Skip to content

Commit 1423ecb

Browse files
committed
Merge branch 'main' into Prefs-chrisda
2 parents dd36203 + a0cdff4 commit 1423ecb

File tree

5 files changed

+74
-12
lines changed

5 files changed

+74
-12
lines changed

defender-endpoint/controlled-folders.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from changes through malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 03/04/2025
6+
ms.date: 04/15/2025
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -38,6 +38,7 @@ search.appverid: met150
3838
## What is controlled folder access?
3939

4040
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on:
41+
4142
- Windows 11
4243
- Windows 10
4344
- Windows Server 2025
@@ -92,8 +93,10 @@ Default folders appear in the user's profile, under **This PC**, as shown in the
9293

9394
![Protected Windows default systems folders](media/defaultfolders.png)
9495

96+
The same profile folders are also protected for system accounts, such as `LocalService`, `NetworkService`, `systemprofile`, and so on. For example, `C:\Windows\System32\config\systemprofile\Documents` is also protected (if it exists).
97+
9598
> [!NOTE]
96-
> You can configure more folders as protected, but you can't remove the Windows system folders that are protected by default.
99+
> You can configure more folders as protected, but you can't remove Windows system folders that are protected by default.
97100
98101
## Requirements for controlled folder access
99102

@@ -150,7 +153,7 @@ You can use the Windows Security app to view the list of folders that are protec
150153

151154
4. If controlled folder access is turned off, you need to turn it on. Select **protected folders**.
152155

153-
5. Do one of the following steps:
156+
5. Take one of the following steps:
154157

155158
- To add a folder, select **+ Add a protected folder**.
156159
- To remove a folder, select it, and then select **Remove**.

defender-endpoint/linux-install-manually.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -151,13 +151,13 @@ In order to preview new features and provide early feedback, it's recommended th
151151
1. Install `curl` if it isn't installed yet:
152152

153153
```bash
154-
sudo apt-get install curl
154+
sudo apt install curl
155155
```
156156

157157
2. Install `libplist-utils` if it isn't installed yet:
158158

159159
```bash
160-
sudo apt-get install libplist-utils
160+
sudo apt install libplist-utils
161161
```
162162

163163
> [!NOTE]
@@ -193,13 +193,13 @@ In order to preview new features and provide early feedback, it's recommended th
193193
5. Install the `gpg` package if not already installed:
194194

195195
```bash
196-
sudo apt-get install gpg
196+
sudo apt install gpg
197197
```
198198

199199
If `gpg` isn't available, then install `gnupg`.
200200

201201
```bash
202-
sudo apt-get install gnupg
202+
sudo apt install gnupg
203203
```
204204

205205
6. Install the Microsoft GPG public key:
@@ -219,13 +219,13 @@ In order to preview new features and provide early feedback, it's recommended th
219219
7. Install the HTTPS driver if not already installed:
220220

221221
```bash
222-
sudo apt-get install apt-transport-https
222+
sudo apt install apt-transport-https
223223
```
224224

225225
8. Update the repository metadata:
226226

227227
```bash
228-
sudo apt-get update
228+
sudo apt update
229229
```
230230

231231
### Mariner
@@ -313,7 +313,7 @@ sudo zypper install packages-microsoft-com-prod:mdatp
313313
### Ubuntu and Debian systems
314314

315315
```bash
316-
sudo apt-get install mdatp
316+
sudo apt install mdatp
317317
```
318318

319319
> [!NOTE]
@@ -551,7 +551,7 @@ For manual uninstallation, execute the following command for your Linux distribu
551551
552552
- `sudo yum remove mdatp` for RHEL and variants(CentOS and Oracle Linux).
553553
- `sudo zypper remove mdatp` for SLES and variants.
554-
- `sudo apt-get purge mdatp` for Ubuntu and Debian systems.
554+
- `sudo apt purge mdatp` for Ubuntu and Debian systems.
555555
- `sudo dnf remove mdatp` for Mariner
556556
557557
## See also

