You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-endpoint.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -172,7 +172,7 @@ Let's start by checking out the dashboards.
172
172
173
173
### View the device inventory
174
174
175
-
The device inventory is where you'll see the list of endpoints, network devices, and IoT devices in your network. Not only does it provide you with a view of the devices in your network, but it also gives your in-depth information about them such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
175
+
The device inventory is where you'll see the list of endpoints, network devices, and IoT devices in your network. Not only does it provide you with a view of the devices in your network, but it also gives you in-depth information about them such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
176
176
177
177
### View the Microsoft Defender Vulnerability Management dashboard
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ f1.keywords:
7
7
- NOCSH
8
8
ms.author: dansimp
9
9
author: dansimp
10
-
ms.date: 05/15/2024
10
+
ms.date: 05/31/2024
11
11
ms.localizationpriority: medium
12
12
manager: dansimp
13
13
audience: ITPro
@@ -92,7 +92,7 @@ Microsoft Defender XDR correlates the signals from all the Microsoft Defender co
92
92
93
93
Microsoft Defender for Identity is fully integrated with Microsoft Defender XDR and leverages signals from on-premises Active Directory identities to help you better identify, detect, and investigate advanced threats directed at your organization.
94
94
95
-
Deploy Microsoft Defender for Identity to help your Security Operations (SecOp) teams deliver a modern identity threat detection and response (ITDR) solution across hybrid environments, including:
95
+
Deploy Microsoft Defender for Identity to help your Security Operations (SecOps) teams deliver a modern identity threat detection and response (ITDR) solution across hybrid environments, including:
96
96
97
97
- Prevent breaches, using proactive identity security posture assessments
98
98
- Detect threats, using real-time analytics and data intelligence
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-office-365.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.collection:
18
18
- highpri
19
19
- tier1
20
20
ms.topic: conceptual
21
-
ms.date: 05/15/2024
21
+
ms.date: 05/31/2024
22
22
---
23
23
24
24
# Pilot and deploy Defender for Office 365
@@ -124,7 +124,7 @@ To effectively evaluate Microsoft Defender for Office 365, it's important that i
124
124
125
125
## Step 2: Audit accepted domains
126
126
127
-
1. In the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>, expand *Mail flow*, and then click **Accepted domains**.Or, to go directly to the *Accepted domains* page, use <https://admin.exchange.microsoft.com/#/accepteddomains>.
127
+
1. In the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>, expand *Mail flow*, and then click **Accepted domains**.Or, to go directly to the *Accepted domains* page, use <https://admin.exchange.microsoft.com/#/accepteddomains>.
128
128
2. On the *Accepted domains* page, make note of the **Domain type** value for your primary email domain.
129
129
- If the domain type is set to **Authoritative**, then it's assumed all recipient mailboxes for your organization currently reside in Exchange Online.
130
130
- If the domain type is set to **InternalRelay**, then you may still be in a hybrid model where some recipient mailboxes still reside on-premises.
@@ -207,7 +207,7 @@ Some capabilities are *not yet* configured. You have the following options for c
207
207
208
208
-**Assign users to preset security policies**: [Preset security policies](/defender-office-365/preset-security-policies) are the recommended method to quickly assign a uniform level of protection across all of the capabilities. You can choose from **Standard** or **Strict** protection. The settings for Standard and Strict are described in the tables [here](/defender-office-365/recommended-settings-for-eop-and-office365). The differences between Standard and Strict are summarized in the table [here](/defender-office-365/preset-security-policies#policy-settings-in-preset-security-policies).
209
209
210
-
The advantages of preset security polices are you protect groups of users as quickly as possible using Microsoft's recommended settings based on observations in the datacenters. As new protection capabilities are added and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.
210
+
The advantages of preset security policies are you protect groups of users as quickly as possible using Microsoft's recommended settings based on observations in the datacenters. As new protection capabilities are added and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.
211
211
212
212
The disadvantage of preset security policies is you can't customize virtually any of the security settings in preset security policies (for example, you can't change an action from deliver to junk to quarantine, or vice-versa). The exception is entries and optional exceptions for [user impersonation and domain impersonation protection](/defender-office-365/anti-phishing-policies-about#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), which you must configure manually.
213
213
@@ -221,7 +221,7 @@ For detailed information about choosing preset security policies vs. custom poli
221
221
222
222
### Assign preset security policies
223
223
224
-
We recommended you begin with the *preset security policies* in EOP and Defender for Office 365 fast by assigning them to specific pilot users or defined groups as part of your evaluation. Preset policies offer a baseline **Standard** protection template or a more aggressive **Strict** protection template, which can be assigned independently.
224
+
We recommend you begin with the *preset security policies* in EOP and Defender for Office 365 fast by assigning them to specific pilot users or defined groups as part of your evaluation. Preset policies offer a baseline **Standard** protection template or a more aggressive **Strict** protection template, which can be assigned independently.
225
225
226
226
For example, an EOP condition for pilot evaluations could be applied if the recipients are *members* of a defined *EOP Standard Protection* group, and then managed by adding accounts to, or removing account from, the group.
0 commit comments