Skip to content

Commit 050f55e

Browse files
authored
Bypassing the Acro requirement, since Acro is not working
Content Freshness updates
2 parents ad3b1ec + 99e1cba commit 050f55e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+124
-124
lines changed

defender-endpoint/alerts-queue-endpoint-detection-response.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ ms.reviewer:
44
description: View and manage the alerts surfaced in Microsoft Defender XDR
55
keywords:
66
ms.service: defender-endpoint
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
- mde-edr
1616
ms.topic: conceptual
17-
ms.date: 02/15/2024
17+
ms.date: 03/26/2025
1818
ms.subservice: edr
1919
search.appverid: met150
2020
---

defender-endpoint/alerts-queue.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: View and organize the Microsoft Defender for Endpoint Alerts queue
33
description: Learn about how the Microsoft Defender for Endpoint alerts queues work, and how to sort and filter lists of alerts.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier1
1313
- mde-edr
1414
ms.topic: conceptual
15-
ms.date: 02/15/2024
15+
ms.date: 03/26/2025
1616
ms.subservice: edr
1717
search.appverid: met150
1818
---

defender-endpoint/attack-surface-reduction-rules-deployment-operationalize.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar, yongrhee
1111
manager: deniseb
1212
ms.custom: asr
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 03/10/2025
20+
ms.date: 03/26/2025
2121
search.appverid: met150
2222
---
2323

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: asr
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 08/14/2023
20+
ms.date: 03/26/2025
2121
search.appverid: met150
2222
---
2323

defender-endpoint/auto-investigation-action-center.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Visit the Action center to see remediation actions
33
description: Use the action center to view details and results following an automated investigation
44
ms.service: defender-endpoint
55
ms.subservice: edr
6-
author: denisebmsft
7-
ms.author: deniseb
6+
author: emmwalshh
7+
ms.author: ewalsh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -16,7 +16,7 @@ ms.custom: admindeeplinkDEFENDER
1616
ms.topic: how-to
1717
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs
1818
search.appverid: met150
19-
ms.date: 02/21/2024
19+
ms.date: 03/26/2025
2020
---
2121

2222
# Visit the Action center to see remediation actions

defender-endpoint/behavioral-blocking-containment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Behavioral blocking and containment
33
description: Learn about behavioral blocking and containment capabilities at Microsoft Defender for Endpoint
44
author: denisebmsft
5-
ms.author: deniseb
6-
manager: deniseb
5+
ms.author: ewalsh
6+
manager: emmwalshh
77
ms.reviewer: shwetaj
88
audience: ITPro
99
ms.topic: conceptual
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
search.appverid: met150
18-
ms.date: 02/29/2024
18+
ms.date: 03/29/2025
1919
---
2020

2121
# Behavioral blocking and containment

defender-endpoint/check-sensor-status.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,16 @@ title: Check the device health at Microsoft Defender for Endpoint
33
description: Check the sensor health on devices to identify which ones are misconfigured, inactive, or aren't reporting sensor data.
44
ms.service: defender-endpoint
55
ms.subservice: onboard
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15-
ms.date: 05/16/2023
15+
ms.date: 03/26/2025
1616
search.appverid: met150
1717
---
1818

defender-endpoint/conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@ description: Enable Conditional Access to prevent applications from running if a
44
search.appverid: met150
55
ms.service: defender-endpoint
66
ms.subservice: onboard
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier3
1515
ms.topic: conceptual
16-
ms.date: 12/18/2020
16+
ms.date: 03/26/2025
1717
---
1818

1919
# Enable Conditional Access to better protect users, devices, and data

defender-endpoint/configure-endpoints-script.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard Windows devices using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
1010
manager: deniseb
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
ms.subservice: onboard
18-
ms.date: 02/29/2024
18+
ms.date: 03/26/2025
1919
---
2020

2121
# Onboard Windows devices using a local script

defender-endpoint/configure-machines-asr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: asr
1717
search.appverid: met150
18-
ms.date: 12/18/2023
18+
ms.date: 03/27/2025
1919
---
2020

2121
# Optimize ASR rule deployment and detections
@@ -27,7 +27,7 @@ ms.date: 12/18/2023
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2828
- [Microsoft Defender XDR](/defender-xdr)
2929

30-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
30+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131
3232
[Attack surface reduction rules](./attack-surface-reduction.md) identify and prevent typical malware exploits. They control when and how potentially malicious code can run. For example, they can prevent JavaScript or VBScript from launching a downloaded executable, block Win32 API calls from Office macros, and block processes that run from USB drives.
3333

0 commit comments

Comments
 (0)