Skip to content

Commit 1196f14

Browse files
committed
Merge branch 'main' into maccruz-unifiedcustom
2 parents 0c4361e + 3be295e commit 1196f14

17 files changed

+134
-145
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1111

1212
> [!NOTE]
13-
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
13+
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
1414
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1515
>
1616
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.

CloudAppSecurityDocs/connector-platform.md

Lines changed: 0 additions & 60 deletions
This file was deleted.

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud
118118
* **Manage Users**
119119
* **[Query All Files](https://go.microsoft.com/fwlink/?linkid=2106480)**
120120
* **Modify Metadata Through Metadata API Functions**
121+
* **View Setup And Configuration**
121122

122123
If these checkboxes aren't selected, you may need to contact Salesforce to add them to your account.
123124

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 04/28/2025
4+
ms.date: 05/05/2025
55
ms.topic: how-to
66
---
77

@@ -97,6 +97,7 @@ Defender for Cloud Apps supports the following ServiceNow versions:
9797
- Kingston
9898
- London
9999
- Utah
100+
- Yokohama
100101
:::column-end:::
101102
:::column:::
102103
- Madrid

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,6 @@ items:
6262
- name: Overview
6363
displayName: connect apps
6464
href: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
65-
- name: Custom connectors with the open app connector platform
66-
href: ./connector-platform.md
6765
- name: Asana
6866
href: protect-asana.md
6967
- name: Atlassian

defender-endpoint/TOC.yml

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -252,14 +252,14 @@
252252
href: manage-sys-extensions-using-jamf.md
253253
- name: Manual deployment
254254
href: manage-sys-extensions-manual-deployment.md
255-
255+
256256
- name: Defender for Endpoint on Linux
257257
items:
258258
- name: Deploy Defender for Endpoint on Linux
259259
items:
260-
- name: 1 - Prerequisites
260+
- name: Prerequisites
261261
href: mde-linux-prerequisites.md
262-
- name: 2 - Choose a deployment method
262+
- name: Choose a deployment method
263263
items:
264264
- name: Installer script based deployment
265265
href: linux-installer-script.md
@@ -277,28 +277,28 @@
277277
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
278278
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
279279
href: mde-linux-deployment-on-sap.md
280-
- name: 3 - Configuration
280+
- name: Configure Defender for Endpoint on Linux
281+
items:
282+
- name: Configure security policies and settings
283+
href: linux-preferences.md
284+
- name: Static proxy configuration
285+
href: linux-static-proxy-configuration.md
286+
- name: Configure antivirus scans
281287
items:
282-
- name: Configure security policies and settings
283-
href: linux-preferences.md
284-
- name: Static proxy configuration
285-
href: linux-static-proxy-configuration.md
286-
- name: Configure antivirus scans
287-
items:
288-
- name: Schedule antivirus scans using Anacron
289-
href: schedule-antivirus-scan-anacron.md
290-
- name: Schedule antivirus scans using Crontab
291-
href: schedule-antivirus-scan-crontab.md
292-
- name: Network protection for Linux
293-
href: network-protection-linux.md
294-
- name: Configure and validate exclusions on Linux
295-
href: linux-exclusions.md
296-
- name: Configure eBPF-based sensor
297-
href: linux-support-ebpf.md
298-
- name: Detect and block Potentially Unwanted Applications
299-
href: linux-pua.md
300-
- name: Configure Offline Security Intelligence Update
301-
href: linux-support-offline-security-intelligence-update.md
288+
- name: Schedule antivirus scans using Anacron
289+
href: schedule-antivirus-scan-anacron.md
290+
- name: Schedule antivirus scans using Crontab
291+
href: schedule-antivirus-scan-crontab.md
292+
- name: Network protection for Linux
293+
href: network-protection-linux.md
294+
- name: Configure and validate exclusions on Linux
295+
href: linux-exclusions.md
296+
- name: Configure eBPF-based sensor
297+
href: linux-support-ebpf.md
298+
- name: Detect and block Potentially Unwanted Applications
299+
href: linux-pua.md
300+
- name: Configure Offline Security Intelligence Update
301+
href: linux-support-offline-security-intelligence-update.md
302302
- name: Update Defender for Endpoint on Linux
303303
items:
304304
- name: Update Defender for Endpoint on Linux
@@ -307,7 +307,7 @@
307307
href: linux-update-mde-linux.md
308308
- name: Privacy for Defender for Endpoint on Linux
309309
href: linux-privacy.md
310-
- name: Resources for Microsoft Defender for Endpoint on Linux
310+
- name: Additional resources for Defender for Endpoint on Linux
311311
href: linux-resources.md
312312
- name: Mobile Threat Defense
313313
items:

defender-endpoint/defender-endpoint-plan-1.md

Lines changed: 14 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: overview
1010
ms.service: defender-endpoint
1111
ms.subservice: onboard
1212
ms.localizationpriority: medium
13-
ms.date: 02/13/2025
13+
ms.date: 05/02/2025
1414
ms.reviewer: shlomiakirav
1515
f1.keywords: NOCSH
1616
ms.collection:
@@ -83,23 +83,13 @@ To learn more, see the following articles:
8383

8484
Your organization's attack surfaces are all the places where you're vulnerable to cyberattacks. With Defender for Endpoint Plan 1, you can reduce your attack surfaces by protecting the devices and applications that your organization uses. The attack surface reduction capabilities that are included in Defender for Endpoint Plan 1 are described in the following sections.
8585

