This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.
Microsoft Defender for Business |
|
Microsoft Defender for Cloud Apps |
 |
Malware hashes available for SharePoint and OneDrive. In addition to file hashes available for malware detected in non-Microsoft storage apps, now new malware detection alerts will provide hashes for malware detected in SharePoint and OneDrive. For more information, see our docs Malware detection. |
 |
Admin audit enhancements. Additional admin activities have been added:
- File monitoring status - switching on/off
- Creating and deleting policies
- Editing of policies has been enriched with additional data
- Admin management: adding and deleting admins
Learn more about Admin activity logging our docs.
|
 |
New app governance video library. App governance created a new library of short videos on features in app governance, how to use them, and info on how to learn more |
 |
Expansion to Microsoft Teams. App governance added insights, policy capabilities, and governance for Microsoft Teams. Customers can now see data usage, permissions usage, and create policies on Teams permissions and usage. |
 |
Microsoft Secure Score integration. Microsoft Secure Score integration with the app governance (AppG) add-on to Microsoft Defender for Cloud Apps has reached general availability. AppG customers will now receive recommendations in Secure Score, helping them secure their Microsoft 365 OAuth apps. By following AppG-related recommendations and enabling proposed policy settings, enterprises can protect both apps and data from misuse and actual bad actor activity. |
 |
Predefined Policies. App governance now has more out of the box policies to detect anomalous app behaviors, such as spike in usage or suspicious new apps |
|
Microsoft Defender for Endpoint |
|
Microsoft Defender for Identity |
|
Microsoft Defender for IoT |
 |
Security for unmanaged devices in the Enterprise network with Defender for IoT. Microsoft Defender for IoT now allows E5/P2 customers to onboard Enterprise IoT and get alerts, recommendations and vulnerabilities for discovered IoT devices. For more details, navigate in your Microsoft 365 Defender portal to Settings -> Device Discovery -> Enterprise IoT.
|
 |
Stream Microsoft Defender for IoT alerts to a 3rd party SIEM. This blog introduces a solution that sends Defender for IoT alerts to an Event Hub that can be consumed by a 3rd party SIEMs. You can use this solution with Splunk, QRadar, or any other SIEM that supports Event Hub ingestion. |
|
Microsoft Defender for Office 365 |
 |
Priority Accounts for Gov Cloud general availability. Priority Accounts now available in Gov Clouds Environments (GCC, GCC-H, DoD). You can read in this older blog more about Priority Account Protection in Defender for Office 365.
|
 |
Operations guidance. This video lists the daily, weekly, monthly, and ad-hoc tasks we recommend for operating Microsoft Defender for Office 365 successfully. |
|
Microsoft Defender Vulnerability Management |
 |
Updated video. Microsoft Defender Vulnerability Management offers intelligent assessments, risk-based prioritization, and built-in mitigation and remediation tools. These capabilities help you to discover, assess, and remediate vulnerabilities and misconfigurations — all in one place. |
|