Skip to content

Commit 0bd22a9

Browse files
authored
Merge branch 'main' into docs-editor/android-whatsnew-1738650896
2 parents cb0b58e + e0de762 commit 0bd22a9

File tree

41 files changed

+399
-354
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+399
-354
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,11 @@
131131
"redirect_url": "/defender-xdr/entity-page-device",
132132
"redirect_document_id": true
133133
},
134+
{
135+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
136+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
137+
"redirect_document_id": true
138+
},
134139
{
135140
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136141
"redirect_url": "/defender-xdr/",

ATPDocs/monitored-activities.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
1414
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
1515

1616
> [!NOTE]
17-
>
1817
> - This article is relevant for all Defender for Identity sensor types.
1918
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20+
21+
> [!TIP]
22+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
2123
2224
## Monitored user activities: User account AD attribute changes
2325

2426
|Monitored activity|Description|
2527
|---------------------|------------------|
2628
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
2729
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28-
|Account Delegation Changed | Changes to the account delegation settings |
30+
|Account Delegation Changed | Changes to the account delegation settings. |
2931
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
3032
|Account Expired|Date when the account expires.|
3133
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
3537
|Account Password Never Expires Changed|User's password changed to never expire.|
3638
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
3739
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
38-
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256)|
39-
|Account Unlock changed | Changes to the account unlock settings |
40-
|Account UPN Name Changed|User's principle name was changed.|
40+
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256).|
41+
|Account Unlock changed | Changes to the account unlock settings. |
42+
|Account UPN Name Changed|User's principal name was changed.|
4143
|Group Membership Changed|User was added/removed, to/from a group, by another user or by themselves.|
4244
|User Mail Changed|Users email attribute was changed.|
4345
|User Manager Changed|User's manager attribute was changed.|
@@ -48,8 +50,8 @@ The information monitored by Defender for Identity is presented in the form of a
4850

4951
|Monitored activity|Description|
5052
|---------------------|------------------|
51-
|User Account Created|User account was created|
52-
|Computer Account Created|Computer account was created|
53+
|User Account Created|User account was created.|
54+
|Computer Account Created|Computer account was created.|
5355
|Security Principal Deleted Changed|Account was deleted/restored (both user and computer).|
5456
|Security Principal Display Name Changed|Account display name was changed from X to Y.|
5557
|Security Principal Name Changed|Account name attribute was changed.|
@@ -69,7 +71,7 @@ The information monitored by Defender for Identity is presented in the form of a
6971
|Private Data Retrieval|User attempted/succeeded to query private data using LSARPC protocol.|
7072
|Service Creation|User attempted to remotely create a specific service to a remote machine.|
7173
|SMB Session Enumeration|User attempted to enumerate all users with open SMB sessions on the domain controllers.|
72-
|SMB file copy|User copied files using SMB|
74+
|SMB file copy|User copied files using SMB.|
7375
|SAMR Query|User performed a SAMR query.|
7476
|Task Scheduling|User tried to remotely schedule X task to a remote machine.|
7577
|Wmi Execution|User attempted to remotely execute a WMI method.|
@@ -83,7 +85,7 @@ For more information, see [Supported logon types](/microsoft-365/security/defend
8385
|Monitored activity|Description|
8486
|---------------------|------------------|
8587
|Computer Operating System Changed|Change to the computer OS.|
86-
|SID-History changed | Changes to the computer SID history |
88+
|SID-History changed | Changes to the computer SID history. |
8789

8890
## See Also
8991

defender-endpoint/TOC.yml

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -605,9 +605,6 @@
605605
- name: Manage device group and tags
606606
href: machine-tags.md
607607

608-
- name: Host firewall reporting in Microsoft Defender for Endpoint
609-
href: host-firewall-reporting.md
610-
611608
- name: Tamper resiliency
612609
href: tamper-resiliency.md
613610

@@ -633,8 +630,6 @@
633630
href: attack-surface-reduction-rules-deployment-operationalize.md
634631
- name: Attack surface reduction rules reference
635632
href: attack-surface-reduction-rules-reference.md
636-
- name: Attack surface reduction rules report
637-
href: attack-surface-reduction-rules-report.md
638633
- name: Troubleshoot attack surface reduction rules
639634
href: troubleshoot-asr-rules.md
640635
- name: Enable ASR rules alternate configuration methods
@@ -665,8 +660,6 @@
665660
href: device-control-deploy-manage-gpo.md
666661
- name: Device control frequently asked questions
667662
href: device-control-faq.md
668-
- name: Device control reports
669-
href: device-control-report.md
670663
- name: Exploit protection
671664
items:
672665
- name: Protect devices from exploits
@@ -703,8 +696,6 @@
703696
items:
704697
- name: Web threat protection overview
705698
href: web-threat-protection.md
706-
- name: Monitor web security
707-
href: web-protection-monitoring.md
708699
- name: Respond to web threats
709700
href: web-protection-response.md
710701
- name: Web content filtering
@@ -910,13 +901,6 @@
910901

