Skip to content

Commit 12cc045

Browse files
committed
Merge branch 'permli' of https://github.com/tarTech23/defender-docs-pr into permli
2 parents 6b7e62b + 7436e64 commit 12cc045

File tree

208 files changed

+3067
-2005
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

208 files changed

+3067
-2005
lines changed

.openpublishing.redirection.defender.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,21 @@
194194
"source_path": "defender-endpoint/collect-diagnostic-data-update-compliance.md",
195195
"redirect_url": "/defender-endpoint/collect-diagnostic-data",
196196
"redirect_document_id": false
197+
},
198+
{
199+
"source_path": "defender-endpoint/attack-simulations.md",
200+
"redirect_url": "/defender-endpoint/defender-endpoint-demonstrations",
201+
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "defender-endpoint/mssp-support.md",
205+
"redirect_url": "/defender-endpoint/configure-mssp-support",
206+
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "defender-endpoint/evaluate-mde.md",
210+
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",
211+
"redirect_document_id": false
197212
}
198213
]
199214
}

defender-business/mdb-asr.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of attack surface reduction capabilities, including
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 06/07/2024
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -23,9 +23,6 @@ Your attack surfaces are all the places and ways that your organization's networ
2323

2424
To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
2525

26-
> [!NOTE]
27-
> Intune is not included in the standalone version of Defender for Business, but it can be added on.
28-
2926
## Standard protection ASR rules
3027

3128
There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:

defender-business/mdb-mtd.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of mobile threat defense in Defender for Business.
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 06/19/2024
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -37,17 +37,17 @@ The following table summarizes the capabilities that are included in mobile thre
3737
| **Microsoft Defender Vulnerability Management**<br/>Vulnerability assessment of onboarded mobile devices. Includes vulnerability assessments for operating systems and apps for Android and iOS. <br/>See [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md). | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | See note 1 (below) |
3838
| **Network Protection** <br/>Protection against rogue Wi-Fi related threats and rogue certificates. <br/>Network protection is turned on by default with [next-generation protection](mdb-next-generation-protection.md). <br/>As part of mobile threat defense, network protection also includes the ability to allow root certification authority and private root certification authority certificates in Intune. It also establishes trust with endpoints. | See note 2 (below) | See note 2 (below) |
3939
| **Unified alerting** <br/>Alerts from all platforms are listed in the unified Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, choose **Incidents**). <br/>See [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md) | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
40-
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
40+
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>- Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
4141
| **Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune | Requires Intune |
4242
| **Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 3 below) | Requires Intune VPN Tunnel <br/>(see note 3 below) |
4343

4444
> [!NOTE]
45-
> 1. Intune is required for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
45+
> 1. Intune is used for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
4646
>
47-
> 2. Intune is required to configure or manage an allow list of root certification authority and private root certification authority certificates.
47+
> 1. Use Intune to configure or manage an allow list of root certification authority and private root certification authority certificates.
4848
>
4949
> 3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
50-
>
50+
5151

5252
## How to get mobile threat defense capabilities
5353

defender-endpoint/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -321,8 +321,6 @@
321321
items:
322322
- name: Integration with Microsoft Defender for Cloud
323323
href: azure-server-integration.md
324-
- name: Run simulated attacks on devices
325-
href: attack-simulations.md
326324
- name: Create an onboarding or offboarding notification rule
327325
href: onboarding-notification.md
328326
- name: Manage Microsoft Defender for Endpoint configuration settings on devices with Microsoft Intune
@@ -1403,8 +1401,6 @@
14031401
href: api/exposed-apis-create-app-partners.md
14041402
- name: Fetch alerts from customer tenant
14051403
href: api/fetch-alerts-mssp.md
1406-
- name: Managed security service provider opportunity
1407-
href: mssp-support.md
14081404
- name: Partner integration scenarios
14091405
items:
14101406
- name: Technical partner opportunities

defender-endpoint/access-mssp-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: Access the Microsoft Defender XDR MSSP customer portal
33
description: Access the Microsoft Defender XDR MSSP customer portal
44
ms.service: defender-endpoint
5+
ms.subservice: onboard
56
ms.author: siosulli
67
author: siosulli
78
ms.localizationpriority: medium

defender-endpoint/admin-submissions-mde.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ manager: deniseb
1010
ms.localizationpriority: medium
1111
audience: ITPro
1212
ms.topic: how-to
13-
ms.collection:
13+
ms.collection:
1414
- m365-security
1515
- tier3
1616
ms.custom: FPFN
@@ -35,13 +35,15 @@ The new unified submissions experience is available only in subscriptions that i
3535
You need to assign permissions before you can perform the procedures in this article. Use one of the following options:
3636

