Skip to content

Commit 1fdab5c

Browse files
Article updates
1 parent eece630 commit 1fdab5c

7 files changed

+13
-13
lines changed

defender-xdr/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,10 @@ landingContent:
4343
linkLists:
4444
- linkListType: get-started
4545
links:
46-
- text: Create a trial lab
47-
url: pilot-deploy-overview.md
48-
- text: Run pilot project in production
46+
- text: Pilot Microsoft Defender XDR components
4947
url: pilot-deploy-overview.md
48+
- text: Microsoft Defender XDR trial lab environment
49+
url: setup-m365deval.md
5050

5151
# Card
5252
- title: Get started

defender-xdr/pilot-deploy-defender-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ f1.keywords:
77
- NOCSH
88
ms.author: bcarter
99
author: brendacarter
10-
ms.date: 05/16/2024
10+
ms.date: 05/31/2024
1111
ms.localizationpriority: medium
1212
manager: dansimp
1313
audience: ITPro

defender-xdr/pilot-deploy-defender-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Let's start by checking out the dashboards.
172172

173173
### View the device inventory
174174

175-
The device inventory is where you'll see the list of endpoints, network devices, and IoT devices in your network. Not only does it provide you with a view of the devices in your network, but it also gives your in-depth information about them such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
175+
The device inventory is where you'll see the list of endpoints, network devices, and IoT devices in your network. Not only does it provide you with a view of the devices in your network, but it also gives you in-depth information about them such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
176176

177177
### View the Microsoft Defender Vulnerability Management dashboard
178178

defender-xdr/pilot-deploy-defender-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ f1.keywords:
77
- NOCSH
88
ms.author: dansimp
99
author: dansimp
10-
ms.date: 05/15/2024
10+
ms.date: 05/31/2024
1111
ms.localizationpriority: medium
1212
manager: dansimp
1313
audience: ITPro
@@ -92,7 +92,7 @@ Microsoft Defender XDR correlates the signals from all the Microsoft Defender co
9292

9393
Microsoft Defender for Identity is fully integrated with Microsoft Defender XDR and leverages signals from on-premises Active Directory identities to help you better identify, detect, and investigate advanced threats directed at your organization.
9494

95-
Deploy Microsoft Defender for Identity to help your Security Operations (SecOp) teams deliver a modern identity threat detection and response (ITDR) solution across hybrid environments, including:
95+
Deploy Microsoft Defender for Identity to help your Security Operations (SecOps) teams deliver a modern identity threat detection and response (ITDR) solution across hybrid environments, including:
9696

9797
- Prevent breaches, using proactive identity security posture assessments
9898
- Detect threats, using real-time analytics and data intelligence

defender-xdr/pilot-deploy-defender-office-365.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
- highpri
1919
- tier1
2020
ms.topic: conceptual
21-
ms.date: 05/15/2024
21+
ms.date: 05/31/2024
2222
---
2323

2424
# Pilot and deploy Defender for Office 365
@@ -124,7 +124,7 @@ To effectively evaluate Microsoft Defender for Office 365, it's important that i
124124

125125
## Step 2: Audit accepted domains
126126

127-
1. In the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>, expand *Mail flow*, and then click **Accepted domains**.Or, to go directly to the *Accepted domains* page, use <https://admin.exchange.microsoft.com/#/accepteddomains>.
127+
1. In the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>, expand *Mail flow*, and then click **Accepted domains**. Or, to go directly to the *Accepted domains* page, use <https://admin.exchange.microsoft.com/#/accepteddomains>.
128128
2. On the *Accepted domains* page, make note of the **Domain type** value for your primary email domain.
129129
- If the domain type is set to **Authoritative**, then it's assumed all recipient mailboxes for your organization currently reside in Exchange Online.
130130
- If the domain type is set to **InternalRelay**, then you may still be in a hybrid model where some recipient mailboxes still reside on-premises.
@@ -207,7 +207,7 @@ Some capabilities are *not yet* configured. You have the following options for c
207207

208208
- **Assign users to preset security policies**: [Preset security policies](/defender-office-365/preset-security-policies) are the recommended method to quickly assign a uniform level of protection across all of the capabilities. You can choose from **Standard** or **Strict** protection. The settings for Standard and Strict are described in the tables [here](/defender-office-365/recommended-settings-for-eop-and-office365). The differences between Standard and Strict are summarized in the table [here](/defender-office-365/preset-security-policies#policy-settings-in-preset-security-policies).
209209

210-
The advantages of preset security polices are you protect groups of users as quickly as possible using Microsoft's recommended settings based on observations in the datacenters. As new protection capabilities are added and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.
210+
The advantages of preset security policies are you protect groups of users as quickly as possible using Microsoft's recommended settings based on observations in the datacenters. As new protection capabilities are added and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.
211211

212212
The disadvantage of preset security policies is you can't customize virtually any of the security settings in preset security policies (for example, you can't change an action from deliver to junk to quarantine, or vice-versa). The exception is entries and optional exceptions for [user impersonation and domain impersonation protection](/defender-office-365/anti-phishing-policies-about#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), which you must configure manually.
213213

@@ -221,7 +221,7 @@ For detailed information about choosing preset security policies vs. custom poli
221221

222222
### Assign preset security policies
223223

224-
We recommended you begin with the *preset security policies* in EOP and Defender for Office 365 fast by assigning them to specific pilot users or defined groups as part of your evaluation. Preset policies offer a baseline **Standard** protection template or a more aggressive **Strict** protection template, which can be assigned independently.
224+
We recommend you begin with the *preset security policies* in EOP and Defender for Office 365 fast by assigning them to specific pilot users or defined groups as part of your evaluation. Preset policies offer a baseline **Standard** protection template or a more aggressive **Strict** protection template, which can be assigned independently.
225225

226226
For example, an EOP condition for pilot evaluations could be applied if the recipients are *members* of a defined *EOP Standard Protection* group, and then managed by adding accounts to, or removing account from, the group.
227227

defender-xdr/pilot-deploy-investigate-respond.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ f1.keywords:
88
ms.localizationpriority: medium
99
ms.author: dansimp
1010
author: dansimp
11-
ms.date: 05/15/2024
11+
ms.date: 05/31/2024
1212
manager: dansimp
1313
audience: ITPro
1414
ms.collection:

defender-xdr/pilot-deploy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ f1.keywords:
77
- NOCSH
88
ms.author: tracyp
99
author: MSFTTracyP
10-
ms.date: 05/15/2024
10+
ms.date: 05/31/2024
1111
ms.localizationpriority: medium
1212
manager: dansimp
1313
audience: ITPro

0 commit comments

Comments
 (0)