911902
- name: Diagnostics for Microsoft Defender Antivirus
912903
items:
913-
- name: Device health reports
914-
href: device-health-reports.md
915-
items:
916-
- name: Microsoft Defender Antivirus health report
917-
href: device-health-microsoft-defender-antivirus-health.md
918-
- name: Sensor health and OS report
919-
href: device-health-sensor-health-os.md
920904
- name: Microsoft Defender Core service overview
921905
href: microsoft-defender-core-service-overview.md
922906
- name: Microsoft Defender Core service configurations and experimentation
@@ -1121,14 +1105,27 @@
11211105
items:
11221106
- name: Reports
11231107
items:
1124-
- name: Monthly security summary
1125-
href: monthly-security-summary-report.md
1126-
- name: Create custom reports using Power BI
1127-
href: api/api-power-bi.md
1128-
- name: Threat protection reports
1108+
- name: Microsoft Defender for Endpoint reports
11291109
href: threat-protection-reports.md
1110+
- name: Device health reports
1111+
href: device-health-reports.md
1112+
items:
1113+
- name: Microsoft Defender Antivirus health report
1114+
href: device-health-microsoft-defender-antivirus-health.md
1115+
- name: Sensor health and OS report
1116+
href: device-health-sensor-health-os.md
1117+
- name: Host firewall reporting
1118+
href: host-firewall-reporting.md
1119+
- name: Web protection and monitoring reports
1120+
href: web-protection-monitoring.md
1121+
- name: Device control reports
1122+
href: device-control-report.md
1123+
- name: Attack surface reduction rules report
1124+
href: attack-surface-reduction-rules-report.md
11301125
- name: Aggregated reports
1131-
href: aggregated-reporting.md
1126+
href: aggregated-reporting.md
1127+
- name: Create custom reports using Power BI
1128+
href: api/api-power-bi.md
11321129
- name: Configure integration with other Microsoft solutions
11331130
items:
11341131
- name: Configure conditional access

defender-endpoint/android-configure.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Defender for Endpoint on Android allows IT Administrators the ability to configu
4949
[Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks. Anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
5050

5151
> [!NOTE]
52-
> Defender for Endpoint on Android would use a VPN in order to provide the Web Protection feature. This VPN is not a regular VPN. Instead, it's a local/self-looping VPN that does not take traffic outside the device.
52+
> Defender for Endpoint on Android would use a VPN in order to provide the Web Protection feature. This VPN isn't a regular VPN. Instead, it's a local/self-looping VPN that doesn't take traffic outside the device.
5353
>
5454
> For more information, see [Configure web protection on devices that run Android](/mem/intune/protect/advanced-threat-protection-manage-android).
5555
@@ -92,7 +92,7 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
9292
|Manage Network Protection detection for Open Networks|2- Enable (default), 1- Audit mode, 0 - Disable. Security admins manage this setting to enable, audit, or disable open network detection, respectively. In 'Audit' mode, alerts are sent only to the ATP portal with no end user experience. For end user experience, the config should be set to 'Enable' mode.|
9393
|Manage Network protection Detection for Certificates|2- Enable, 1- Audit mode, 0 - Disable (default). In Audit mode, notification alerts are sent to SOC admins, but no end-user notifications are displayed to the user when Defender detects a bad certificate. Admins can, however, enable full feature functionality by setting 2 as the value. When the feature is enabled with the value of 2, end-user notifications are sent to the user when Defender detects a bad certificate, and alerts are also sent to the SOC Admin. |
9494

95-
5. Add the required groups to which the policy will have to be applied. Review and create the policy.
95+
5. Add the required groups to which the policy has to be applied. Review and create the policy.
9696

9797
| Configuration Key| Description|
9898
|---|---|
@@ -106,9 +106,9 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
106106
6. Add the required groups to which the policy has to be applied. Review and create the policy.
107107