86-
- [Overview of Microsoft Defender for Endpoint Plan 1](#overview-of-microsoft-defender-for-endpoint-plan-1)
87-
- [Defender for Endpoint Plan 1 capabilities](#defender-for-endpoint-plan-1-capabilities)
88-
- [Next-generation protection](#next-generation-protection)
89-
- [Manual response actions](#manual-response-actions)
90-
- [Attack surface reduction](#attack-surface-reduction)
91-
- [Attack surface reduction rules](#attack-surface-reduction-rules)
92-
- [Ransomware mitigation](#ransomware-mitigation)
93-
- [Device control](#device-control)
94-
- [Web protection](#web-protection)
95-
- [Network protection](#network-protection)
96-
- [Network firewall](#network-firewall)
97-
- [Application control](#application-control)
98-
- [Centralized management](#centralized-management)
99-
- [Role-based access control](#role-based-access-control)
100-
- [Reporting](#reporting)
101-
- [APIs](#apis)
102-
- [Next steps](#next-steps)
86+
- [Attack surface reduction rules](#attack-surface-reduction-rules)
87+
- [Ransomware mitigation](#ransomware-mitigation)
88+
- [Device control](#device-control)
89+
- [Web protection](#web-protection)
90+
- [Network protection](#network-protection)
91+
- [Network firewall](#network-firewall)
92+
- [Application control](#application-control)
10393

10494
To learn more about attack surface reduction capabilities in Defender for Endpoint, see [Overview of attack surface reduction](overview-attack-surface-reduction.md).
10595

@@ -191,17 +181,17 @@ With the Defender for Endpoint APIs, you can automate workflows and integrate wi
191181

192182
To learn more, see [Defender for Endpoint APIs](api/management-apis.md).
193183

194-
- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction).
195-
- **Microsoft Defender for Endpoint Server** (*recommended for enterprise customers*). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
196-
- **Microsoft Defender for Business servers** (*for small and medium-sized businesses who have [Microsoft Defender for Business](/defender-business/mdb-overview)*). To learn more, see [How to get Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers).
197-
198-
See [Microsoft licensing and product terms](https://www.microsoft.com/en-us/licensing/product-licensing/products).
199-
200184
## Next steps
201185

202186
- [Set up and configure Defender for Endpoint Plan 1](mde-p1-setup-configuration.md)
187+
188+
## Related content
189+
203190
- [Get started with Defender for Endpoint Plan 1](mde-plan1-getting-started.md)
204191
- [Manage Defender for Endpoint Plan 1](preferences-setup.md)
205192
- [Learn about exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
193+
- [Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint](onboard-client.md)
194+
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
195+
- [Microsoft Defender for Endpoint - Mobile Threat Defense](mtd.md) (for iOS and Android devices)
206196

207197
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/mac-install-manually.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
ms.subservice: macos
1818
search.appverid: met150
19-
ms.date: 04/16/2025
19+
ms.date: 05/01/2025
2020
---
2121

2222
# Manual deployment for Microsoft Defender for Endpoint on macOS
@@ -33,7 +33,7 @@ ms.date: 04/16/2025
3333
This article describes how to deploy Microsoft Defender for Endpoint on macOS manually. A successful deployment requires the completion of all of the following steps:
3434

3535
- [Download installation and onboarding packages](#download-installation-and-onboarding-packages)
36-
- [Application installation (macOS 11 and newer versions)](#application-installation-macos-11-and-newer-versions)
36+
- [Application installation (macOS 13 and newer versions)](#application-installation-macos-13-and-newer-versions)
3737
- [Onboarding Package](#onboarding-package)
3838
- [Grant Full Disk Access](#allow-full-disk-access)
3939
- [Ensure Background Execution](#background-execution)
@@ -64,23 +64,23 @@ Download the installation and onboarding packages from Microsoft Defender portal
6464

6565
6. Copy the *wdav.pkg* and *MicrosoftDefenderATPOnboardingMacOs.sh* to the device where you want to deploy the Microsoft Defender for Endpoint on macOS.
6666

67-
## Application installation (macOS 11 and newer versions)
67+
## Application installation (macOS 13 and newer versions)
6868

6969
To complete this process, you must have admin privileges on the device.
7070

7171
1. Do one of the following steps:
7272

73-
- Navigate to the downloaded *wdav.pkg* in **Finder** and open it.
73+
- Navigate to the downloaded *wdav.pkg* in **Finder** and open it.
7474

7575
Or
7676

77-
- You can download the *wdav.pkg*- from **Terminal**
78-
77+
- You can download the *wdav.pkg*- from **Terminal**.
78+
7979
```console
80-
sudo installer -store -pkg /Users/admin/Downloads/wdav.pkg -target /
80+
sudo installer -pkg /Users/admin/Downloads/wdav.pkg -target /
8181
```
82-
83-
:::image type="content" source="media/monterey-install-1.png" alt-text="Screenshot that shows the installation process for the application":::
82+
83+
:::image type="content" source="media/monterey-install-1.png" alt-text="Screenshot that shows the installation process for the application.":::
8484

8585
2. Select **Continue**.
8686

@@ -111,7 +111,7 @@ To complete this process, you must have admin privileges on the device.
111111

112112
9. Select **Install Software**.
113113

114-
10. At the end of the installation process, for macOS Big Sur (11.0) or latest version, you're prompted to approve the system extensions used by the product. Select **Open Security Preferences**.
114+
10. At the end of the installation process, for macOS Ventura (13.0) or latest version, you're prompted to approve the system extensions used by the product. Select **Open Security Preferences**.
115115

116116
:::image type="content" source="media/monterey-install-2.png" alt-text="Screenshot that shows the system extension approval":::
117117

0 commit comments

Comments
 (0)