Skip to content

Commit 004639e

Browse files
committed
Merge branch 'WI370671-api-fixes-for-docs' of https://github.com/DeCohen/defender-docs-pr into WI370671-api-fixes-for-docs
2 parents 2fc125f + 1619784 commit 004639e

File tree

119 files changed

+882
-790
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+882
-790
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-endpoint/threat-analytics-analyst-reports.md",
5+
"redirect_url": "/defender-xdr/threat-analytics-analyst-reports",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-endpoint/threat-analytics.md",
10+
"redirect_url": "/defender-xdr/threat-analytics",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "defender-endpoint/configure-microsoft-threat-experts.md",
515
"redirect_url": "/defender-xdr/defender-experts-for-hunting",

CloudAppSecurityDocs/tutorial-dlp.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@ Our approach to information protection can be split into the following phases th
7979
1. Under **Inspection method**, choose and configure one of the following classification services:
8080

8181
- **[Data Classification Services](dcs-inspection.md)**: Uses classification decisions you've made across Microsoft 365, Microsoft Purview Information Protection, and Defender for Cloud Apps to provide a unified labeling experience. This is the preferred content inspection method as it provides a consistent and unified experience across Microsoft products.
82-
- **[Built-in DLP](content-inspection-built-in.md)**: Inspects files for sensitive information using our built-in DLP content inspection engine.
8382

8483
1. For highly sensitive files, select **Create an alert** and choose the alerts you require, so that you're informed when there are files with unprotected sensitive information in your organization.
8584
1. Select **Create**.

defender-endpoint/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -232,6 +232,8 @@
232232
href: mac-resources.md
233233
- name: Troubleshoot Microsoft Defender for Endpoint on macOS
234234
items:
235+
- name: Troubleshoot agent health issues
236+
href: mac-health-status.md
235237
- name: Troubleshooting mode on macOS
236238
href: mac-troubleshoot-mode.md
237239
- name: Troubleshoot macOS installation issues
@@ -1079,10 +1081,10 @@
10791081
href: /defender-xdr/advanced-hunting-overview
10801082

10811083
- name: Threat analytics overview
1082-
href: threat-analytics.md
1084+
href: /defender-xdr/threat-analytics
10831085
items:
10841086
- name: Read the analyst report
1085-
href: threat-analytics-analyst-reports.md
1087+
href: /defender-xdr/threat-analytics-analyst-reports
10861088

10871089
- name: EDR in block mode
10881090
href: edr-in-block-mode.md

defender-endpoint/aggregated-reporting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 01/21/2025
15+
ms.date: 03/04/2025
1616
appliesto:
1717
- Microsoft Defender for Endpoint Plan 2
1818
---
@@ -38,8 +38,8 @@ The following requirements must be met before turning on aggregated reporting:
3838

3939
Aggregated reporting supports the following:
4040

41-
- Client version: Windows version 2411 and above
42-
- Operating systems: Windows 11 22H2, Windows Server 2022, Windows 11 Enterprise, Windows 10 20H2, 21H1, 21H2, Windows Server version 20H2, and Windows Server 2019
41+
- Client version: Windows version 2411 and later
42+
- Operating systems: Windows 11 22H2, Windows 11 Enterprise, Windows 10 20H2, 21H1, 21H2, Windows Server 2025, Windows Server 2022, Windows Server 2019, or Windows Server version 20H2
4343

4444
## Turn on aggregated reporting
4545

defender-endpoint/analyzer-report.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: onboard
1717
search.appverid: met150
18-
ms.date: 02/15/2024
18+
ms.date: 03/04/2025
1919
---
2020

2121
# Understand the client analyzer HTML report
@@ -28,28 +28,38 @@ The client analyzer produces a report in HTML format. Learn how to review the re
2828

2929
Use the following example to understand the report.
3030

31-
Example output from the analyzer on a machine onboarded to expired Org ID and failing to reach one of the required Microsoft Defender for Endpoint URLs:
31+
## Example output
32+
33+
In this example, the [Defender for Endpoint Client Analyzer](/defender-endpoint/overview-client-analyzer) produced information about a device that was onboarded to an expired Org ID and failed to reach a required Defender for Endpoint URL:
3234

