Microsoft Docs - Latest Articles

As the new home for Microsoft technical documentation, docs.microsoft.com has not only modernized the web experience for content, but also how we create and support the content you use to learn, manage and deploy solutions. It is the one-stop shop for everything related to Microsoft technologies. In order to make sure you can keep up to date on what’s new and exciting on docs.microsoft.com, we’ve created a dedicated feed for you.


Selected Feed: Microsoft 365

What's new in Bot Framework Composer

https://docs.microsoft.com/en-us/composer/what-is-new Learn about updates, improvements and new features in Bot Framework Composer, a visual authoring tool for building conversational AI applications.
Published Date : Monday, August 2, 2021

Governance overview - Microsoft Service Assurance

https://docs.microsoft.com/en-us/compliance/assurance/assurance-governance Learn about compliance governance in Microsoft online services.
Published Date : Thursday, April 1, 2021

In development - Microsoft Intune

https://docs.microsoft.com/en-us/mem/intune/fundamentals/in-development Microsoft Intune features in development
Published Date : Wednesday, December 1, 2021

Microsoft 365 Apps health - Deploy Office

https://docs.microsoft.com/en-us/deployoffice/admincenter/microsoft-365-apps-health Provides Office admins information about Microsoft 365 Apps health within their environment
Published Date : Thursday, April 1, 2021

User reported message settings - Office 365

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/user-submission Admins can learn how to configure a mailbox to collect spam and phishing email that are reported by users.
Published Date : Thursday, April 1, 2021

Investigate incidents in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/investigate-incidents Investigate incidents related to devices, users, and mailboxes.
Published Date : Thursday, April 1, 2021

Incident response with Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview Investigate incidents seen across devices, users, and mailboxes in the Microsoft 365 Defender portal.
Published Date : Thursday, April 1, 2021

Migrate advanced hunting queries from Microsoft Defender for Endpoint

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-migrate-from-mde Learn how to adjust your Microsoft Defender for Endpoint queries so you can use them in Microsoft 365 Defender
Published Date : Thursday, April 1, 2021

Set the password expiration policy for your organization - Microsoft 365 admin

https://docs.microsoft.com/en-us/microsoft-365/admin/manage/set-password-expiration-policy Learn how an admin can set a password expiration policy for your business, school, or nonprofit in Microsoft 365 admin center.
Published Date : Thursday, April 1, 2021

Overview of custom detections in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/custom-detections-overview Understand how you can use advanced hunting to create custom detections and generate alerts
Published Date : Thursday, April 1, 2021

Investigate alerts in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/investigate-alerts Investigate alerts seen across devices, users, and mailboxes.
Published Date : Thursday, April 1, 2021

Investigate users in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/investigate-users Investigate users for an incident in the Microsoft 365 Defender portal.
Published Date : Thursday, April 1, 2021

Prioritize incidents in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/incident-queue Learn how to filter incidents from the incident queue in Microsoft 365 Defender
Published Date : Thursday, April 1, 2021

Work with advanced hunting query results in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-results Make the most of the query results returned by advanced hunting in Microsoft 365 Defender
Published Date : Thursday, April 1, 2021

AssignedIPAddresses() function in advanced hunting for Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-assignedipaddresses-function Learn how to use the AssignedIPAddresses() function to get the latest IP addresses assigned to a device
Published Date : Thursday, April 1, 2021

Create and manage custom detection rules in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/custom-detection-rules Learn how to create and manage custom detections rules based on advanced hunting queries
Published Date : Thursday, April 1, 2021

Use shared queries in Microsoft 365 Defender advanced hunting

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-shared-queries Start threat hunting immediately with predefined and shared queries. Share your queries to the public or to your organization.
Published Date : Thursday, April 1, 2021

Learn the advanced hunting query language in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-language Create your first threat hunting query and learn about common operators and other aspects of the advanced hunting query language
Published Date : Thursday, April 1, 2021

Overview - Advanced hunting

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-overview Learn about advanced hunting queries in Microsoft 365 and how to use them to proactively find threats and weaknesses in your network
Published Date : Thursday, April 1, 2021

Learn about retention policies & labels to automatically retain or delete content - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/retention Learn about retention policies and retention labels that help you to retain what you need and delete what you don't.
Published Date : Thursday, April 1, 2021

