You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/behavior-monitor-macos.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -276,11 +276,15 @@ NRI should have a low impact on network performance. Instead of holding the conn
276
276
277
277
```
278
278
279
-
4. Enable network real-time inspection (NRI):
279
+
1. Enable network real-time inspection (NRI):
280
280
281
281
```Bash
282
-
282
+
283
283
sudo mdatp network-protection remote-settings-override set --value "{\"enableNriMpengineMetadata\" : true}"
284
284
285
+
285
286
```
286
-
287
+
288
+
> [!NOTE]
289
+
> While in Public Preview, since the setting is set via a command line, network real-time inspection (NRI) will not persist reboots. You will need to re-enable it.
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-gpo.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ To configure the device types that a device control policy is applied, follow th
61
61
62
62
1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**.
63
63
64
-
2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
64
+
1. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). This setting must be a single string with no spaces or it will be parsed incorrectly by the device control engine causing unexpected behaviors. Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-intune.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ In the following table, identify the setting you want to configure, and then use
93
93
| Setting | OMA-URI, data type, & values |
94
94
|---|---|
95
95
|**Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match |`./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2`|
96
-
|**Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on |`./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices`|
96
+
|**Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on. You must specify the product family IDs, separated by a pipe. When selecting multiple devices types you need to ensure the string is all one word with no spaces. A configuration that does not follow this syntax will cause unexpected behavior. |`./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices`|
97
97
|**Enable device control** <br/>Enable or disable device control on the device |`./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`<br/><br/>Integer:<br/>- Disable = `0`<br/>- Enable = `1`|
Copy file name to clipboardExpand all lines: defender-endpoint/ios-whatsnew.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
32
32
33
33
## Defender for Endpoint on iOS now supports iOS/iPadOS 16.x as the minimum version
34
34
35
-
Defender for Endpoint on iOS is ending support for iOS/iPadOS 15, as iOS/iPadOS 18 became available in September 2024. Microsoft typically supports the current version and two previous versions (n-2). This change takes effect beginning on January 31, 2025.
35
+
Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-ios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ ms.date: 12/11/2024
78
78
- The device is either enrolled with the [Intune Company Portal app](https://apps.apple.com/us/app/intune-company-portal/id719171358) or is registered with Microsoft Entra ID through [Microsoft Authenticator](https://apps.apple.com/app/microsoft-authenticator/id983156458) with the same account.
79
79
80
80
> [!IMPORTANT]
81
-
> Microsoft Defender for Endpoint is ending support for devices running iOS/iPadOS 15 and previous versions on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
81
+
> Microsoft Defender for Endpoint is ending support for devices running iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
82
82
83
83
> [!NOTE]
84
84
> - Microsoft Defender for Endpoint on iOS isn't supported on user-less or shared devices.
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 11/10/2024
6
+
ms.date: 12/12/2024
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -55,14 +55,15 @@ The following table summarizes network protection areas of coverage.
55
55
> [!NOTE]
56
56
> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
57
57
> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58
-
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
59
-
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60
-
> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
58
+
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
59
+
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60
+
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
61
61
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
62
+
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
62
63
> - Full URL path blocks can be applied for unencrypted URLs.
63
-
>
64
+
>
64
65
> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
65
-
66
+
>
66
67
Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
Copy file name to clipboardExpand all lines: defender-xdr/defender-experts-report.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,7 @@ title: Understand the Defender Experts for Hunting report in Microsoft Defender
3
3
ms.reviewer:
4
4
description: The Defender Experts for Hunting service publishes reports to help you understand all the threats the hunting service surfaced in your environment
0 commit comments