retirement action for Azure App Service v1/v2, Logic Apps ISE, and API Management stv1 You may also like Insights from MVPs at the Power Platform Community Conference October 10, 2024 Restoring an MS SQL 2022 DB from a ANF SnapShot October 10, 2024 Your guide to Intune at Microsoft Ignite 2024 October 10, 2024 Partner Blog | Build your team’s AI expertise with upcoming Microsoft partner skilling opportunities October 10, 2024 Attend Microsoft Ignite from anywhere in the world! October 10, 2024 Get tailored support with the new Partner Center AI assistant (preview) October 10, 2024 Leave a Comment Cancel Reply Save my name, email, and website in this browser for the next time I comment.