Threat analytics in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/threat-analytics Learn about emerging threats and attack techniques and how to stop them. Assess their impact to your organization and evaluate your organizational resilience.
Published Date : Thursday, April 1, 2021

EmailPostDeliveryEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table Learn about post-delivery actions taken on Microsoft 365 emails in the EmailPostDeliveryEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Data tables in the Microsoft 365 Defender advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-schema-tables Learn about the tables in the advanced hunting schema to understand the data you can run threat hunting queries on
Published Date : Thursday, April 1, 2021

EmailUrlInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table Learn about URL or link information in the EmailUrlInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

FileProfile() function in advanced hunting for Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-fileprofile-function Learn how to use the FileProfile() to enrich information about files in your advanced hunting query results
Published Date : Thursday, April 1, 2021

Get started with Microsoft Compliance Manager - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-setup Set Microsoft Compliance Manager user permissions and roles, and configure automated testing of actions. Manage user history and filter your dashboard view.
Published Date : Thursday, April 1, 2021

Get started with sensitivity labels - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-sensitivity-labels Ready to deploy sensitivity labels to help protect your organization's data, but not sure where to start? Read some practical guidance to help get you on your labeling journey.
Published Date : Thursday, April 1, 2021

Protect information subject to data privacy regulation

https://docs.microsoft.com/en-us/microsoft-365/solutions/information-protection-deploy-protect-information Deploy Microsoft 365 security and compliance features and protect your personal information.
Published Date : Tuesday, June 9, 2020

Get expert training on advanced hunting

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-expert-training Free training and guidance from advanced hunting experts
Published Date : Thursday, April 1, 2021

Naming changes in the Microsoft 365 Defender advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-schema-changes Track and review naming changes tables and columns in the advanced hunting schema
Published Date : Thursday, April 1, 2021

Vulnerable devices report - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-vulnerable-devices-report A report showing vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
Published Date : Thursday, April 1, 2021

IdentityInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-identityinfo-table Learn about user account information in the IdentityInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

EmailAttachmentInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table Learn about email attachment information in the EmailAttachmentInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Manage submissions - Office 365

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/admin-submission Admins can learn how to use the Submissions portal in the Microsoft 365 Defender portal to submit suspicious emails, suspected phishing mails, spam, and other potentially harmful messages, URLs, and email attachments to Microsoft for rescanning.
Published Date : Thursday, April 1, 2021

Get relevant info about an entity with go hunt

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-go-hunt Learn how to use the go hunt tool on to quickly query for relevant information about an entity or event using advanced hunting.
Published Date : Thursday, April 1, 2021

DeviceFileCertificateInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicefilecertificateinfo-table Learn about file signing information in the DeviceFileCertificateInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

IdentityQueryEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table Learn about Active Directory query events in the IdentityQueryEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Find ransomware with advanced hunting

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-find-ransomware Use advanced hunting to locate devices potentially affected by ransomware.
Published Date : Thursday, April 1, 2021

DeviceTvmSecureConfigurationAssessment table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicetvmsecureconfigurationassessment-table Learn about security assessment events in the DeviceTvmSecureConfigurationAssessment table of the advanced hunting schema. These events provide device information, security configuration details, impact, and compliance information.
Published Date : Thursday, April 1, 2021

EmailEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-emailevents-table Learn about events associated with Microsoft 365 emails in the EmailEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Prerequisites & permissions - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-prerequisites Before you begin using threat and vulnerability management, make sure you have the relevant configurations and permissions.
Published Date : Thursday, April 1, 2021

Hunt for exposed devices

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-hunt-exposed-devices Learn how threat and vulnerability management can be used to help security admins, IT admins, and SecOps collaborate.
Published Date : Thursday, April 1, 2021

IdentityDirectoryEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table Learn about domain controller and Active Directory events in the IdentityDirectoryEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

IdentityLogonEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table Learn about authentication events recorded by Active Directory in the IdentityLogonEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

CloudAppEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-cloudappevents-table Learn about events from cloud apps and services in the CloudAppEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

DeviceInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-deviceinfo-table Learn about OS, computer name, and other machine information in the DeviceInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

DeviceEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-deviceevents-table Learn about antivirus, firewall, and other event types in the miscellaneous device events (DeviceEvents) table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Manage sensitivity labels in Office apps - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels-office-apps Information for IT administrators to manage sensitivity labels in Office apps for desktop, mobile, and the web.
Published Date : Thursday, April 1, 2021

