Skip to content

Commit 17e9649

Browse files
authored
Merge branch 'main' into deniseb-293977
2 parents f242b10 + 0878f64 commit 17e9649

11 files changed

+84
-85
lines changed

defender-endpoint/android-intune.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Defender for Endpoint on Android supports Android Enterprise enrolled devices.
9393

9494
For more information on the enrollment options supported by Microsoft Intune, see [Enrollment Options](/mem/intune/enrollment/android-enroll).
9595

96-
**Currently, personally owned devices using a work profile and corporate-owned, fully managed user device enrollments are supported for deployment.**
96+
**Currently, Personally-owned devices with work profile, Corporate-owned devices with work profile, and Corporate-owned fully managed user device enrollments are supported in Android Enterprise.**
9797

9898
## Add Microsoft Defender for Endpoint on Android as a Managed Google Play app
9999

@@ -280,11 +280,11 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
280280

281281
6. Under **Configuration settings**, select `Use Configuration designer`, and then select **Add**.
282282

283-
7. Select **Low touch onboarding and User UPN**. For User UPN, change the value type to `Variable`, and set the configuration value to `User Principal Name`. Enable low-touch onboarding by changing its configuration value to `1`.
284-
285-
>[!div class="mx-imgBorder"]
286-
>![Screenshot showing a low touch onboarding configuration policy.](media/low-touch-user-upn.png)
283+
1. Select **Low touch onboarding and User UPN**. For User UPN, change the value type to `Variable`, and set the configuration value to `User Principal Name`. Enable low-touch onboarding by changing its configuration value to `1`.
287284

285+
> [!div class="mx-imgBorder"]
286+
> ![Screenshot showing a low touch onboarding configuration policy.](media/low-touch-user-upn.png)
287+
288288
8. Assign the policy to the target user group.
289289

290290
9. Review and create the policy.
@@ -297,29 +297,29 @@ Admins can go to the [Microsoft Endpoint Management admin center](https://intune
297297

298298
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
299299

300-
> [!div class="mx-imgBorder"]
301-
> ![Image of adding app configuration policy.](media/addpolicy.png)
302-
303-
2. Enter **Name** and **Description** to uniquely identify the configuration policy. Select platform as **'Android Enterprise'**, Profile type as **'Personally-owned work profile only'** and Targeted app as **'Microsoft Defender'**.
304-
305-
> [!div class="mx-imgBorder"]
306-
> ![Image of naming configuration policy.](media/selectapp.png)
307-
308-
3. On the settings page, in **'Configuration settings format'**, select **'Use configuration designer'** and click on **Add**. From the list of configurations that are displayed, select **'Microsoft Defender in Personal profile'**.
309-
310-
> [!div class="mx-imgBorder"]
311-
> ![Image of configuring personal profile.](media/addconfiguration.png)
312-
313-
4. The selected configuration will be listed. Change the **configuration value to 1** to enable Microsoft Defender support personal profiles. A notification will appear informing the admin about the same. Click on **Next**.
300+
> [!div class="mx-imgBorder"]
301+
> ![Image of adding app configuration policy.](media/addpolicy.png)
302+
303+
1. Enter **Name** and **Description** to uniquely identify the configuration policy. Select platform as **'Android Enterprise'**, Profile type as **'Personally-owned work profile only'** and Targeted app as **'Microsoft Defender'**.
314304

315-
> [!div class="mx-imgBorder"]
316-
> ![Image of changing config value.](media/changeconfigvalue.png)
305+
> [!div class="mx-imgBorder"]
306+
> ![Image of naming configuration policy.](media/selectapp.png)
307+
308+
1. On the settings page, in **'Configuration settings format'**, select **'Use configuration designer'** and click on **Add**. From the list of configurations that are displayed, select **'Microsoft Defender in Personal profile'**.
317309

318-
5. **Assign** the configuration policy to a group of users. **Review and create** the policy.
310+
> [!div class="mx-imgBorder"]
311+
> ![Image of configuring personal profile.](media/addconfiguration.png)
312+
313+
1. The selected configuration will be listed. Change the **configuration value to 1** to enable Microsoft Defender support personal profiles. A notification will appear informing the admin about the same. Click on **Next**.
319314

320-
> [!div class="mx-imgBorder"]
321-
> ![Image of reviewing and creating policy.](media/savepolicy.png)
315+
> [!div class="mx-imgBorder"]
316+
> ![Image of changing config value.](media/changeconfigvalue.png)
317+
318+
1. **Assign** the configuration policy to a group of users. **Review and create** the policy.
322319

320+
> [!div class="mx-imgBorder"]
321+
> ![Image of reviewing and creating policy.](media/savepolicy.png)
322+
323323
Admins also can set up **privacy controls** from the Microsoft Intune admin center to control what data can be sent by the Defender mobile client to the security portal. For more information, see [configuring privacy controls](android-configure.md).
324324

325325
Organizations can communicate to their users to protect Personal profile with Microsoft Defender on their enrolled BYOD devices.

defender-endpoint/configure-proxy-internet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Configure the static proxy using the Group Policy available in Administrative Te
132132
>
133133
> For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus caches the last known working proxy. Ensure your proxy solution does not perform SSL inspection, as that breaks the secure cloud connection.
134134
>
135-
> Microsoft Defender Antivirus doesn't use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it uses a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md). If necessary, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
135+
> Microsoft Defender Antivirus doesn't use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it uses a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md). If necessary, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses to bypass proxy server** and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
136136
>
137137
> You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
138138
> - `ProxyBypass`

defender-endpoint/device-control-deploy-manage-gpo.md

Lines changed: 8 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 02/14/2024
7+
ms.date: 08/27/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -34,7 +34,7 @@ If you're using Group Policy to manage Defender for Endpoint settings, you can u
3434

