Skip to content

Commit 04a81d0

Browse files
authored
Merge branch 'main' into defender-criteria
2 parents 287895d + 185b4ec commit 04a81d0

File tree

212 files changed

+3407
-1536
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

212 files changed

+3407
-1536
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,18 @@
112112
},
113113
"build_entry_point": "docs",
114114
"template_folder": "_themes"
115+
},
116+
{
117+
"docset_name": "unified-secops-platform",
118+
"build_source_folder": "unified-secops-platform",
119+
"build_output_subfolder": "unified-secops-platform",
120+
"locale": "en-us",
121+
"monikers": [],
122+
"open_to_public_contributors": false,
123+
"type_mapping": {
124+
"Conceptual": "Content"
125+
},
126+
"build_entry_point": "docs"
115127
}
116128
],
117129
"notification_subscribers": [],

.openpublishing.redirection.defender.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender/threat-intelligence/index-backup.md",
5+
"redirect_url": "/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender/advanced-hunting-overview.md",
510
"redirect_url": "/defender-xdr/advanced-hunting-overview",
@@ -214,6 +219,16 @@
214219
"source_path": "defender-endpoint/defender-endpoint-antivirus-exclusions.md",
215220
"redirect_url": "/defender-endpoint/navigate-defender-endpoint-antivirus-exclusions",
216221
"redirect_document_id": false
217-
}
222+
},
223+
{
224+
"source_path": "defender-endpoint/defender-endpoint-demonstration-amsi.md",
225+
"redirect_url": "/defender-endpoint/mde-demonstration-amsi",
226+
"redirect_document_id": true
227+
},
228+
{
229+
"source_path": "defender-xdr/device-profile.md",
230+
"redirect_url": "/defender-xdr/entity-page-device",
231+
"redirect_document_id": true
232+
}
218233
]
219234
}

defender-endpoint/TOC.yml

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -59,44 +59,43 @@
5959
- name: Antivirus solution compatibility with Defender for Endpoint
6060
href: defender-compatibility.md
6161

62-
- name: Microsoft Defender for Endpoint demonstrations
62+
- name: Microsoft Defender for Endpoint demonstrations and evaluation
6363
items:
64-
- name: Microsoft Defender for Endpoint demonstrations
64+
- name: Evaluate Microsoft Defender Antivirus
65+
href: evaluate-microsoft-defender-antivirus.md
6566
items:
66-
- name: Overview
67-
href: evaluate-microsoft-defender-antivirus.md
6867
- name: Evaluate Microsoft Defender Antivirus using PowerShell
6968
href: microsoft-defender-antivirus-using-powershell.md
7069
- name: Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management
7170
href: evaluate-mda-using-mde-security-settings-management.md
7271
- name: Evaluate Microsoft Defender Antivirus using Group Policy
7372
href: evaluate-mdav-using-gp.md
74-
- name: Microsoft Defender for Endpoint demonstration scenarios
75-
href: defender-endpoint-demonstrations.md
73+
- name: Demonstration scenarios
74+
href: defender-endpoint-demonstrations.md
75+
items:
76+
- name: AMSI demonstrations
77+
href: mde-demonstration-amsi.md
78+
- name: Antimalware validation demonstration
79+
href: validate-antimalware.md
80+
- name: Attack surface reduction rules demonstration
81+
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
7682
- name: App reputation demonstration
7783
href: defender-endpoint-demonstration-app-reputation.md
78-
- name: Behavior monitoring demonstrations
84+
- name: Behavior monitoring demonstration
7985
href: demonstration-behavior-monitoring.md
80-
- name: Validate antimalware
81-
href: validate-antimalware.md
82-
- name: AMSI demonstrations
83-
href: defender-endpoint-demonstration-amsi.md
84-
displayName: Antimalware Scan Interface (AMSI), AMSI
85-
- name: Attack surface reduction rules demonstrations
86-
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
87-
- name: Cloud-delivered protection demonstration
86+
- name: Cloud-delivered protection
8887
href: defender-endpoint-demonstration-cloud-delivered-protection.md
89-
- name: Controlled folder access (CFA) demonstration (block script)
88+
- name: Controlled folder access (block script) demonstration
9089
href: defender-endpoint-demonstration-controlled-folder-access-test-tool.md
91-
- name: Controlled folder access (CFA) demonstrations (block ransomware)
90+
- name: Controlled folder access (block ransomware) demonstration
9291
href: defender-endpoint-demonstration-controlled-folder-access.md
93-
- name: EDR detections
92+
- name: EDR detections demonstration
9493
href: edr-detection.md
95-
- name: Exploit protection (EP) demonstrations
94+
- name: Exploit protection demonstration
9695
href: defender-endpoint-demonstration-exploit-protection.md
97-
- name: Network protection demonstrations
96+
- name: Network protection demonstration
9897
href: defender-endpoint-demonstration-network-protection.md
99-
- name: Potentially unwanted applications (PUA) demonstration
98+
- name: Potentially unwanted applications demonstration
10099
href: defender-endpoint-demonstration-potentially-unwanted-applications.md
101100
- name: URL reputation demonstrations
102101
href: defender-endpoint-demonstration-smartscreen-url-reputation.md

