Skip to content

Commit 1313e91

Browse files
Merge pull request #2181 from MicrosoftDocs/main
Publish main to live, 12/12/24, 3:30 PM PT
2 parents cf24d47 + 8a86373 commit 1313e91

12 files changed

+24
-25
lines changed

defender-endpoint/behavior-monitor-macos.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -276,11 +276,15 @@ NRI should have a low impact on network performance. Instead of holding the conn
276276

277277
```
278278

279-
4. Enable network real-time inspection (NRI):
279+
1. Enable network real-time inspection (NRI):
280280

281281
```Bash
282-
282+
283283
sudo mdatp network-protection remote-settings-override set --value "{\"enableNriMpengineMetadata\" : true}"
284284

285+
285286
```
286-
287+
288+
> [!NOTE]
289+
> While in Public Preview, since the setting is set via a command line, network real-time inspection (NRI) will not persist reboots. You will need to re-enable it.
290+

defender-endpoint/device-control-deploy-manage-gpo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ To configure the device types that a device control policy is applied, follow th
6161

6262
1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**.
6363

64-
2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
64+
1. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). This setting must be a single string with no spaces or it will be parsed incorrectly by the device control engine causing unexpected behaviors. Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
6565

6666
## Define groups
6767

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ In the following table, identify the setting you want to configure, and then use
9393
| Setting | OMA-URI, data type, & values |
9494
|---|---|
9595
| **Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match | `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2` |
96-
| **Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on | `./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices` |
96+
| **Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on. You must specify the product family IDs, separated by a pipe. When selecting multiple devices types you need to ensure the string is all one word with no spaces. A configuration that does not follow this syntax will cause unexpected behavior. | `./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices` |
9797
| **Enable device control** <br/>Enable or disable device control on the device | `./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`<br/><br/>Integer:<br/>- Disable = `0`<br/>- Enable = `1` |
9898

9999
### Creating policies with OMA-URI

defender-endpoint/ios-whatsnew.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3232

3333
## Defender for Endpoint on iOS now supports iOS/iPadOS 16.x as the minimum version
3434

35-
Defender for Endpoint on iOS is ending support for iOS/iPadOS 15, as iOS/iPadOS 18 became available in September 2024. Microsoft typically supports the current version and two previous versions (n-2). This change takes effect beginning on January 31, 2025.
35+
Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
3636

3737
**How does this affect you or your users?**
3838

defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ ms.date: 12/11/2024
7878
- The device is either enrolled with the [Intune Company Portal app](https://apps.apple.com/us/app/intune-company-portal/id719171358) or is registered with Microsoft Entra ID through [Microsoft Authenticator](https://apps.apple.com/app/microsoft-authenticator/id983156458) with the same account.
7979

8080
> [!IMPORTANT]
81-
> Microsoft Defender for Endpoint is ending support for devices running iOS/iPadOS 15 and previous versions on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
81+
> Microsoft Defender for Endpoint is ending support for devices running iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
8282
8383
> [!NOTE]
8484
> - Microsoft Defender for Endpoint on iOS isn't supported on user-less or shared devices.

defender-endpoint/network-protection.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 11/10/2024
6+
ms.date: 12/12/2024
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -55,14 +55,15 @@ The following table summarizes network protection areas of coverage.
5555
> [!NOTE]
5656
> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
5757
> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58-
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
59-
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60-
> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
58+
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
59+
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60+
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
6161
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
62+
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
6263
> - Full URL path blocks can be applied for unencrypted URLs.
63-
>
64+
>
6465
> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
65-
66+
>
6667
Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
6768

6869
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4r4yZ]

defender-xdr/access-den-graph-api.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
title: Accessing incident notifications and DENs using Graph security API
33
ms.reviewer:
44
description: The method to access Defender Experts Notifications using Graph security API
5-
ms.service: defender-experts
6-
ms.subservice: dex-hunting
5+
ms.service: defender-experts-for-hunting
76
ms.author: vpattnaik
87
author: vpattnai
98
ms.localizationpriority: medium

defender-xdr/before-you-begin-defender-experts.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
title: Key infrastructure requirements before enrolling in the Microsoft Defender Experts for Hunting service
33
ms.reviewer:
44
description: This section outlines the key infrastructure requirements you must meet and important information on data access and compliance
5-
ms.service: defender-experts
6-
ms.subservice: dex-hunting
5+
ms.service: defender-experts-for-hunting
76
ms.author: vpattnaik
87
author: vpattnai
98
ms.localizationpriority: medium

defender-xdr/defender-experts-for-hunting.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
title: What is Microsoft Defender Experts for Hunting offering
33
ms.reviewer:
44
description: Microsoft Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints
5-
ms.service: defender-experts
6-
ms.subservice: dex-hunting
5+
ms.service: defender-experts-for-hunting
76
ms.author: vpattnaik
87
author: vpattnai
98
ms.localizationpriority: medium

defender-xdr/defender-experts-report.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,7 @@ title: Understand the Defender Experts for Hunting report in Microsoft Defender
33
ms.reviewer:
44
description: The Defender Experts for Hunting service publishes reports to help you understand all the threats the hunting service surfaced in your environment
55
search.appverid: met150
6-
ms.service: defender-experts
7-
ms.subservice: dex-hunting
6+
ms.service: defender-experts-for-hunting
87
f1.keywords:
98
- NOCSH
109
ms.author: vpattnaik

0 commit comments

Comments
 (0)