Skip to content

Commit 20bd987

Browse files
authored
Merge branch 'main' into patch-2
2 parents 324ceab + 6064402 commit 20bd987

File tree

4 files changed

+13
-8
lines changed

4 files changed

+13
-8
lines changed

ATPDocs/deploy/test-connectivity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ After preparing the server that you're going to use for your Microsoft Defender
1414

1515
For more information, see [Required ports](../prerequisites.md#ports).
1616

17+
> [!NOTE]
18+
> To get the name and other important details about your Defender for Identity workspace, see the [About page](../settings-about.md) in the [Microsoft Defender XDR](https://security.microsoft.com/) portal.
19+
1720
## Test connectivity using a browser
1821

1922
1. Open a browser. If you're using a proxy, make sure that your browser uses the same proxy settings being used by the sensor.

defender-endpoint/api/get-assessment-secure-config.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 06/04/2021
18+
ms.date: 01/06/2025
1919
---
2020

2121
# Export secure configuration assessment per device
@@ -245,18 +245,18 @@ GET /api/machines/SecureConfigurationsAssessmentExport
245245
### 2.5 Properties
246246

247247
> [!NOTE]
248-
>
249-
> - The files are gzip compressed & in multiline Json format.
250-
> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
248+
> - The files are GZIP compressed & in multiline JSON format.
249+
> - The download URLs are only valid for 1 hour; otherwise you can use the parameter.
251250
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.
252251
252+
253253
<br>
254254

255255
****
256256

257257
Property (ID)|Data type|Description|Example of a returned value
258258
---|---|---|---
259-
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
259+
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
260260
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
261261
|
262262

defender-endpoint/network-devices.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/02/2025
1818
---
1919

2020
# Network device discovery and vulnerability management
@@ -85,7 +85,6 @@ Your first step is to select a device that performs the authenticated network sc
8585

8686
8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
8787

88-
- login.windows.net
8988
- \*.security.microsoft.com
9089
- login.microsoftonline.com
9190
- \*.blob.core.windows.net/networkscannerstable/\*

defender-xdr/configure-asset-rules.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 09/04/2024
15+
ms.date: 01/02/2025
1616
---
1717

1818
# Asset rule management - Dynamic rules for devices
@@ -67,6 +67,9 @@ The following steps guide you on how to create a new dynamic rule in Microsoft D
6767

6868
You can see the dynamic tags assigned in the Device Inventory view.
6969

70+
> [!NOTE]
71+
> Dynamic tags are not supported by [security baseline assessments](/defender-vulnerability-management/tvm-security-baselines).
72+
7073
To see tags on individual devices:
7174

7275
1. Select **Devices** from the **Assets** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com).

0 commit comments

Comments
 (0)