Get exposure score

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/get-exposure-score Retrieves the organizational exposure score.
Published Date : Thursday, April 1, 2021

Remediate vulnerabilities with threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-remediation Remediate security weaknesses discovered through security recommendations, and create exceptions if needed, in threat and vulnerability management.
Published Date : Thursday, April 1, 2021

Microsoft Defender for Endpoint on Mac

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac Learn how to install, configure, update, and use Microsoft Defender for Endpoint on Mac.
Published Date : Thursday, April 1, 2021

Advanced hunting schema reference

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/advanced-hunting-schema-reference Learn about the tables in the advanced hunting schema to understand the data you can run threat hunting queries on.
Published Date : Tuesday, January 14, 2020

DeviceRegistryEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table Learn about registry events you can query from the DeviceRegistryEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

DeviceImageLoadEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-deviceimageloadevents-table Learn about DLL loading events in the DeviceImageLoadEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Set device value API

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/set-device-value Learn how to specify the value of a device using a Microsoft Defender for Endpoint API.
Published Date : Thursday, April 1, 2021

Mitigate zero-day vulnerabilities - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-zero-day-vulnerabilities Learn how to find and mitigate zero-day vulnerabilities in your environment through threat and vulnerability management.
Published Date : Thursday, April 1, 2021

Experience Microsoft Defender for Endpoint through simulated attacks

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-simulations Run the provided attack scenario simulations to experience how Microsoft Defender for Endpoint can detect, investigate, and respond to breaches.
Published Date : Tuesday, November 20, 2018

DeviceNetworkEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table Learn about network connection events you can query from the DeviceNetworkEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

View and organize the Incidents queue

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/view-incidents-queue See the list of incidents and learn how to apply filters to limit the list and get a more focused view.
Published Date : Thursday, April 1, 2021

Overview of advanced hunting in Microsoft Defender for Endpoint

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/advanced-hunting-overview Use threat hunting capabilities in Microsoft Defender for Endpoint to build queries that find threats and weaknesses in your network
Published Date : Thursday, April 1, 2021

DeviceFileEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicefileevents-table Learn about file-related events in the DeviceFileEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Build and manage assessments in Microsoft Compliance Manager - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-assessments Build assessments in Microsoft Compliance Manager to help you meet the requirements of regulations and certifications that are important to your organization.
Published Date : Thursday, April 1, 2021

Protect your organization against web threats

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-threat-protection Learn about web protection in Microsoft Defender for Endpoint and how it can protect your organization.
Published Date : Thursday, April 1, 2021

Dashboard insights - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-dashboard-insights The threat and vulnerability management dashboard can help SecOps and security admins address cybersecurity threats and build their organization's security resilience.
Published Date : Thursday, April 1, 2021

Create and view exceptions for security recommendations - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-exception Create and monitor exceptions for security recommendations in threat and vulnerability management.
Published Date : Thursday, April 1, 2021

Working with assessment templates in Microsoft Compliance Manager - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-templates Understand how to use and manage templates for building assessments in Microsoft Compliance Manager. Create and modify templates using a formatted Excel file.
Published Date : Thursday, April 1, 2021

Understand the analyst report section in threat analytics.

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/threat-analytics-analyst-reports How the report section of threat analytics reports provides information about threats, mitigation, detections, advanced hunting queries, and more.
Published Date : Thursday, April 1, 2021

Web protection

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-protection-overview Learn about the web protection in Microsoft Defender for Endpoint and how it can protect your organization
Published Date : Thursday, April 1, 2021

Enable attack surface reduction rules

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction Enable attack surface reduction (ASR) rules to protect your devices from attacks that use macros, scripts, and common injection techniques.
Published Date : Monday, December 6, 2021

Get missing KBs by software ID

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/get-missing-kbs-software Retrieves missing security updates by software ID
Published Date : Thursday, April 1, 2021

Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/mac-jamfpro-policies Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
Published Date : Thursday, April 1, 2021

Get missing KBs by device ID

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/get-missing-kbs-machine Retrieves missing security updates by device ID
Published Date : Thursday, April 1, 2021

Advanced hunting quotas and usage parameters in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-limits Understand various quotas and usage parameters (service limits) that keep the advanced hunting service responsive
Published Date : Thursday, April 1, 2021

