Skip to content

Commit 1d98f19

Browse files
authored
Merge branch 'main' into docs-editor/ios-troubleshoot-1723186332
2 parents 2cd0e3f + 3572f41 commit 1d98f19

24 files changed

+174
-102
lines changed

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 03/28/2024
17+
ms.date: 08/12/2024
1818
---
1919

2020
# Onboard Windows devices to Defender for Endpoint using Intune
@@ -65,31 +65,39 @@ For security reasons, the package used to Offboard devices will expire 7 days af
6565
> [!NOTE]
6666
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
6767
68-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
68+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) as follows:
6969

70-
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
70+
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
7171

72-
3. Select Windows 10 or Windows 11 as the operating system.
72+
2. Select **Windows 10 or Windows 11** as the operating system.
7373

74-
4. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
74+
3. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
7575

76-
5. Click **Download package**, and save the .zip file.
76+
4. Click **Download package**, and save the .zip file.
7777

78-
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
78+
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
7979

80-
3. Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings.
80+
3. In Microsoft Intune admin center, create a custom configuration policy.
8181

82-
- OMA-URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding
83-
- Date type: String
84-
- Value: [Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file]
82+
1. In the navigation pane, select **Devices** \> **By platform** \> **Windows** \> **Manage Devices** \> **Configuration**.
83+
2. Under **Policies** click **Create** \> **New Policy**.
84+
3. In the **Create a profile** slide out, select **Windows 10 and later** as **Platform** and **Templates** as **Profile Type**.
85+
4. Under **Template Name**, click the **Custom** template and click **Create**.
86+
5. Enter a value for **Name** and click **Next**.
87+
6. Under **Configuration settings**, click **Add** and use the following OMA-URI settings.
88+
- Name: Provide a name
89+
- OMA-URI: `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding`
90+
- Date type: String
91+
- Value: *Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file*
92+
7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, click the **Create** button to finish the policy.
8593

8694
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
8795

8896
> [!NOTE]
8997
> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
9098
9199
> [!IMPORTANT]
92-
> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
100+
> Offboarding causes the device to stop sending sensor data to Defender for Endpoint, but data from the device, including references to any alerts it has, is retained for up to 6 months.
93101
94102
## Related articles
95103

defender-endpoint/data-storage-privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 05/14/2024
19+
ms.date: 08/12/2024
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -63,7 +63,7 @@ In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wi
6363

6464
## Data storage location
6565

66-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
66+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
6767

6868
Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
6969

defender-endpoint/device-discovery.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,11 +91,14 @@ Network devices aren't managed as standard endpoints, as Defender for Endpoint d
9191

9292
For more information, see [Network devices](network-devices.md).
9393

94-
## Device discovery Integration
94+
## Device discovery integration
9595

9696
To address the challenge of gaining enough visibility to locate, identify, and secure your complete OT/IOT asset inventory Defender for Endpoint now supports the following integration:
9797

98-
- **Microsoft Defender for IoT**: This integration combines Defender for Endpoint's device discovery capabilities, with the agentless monitoring capabilities of Microsoft Defender for IoT, to secure enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
98+
- **Microsoft Defender for IoT**: This integration combines Defender for Endpoint's device discovery capabilities with Microsoft Defender for IoT in the Microsoft Defender portal (Preview) to secure:
99+
100+
- OT devices, such as servers or packaging systems. For more information, see [onboard Defender for IoT in the Defender portal](/defender-for-iot/get-started).
101+
- Enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint).
99102

100103
## Vulnerability assessment on discovered devices
101104

0 commit comments

Comments
 (0)