You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- View submissions: _"Security data basics (read)"_
46
+
45
47
For more information about how you can submit spam, phish, URLs, and email attachments to Microsoft, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](/defender-office-365/submissions-admin).
46
48
47
49
## Submit a file or file hash to Microsoft from the Defender portal
@@ -54,7 +56,7 @@ For more information about how you can submit spam, phish, URLs, and email attac
54
56
55
57
:::image type="content" source="/defender/media/unified-admin-submission-new.png" alt-text="Screenshot showing how to add a new submission.":::
56
58
57
-
2. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
59
+
4. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
58
60
59
61
- If you selected **Files**, configure the following options:
60
62
- Select **Browse files**. In the dialog that opens, find and select the file, and then select **Open**. Repeat this step as many times as necessary. To remove an entry from the flyout, select :::image type="icon" source="/defender/media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure-mam.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- mde-android
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
-
ms.date: 01/13/2023
17
+
ms.date: 07/25/2024
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -138,7 +138,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
138
138
139
139
## Configure Web protection
140
140
141
-
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://endpoint.microsoft.com).
141
+
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://intune.microsoft.com).
142
142
143
143
Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 05/22/2024
18
+
ms.date: 07/25/2024
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -293,7 +293,7 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
293
293
294
294
### Set up Microsoft Defender in Personal Profile
295
295
296
-
Admins can go to the [Microsoft Endpoint Management admin center](https://endpoint.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
296
+
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
297
297
298
298
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: siosulli
8
8
ms.reviewer: marcmcc
9
9
manager: deniseb
10
10
ms.custom: nextgen
11
-
ms.date: 02/16/2024
11
+
ms.date: 07/25/2024
12
12
ms.subservice: ngp
13
13
ms.topic: conceptual
14
14
ms.collection:
@@ -69,7 +69,7 @@ Microsoft Defender Antivirus uses multiple detection and prevention technologies
69
69
70
70
## Turn on block at first sight with Microsoft Intune
71
71
72
-
1. In the Microsoft Intune admin center (<https://endpoint.microsoft.com>), go to **Endpoint security**\>**Antivirus**.
72
+
1. In the Microsoft Intune admin center (<https://intune.microsoft.com>), go to **Endpoint security**\>**Antivirus**.
73
73
74
74
2. Select an existing policy, or create a new policy using the **Microsoft Defender Antivirus** profile type. In our example, we selected **Windows 10, Windows 11, or Windows Server** for the platform.
75
75
@@ -128,7 +128,7 @@ You can confirm that block at first sight is enabled on individual client device
128
128
129
129
### Turn off block at first sight with Microsoft Intune
130
130
131
-
1. Go to the Microsoft Intune admin center (<https://endpoint.microsoft.com>) and sign in.
131
+
1. Go to the Microsoft Intune admin center (<https://intune.microsoft.com>) and sign in.
132
132
133
133
2. Go to **Endpoint security**\>**Antivirus**, and then select your Microsoft Defender Antivirus policy.
0 commit comments