Exposure score in threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-exposure-score The threat and vulnerability management exposure score reflects how vulnerable your organization is to cybersecurity threats.
Published Date : Thursday, April 1, 2021

Learn about sensitivity labels - Microsoft 365 Compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels Use sensitivity labels from Microsoft Information Protection (MIP) to classify and protect sensitive content.
Published Date : Thursday, April 1, 2021

Take action on advanced hunting query results in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-take-action Quickly address threats and affected assets in your advanced hunting query results
Published Date : Thursday, April 1, 2021

Monitoring web browsing security in Microsoft Defender for Endpoint

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-protection-monitoring Use web protection in Microsoft Defender for Endpoint to monitor web browsing security
Published Date : Thursday, April 1, 2021

AlertInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-alertinfo-table Learn about alert generation events in the AlertInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

DeviceTvmSoftwareVulnerabilitiesKB table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table Learn about the software vulnerabilities tracked by Threat & Vulnerability Management in the DeviceTvmSoftwareVulnerabilitiesKB table of the advanced hunting schema.
Published Date : Thursday, April 1, 2021

Understand the analyst report section in threat analytics in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/threat-analytics-analyst-reports Learn about the analyst report section of each threat analytics report. Understand how it provides information about threats, mitigations, detections, advanced hunting queries, and more.
Published Date : Thursday, April 1, 2021

DeviceNetworkInfo table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table Learn about network configuration information in the DeviceNetworkInfo table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Evaluate Microsoft Defender for Office 365 - Office 365

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-evaluation Defender for Office 365 in evaluation mode creates Defender for Office 365 email policies that log verdicts, such as malware, but don't act on messages.
Published Date : Wednesday, April 21, 2021

DeviceTvmSecureConfigurationAssessmentKB table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table Learn about the various secure configurations assessed by Threat & Vulnerability Management in the DeviceTvmSecureConfigurationAssessmentKB table of the advanced hunting schema.
Published Date : Thursday, April 1, 2021

Extend advanced hunting coverage with the right settings

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-extend-data Check auditing settings on Windows devices and other settings to help ensure that you get the most comprehensive data in advanced hunting
Published Date : Thursday, April 1, 2021

Score methods and properties

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/score Retrieves your organization's exposure score, device secure score, and exposure score by device group
Published Date : Thursday, April 1, 2021

Advanced hunting query best practices in Microsoft 365 Defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-best-practices Learn how to construct fast, efficient, and error-free threat hunting queries with advanced hunting
Published Date : Thursday, April 1, 2021

Web content filtering

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-content-filtering Use web content filtering in Microsoft Defender for Endpoint to track and regulate access to websites based on their content categories.
Published Date : Thursday, April 1, 2021

Hunt for threats across devices, emails, apps, and identities with advanced hunting

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices Study common hunting scenarios and sample queries that cover devices, emails, apps, and identities.
Published Date : Thursday, April 1, 2021

DeviceLogonEvents table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table Learn about authentication or sign-in events in the DeviceLogonEvents table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Vulnerabilities in my organization - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-weaknesses Lists the common vulnerabilities and exposures (CVE) ID of weaknesses found in the software running in your organization. Discovered by the Microsoft Defender for Endpoint threat and vulnerability management capability.
Published Date : Thursday, April 1, 2021

Assign device value - threat and vulnerability management

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-assign-device-value Learn how to assign a low, normal, or high value to a device to help you differentiate between asset priorities.
Published Date : Thursday, April 1, 2021

Microsoft Secure Score for Devices

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-microsoft-secure-score-devices Your score for devices shows the collective security configuration state of your devices across application, operating system, network, accounts, and security controls.
Published Date : Thursday, April 1, 2021

AlertEvidence table in the advanced hunting schema

https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-alertevidence-table Learn about information associated with alerts in the AlertEvidence table of the advanced hunting schema
Published Date : Thursday, April 1, 2021

Plan for end-of-support software and software versions

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-end-of-support-software Discover and plan for software and software versions that are no longer supported and won't receive security updates.
Published Date : Thursday, April 1, 2021

Supported operating systems platforms and capabilities

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/tvm-supported-os Ensure that you meet the operating system or platform requisites for threat and vulnerability management, so the activities in your all devices are properly accounted for.
Published Date : Thursday, April 1, 2021