Skip to content

Commit 1225ffb

Browse files
authored
Merge branch 'main' into siosulli-patch-1
2 parents dd1e85f + 1774132 commit 1225ffb

22 files changed

+285
-45
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 07/25/2024
17+
ms.date: 08/08/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -124,14 +124,14 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
124124

125125
1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
126126

127-
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
127+
2. Select **Continue**. A screen is presented which recommends downloading and setting up of the Microsoft Defender: Antivirus (Mobile) app.
128128

129129
3. Select **Download**. You'll be redirected to the app store (Google play).
130130

131-
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
132-
133-
:::image type="content" source="media/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="media/download-mde.png":::
131+
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
134132

133+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134+
135135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136136

137137
6. Select **Continue** to log into the managed application.
411 KB
Loading

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 08/01/2024
17+
ms.date: 08/13/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -55,7 +55,7 @@ This article provides instructions on how to run the tool via Live Response on W
5555

5656
```console
5757
Run MDELiveAnalyzer.ps1
58-
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult.zip"
58+
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
5959
```
6060

6161
[![Image of commands.](media/analyzer-commands.png)](media/analyzer-commands.png#lightbox)

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141

4242
## July 2024
4343

44-
- **Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD and and Office 365 operated by 21Vianet environments**: The [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.
44+
- **Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD, and Office 365 operated by 21Vianet environments**: The [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.
4545

4646
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
4747

@@ -51,14 +51,14 @@ For more information on what's new with other Microsoft Defender security produc
5151

5252
## May 2024
5353

54-
- **Top level domain and subdomain blocking in Tenant Allow/Block List**: You will be able to create block entries under domains & email addresses, using the format `*.TLD`, where `TLD` can be any top-level domain or `*.SD1.TLD, *.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, and similar patterns for subdomain blocking. The entries block all email received from or sent to any email addresses in the domain or subdomain during mail flow.
54+
- **Top level domain and subdomain blocking in Tenant Allow/Block List**: You can create block entries under domains & email addresses, using the format `*.TLD`, where `TLD` can be any top-level domain or `*.SD1.TLD, *.SD2.SD1.TLD`, `*.SD3.SD2.SD1.TLD`, and similar patterns for subdomain blocking. The entries block all email received from or sent to any email addresses in the domain or subdomain during mail flow.
5555

5656
- **Automated end user feedback**: The user submission automatic feedback response capability in Microsoft Defender for Office 365 enables organizations to automatically respond to end user submissions of phishing based on the verdict from the automated investigation. [Learn more](air-user-automatic-feedback-response.md).
5757

58-
- We are introducing **Sender's copy clean-up features** in Threat Explorer, email entity, Summary Panel, and Advanced hunting. These new features will streamline the process of managing Sent items, particularly for admins who use the actions **Move to mailbox folder** \> **Soft delete** and **Move to mailbox folder** \> **Inbox**. For more information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard). Key highlights:
59-
- Integration with Soft delete: Sender's copy clean-up will be incorporated as part of the Soft delete action.
60-
- Wide support: This action will be supported across various Defender XDR platforms including Threat Explorer, Take Action wizard from the email entity, Summary Panel, Advanced hunting, and through Microsoft Graph API.
61-
- Undo capability: An undo action will be available, allowing you to reverse the clean-up by moving items back to the Sent folder.
58+
- We're introducing **Sender's copy clean-up features** in Threat Explorer, email entity, Summary Panel, and Advanced hunting. These new features streamline the process of managing Sent items, particularly for admins who use the actions **Move to mailbox folder** \> **Soft delete** and **Move to mailbox folder** \> **Inbox**. For more information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard). Key highlights:
59+
- Integration with Soft delete: Sender's copy clean-up is incorporated as part of the Soft delete action.
60+
- Wide support: This action is supported across various Defender XDR platforms including Threat Explorer, Take Action wizard from the email entity, Summary Panel, Advanced hunting, and through Microsoft Graph API.
61+
- Undo capability: An undo action is available, allowing you to reverse the clean-up by moving items back to the Sent folder.
6262

