Skip to content

Commit 03ced7f

Browse files
authored
Merge branch 'main' into docs-editor/investigate-users-1727439254
2 parents f0b3672 + 1092e7f commit 03ced7f

File tree

145 files changed

+1636
-1058
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

145 files changed

+1636
-1058
lines changed

.openpublishing.redirection.defender.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender/threat-intelligence/index-backup.md",
5+
"redirect_url": "/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender/advanced-hunting-overview.md",
510
"redirect_url": "/defender-xdr/advanced-hunting-overview",
@@ -214,6 +219,16 @@
214219
"source_path": "defender-endpoint/defender-endpoint-antivirus-exclusions.md",
215220
"redirect_url": "/defender-endpoint/navigate-defender-endpoint-antivirus-exclusions",
216221
"redirect_document_id": false
217-
}
222+
},
223+
{
224+
"source_path": "defender-endpoint/defender-endpoint-demonstration-amsi.md",
225+
"redirect_url": "/defender-endpoint/mde-demonstration-amsi",
226+
"redirect_document_id": true
227+
},
228+
{
229+
"source_path": "defender-xdr/device-profile.md",
230+
"redirect_url": "/defender-xdr/entity-page-device",
231+
"redirect_document_id": true
232+
}
218233
]
219234
}

defender-endpoint/TOC.yml

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -59,44 +59,43 @@
5959
- name: Antivirus solution compatibility with Defender for Endpoint
6060
href: defender-compatibility.md
6161

62-
- name: Microsoft Defender for Endpoint demonstrations
62+
- name: Microsoft Defender for Endpoint demonstrations and evaluation
6363
items:
64-
- name: Microsoft Defender for Endpoint demonstrations
64+
- name: Evaluate Microsoft Defender Antivirus
65+
href: evaluate-microsoft-defender-antivirus.md
6566
items:
66-
- name: Overview
67-
href: evaluate-microsoft-defender-antivirus.md
6867
- name: Evaluate Microsoft Defender Antivirus using PowerShell
6968
href: microsoft-defender-antivirus-using-powershell.md
7069
- name: Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management
7170
href: evaluate-mda-using-mde-security-settings-management.md
7271
- name: Evaluate Microsoft Defender Antivirus using Group Policy
7372
href: evaluate-mdav-using-gp.md
74-
- name: Microsoft Defender for Endpoint demonstration scenarios
75-
href: defender-endpoint-demonstrations.md
73+
- name: Demonstration scenarios
74+
href: defender-endpoint-demonstrations.md
75+
items:
76+
- name: AMSI demonstrations
77+
href: mde-demonstration-amsi.md
78+
- name: Antimalware validation demonstration
79+
href: validate-antimalware.md
80+
- name: Attack surface reduction rules demonstration
81+
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
7682
- name: App reputation demonstration
7783
href: defender-endpoint-demonstration-app-reputation.md
78-
- name: Behavior monitoring demonstrations
84+
- name: Behavior monitoring demonstration
7985
href: demonstration-behavior-monitoring.md
80-
- name: Validate antimalware
81-
href: validate-antimalware.md
82-
- name: AMSI demonstrations
83-
href: defender-endpoint-demonstration-amsi.md
84-
displayName: Antimalware Scan Interface (AMSI), AMSI
85-
- name: Attack surface reduction rules demonstrations
86-
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
87-
- name: Cloud-delivered protection demonstration
86+
- name: Cloud-delivered protection
8887
href: defender-endpoint-demonstration-cloud-delivered-protection.md
89-
- name: Controlled folder access (CFA) demonstration (block script)
88+
- name: Controlled folder access (block script) demonstration
9089
href: defender-endpoint-demonstration-controlled-folder-access-test-tool.md
91-
- name: Controlled folder access (CFA) demonstrations (block ransomware)
90+
- name: Controlled folder access (block ransomware) demonstration
9291
href: defender-endpoint-demonstration-controlled-folder-access.md
93-
- name: EDR detections
92+
- name: EDR detections demonstration
9493
href: edr-detection.md
95-
- name: Exploit protection (EP) demonstrations
94+
- name: Exploit protection demonstration
9695
href: defender-endpoint-demonstration-exploit-protection.md
97-
- name: Network protection demonstrations
96+
- name: Network protection demonstration
9897
href: defender-endpoint-demonstration-network-protection.md
99-
- name: Potentially unwanted applications (PUA) demonstration
98+
- name: Potentially unwanted applications demonstration
10099
href: defender-endpoint-demonstration-potentially-unwanted-applications.md
101100
- name: URL reputation demonstrations
102101
href: defender-endpoint-demonstration-smartscreen-url-reputation.md

defender-endpoint/android-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 08/30/2024
18+
ms.date: 10/18/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -197,9 +197,9 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
197197
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \\> **Add** > **Managed devices**.
198198
2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
199199
3. Select **Microsoft Defender for Endpoint** as the target app.
200-
4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
200+
1. In Settings page, select **Use configuration designer** and add **Enable TVM Privacy** as the key and value type as **Integer**
201201

202-
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
202+
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
203203
- For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
204204

205205
5. Select **Next** and assign this profile to targeted devices/users.

defender-endpoint/android-intune.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 07/25/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -284,7 +284,10 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
284284

285285
> [!div class="mx-imgBorder"]
286286
> ![Screenshot showing a low touch onboarding configuration policy.](media/low-touch-user-upn.png)
287-
287+
288+
> [!Note]
289+
> Once the policy is created, these value types will show as string.
290+
288291
8. Assign the policy to the target user group.
289292

290293
9. Review and create the policy.

defender-endpoint/customize-controlled-folders.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 10/27/2023
18+
ms.date: 10/17/2024
1919
---
2020

2121
# Customize controlled folder access
@@ -33,8 +33,12 @@ ms.date: 10/27/2023
3333
> [!TIP]
3434
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
3535
36-
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients. This article describes how to customize controlled folder access capabilities, and includes the following sections:
36+
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients.
3737

38+
> [!IMPORTANT]
39+
> Controlled folder access is not supported on Linux servers.
40+
41+
This article describes how to customize controlled folder access capabilities, and includes the following sections:
3842
- [Protect additional folders](#protect-additional-folders)
3943
- [Add apps that should be allowed to access protected folders](#allow-specific-apps-to-make-changes-to-controlled-folders)
4044
- [Allow signed executable files to access protected folders](#allow-signed-executable-files-to-access-protected-folders)

defender-endpoint/defender-endpoint-demonstration-amsi.md

Lines changed: 0 additions & 239 deletions
This file was deleted.

0 commit comments

Comments
 (0)