Skip to content

Commit 1ba7059

Browse files
committed
2 parents 8b139bd + 860b6e3 commit 1ba7059

File tree

57 files changed

+1316
-967
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+1316
-967
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -204,6 +204,11 @@
204204
"source_path": "defender-endpoint/mssp-support.md",
205205
"redirect_url": "/defender-endpoint/configure-mssp-support",
206206
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "defender-endpoint/evaluate-mde.md",
210+
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",
211+
"redirect_document_id": false
207212
}
208213
]
209214
}

defender-endpoint/admin-submissions-mde.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ manager: deniseb
1010
ms.localizationpriority: medium
1111
audience: ITPro
1212
ms.topic: how-to
13-
ms.collection:
13+
ms.collection:
1414
- m365-security
1515
- tier3
1616
ms.custom: FPFN
@@ -35,13 +35,15 @@ The new unified submissions experience is available only in subscriptions that i
3535
You need to assign permissions before you can perform the procedures in this article. Use one of the following options:
3636

3737
**Microsoft Defender for Endpoint** permissions:
38-
- Submit files / file hashes: _"Alerts investigation" or "Manage security settings in Security Center"_
39-
- View submissions: "_View Data - Security operations"_
40-
41-
**Microsoft Defender XDR** unified RBAC permissions:
42-
- Submit files / file hashes: *"Alerts (Manage)" or "Core security settings (manage)"*
43-
- View submissions: _"Security data basics (read)"_
44-
38+
39+
- Submit files / file hashes: _"Alerts investigation" or "Manage security settings in Security Center"_
40+
- View submissions: "_View Data - Security operations"_
41+
42+
**Microsoft Defender XDR Unified RBAC** permissions:
43+
44+
- Submit files / file hashes: _"Alerts (Manage)" or "Core security settings (manage)"_
45+
- View submissions: _"Security data basics (read)"_
46+
4547
For more information about how you can submit spam, phish, URLs, and email attachments to Microsoft, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](/defender-office-365/submissions-admin).
4648

4749
## Submit a file or file hash to Microsoft from the Defender portal
@@ -54,7 +56,7 @@ For more information about how you can submit spam, phish, URLs, and email attac
5456

5557
:::image type="content" source="/defender/media/unified-admin-submission-new.png" alt-text="Screenshot showing how to add a new submission.":::
5658

57-
2. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
59+
4. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
5860

5961
- If you selected **Files**, configure the following options:
6062
- Select **Browse files**. In the dialog that opens, find and select the file, and then select **Open**. Repeat this step as many times as necessary. To remove an entry from the flyout, select :::image type="icon" source="/defender/media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.

defender-endpoint/android-configure-mam.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 01/13/2023
17+
ms.date: 07/25/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -138,7 +138,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
138138

139139
## Configure Web protection
140140

141-
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://endpoint.microsoft.com).
141+
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://intune.microsoft.com).
142142

143143
Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
144144

defender-endpoint/android-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 05/22/2024
18+
ms.date: 07/25/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -293,7 +293,7 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
293293

294294
### Set up Microsoft Defender in Personal Profile
295295

296-
Admins can go to the [Microsoft Endpoint Management admin center](https://endpoint.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
296+
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
297297

298298
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
299299

defender-endpoint/attack-surface-reduction-rules-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 07/13/2023
20+
ms.date: 07/25/2024
2121
search.appverid: met150
2222
---
2323

@@ -199,7 +199,7 @@ Some rules don't work well if unsigned, internally developed application and scr
199199

200200
### Management sites
201201

202-
[Microsoft Intune admin center](https://endpoint.microsoft.com/#home)
202+
[Microsoft Intune admin center](https://intune.microsoft.com/#home)
203203