6363
## April 2024
6464

@@ -192,7 +192,7 @@ For more information on what's new with other Microsoft Defender security produc
192192
- From Office 365 Security & Compliance Center URL: scc.protection.apps.mil
193193
- To Microsoft Defender XDR URL: security.apps.mil
194194
- Items in the Office 365 Security & Compliance Center that aren't related to security aren't redirected to Microsoft Defender XDR. For compliance solutions redirection to Microsoft 365 Compliance Center, see Message Center post 244886.
195-
- This change is a continuation of [Microsoft Defender XDR delivers unified XDR experience to GCC, GCC High and DoD customers - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-defender-delivers-unified-xdr-experience-to-gcc/ba-p/3263702), announced in March 2022.
195+
- This change is a continuation of [Microsoft Defender XDR delivers unified XDR experience to GCC, GCC High, and DoD customers - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-defender-delivers-unified-xdr-experience-to-gcc/ba-p/3263702), announced in March 2022.
196196
- This change enables users to view and manage additional Microsoft Defender XDR security solutions in one portal.
197197
- This change impacts all customers who use the Office 365 Security & Compliance Center (protection.office.com), including Microsoft Defender for Office (Plan 1 or Plan 2), Microsoft 365 E3 / E5, Office 365 E3/ E5, and Exchange Online Protection. For the full list, see [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)
198198
- This change impacts all users who sign in to the Office 365 Security and Compliance portal (protection.office.com), including security teams and end-users who access the Email Quarantine experience, at the **Microsoft Defender Portal** \> **Review** \> **Quarantine**.
@@ -258,7 +258,7 @@ For more information on what's new with other Microsoft Defender security produc
258258
## August 2021
259259

260260
- [Admin review for reported messages](submissions-admin-review-user-reported-messages.md): Admins can now send templated messages back to end users after they review reported messages. The templates can be customized for your organization and based on your admin's verdict as well.
261-
- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow will be added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally if warranted. In some cases, Microsoft manages the allow for you. For more information, see:
261+
- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow entries are added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally, if warranted. In some cases, Microsoft manages the allow for you. For more information, see:
262262
- [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft)
263263
- [Report good email attachments to Microsoft](submissions-admin.md#report-good-email-attachments-to-microsoft)
264264
- [Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft)
@@ -289,7 +289,7 @@ For more information on what's new with other Microsoft Defender security produc
289289

290290
- [Email entity page](mdo-email-entity-page.md): A unified 360-degree view of an email with enriched information around threats, authentication and detections, detonation details, and a brand-new email preview experience.
291291
- [Office 365 Management API](/office/office-365-management-api/office-365-management-activity-api-schema#email-message-events): Updates to EmailEvents (RecordType 28) to add delivery action, original and latest delivery locations, and updated detection details.
292-
- [Threat Analytics for Defender for Office 365](/defender-xdr/threat-analytics): View active threat actors, popular techniques and attack surfaces, along with extensive reporting from Microsoft researchers around ongoing campaigns.
292+
- [Threat Analytics for Defender for Office 365](/defender-xdr/threat-analytics): View active threat actors, popular techniques, and attack surfaces, along with extensive reporting from Microsoft researchers around ongoing campaigns.
293293

294294
## February/March 2021
295295

defender-office-365/safe-links-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Safe Links protection by Safe Links policies is available in the following locat
6161
>
6262
> Safe Links supports only HTTP(S) and FTP formats.
6363
>
64-
> Safe Links no longer wraps URLs pointing to SharePoint sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
64+
> Safe Links no longer wraps URLs pointing to SharePoint Online sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
6565
>
6666
> Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
6767

defender-office-365/submissions-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ For other ways that **admins** can report messages to Microsoft in the Defender
9595
- **Select the submission type**: Verify the value **Email** is selected.
9696

