Skip to content

Commit 19f4f37

Browse files
Merge pull request #3918 from MicrosoftDocs/mde-newfeature
new feature
2 parents 0108a52 + 2c18a7b commit 19f4f37

File tree

6 files changed

+19
-9
lines changed

6 files changed

+19
-9
lines changed

defender-endpoint/investigate-machines.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 03/26/2025
17+
ms.date: 05/28/2025
1818
---
1919

2020
# Investigate devices in the Microsoft Defender for Endpoint Devices list
@@ -50,7 +50,7 @@ When you investigate a specific device, you see:
5050
:::image type="content" source="media/specific-device.png" alt-text="The device view" lightbox="media/specific-device.png":::
5151

5252
> [!NOTE]
53-
> Due to product constrains, the device profile does not consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
53+
> Due to product constraints, the device profile doesn't consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
5454
> For example, the 'Last seen' value in the Device page may show an older time frame even though more recent alerts or data is available in the machine's timeline.
5555
5656
## Device details
@@ -152,16 +152,26 @@ To further inspect the event and related events, you can quickly run an [advance
152152

153153
**Security recommendations** are generated from Microsoft Defender for Endpoint's [Vulnerability Management](/defender-vulnerability-management/tvm-dashboard-insights) capability. Selecting a recommendation shows a panel where you can view relevant details such as description of the recommendation and the potential risks associated with not enacting it. See [Security recommendation](api/ti-indicator.md) for details.
154154

155+
### Configuration management - Security policies
155156

157+
The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
156158

159+
:::image type="content" source="media/mde-security-policies.png" alt-text="Screenshot showing the Security policies tab." lightbox="media/mde-security-policies.png":::
157160

158-
### Security policies
161+
### Configuration management - Effective settings
159162

160-
The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
163+
The **Effective settings** tab provides visibility into the actual value of each security setting and identifies the source that configured it. It lists setting names, policy types, effective values, the source of each effective value, and the last report time.
161164

165+
Configuration sources can include tools like Microsoft Defender for Endpoint, Group Policy, Intune, or default settings. They can also be specific registry paths, such as the MDM or Group Policy hives. If the source is a registry location, the Configured By field shows as **Unknown** along with the registry path.
166+
167+
Select a setting to open a side panel with more details. You see the current value, any other configuration attempts that didn’t take effect, and—for complex settings like ASR rules or AV exclusions—a breakdown of all configured rules, their sources, and any exclusions.
168+
169+
> [!NOTE]
170+
> The presented settings are AV security settings, Attack Surface Reduction rules, and exclusions, for Windows platforms.
162171
163-
:::image type="content" source="media/security-policies-tab.png" alt-text="The Security policies tab" lightbox="media/security-policies-tab.png":::
172+
:::image type="content" source="media/mde-effective-settings.png" alt-text="Screenshot showing the Effective settings tab." lightbox="media/mde-effective-settings.png":::
164173

174+
:::image type="content" source="media/mde-effective-settings-open.png" alt-text="Screenshot showing the opened Effective settings value tab." lightbox="media/mde-effective-settings-open.png":::
165175

166176
### Software inventory
167177

defender-endpoint/manage-security-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: how-to
1414
search.appverid: met150
15-
ms.date: 08/05/2024
15+
ms.date: 05/28/2025
1616
---
1717

1818
# Manage endpoint security policies in Microsoft Defender for Endpoint
@@ -100,7 +100,7 @@ To verify that you have successfully created a policy, select a policy name from
100100
101101
The policy page displays details that summarize the status of the policy. You can view a policy's status, which devices it has been applied to, and assigned groups.
102102

103-
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md#security-policies).
103+
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md).
104104

105105
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies":::
106106

defender-endpoint/mde-security-settings-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
ms.service: defender-endpoint
99
ms.subservice: ngp
1010
ms.topic: how-to
11-
ms.date: 05/24/2025
11+
ms.date: 05/28/2025
1212
ms.collection:
1313
- m365-security
1414
- tier2
@@ -114,7 +114,7 @@ To verify that you have successfully created a policy, select a policy name from
114114
115115
The policy page displays details that summarize the status of the policy. You can view a policy's status, which devices it is applied to, and assigned groups.
116116

117-
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md#security-policies).
117+
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md).
118118

119119
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies" lightbox="./media/security-policies-list.png":::
120120

453 KB
Loading
226 KB
Loading
170 KB
Loading

0 commit comments

Comments
 (0)