204204
[Attack surface reduction](https://security.microsoft.com/asr?viewid=detections)
205205

defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: siosulli
88
ms.reviewer: marcmcc
99
manager: deniseb
1010
ms.custom: nextgen
11-
ms.date: 02/16/2024
11+
ms.date: 07/25/2024
1212
ms.subservice: ngp
1313
ms.topic: conceptual
1414
ms.collection:
@@ -69,7 +69,7 @@ Microsoft Defender Antivirus uses multiple detection and prevention technologies
6969

7070
## Turn on block at first sight with Microsoft Intune
7171

72-
1. In the Microsoft Intune admin center (<https://endpoint.microsoft.com>), go to **Endpoint security** \> **Antivirus**.
72+
1. In the Microsoft Intune admin center (<https://intune.microsoft.com>), go to **Endpoint security** \> **Antivirus**.
7373

7474
2. Select an existing policy, or create a new policy using the **Microsoft Defender Antivirus** profile type. In our example, we selected **Windows 10, Windows 11, or Windows Server** for the platform.
7575

@@ -128,7 +128,7 @@ You can confirm that block at first sight is enabled on individual client device
128128
129129
### Turn off block at first sight with Microsoft Intune
130130

131-
1. Go to the Microsoft Intune admin center (<https://endpoint.microsoft.com>) and sign in.
131+
1. Go to the Microsoft Intune admin center (<https://intune.microsoft.com>) and sign in.
132132

133133
2. Go to **Endpoint security** \> **Antivirus**, and then select your Microsoft Defender Antivirus policy.
134134

defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
1010
manager: deniseb
1111
ms.subservice: ngp
1212
ms.topic: conceptual
13-
ms.date: 02/18/2024
13+
ms.date: 07/25/2024
1414
ms.collection:
1515
- m365-security
1616
- tier2
@@ -58,7 +58,7 @@ To specify the cloud block timeout period with Microsoft Defender for Endpoint S
5858

5959
You can specify the cloud block timeout period with an [endpoint security policy in Microsoft Intune](/mem/intune/protect/endpoint-security-policy).
6060

61-
1. Go to the Intune admin center ([https://endpoint.microsoft.com/](https://endpoint.microsoft.com/)) and sign in.
61+
1. Go to the Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)) and sign in.
6262

6363
2. Select **Endpoint security**, and then under **Manage**, choose **Antivirus**.
6464

defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: siosulli
88
ms.author: siosulli
99
ms.topic: conceptual
1010
ms.custom: nextgen
11-
ms.date: 07/13/2023
11+
ms.date: 07/25/2024
1212
ms.reviewer:
1313
manager: deniseb
1414
ms.collection:
@@ -92,7 +92,7 @@ By default, lists that have been configured in local group policy and the Window
9292
9393
### Use Microsoft Intune to disable local list merging
9494

95-
1. In the [Microsoft Intune admin center](https://endpoint.microsoft.com), select **Endpoint security** > **Antivirus**.
95+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), select **Endpoint security** > **Antivirus**.
9696

9797
2. Choose **Create Policy**, or modify an existing Microsoft Defender Antivirus policy.
9898

defender-endpoint/controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 03/05/2024
6+
ms.date: 07/30/2024
77
author: siosulli
88
ms.author: siosulli
99
audience: ITPro
@@ -112,7 +112,7 @@ You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/
112112

113113
Example query:
114114

115-
```PowerShell
115+
```
116116
DeviceEvents
117117
| where ActionType in ('ControlledFolderAccessViolationAudited','ControlledFolderAccessViolationBlocked')
118118
```

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 05/15/2024
7+
ms.date: 07/25/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -147,7 +147,7 @@ In the **Add Row** pane, specify the following settings:
147147

148148
In Intune, device control groups appear as reusable settings.
149149

150-
1. Go to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and sign in.
150+
1. Go to the [Microsoft Intune admin center](https://intune.microsoft.com) and sign in.
151151

152152
2. Go to **Endpoint Security** > **Attack Surface Reduction**.
153153

0 commit comments

Comments
 (0)