9797
- **Add the network message ID or upload the email file**: Select one of the following options:
98-
- **Add the email network message ID**: The GUID value is available in the **X-MS-Exchange-Organization-Network-Message-Id** header in the message or in the **X-MS-Office365-Filtering-Correlation-Id** header in quarantined messages.
98+
- **Add the email network message ID**: The GUID value is available in the **X-MS-Exchange-Organization-Network-Message-Id** header or in the **X-MS-Office365-Filtering-Correlation-Id** header in messages.
9999
- **Upload the email file (.msg or .eml)**: Select **Browse files**. In the dialog that opens, find and select the .eml or .msg file, and then select **Open**.
100100

101101
- **Choose at least one recipient who had an issue**: Specify the recipients to run a policy check against. The policy check determines if the email bypassed scanning due to user or organization policies or override.

defender-xdr/access-den-graph-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Accessing incident notifications and DENs using Graph security API
33
ms.reviewer:
44
description: The method to access Defender Experts Notifications using Graph security API
55
ms.service: defender-experts
6-
ms.subservice: dex-xdr
6+
ms.subservice: dex-hunting
77
ms.author: vpattnaik
88
author: vpattnai
99
ms.localizationpriority: medium
@@ -15,7 +15,7 @@ ms.collection:
1515
- essentials-overview
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 04/29/2024
18+
ms.date: 08/14/2024
1919
---
2020

2121
# Access incident notifications using Graph API

defender-xdr/before-you-begin-defender-experts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Key infrastructure requirements before enrolling in the Microsoft Defende
33
ms.reviewer:
44
description: This section outlines the key infrastructure requirements you must meet and important information on data access and compliance
55
ms.service: defender-experts
6+
ms.subservice: dex-hunting
67
ms.author: vpattnaik
78
author: vpattnai
89
ms.localizationpriority: medium
@@ -14,7 +15,7 @@ ms.collection:
1415
- tier1
1516
ms.topic: conceptual
1617
search.appverid: met150
17-
ms.date: 06/19/2024
18+
ms.date: 08/14/2024
1819
---
1920

2021
# Before you begin using Defender Experts for Hunting

defender-xdr/deception-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,20 @@ title: Manage the deception capability in Microsoft Defender XDR
33
description: Detect human-operated attacks with lateral movement in the early stages using high confidence signals from the deception feature in Microsoft Defender XDR.
44
ms.service: defender-xdr
55
f1.keywords:
6-
- NOCSH
6+
- NOCSH
77
ms.author: diannegali
88
author: diannegali
99
ms.localizationpriority: medium
1010
manager: dansimp
1111
audience: ITPro
1212
ms.collection:
13-
- m365-security
14-
- tier1
13+
- m365-security
14+
- tier1
1515
ms.topic: conceptual
1616
search.appverid:
17-
- MOE150
18-
- MET150
19-
ms.date: 08/08/2024
17+
- MOE150
18+
- MET150
19+
ms.date: 08/14/2024
2020
---
2121

2222
# Manage the deception capability in Microsoft Defender XDR
@@ -79,7 +79,7 @@ There are two types of lures available in the deception feature:
7979
8080
You can specify decoys, lures, and the scope in a deception rule. See [Configure the deception feature](configure-deception.md) to learn more about how to create and modify deception rules.
8181

82-
When an attacker uses a decoy or a lure on any Defender for Endpoint-onboarded client, the deception capability triggers an alert that indicates possible attacker activity, regardless of whether deception was deployed on the client or not.
82+
When an attacker uses a decoy on any Defender for Endpoint-onboarded client, the deception capability triggers an alert that indicates possible attacker activity, regardless of whether deception was deployed on the client or not.
8383

8484
## Identify incidents and alerts activated by deception
8585

defender-xdr/defender-experts-for-hunting.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: What is Microsoft Defender Experts for Hunting offering
33
ms.reviewer:
44
description: Microsoft Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints
55
ms.service: defender-experts
6+
ms.subservice: dex-hunting
67
ms.author: vpattnaik
78
author: vpattnai
89
ms.localizationpriority: medium

0 commit comments

Comments
 (0)