defender-endpoint/android-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 08/30/2024
18+
ms.date: 10/18/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -197,9 +197,9 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
197197
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \\> **Add** > **Managed devices**.
198198
2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
199199
3. Select **Microsoft Defender for Endpoint** as the target app.
200-
4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
200+
1. In Settings page, select **Use configuration designer** and add **Enable TVM Privacy** as the key and value type as **Integer**
201201

202-
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
202+
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
203203
- For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
204204

205205
5. Select **Next** and assign this profile to targeted devices/users.

defender-endpoint/android-intune.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 07/25/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -284,7 +284,10 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
284284

285285
> [!div class="mx-imgBorder"]
286286
> ![Screenshot showing a low touch onboarding configuration policy.](media/low-touch-user-upn.png)
287-
287+
288+
> [!Note]
289+
> Once the policy is created, these value types will show as string.
290+
288291
8. Assign the policy to the target user group.
289292

290293
9. Review and create the policy.

defender-endpoint/configure-environment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
ms.topic: how-to
1616
ms.subservice: onboard
17-
ms.date: 06/14/2024
17+
ms.date: 10/18/2024
1818
---
1919

2020
# STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service
@@ -27,7 +27,7 @@ ms.date: 06/14/2024
2727

2828
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
2929
30-
Before you onboard devices to Defender for Endpoint, make sure your network is configured to connect to the service. The first step of this process involves adding URLs to the allowed domains list if your proxy server or firewall rules prevent access to Defender for Endpoint. This article also includes information about proxy and firewall requirements for older versions of Windows client and Windows Server.
30+
Before you onboard devices to Defender for Endpoint, make sure your network is configured to connect to the service, by allowing outbound connection and bypassings HTTPS inspection for the service URLs. The first step of this process involves adding URLs to the allowed domains list if your proxy server or firewall rules prevent access to Defender for Endpoint. This article also includes information about proxy and firewall requirements for older versions of Windows client and Windows Server.
3131

3232
> [!NOTE]
3333
> - After May 8, 2024, you have the option to keep streamlined connectivity ([consolidated set of URLs](https://aka.ms/MDE-streamlined-urls)) as the default onboarding method, or downgrade to standard connectivity through (**Settings > Endpoints > Advanced Features**). For onboarding through Intune or Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded aren't reonboarded automatically. In such cases, create a new policy in Intune, where it is recommended to first assign the policy to a set of test devices to verify connectivity is successful, and then expand the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script, while newly onboarded devices will automatically receive streamlined onboarding.

defender-endpoint/customize-controlled-folders.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 10/27/2023
18+
ms.date: 10/17/2024
1919
---
2020

2121
# Customize controlled folder access
@@ -33,8 +33,12 @@ ms.date: 10/27/2023
3333
> [!TIP]
3434
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
3535
36-
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients. This article describes how to customize controlled folder access capabilities, and includes the following sections:
36+
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients.
3737

38+
> [!IMPORTANT]
39+
> Controlled folder access is not supported on Linux servers.
40+
41+
This article describes how to customize controlled folder access capabilities, and includes the following sections:
3842
- [Protect additional folders](#protect-additional-folders)
3943
- [Add apps that should be allowed to access protected folders](#allow-specific-apps-to-make-changes-to-controlled-folders)
4044
- [Allow signed executable files to access protected folders](#allow-signed-executable-files-to-access-protected-folders)

0 commit comments

Comments
 (0)