Skip to content

Commit 161fad9

Browse files
Merge pull request #2349 from MicrosoftDocs/main
Publish main to live, 01/07/25, 3:30 PM PT
2 parents 4288068 + d53e3d3 commit 161fad9

13 files changed

+125
-46
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 12/02/2024
18+
ms.date: 01/07/2025
1919
search.appverid: met150
2020
---
2121

@@ -51,7 +51,7 @@ Attack surface reduction rules are categorized as one of two types:
5151

5252
- **Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the effect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
5353

54-
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
54+
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md).
5555

5656
For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
5757

@@ -180,7 +180,7 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
180180

181181
For rules with the "Rule State" specified:
182182

183-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High".
183+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
184184
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
185185
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
186186
- Toast notifications occur in block mode only and for devices at cloud block level "High"
@@ -320,7 +320,7 @@ Dependencies: Microsoft Defender Antivirus
320320
### Block credential stealing from the Windows local security authority subsystem
321321

322322
> [!NOTE]
323-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
323+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
324324
325325
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326326

@@ -634,7 +634,7 @@ Dependencies: Microsoft Defender Antivirus
634634

635635
### Block Webshell creation for Servers
636636

637-
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
637+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
638638

639639
Intune name: `Block Webshell creation for Servers`
640640

defender-endpoint/ios-whatsnew.md

Lines changed: 46 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Learn about the major changes for previous versions of Microsoft De
44
ms.service: defender-endpoint
55
ms.author: deniseb
66
author: denisebmsft
7-
ms.reviewer: sunasing
7+
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 12/11/2024
9+
ms.date: 01/07/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -30,6 +30,41 @@ search.appverid: met150
3030
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
3131

3232

33+
## Upgrading your experience: UX enhancements you should know about
34+
35+
January 2025
36+
37+
**Key changes**
38+
39+
We are pleased to introduce the new dashboard for our enterprise users, which has been designed to be more user-friendly and accessible. The updated dashboard structure now includes recommendation cards for alerts and feature tiles.
40+
41+
Recommendation cards prominently display any active alerts, ensuring you stay informed. Additionally, features are now presented in the form of tiles, enhancing ease of use and navigation. 
42+
43+
The following screenshot is an example of what the user sees in their dashboard:
44+
45+
:::image type="content" source="media/ios-whatsnew/ios-dashboard.png" alt-text="Screenshot showing the user's dashboard.":::
46+
47+
**Recommendation cards for alerts**
48+
49+
The structure of the dashboard has been updated to include a recommendation card that contains active alerts (if any). In case there are multiple alerts, resolving the top alert will bring forward the next one. Recommendation cards have been implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard, as shown in the following table.
50+
51+
| Card | Description |
52+
|--|--|
53+
| :::image type="content" source="media/ios-whatsnew/ios-network-protection-unsafe-connection.png" alt-text="Screenshot of a card indicating an unsafe network connection."::: | **Network protection** <br/>The user is prompted to connect to a secure network. |
54+
| :::image type="content" source="media/ios-whatsnew/ios-web-protection.png" alt-text="Screenshot of a card prompting the user to turn on web protection."::: | **Web protection** <br/>The user is prompted to turn on web protection. |
55+
| :::image type="content" source="media/ios-whatsnew/ios-update.png" alt-text="Screenshot of a card telling the user an iOS update is available."::: | **Device health** <br/>The user is prompted to update their device. |
56+
57+
**Feature tiles**
58+
59+
We have enhanced the current enterprise dashboard experience, featuring a new tile view. The following table lists some examples of tiles:
60+
61+
| Tile | Description |
62+
|--|--|
63+
| :::image type="content" source="media/ios-whatsnew/ios-tile-network.png" alt-text="Screenshot of the network protection tile."::: | **Network protection** <br/>The user sees whether or not their connection is secure. |
64+
| :::image type="content" source="media/ios-whatsnew/ios-tile-web-protection.png" alt-text="Screenshot of the web protection tile."::: | **Web protection** <br/>The user sees their current status of web protection. If it's not enabled, the tile indicates action is needed. |
65+
| :::image type="content" source="media/ios-whatsnew/ios-tile-device-health.png" alt-text="Screenshot of the device health tile."::: | **Device health** <br/>The user sees their device health status. If an iOS update is available, the tile indicates that action is needed. |
66+
| :::image type="content" source="media/ios-whatsnew/ios-tile-global-secure-access.png" alt-text="Screenshot of the Global Secure Access tile."::: | **Global Secure Access** <br/>The user sees their current status of Global Secure Access. |
67+
3368
## Defender for Endpoint on iOS now supports iOS/iPadOS 16.x as the minimum version
3469