3737
**Microsoft Defender for Endpoint** permissions:
38-
- Submit files / file hashes: _"Alerts investigation" or "Manage security settings in Security Center"_
39-
- View submissions: "_View Data - Security operations"_
40-
41-
**Microsoft Defender XDR** unified RBAC permissions:
42-
- Submit files / file hashes: *"Alerts (Manage)" or "Core security settings (manage)"*
43-
- View submissions: _"Security data basics (read)"_
44-
38+
39+
- Submit files / file hashes: _"Alerts investigation" or "Manage security settings in Security Center"_
40+
- View submissions: "_View Data - Security operations"_
41+
42+
**Microsoft Defender XDR Unified RBAC** permissions:
43+
44+
- Submit files / file hashes: _"Alerts (Manage)" or "Core security settings (manage)"_
45+
- View submissions: _"Security data basics (read)"_
46+
4547
For more information about how you can submit spam, phish, URLs, and email attachments to Microsoft, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](/defender-office-365/submissions-admin).
4648

4749
## Submit a file or file hash to Microsoft from the Defender portal
@@ -54,7 +56,7 @@ For more information about how you can submit spam, phish, URLs, and email attac
5456

5557
:::image type="content" source="/defender/media/unified-admin-submission-new.png" alt-text="Screenshot showing how to add a new submission.":::
5658

57-
2. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
59+
4. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
5860

5961
- If you selected **Files**, configure the following options:
6062
- Select **Browse files**. In the dialog that opens, find and select the file, and then select **Open**. Repeat this step as many times as necessary. To remove an entry from the flyout, select :::image type="icon" source="/defender/media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.

defender-endpoint/android-configure-mam.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 01/13/2023
17+
ms.date: 07/25/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -138,7 +138,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
138138

139139
## Configure Web protection
140140

141-
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://endpoint.microsoft.com).
141+
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://intune.microsoft.com).
142142

143143
Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
144144

defender-endpoint/android-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 05/22/2024
18+
ms.date: 07/25/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -293,7 +293,7 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
293293

294294
### Set up Microsoft Defender in Personal Profile
295295

296-
Admins can go to the [Microsoft Endpoint Management admin center](https://endpoint.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
296+
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
297297

298298
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
299299

defender-endpoint/android-support-signin.md

Lines changed: 28 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -108,19 +108,42 @@ Defender App asks for Battery Optimization/Permanent Protection permission on de
108108

109109
**Cause:**
110110

111-
Xiaomi changed the battery optimization permissions in Android 11. Defender for Endpoint isn't allowed to configure this setting to ignore battery optimizations.
111+
Xiaomi changed the battery optimization permissions from Android 11 onwards. Defender for Endpoint isn't allowed to configure this setting to ignore battery optimizations.
112112

113-
**Solution:**
114-
1. Install MDE app in personal profile. (Sign-in isn't required.)
113+
**Solution 1:**
114+
115+
The Android devices Battery Optimization screen opens automatically as part of the onboarding flow where the user needs to give the permissions. The user must then follow these steps to get on-boarded:
116+
117+
1. Select Work Profile to see all of the work profile apps
118+
119+
![Image of Battery Optimisation screen](media/android-support-signin/image.png)
120+
2. Tap on **Not optimised** and select **All Apps**
121+
122+
![Image of Optimisation dropdown menu](media/android-support-signin/image1.png)
123+
124+
![Image of All Apps option in the dropdown](media/android-support-signin/image2.png)
125+
126+
3. Scroll down to find **Microsoft Defender** and tap on it
127+
128+
![Image of All Apps including Microsoft Defender](media/android-support-signin/image3.png)
129+
130+
4. Select **Don’t Optimise** option and tap on **Done**
131+
132+
![Image of the Microsoft Defende Optimise drop down](media/android-support-signin/image4.png)
133+
134+
5. Navigate back to Defender
135+
136+
**Solution 2** (needed in case the Solution 1 does not work):
137+
138+
1. Install MDE app in personal profile. (Sign-in isn't required.)
115139
2. Open the Company Portal and tap on Settings.
116140
3. Go to the Battery Optimization section, tap on the **Turn Off** button, and then select on **Allow** to turn off Battery Optimization for the Company Portal.
117141
4. Again, go to the Battery Optimization section and tap on the **Turn On** button. The battery saver section opens.
118142
5. Find the Defender app and tap on it.
119143
6. Select **No Restriction**. Go back to the Defender app in work profile and tap on **Allow** button.
120144
7. The application shouldn't be uninstalled from personal profile for this to work.
121145

122-
>[!NOTE]
123-
>This is a temporary workaround. This can be used to unblock onboarding on Xiaomi devices. The Defender team is working on a permanent fix. As the MDE app is not onboarded in the personal profile, it will not have any visibility there.
146+
124147

125148
## Unable to use banking applications with MDE app
126149

0 commit comments

Comments
 (0)