diff --git a/defender-office-365/attack-simulation-training-payloads.md b/defender-office-365/attack-simulation-training-payloads.md index 07b76a1095..939b8762ce 100644 --- a/defender-office-365/attack-simulation-training-payloads.md +++ b/defender-office-365/attack-simulation-training-payloads.md @@ -172,11 +172,11 @@ You can also create custom payloads that use QR codes as phishing links as descr 3. On the **Select technique** page, the available options are the same as on the **Select technique** page in the new simulation wizard: - **Credential Harvest**\* - **Malware Attachment** - - **Link in Attachment** + - **Link in Attachment**\* - **Link to Malware**\* - - **Drive-by URL** + - **Drive-by URL**\* - **OAuth Consent Grant**\* - - **How-to Guide**\* + - **How-to Guide** \* This social engineering technique allows you to use QR codes (currently in Preview). diff --git a/exposure-management/predefined-classification-rules-and-levels.md b/exposure-management/predefined-classification-rules-and-levels.md index 24e93d8d70..9679425560 100644 --- a/exposure-management/predefined-classification-rules-and-levels.md +++ b/exposure-management/predefined-classification-rules-and-levels.md @@ -47,54 +47,54 @@ Current asset types are: | Classification | Asset type | Default criticality level | Description | | --------------------------------------------- | ---------- | ------------------------- | ------------------------------------------------------------ | | Identity with Privileged Azure Role | Identity | High | The following identities (User, Group, Service Principal, or Managed Identity) have an assigned built-in or custom privileged Azure RBAC role, at subscription scope, containing a critical resource. The role can include permissions for Azure role assignments, modifying Azure policies, executing scripts on a VM using Run command, read-access to storage accounts and keyvaults, and more. | -| Application Administrator | Identity | Very High | Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. | -| Application Developer | Identity | High | Users in this role can create application registrations independent of the 'Users can register applications' setting. | -| Authentication Administrator | Identity | Very High | Users in this role can set and reset authentication method (including passwords) for non-admin users. | -| B2C IEF Keyset Administrator | Identity | High | Users in this role can manage secrets for federation and encryption in the Identity Experience Framework (IEF). | -| Cloud Application Administrator | Identity | Very High | Users in this role can create and manage all aspects of app registrations and enterprise apps except App Proxy. | -| Cloud Device Administrator | Identity | High | Users in this role have limited access to manage devices in Microsoft Entra ID. They can enable, disable, and delete devices in Microsoft Entra ID and read Windows 10 BitLocker keys (if present) in the Azure portal. | -| Conditional Access Administrator | Identity | High | Users with this role have the ability to manage Microsoft Entra Conditional Access settings. | -| Directory Synchronization Accounts | Identity | Very High | Users with this role have the ability to manage all directory synchronization settings. Should Only be used by Microsoft Entra Connect service. | -| Directory Writers | Identity | High | Users in this role can read and write basic directory information. For granting access to applications, not intended for users. | -| Global Administrator | Identity | Very High | Users in this role can manage all aspects of Microsoft Entra ID and Microsoft services that use Microsoft Entra identities. | -| Global Reader | Identity | High | Users in this role can read everything that a Global Administrator can, but not update anything. | -| Helpdesk Administrator | Identity | Very High | Users in this role can reset passwords for nonadministrators and Helpdesk Administrators. | -| Hybrid Identity Administrator | Identity | Very High | Users in this role can manage Active Directory to Microsoft Entra cloud provisioning, Microsoft Entra Connect, Pass-through Authentication (PTA), Password hash synchronization (PHS), seamless single sign-on (Seamless SSO), and federation settings. | -| Intune Administrator | Identity | Very High | Users in this role can manage all aspects of the Intune product. | -| Partner Tier1 Support | Identity | Very High | Users in this role can reset passwords for nonadmin users, update credentials for applications, create and delete users, and create OAuth2 permission grants. This role has been deprecated and will be removed from Microsoft Entra ID in the future. Don't use - not intended for general use. | -| Partner Tier2 Support | Identity | Very High | Users in this role can reset passwords for all users (including Global Administrators), update credentials for applications, create and delete users, and create OAuth2 permission grants. This role has been deprecated and will be removed from Microsoft Entra ID in the future. Don't use - not intended for general use. | -| Password Administrator | Identity | Very High | Users in this role can reset passwords for nonadministrators and Password Administrators. | -| Privileged Authentication Administrator | Identity | Very High | Users in this role can view, set, and reset authentication method information for any user (admin or nonadmin). | -| Privileged Role Administrator | Identity | High | Users in this role can manage role assignments in Microsoft Entra ID, and all aspects of Privileged Identity Management. | -| Security Administrator | Identity | High | Users in this role can read security information and reports, and manage configuration in Microsoft Entra ID and Office 365. | -| Security Operator | Identity | High | Users in this role can create and manage security events. | -| Security Reader | Identity | High | Users in this role can read security information and reports in Microsoft Entra ID