3535
:::image type="content" source="media/deploy-dc-gpo/enable-disable-rsac.png" alt-text="Screenshot of enable disable rsac." lightbox="media/deploy-dc-gpo/enable-disable-rsac.png":::
3636

37-
1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Features** \> **Device Control**.
37+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Features** > **Device Control**.
3838

3939
2. In the **Device Control** window, select **Enabled**.
4040

@@ -49,7 +49,7 @@ You can set default access such as, `Deny` or `Allow` for all device control fea
4949

5050
For example, you can have either a `Deny` or an `Allow` policy for `RemovableMediaDevices`, but not for `CdRomDevices` or `WpdDevices`. If you set `Default Deny` through this policy, then Read/Write/Execute access to `CdRomDevices` or `WpdDevices` is blocked. If you only want to manage storage, make sure to create `Allow` policy for printers. Otherwise, default enforcement (Deny) is applied to printers, too.
5151

52-
1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Features** \> **Device Control** \> **Select Device Control Default Enforcement Policy**.
52+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Features** > **Device Control** > **Select Device Control Default Enforcement Policy**.
5353

5454
2. In the **Select Device Control Default Enforcement Policy** window, select **Default Deny**.
5555

@@ -59,7 +59,7 @@ For example, you can have either a `Deny` or an `Allow` policy for `RemovableMed
5959

6060
To configure the device types that a device control policy is applied, follow these steps:
6161

62-
1. On a computer running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Turn on device control for specific device types**.
62+
1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**.
6363

6464
2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
6565

@@ -75,7 +75,7 @@ To configure the device types that a device control policy is applied, follow th
7575

7676
4. Define the settings as follows:
7777

78-
1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy groups**.
78+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy groups**.
7979

8080
2. In the **Define device control policy groups** window, specify the network share file path containing the XML groups data.
8181

@@ -97,33 +97,15 @@ You can create different group types. Here's one group example XML file for any
9797

9898
4. Define the settings as follows:
9999

100-
1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy rules**.
100+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy rules**.
101101

102102
2. In the **Define device control policy rules** window, select **Enabled**, and then specify the network share file path containing the XML rules data.
103103

104+
> [!NOTE]
105+
> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
104106
> [!NOTE]
105107
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
106108
107-
## Set location for a copy of the file (evidence)
108-
109-
:::image type="content" source="media/deploy-dc-gpo/set-loc-copy-file.png" alt-text="Screenshot of set location for a copy of the file." lightbox="media/deploy-dc-gpo/set-loc-copy-file.png":::
110-
111-
If you want to have a copy of the file (evidence) having Write access, set right **Options** in your removable storage access policy rule in the XML file, and then specify the location where system can save the copy.
112-
113-
1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define Device Control evidence data remote location**.
114-
115-
2. In the **Define Device Control evidence data remote location** window, select **Enabled**, and then specify the local or network share folder path.
116-
117-
## Retention period for local evidence cache
118-
119-
:::image type="content" source="media/deploy-dc-gpo/retention-loc-cache.png" alt-text="Screenshot of retention period for local cache." lightbox="media/deploy-dc-gpo/retention-loc-cache.png":::
120-
121-
If you want to change the default value of 60 days for persisting the local cache for file evidence, follow these steps:
122-
123-
1. Go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Set the retention period for files in the local device control cache**.
124-
125-
2. In the **Set the retention period for files in the local device control cache** window, select **Enabled**, and then enter the number of days to retain the local cache (default 60).
126-
127109
## See also
128110

129111
- [Device control in Defender for Endpoint](device-control-overview.md)

defender-endpoint/device-control-overview.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of device control, including removable storage acce
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 05/15/2024
7+
ms.date: 08/28/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -57,12 +57,11 @@ Device control capabilities from Microsoft can be organized into three main cate
5757

5858
- **Device control in Defender for Endpoint**. Device control in Defender for Endpoint provides more advanced capabilities and is cross platform.
5959
- Granular access control - create policies to control access by device, device type, operation (read, write, execute), user group, network location, or file type.
60-
- File evidence - store the file information and contents to audit files copied or accessed on devices.
6160
- Reporting and advanced hunting - complete visibility into add device related activities.
6261
- Device control in Microsoft Defender can be managed using Intune or [Group Policy](device-control-deploy-manage-gpo.md).
6362
- **Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md).
6463

65-
- **Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about).
64+
- **Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. Endpoint DLP can capture file evidence. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about).
6665

6766
## Common device control scenarios
6867

@@ -187,6 +186,10 @@ Device control can also restrict the types of files that are printed. Device con
187186

188187
To block printing of documents based on information classification use [Endpoint DLP](/purview/endpoint-dlp-learn-about).
189188

189+
### Use Endpoint DLP to capture file evidence of printed files
190+
191+
To capture evidence of a file being printed, use [Endpoint DLP](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
192+
190193
## Control access to Bluetooth devices
191194

192195
You can use device control to control access to Bluetooth services on Windows devices or by using Endpoint DLP.
@@ -202,6 +205,10 @@ Administrators can control the behavior of the Bluetooth service (Allowing adver
202205

203206
To block copying of sensitive document to any Bluetooth Device use [Endpoint DLP](/purview/endpoint-dlp-learn-about).
204207

208+
### Use Endpoint DLP to capture file evidence of files copied to USB
209+
210+
To capture evidence of a file being copied to a USB, use [Endpoint DLP](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
211+
205212
## Device control policy samples and scenarios
206213

207214
Device control in Defender for Endpoint provides your security team with a robust access control model that enables a wide range of scenarios (see [Device control policies](device-control-policies.md)). We have put together a GitHub repository that contains samples and scenarios you can explore. See the following resources:

0 commit comments

Comments
 (0)