3570
Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
@@ -75,19 +110,19 @@ With **Disable Web Protection**, customers who don't want to set up a VPN can co
75110

76111
## Integration with Tunnel
77112

78-
Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Integration with Tunnel provides a simpler, secure VPN experience on iOS with just one app. This feature was earlier available only on Android. For more information, [see the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995).
113+
Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Integration with Tunnel provides a simpler, secure VPN experience on iOS with just one app. This feature was earlier available only on Android. For more information, see [Tech Community: What's new in Microsoft Endpoint Manager - 2204 (April) edition](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995).
79114

80115
## Improved experience on supervised iOS devices
81116

82-
Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For more information, see [this documentation](ios-install.md#complete-deployment-for-supervised-devices).
117+
Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For more information, see [Complete deployment for supervised devices](ios-install.md#complete-deployment-for-supervised-devices).
83118

84119
## Microsoft Defender for Endpoint is now Microsoft Defender in the App store
85120

86-
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the app store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you'll have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
121+
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the app store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you'll have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. For more information, see [Microsoft Defender](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
87122

88123
## Vulnerability Management
89124

90-
On January 25, 2022, we announced the general availability of Vulnerability management on Android and iOS. For more information, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
125+
On January 25, 2022, we announced the general availability of Vulnerability management on Android and iOS. For more information, see [Tech Community: Announcing general availability of vulnerability management support for Android and iOS](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
91126

92127
## 1.1.28250101
93128

@@ -103,24 +138,27 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
103138
## 1.1.23250104
104139

105140
- Performance optimizations - Test battery performance with this version and let us know your feedback.
106-
- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Intune has been added. For more information, see this [documentation](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint) for more details on setup and configuration.
141+
- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Intune has been added. For more information, see this [Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint).
107142
- **Privacy Controls** - Configure privacy controls for phish alert report. For more information, see [Configure iOS features](ios-configure-features.md).
108143

109144
## 1.1.23010101
110145

111146
- Bug fixes and performance improvements
112-
- Performance optimizations were made in this release. Test battery performance with this version and let us know your feedback.
147+
- Performance optimizations were made in this release. Test battery performance with this version and let us know your feedback.
113148

114149
## 1.1.20240103
150+
115151
- Device Health card - Device Health card notifies end-users about any pending software updates.
116152
- Usability enhancements - End-users can now disable the Defender for Endpoint VPN from the Microsoft Defender app itself. Prior to this update, end-users had to disable VPN only from the Settings app.
117153
- Bug fixes.
118154

119155
## 1.1.20020101
156+
120157
- UX Enhancements - Microsoft Defender for Endpoint has a new look.
121158
- Bug fixes.
122159

123160
## 1.1.17240101
161+
124162
- Support for Mobile Application Management (MAM) via Intune is generally available with this version. For more information, see [Microsoft Defender for Endpoint risk signals available for your App protection policies](https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-defender-for-endpoint-risk-signals-available-for-your/ba-p/2186322)
125163
- **Jailbreak Detection** is generally available. For more information, see [Setup Conditional Access Policy based on device risk signals](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios).
126164
- **Auto-setup of VPN profile** for enrolled devices via Microsoft Intune is generally available. For more information, see [Auto-Setup VPN profile for enrolled iOS devices](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding).
120 KB
Loading
50.1 KB
Loading
23.1 KB
Loading
32.1 KB
Loading
24.9 KB
Loading
21.4 KB
Loading
42.1 KB
Loading
44.8 KB
Loading

0 commit comments

Comments
 (0)