and Office 365. | -| User Administrator | Identity | Very High | Users in this role can manage all aspects of users and groups, including resetting passwords for limited admins. | -| Exchange Administrator | Identity | High | Users in this role can manage all aspects of the Exchange product. | -| SharePoint Administrator | Identity | High | Users in this role can manage all aspects of the SharePoint service. | -| Compliance Administrator | Identity | High | Users in this role can read and manage compliance configurations and reports in Microsoft Entra ID and Microsoft 365. | -| Groups Administrator | Identity | High | Users in this role can create/manage groups and group settings like naming and expiration policies, and view group activity and audit reports. | -| External Identity Provider Administrator | Identity | Very High | Users in this role can configure identity providers for use in direct federation. | -| Domain Name Administrator | Identity | Very High | Users in this role can manage domain names in cloud and on-premises. | -| Permissions Management Administrator | Identity | Very High | Users in this role can manage all aspects of Microsoft Entra Permissions Management (EPM). | -| Billing Administrator | Identity | High | Users in this role can perform common billing related tasks like updating payment information. | -| License Administrator | Identity | High | Users in this role can manage product licenses on users and groups. | -| Teams Administrator | Identity | High | Users in this role can manage the Microsoft Teams service. | -| External ID User Flow Administrator | Identity | High | Users in this role can create and manage all aspects of user flows. | -| External ID User Flow Attribute Administrator | Identity | High | Users in this role can create and manage the attribute schema available to all user flows. | -| B2C IEF Policy Administrator | Identity | High | Users in this role can create and manage trust framework policies in the Identity Experience Framework (IEF). | -| Compliance Data Administrator | Identity | High | Users in this role can create and manage compliance content. | -| Authentication Policy Administrator | Identity | High | Users in this role can create and manage the authentication methods policy, tenant-wide MFA settings, password protection policy, and verifiable credentials. | -| Knowledge Administrator | Identity | High | Users in this role can configure knowledge, learning, and other intelligent features. | -| Knowledge Manager | Identity | High | Users in this role can organize, create, manage, and promote topics and knowledge. | -| Attribute Definition Administrator | Identity | High | Users in this role can define and manage the definition of custom security attributes. | -| Attribute Assignment Administrator | Identity | High | Users in this role can assign custom security attribute keys and values to supported Microsoft Entra objects. | -| Identity Governance Administrator | Identity | High | Users in this role can manage access using Microsoft Entra ID for identity governance scenarios. | -| Cloud App Security Administrator | Identity | High | Users in this role can manage all aspects of the Defender for Cloud Apps product. | -| Windows 365 Administrator | Identity | High | Users in this role can provision and manage all aspects of Cloud PCs. | -| Yammer Administrator | Identity | High | Users in this role can manage all aspects of the Yammer service. | -| Authentication Extensibility Administrator | Identity | High | Users in this role can customize sign in and sign up experiences for users by creating and managing custom authentication extensions. | -| Lifecycle Workflows Administrator | Identity | High | Users in this role create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Microsoft Entra ID. | +| Application Administrator | Identity | Very High | Identities in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. | +| Application Developer | Identity | High | Identities in this role can create application registrations independent of the 'Users can register applications' setting. | +| Authentication Administrator | Identity | Very High | Identities in this role can set and reset authentication method (including passwords) for non-admin users. | +| B2C IEF Keyset Administrator | Identity | High | Identities in this role can manage secrets for federation and encryption in the Identity Experience Framework (IEF). | +| Cloud Application Administrator | Identity | Very High | Identities in this role can create and manage all aspects of app registrations and enterprise apps except App Proxy. | +| Cloud Device Administrator | Identity | High | Identities in this role have limited access to manage devices in Microsoft Entra ID. They can enable, disable, and delete devices in Microsoft Entra ID and read Windows 10 BitLocker keys (if present) in the Azure portal. | +| Conditional Access Administrator | Identity | High | Identities in this role have the ability to manage Microsoft Entra Conditional Access settings. | +| Directory Synchronization Accounts | Identity | Very High | Identities in this role have the ability to manage all directory synchronization settings. Should Only be used by Microsoft Entra Connect service. | +| Directory Writers | Identity | High | Identities in this role can read and write basic directory information. For granting access to applications, not intended for users. | +| Global Administrator | Identity | Very High | Identities in this role can manage all aspects of Microsoft Entra ID and Microsoft services that use Microsoft Entra identities. | +| Global Reader | Identity | High | Identities in this role can read everything that a Global Administrator can, but not update anything. | +| Helpdesk Administrator | Identity | Very High | Identities in this role can reset passwords for nonadministrators and Helpdesk Administrators. | +| Hybrid Identity Administrator | Identity | Very High | Identities