108108
> [!NOTE]
109-
>
110109
> - The other config keys of Network Protection will only work if the parent key '**Enable Network Protection in Microsoft Defender'** is enabled.
111-
> - Users need to enable location permission (which is an optional permission) and need to grant "Allow All the Time" permission to ensure protection against Wi-Fi threat, even when the app is not actively in use. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
110+
> - To ensure comprehensive protection against Wi-Fi threats, users should enable location permission and select the "Allow All the Time" option. This permission is optional but highly recommended, even when the app is not actively in use. If location permission is denied, Defender for Endpoint will only offer limited protection against network threats and will only safeguard users from rogue certificates.
111+
**An open wi-fi network alert** is generated whenever a user connects to an open Wi-Fi network. If the user reconnects to the same network within a seven-day period, no new alert will be generated. However, connecting to a different open Wi-Fi network will result in an immediate alert.
112112

113113
## Privacy Controls
114114

@@ -156,7 +156,7 @@ These controls help the end user to configure the information shared to their or
156156

157157
These toggles will only be visible if enabled by the admin. Users can decide if they want to send the information to their organization or not.
158158

159-
Enabling/disabling the above privacy controls won't impact the device compliance check or conditional access.
159+
Enabling/disabling the above privacy controls won't affect the device compliance check or conditional access.
160160

161161
## Configure vulnerability assessment of apps for BYOD devices
162162

@@ -207,7 +207,7 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
207207

208208
5. Select **Next** and assign this profile to targeted devices/users.
209209

210-
Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
210+
Turning the above privacy controls on or off won't affect the device compliance check or conditional access.
211211

212212
## Configure privacy for phishing alert report
213213

@@ -233,7 +233,7 @@ Use the following steps to turn it on for targeted users:
233233

234234
4. Select **Next** and assign this profile to targeted devices/users.
235235

236-
Using this privacy control won't impact the device compliance check or conditional access.
236+
Using this privacy control won't affect the device compliance check or conditional access.
237237

238238
### Configure privacy for phishing alert report on Android Enterprise work profile
239239

@@ -248,7 +248,7 @@ Use the following steps to turn on privacy for targeted users in the work profil
248248

249249
5. Select **Next** and assign this profile to targeted devices/users.
250250

251-
Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
251+
Turning the above privacy controls on or off won't affect the device compliance check or conditional access.
252252

253253
## Configure privacy for malware threat report
254254

@@ -274,7 +274,7 @@ Use the following steps to turn it on for targeted users:
274274

275275
4. Select **Next** and assign this profile to targeted devices/users.
276276

277-
Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
277+
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
278278

279279
### Configure privacy for malware alert report on Android Enterprise work profile
280280

@@ -289,20 +289,20 @@ Use the following steps to turn on privacy for targeted users in the work profil
289289

290290
5. Select **Next** and assign this profile to targeted devices/users.
291291

292-
Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
292+
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
293293

294-
## Disable sign-out
294+
## Disable sign out
295295

296-
Defender for Endpoint supports deployment without the sign-out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering with the device.
297-
Use the following steps to configure Disable sign-out:
296+
Defender for Endpoint supports deployment without the sign out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering with the device.
297+
Use the following steps to configure Disable out sign:
298298

299299
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
300300
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
301301
3. Select **Microsoft Defender for Endpoint** as the target app.
302302
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
303303

304304
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
305-
- Admins need to make Disable Sign Out = 0 to enable the sign-out button in the app. Users will be able to see the sign-out button once the policy is pushed.
305+
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
306306

307307
5. Select **Next** and assign this profile to targeted devices and users.
308308

@@ -321,11 +321,11 @@ Use the following steps to configure the Device tags:
321321
- Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
322322
- Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
323323

324-
5. Click Next and assign this policy to targeted devices and users.
324+
5. Select Next and assign this policy to targeted devices and users.
325325

326326

327327
> [!NOTE]
328-
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
328+
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It might take up to 18 hours for tags to reflect in the portal.
329329
330330
## Related articles
331331

defender-endpoint/api/export-firmware-hardware-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ GET /api/machines/HardwareFirmwareInventoryExport
162162
> [!NOTE]
163163
>
164164
> - The files are GZIP compressed & in multiline JSON format.
165-
> - The download URLs are valid for 6 hours.
165+
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
166166
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
167167
> - Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
168168
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.

defender-endpoint/api/export-security-baseline-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ GET /api/machines/BaselineComplianceAssessmentExport
167167
> [!NOTE]
168168
>
169169
> - The files are GZIP compressed & in multiline JSON format.
170-
> - The download URLs are valid for 6 hours.
170+
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
171171
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
172172
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
173173

0 commit comments

Comments
 (0)