defender-endpoint/linux-install-with-ansible.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ ansible-playbook -i /etc/ansible/hosts /etc/ansible/playbooks/install_mdatp.yml
216216
217217
- name: MDE Deployed
218218
debug:
219-
msg: "MDE succesfully deployed"
219+
msg: "MDE succesfully deployed"
220220
```
221221
222222
### How to uninstall Microsoft Defender for Endpoint on Linux Servers

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -519,6 +519,8 @@
519519
items:
520520
- name: Getting started with defense in-depth configuration for email security
521521
href: step-by-step-guides/defense-in-depth-guide.md
522+
- name: Tune Microsoft Defender for Office 365
523+
href: step-by-step-guides/tune-microsoft-defender-for-office-365.md
522524
- name: How to configure quarantine permissions and policies
523525
href: step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md
524526
- name: Set up steps for the Standard or Strict preset security policies in Microsoft Defender for Office 365
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
title: Tune Microsoft Defender for Office 365
3+
description: Tune settings and protection in Microsoft Defender for Office 365.
4+
ms.service: defender-office-365
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: chrisda
8+
author: MSFTBen
9+
ms.localizationpriority: medium
10+
manager: deniseb
11+
audience: ITPro
12+
ms.collection:
13+
- m365-guidance-templates
14+
- m365-security
15+
- tier3
16+
ms.topic: how-to
17+
search.appverid: met150
18+
ms.date: 04/14/2025
19+
appliesto:
20+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
21+
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
22+
---
23+
24+
# Microsoft Defender for Office 365 tuning
25+
26+
When a relevant license is enabled, Microsoft Defender for Office 365 protects collaboration across Exchange Online, Teams, SharePoint, OneDrive, and Microsoft 365 applications by default. However, you can do some "tuning" for maximum benefit.
27+
28+
The term "tuning" is used often and can mean different things. For example:
29+
30+
- [Configuring security controls](#configuring-security-controls) or [configuring connectors for complex routing and dual filtering scenarios](#complex-routing-and-dual-filtering-scenarios) as part of initial setup.
31+
- Setting [security control thresholds](#security-control-thresholds) (for example, the bulk email slider and the advanced filtering slider) to determine how aggressively email is blocked.
32+
- Adding and managing [customer configured allows and blocks](#customer-configured-allows-and-blocks). Allows are a powerful tool for managing email deliverability but can let malicious or unwanted email be delivered if not correctly managed. Blocks ensure unwanted email isn't delivered but can lead to user productivity loss.
33+
- [Submissions and system learning](#submissions-and-system-learning), or how the filtering stack self corrects based on the submission of false positive and false negative email.
34+
35+
## Configuring security controls
36+
37+
The easiest and safest way to configure security controls is by onboarding to [preset security policies](../preset-security-policies.md). By using the Standard or Strict preset security policies, you always have Microsoft's recommended, best practice configuration for users. For instructions, see [Steps to set up the Standard or Strict preset security policies for Microsoft Defender for Office 365](ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md).
38+
39+
Are you worried about attacks targeting your CEO, CIO, or CFO? You can [Protect your c-suite with Priority account protection in Microsoft Defender for Office 365 Plan 2](protect-your-c-suite-with-priority-account-protection.md).
40+
41+
If you use custom security policies, configuration analyzer gives recommendations to make sure you follow Microsoft's best practices. You can [Optimize and correct security policies with configuration analyzer](optimize-and-correct-security-policies-with-configuration-analyzer.md).
42+
43+
## Complex routing and dual filtering scenarios
44+
45+
Using a non-Microsoft email filtering solution with Defender for Office 365 requires some extra configuration to ensure you're getting the best from both filtering solutions. For more information, see [Getting started with defense in-depth configuration for email security](defense-in-depth-guide.md). You need to be careful when using connectors to route mail to ensure that Defender for Office 365 has access to the original email sender information. To meet this requirement, configure [Enhanced filtering for connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors).
46+
47+
## Security control thresholds
48+
49+
The bulk email slider and the advanced phishing slider allow you to determine how aggressively each of those filters is applied. To optimize the threshold where bulk mail is treated as spam, you can [Assess and tune your filtering for bulk mail in Defender for Office 365](tune-bulk-mail-filtering-walkthrough.md). [Microsoft recommendations for EOP and Defender for Office 365 security settings](../recommended-settings-for-eop-and-office365.md) contains best practices for choosing the right [Advanced phishing thresholds in anti-phishing policies in Microsoft Defender for Office 365](../anti-phishing-policies-about.md) for your organization.
50+
51+
## Customer configured allows and blocks
52+
53+
Overrides are a powerful tool that can be used to deliver or block email regardless of how Defender for Office 365 evaluates the message. [Understanding overrides within the email entity page in Microsoft Defender for Office 365](understand-overrides-in-email-entity.md) provides a guide for using the email entity page to understand why a message was allowed or blocked across all the different types of available overrides.
54+
55+
### Submissions and system Learning
56+
57+
The single most important thing you can do to improve the accuracy of email filtering for users is to [Report spam, non-spam, phishing, suspicious email and files to Microsoft](../submissions-report-messages-files-to-microsoft.md). This information informs the Microsoft Security Analyst team what changes need to be made across the entire filtering stack to ensure users have the best possible experience. Here are some best practices for [How to handle malicious emails that are delivered to recipients using Microsoft Defender for Office 365](how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md) and [How to handle legitimate emails getting blocked from delivery using Microsoft Defender for Office 365](how-to-handle-false-positives-in-microsoft-defender-for-office-365.md).

0 commit comments

Comments
 (0)