3335
:::image type="content" source="media/147cbcf0f7b6f0ff65d200bf3e4674cb.png" alt-text="The MDE Client Analyzer Results page" lightbox="media/147cbcf0f7b6f0ff65d200bf3e4674cb.png":::
3436

3537
- On top, the script version and script runtime are listed for reference
38+
3639
- The **Device Information** section provides basic OS and device identifiers to uniquely identify the device on which the analyzer has run.
37-
- The **Endpoint Security Details** provides general information about Microsoft Defender for Endpoint-related processes including Microsoft Defender Antivirus and the sensor process. If important processes aren't online as expected, the color will change to red.
40+
41+
- The **Endpoint Security Details** provides general information about Microsoft Defender for Endpoint-related processes including Microsoft Defender Antivirus and the sensor process. If important processes aren't online as expected, the color changes to red.
3842

3943
:::image type="content" source="media/85f56004dc6bd1679c3d2c063e36cb80.png" alt-text="The Check Results Summary page" lightbox="media/85f56004dc6bd1679c3d2c063e36cb80.png":::
4044

4145
- On **Check Results Summary**, you'll have an aggregated count for error,
4246
warning, or informational events detected by the analyzer.
47+
4348
- On **Detailed Results**, you'll see a list (sorted by severity) with
4449
the results and the guidance based on the observations made by the analyzer.
4550

4651
## Open a support ticket to Microsoft and include the Analyzer results
4752

48-
To include analyzer result files [when opening a support ticket](contact-support.md#open-a-service-request), make sure you use the **Attachments** section and include the
49-
`MDEClientAnalyzerResult.zip` file:
53+
To include analyzer result files [when opening a support ticket](contact-support.md#open-a-service-request), make sure you use the **Attachments** section and include the `MDEClientAnalyzerResult.zip` file:
5054

5155
:::image type="content" source="media/508c189656c3deb3b239daf811e33741.png" alt-text="An attachment prompt" lightbox="media/508c189656c3deb3b239daf811e33741.png":::
5256

5357
> [!NOTE]
5458
> If the file size is larger than 25 MB, the support engineer assigned to your case will provide a dedicated secure workspace to upload large files for analysis.
59+
60+
## See also
61+
62+
- [Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer](overview-client-analyzer.md)
63+
64+
5565
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/get-assessment-browser-extensions.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 01/22/2025
18+
ms.date: 03/04/2025
1919
---
2020

2121
# Export browser extensions assessment per device
@@ -24,14 +24,9 @@ ms.date: 01/22/2025
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](../microsoft-defender-endpoint.md)
29-
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management)
30-
- [Microsoft Defender XDR](/defender-xdr)
31-
32-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us).
33-
34-
> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](/defender-vulnerability-management/get-defender-vulnerability-management).
27+
- [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
28+
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management-capabilities#vulnerability-management-capabilities-for-endpoints) (add-on for Defender for Endpoint Plan 2 or the standalone version)
29+
- [Microsoft Defender for Cloud Plan 2](/azure/defender-for-cloud/defender-for-cloud-introduction)
3530

3631
Returns all known installed browser extensions and their details for all devices, on a per-device basis.
3732

defender-endpoint/api/get-live-response-result.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ Before you can initiate a session on a device, make sure you fulfill the followi
6969

7070
- **Windows Server 2022**
7171

72+
- **Windows Server 2025**
73+
7274
## Permissions
7375

7476
One of the following permissions is required to call this API. To learn more,

defender-endpoint/api/initiate-autoir-investigation.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,13 @@ Your organization must have Defender for Endpoint (see [Minimum requirements for
4949

5050
Currently, AIR only supports the following OS versions:
5151

52-
- Windows Server 2019
53-
- Windows Server 2022
54-
- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later
55-
- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later
56-
- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later
5752
- Windows 11
53+
- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later
54+
- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later
55+
- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later
56+
- Windows Server 2025
57+
- Windows Server 2022
58+
- Windows Server 2019
5859

5960
## Permissions
6061

defender-endpoint/api/management-apis.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Defender for Endpoint supports a wide variety of deployment, configuration, and
3333

