Home NewsX Monthly news – September 2024

Monthly news – September 2024

by info.odysseyx@gmail.com
0 comment 4 views


Microsoft Defender Vulnerability Management
Product Improvement.png (Preview) Enhance vulnerability prioritization with asset context and EPSS. In this articleLet’s take a closer look at each of these improvements, how they contribute to a more robust vulnerability prioritization process, and how you can use them.
Microsoft Security Exposure Management
Sign up for public preview.png

new Predefined ID Classification Added to the list of critical assets. Please review the full list. Our Documents.

Microsoft Defender for Endpoints
MS.png's blog Safe Deployment Practices for Microsoft Defender for Endpoint. This blog post Briefly describes how Microsoft uses secure deployment practices for Defender for Endpoint.
Sign up for public preview.png

We’re excited to share it. Microsoft again named a leader in endpoint security.! This demonstrates our commitment to keeping our customers safe with Defender’s AI-based end-to-end protection. In today’s digital world, securing your devices is more important than ever, and Microsoft Defender ensures comprehensive security across all your devices. Read About our detailed blog that.

Sign up for public preview.png

(preview) Global Exclusions for Linux is in public preview.. Global exclusions apply to Real-Time Protection (RTP), Behavior Monitoring (BM), and Endpoint Detection and Response (EDR). For more information, see Our Documents.

Sign up for public preview.png Network protection features are enabled by default for all users of Defender for Endpoint for Android.. Learn more Our Documents.
Sign up for public preview.png (preview) Streamlined onboarding for Defender for Endpoint for Android is in public preview. Learn more in this detailed article. Blog Posts.
Documentation about MS.png

Evaluate Defender Antivirus using Defender Endpoint Security Settings Management.

This document describes the configuration. Options that guide you through enabling and testing the key protections of Defender Antivirus and Defender Exploit Guard on Windows 10 and later and Windows Server 2016 and later. Also provides instructions and links to more information.

Sign up for public preview.png (preview) Motion Monitoring for macOS is now available in public preview.. Behavioral monitoring monitors process behavior to detect and analyze potential threats based on the behavior of applications, daemons, and files within the system. Behavioral monitoring observes how software behaves in real time, allowing you to quickly adapt and block new and evolving threats. For more information, see: Behavior monitoring in Defender for Endpoint on macOS.
Sign up for public preview.png I am pleased to announce this. Defender for Endpoint and Defender for Identity now support local data residency in India. For more details, check out this blog post.
Microsoft Defender for Cloud Apps
Sign up for public preview.png

Defender for Cloud Apps delivers a new, seamless app onboarding experience for inline capabilities.. We are eliminating all manual Entra ID app onboarding steps and automating the experience of enforcing session and access policies. Customers will also receive notifications on how to resolve common errors during the onboarding process.

This new experience Customers can create on-the-go data insurance policies using the Entra ID app directly from the Entra catalog, eliminating the need for MDA onboarding configuration.

Sign up for public preview.png

(Preview) New Defender features for cloud apps”Large-scale export of activity logs” is now available in public preview! This new feature allows users to export records from the “Activity Log” page going back up to 6 months or 100,000 records, greatly improving your ability to investigate events and suspicious activity in your environment! For more information, visit: Export activities 6 months ago.

Sign up for public preview.png

We are extending the capabilities of the Defender for Cloud app and Microsoft Edge browser to accommodate more use cases by implementing the following policies::
Threat Protection:
– Prevents malware from being downloaded from business SaaS apps to end-user devices.
– Prevents malware from being uploaded from devices to business SaaS apps.

Information Protection:
– Block sensitive file uploads to SaaS apps
-Paste block

Additionally, we now provide support for end users accessing SaaS apps on macOS.

With in-browser protection, Edge browser users (BYOD or company-owned devices) can enjoy a seamless app experience with no lag, no app compatibility issues, and a higher level of security, depending on session policies. Click here For more details.

Documentation about MS.png

Defender Reconfiguration Guide for Cloud Apps
We’ve reorganized the Defender for Cloud Apps documentation to highlight key product elements and use cases and align with the overall Microsoft Defender documentation.

To provide feedback on the Defender for Cloud Apps documentation, please use the feedback mechanisms located at the top and bottom of each documentation page.

Microsoft Defender for Office 365
Sign up for public preview.png

Automating tenant allow/block list entries. We are excited to announce that we have recently launched:Last used date For domains, email addresses, URLs, or files that are allowed or blocked in Defender for Office 365. For blocked items, the last used date is updated when the filtering system detects the entity (either on click or in mail flow). For allowed items, an allowed item is triggered and the last used date is updated when the filtering system determines the entity is malicious (either on click or in mail flow). For more information, This blog post.

MS.png's blog

Security Architecture Design – How Defender for Office 365 Protects Against EchoSpoofing. This blog We provide short Overview Method This particular attack is exploited Their specific architecture and explain Architectural best practices implemented by Microsoft Defender for Office 365 help prevent security issues such as: echoSPuffing and Spoofing attack generally.

Sign up for public preview.png

Availability of attack simulations and training in additional areas (ITA, ESP, MEX and ISR). Check Instructions on how to start attack simulation training.

Sign up for public preview.png

Use Outlook’s built-in report buttons: Built-in report Buttons are now supported in Outlook for Microsoft 365 and Outlook 2021. User-reported settings How to report a message as phishing, junk, or not junk

Sign up for public preview.png

(Preview) YNow you can run it simulation Include QR code payload Attack simulation trainingYou can track user responses and assign training to end users.

Microsoft Defender for Identity
Sign up for public preview.png

New Microsoft Defender for Identity sensor for Entra Connect servers. As part of our ongoing efforts to improve Microsoft Defender for Identity coverage in hybrid identity environments, we are introducing new sensors for Entra Connect servers. We are also releasing three new hybrid security detections and four new identity posture recommendations specifically for Entra Connect to help customers stay protected and mitigate potential risks. For more information, visit: Entra Connect Blog Post.

Product Improvement.png Defender for Identity PowerShell Module Update
that Module improvements It is designed to address some of the feedback provided by the community and add new features.





Source link

You may also like

Leave a Comment

Our Company

Welcome to OdysseyX, your one-stop destination for the latest news and opportunities across various domains.

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

Laest News

@2024 – All Right Reserved. Designed and Developed by OdysseyX