You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ Set-MDIConfiguration -Mode Domain -Configuration All
80
80
81
81
## Activate Defender for Identity capabilities
82
82
83
-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83
+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
84
84
85
85
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
86
86
@@ -90,13 +90,10 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
90
90
91
91
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they are discovered, or manually, where you select specific domain controllers from the list of eligible servers.
93
+
> [!NOTE]
94
+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
97
95
98
-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
100
97
101
98
## Onboarding Confirmation
102
99
@@ -107,7 +104,7 @@ To confirm the sensor has been onboarded:
107
104
2. Check that the onboarded domain controller is listed.
108
105
109
106
> [!NOTE]
110
-
> The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as**Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
107
+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as**Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
111
108
112
109
## Test activated capabilities
113
110
@@ -219,8 +216,7 @@ For more information, see [Remediation actions in Microsoft Defender for Identit
219
216
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
220
217
221
218
1. In the Defender portal, select **Settings > Identities > Sensors**.
222
-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
224
220
225
221
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-zoom.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,6 @@ ms.topic: how-to
11
11
12
12
Zoom is an online video conferencing and collaboration tool. Zoom holds critical data of your organization, and this makes it a target for malicious actors.
13
13
14
-
Connecting Zoom to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection using machine learning based anomaly detections.
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
26
-
27
24
Aggregated reporting addresses constraints on event reporting in Microsoft Defender for Endpoint. Aggregated reporting extends signal reporting intervals to significantly reduce the size of reported events while preserving essential event properties.
28
25
29
26
Defender for Endpoint reduces noise in collected data to improve the signal-to-noise ratio while balancing product performance and efficiency. It limits data collection to maintain this balance.
Copy file name to clipboardExpand all lines: defender-endpoint/device-health-microsoft-defender-antivirus-health.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ For the three `updates` cards (also known as up-to-date reporting cards), "**No
100
100
- Computer is disconnected from the network.
101
101
- Computer is powered down or in a hibernation state.
102
102
- Microsoft Defender Antivirus is disabled.
103
-
- Device is a non-Windows (Mac or Linux) device.
103
+
- Device is a Mac device.
104
104
- Cloud protection isn't enabled.
105
105
- Device doesn't meet pre-requisites for Antivirus engine or platform version.
106
106
@@ -115,8 +115,8 @@ Up-to-date reporting generates information for devices that meet the following c
115
115
- Windows OS - Windows 10 1809 or later
116
116
117
117
> [!NOTE]
118
-
> \* Currently up to date reporting is only available for Windows devices. Cross platform devices such as Mac and Linux are listed under "No data available"/Unknown.
119
-
118
+
> \* Currently up to date reporting is only available for Windows and Linux devices. Mac devices are listed under “no such data available or unknown".
119
+
120
120
:::image type="content" source="media/device-health-defender-antivirus-health-tab.png" alt-text="Shows the Microsoft Defender Antivirus Health tab." lightbox="media/device-health-defender-antivirus-health-tab.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/edr-in-block-mode.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,10 +44,12 @@ This article describes EDR in block mode, which helps protect devices that are r
44
44
45
45
> [!IMPORTANT]
46
46
> EDR in block mode cannot provide all available protection when Microsoft Defender Antivirus real-time protection is in passive mode. Some capabilities that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, such as the following examples:
47
-
> - Real-time protection, including on-access scanning, and scheduled scan is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
47
+
> - Real-time protection, including on-access scanning, is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
48
48
> - Features like **[network protection](network-protection.md)** and **[attack surface reduction rules](attack-surface-reduction.md)** and indicators (file hash, ip address, URL, and certificates) are only available when Microsoft Defender Antivirus is running in active mode.
49
49
> It is expected that your non-Microsoft antivirus solution includes these capabilities.
50
50
51
+
52
+
51
53
EDR in block mode works behind the scenes to remediate malicious artifacts that were detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product. EDR in block mode allows Microsoft Defender Antivirus to take actions on post-breach, behavioral EDR detections.
52
54
53
55
EDR in block mode is integrated with [threat & vulnerability management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Your organization's security team gets a [security recommendation](api/ti-indicator.md) to turn EDR in block mode on if it isn't already enabled.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-jamf.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: macos
17
17
search.appverid: met150
18
-
ms.date: 01/31/2025
18
+
ms.date: 02/25/2025
19
19
---
20
20
21
21
# Deploy and manage Device Control using JAMF
@@ -52,7 +52,7 @@ For more information about settings, rules, and groups, see [Device Control for
52
52
53
53
### Step 2: Validating a JSON policy
54
54
55
-
You must validate your JSON policy after it's created to ensure there are no syntax or configuration errors. A schema for device control policies is available in [our GitHub repository](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json"https://github.com/microsoft/mdatp-devicecontrol/blob/main/macos/policy/device_control_policy_schema.json"). The Defender for Endpoint application has built-in functionality to compare your JSON to the defined schema.
55
+
You must validate your JSON policy after it's created to ensure there are no syntax or configuration errors. A schema for device control policies is available in [our GitHub repository](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json). The Defender for Endpoint application has built-in functionality to compare your JSON to the defined schema.
56
56
57
57
1. Save your configuration on a local device as a `.json` file.
Copy file name to clipboardExpand all lines: defender-endpoint/minimum-requirements.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
6
6
author: denisebmsft
7
7
ms.reviewer: pahuijbr
8
8
ms.localizationpriority: medium
9
-
ms.date: 01/13/2025
9
+
ms.date: 02/26/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -97,7 +97,7 @@ Supported versions of Windows include:
97
97
- Azure Virtual Desktop
98
98
- Windows 365 running one of the previously listed operating systems/versions
99
99
100
-
The following operating systems require the use of the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA) to work with Defender for Endpoint:
100
+
The following operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-windows-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: conceptual
14
14
ms.subservice: onboard
15
15
search.appverid: met150
16
-
ms.date: 01/29/2025
16
+
ms.date: 02/25/2025
17
17
---
18
18
19
19
# Defender for Endpoint onboarding Windows Server
@@ -69,7 +69,7 @@ For other Windows server versions, you have two options to offboard Windows serv
69
69
- Remove the Defender for Endpoint workspace configuration
70
70
71
71
> [!NOTE]
72
-
> These offboarding instructions for other Windows server versions also apply if you are running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at[Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
72
+
> The offboarding instructions in this article apply to previous versions of Windows Server, such as Windows Server 2016 and Windows Server 2012 R2 using the MMA. To migrate to the new, unified solution, see[Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,6 +46,9 @@ For more information on what's new with other Microsoft Defender security produc
46
46
-[What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
47
47
-[What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
48
48
49
+
## February 2025
50
+
51
+
- (GA) **Aggregated reporting in Microsoft Defender for Endpoint** is now generally available. For more information, see [Aggregated reporting in Microsoft Defender for Endpoint](aggregated-reporting.md).
0 commit comments