3434
## Endpoint onboarding and portal access
3535

36-
Device onboarding is fully integrated into Microsoft Intune and Microsoft Configuration Manager for client devices. For servers, you can choose from several options, such as Defender for Endpoint Server, Defender for Servers (as part of the Defender for Cloud offering), or Defender for Business servers (for small and medium-sized businesses).
36+
Device onboarding is fully integrated into Microsoft Intune and Microsoft Configuration Manager for client devices. You can onboard both client and server devices using the Microsoft Defender portal. Or, for servers, you can use Defender for Cloud, which integrates with Defender for Endpoint and Defender for Business. (Server licenses are required; for more information, see [Onboard servers to Defender for Endpoint](/defender-endpoint/onboard-server) and [Onboard devices to Defender for Business](/defender-business/mdb-onboard-devices).)
3737

3838
The Microsoft Defender portal provides your security team with a robust, end-to-end experience for configuration, deployment, and monitoring. In addition, Microsoft Defender for Endpoint supports Group Policy and other non-Microosft tools used for managing devices.
3939

@@ -47,7 +47,7 @@ Defender for Endpoint provides fine-grained control over what users with access
4747

4848
Defender for Endpoint is built on top of an integration-ready platform.
4949

50-
Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs enable you to automate workflows and innovate based on Defender for Endpoint capabilities. You can also the Defender for Endpoint APIs with Defender for Business, for the capabilities that are supported in Defender for Business.
50+
Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs enable you to automate workflows and innovate based on Defender for Endpoint capabilities. You can also use the Defender for Endpoint APIs with Defender for Business for the capabilities that are supported in Defender for Business.
5151

5252
:::image type="content" source="../media/mdatp-apis.png" alt-text="The available API and integration in Microsoft Defender for Endpoint" lightbox="../media/mdatp-apis.png":::
5353

@@ -73,7 +73,7 @@ The **Response API** exposes the ability to take actions in the service and on d
7373

7474
Defender for Endpoint raw data streaming API provides the ability for customers to ship real-time events and alerts from their instances as they occur within a single data stream, providing a low latency, high throughput delivery mechanism.
7575

76-
The Defender for Endpoint event information is pushed directly to Azure storage for long-term data retention, or to Azure Event Hubs for consumption by visualization services or additional data processing engines.
76+
The Defender for Endpoint event information is pushed directly to Azure storage for long-term data retention, or to Azure Event Hubs for consumption by visualization services or other data processing engines.
7777

7878
For more information, see [Raw data streaming API](raw-data-export.md).
7979

@@ -82,9 +82,9 @@ For more information, see [Microsoft Defender XDR Streaming API](/defender-xdr/s
8282

8383
## SIEM API
8484

85-
When you enable security information and event management (SIEM) integration, it allows you to pull detections from Microsoft Defender XDR using your SIEM solution or by connecting directly to the detections REST API. This activates the SIEM connector access details section with pre-populated values and an application is created under your Microsoft Entra tenant.
85+
When you enable security information and event management (SIEM) integration, you can pull detections from Microsoft Defender XDR using your SIEM solution or by connecting directly to the detections REST API. This activates the SIEM connector access details section with pre-populated values and an application is created under your Microsoft Entra tenant.
8686

87-
## Related topics
87+
## Related articles
8888

8989
- [Access the Microsoft Defender for Endpoint APIs](apis-intro.md)
9090
- [Supported APIs](exposed-apis-list.md)

defender-endpoint/api/run-live-response.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,11 +85,15 @@ Before you can initiate a session on a device, make sure you fulfill the followi
8585
- Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
8686

8787
- **Windows Server 2022**
88+
89+
- **Windows Server 2025**
90+
8891
- **macOS** [(requires other configuration profiles)](../microsoft-defender-endpoint-mac.md)
8992
- 13 (Ventura)
9093
- 12 (Monterey)
9194
- 11 (Big Sur)
92-
- **Linux**
95+
96+
- **Linux Server**
9397
- [Supported Linux server distributions and kernel versions](../microsoft-defender-endpoint-linux.md)
9498

9599
## Permissions

0 commit comments

Comments
 (0)