in this role can manage Active Directory to Microsoft Entra cloud provisioning, Microsoft Entra Connect, Pass-through Authentication (PTA), Password hash synchronization (PHS), seamless single sign-on (Seamless SSO), and federation settings. | +| Intune Administrator | Identity | Very High | Identities in this role can manage all aspects of the Intune product. | +| Partner Tier1 Support | Identity | Very High | Identities in this role can reset passwords for nonadmin users, update credentials for applications, create and delete users, and create OAuth2 permission grants. This role has been deprecated and will be removed from Microsoft Entra ID in the future. Don't use - not intended for general use. | +| Partner Tier2 Support | Identity | Very High | Identities in this role can reset passwords for all users (including Global Administrators), update credentials for applications, create and delete users, and create OAuth2 permission grants. This role has been deprecated and will be removed from Microsoft Entra ID in the future. Don't use - not intended for general use. | +| Password Administrator | Identity | Very High | Identities in this role can reset passwords for nonadministrators and Password Administrators. | +| Privileged Authentication Administrator | Identity | Very High | Identities in this role can view, set, and reset authentication method information for any user (admin or nonadmin). | +| Privileged Role Administrator | Identity | High | Identities in this role can manage role assignments in Microsoft Entra ID, and all aspects of Privileged Identity Management. | +| Security Administrator | Identity | High | Identities in this role can read security information and reports, and manage configuration in Microsoft Entra ID and Office 365. | +| Security Operator | Identity | High | Identities in this role can create and manage security events. | +| Security Reader | Identity | High | Identities in this role can read security information and reports in Microsoft Entra ID and Office 365. | +| User Administrator | Identity | Very High | Identities in this role can manage all aspects of users and groups, including resetting passwords for limited admins. | +| Exchange Administrator | Identity | High | Identities in this role can manage all aspects of the Exchange product. | +| SharePoint Administrator | Identity | High | Identities in this role can manage all aspects of the SharePoint service. | +| Compliance Administrator | Identity | High | Identities in this role can read and manage compliance configurations and reports in Microsoft Entra ID and Microsoft 365. | +| Groups Administrator | Identity | High | Identities in this role can create/manage groups and group settings like naming and expiration policies, and view group activity and audit reports. | +| External Identity Provider Administrator | Identity | Very High | Identities in this role can configure identity providers for use in direct federation. | +| Domain Name Administrator | Identity | Very High | Identities in this role can manage domain names in cloud and on-premises. | +| Permissions Management Administrator | Identity | Very High | Identities in this role can manage all aspects of Microsoft Entra Permissions Management (EPM). | +| Billing Administrator | Identity | High | Identities in this role can perform common billing related tasks like updating payment information. | +| License Administrator | Identity | High | Identities in this role can manage product licenses on users and groups. | +| Teams Administrator | Identity | High | Identities in this role can manage the Microsoft Teams service. | +| External ID User Flow Administrator | Identity | High | Identities in this role can create and manage all aspects of user flows. | +| External ID User Flow Attribute Administrator | Identity | High | Identities in this role can create and manage the attribute schema available to all user flows. | +| B2C IEF Policy Administrator | Identity | High | Identities in this role can create and manage trust framework policies in the Identity Experience Framework (IEF). | +| Compliance Data Administrator | Identity | High | Identities in this role can create and manage compliance content. | +| Authentication Policy Administrator | Identity | High | Identities in this role can create and manage the authentication methods policy, tenant-wide MFA settings, password protection policy, and verifiable credentials. | +| Knowledge Administrator | Identity | High | Identities in this role can configure knowledge, learning, and other intelligent features. | +| Knowledge Manager | Identity | High | Identities in this role can organize, create, manage, and promote topics and knowledge. | +| Attribute Definition Administrator | Identity | High | Identities in this role can define and manage the definition of custom security attributes. | +| Attribute Assignment Administrator | Identity | High | Identities in this role can assign custom security attribute keys and values to supported Microsoft Entra objects. | +| Identity Governance Administrator | Identity | High | Identities in this role can manage access using Microsoft Entra ID for identity governance scenarios. | +| Cloud App Security Administrator | Identity | High | Identities in this role can manage all aspects of the Defender for Cloud Apps product. | +| Windows 365 Administrator | Identity | High | Identities in this role can provision and manage all aspects of Cloud PCs. | +| Yammer Administrator | Identity | High | Identities in this role can manage all aspects of the Yammer service. | +| Authentication Extensibility Administrator | Identity | High | Identities in this role can customize sign in and sign up experiences for users by creating and managing custom authentication extensions. | +| Lifecycle Workflows Administrator | Identity | High | Identities in this role create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Microsoft Entra ID. | ##### Cloud resource