You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure-mam.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- mde-android
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
-
ms.date: 07/25/2024
17
+
ms.date: 08/08/2024
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -124,14 +124,14 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
124
124
125
125
1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
126
126
127
-
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
127
+
2. Select **Continue**. A screen is presented which recommends downloading and setting up of the Microsoft Defender: Antivirus (Mobile) app.
128
128
129
129
3. Select **Download**. You'll be redirected to the app store (Google play).
130
130
131
-
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
132
-
133
-
:::image type="content" source="media/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="media/download-mde.png":::
131
+
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
134
132
133
+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134
+
135
135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136
136
137
137
6. Select **Continue** to log into the managed application.
# Onboard Windows devices to Defender for Endpoint using Intune
@@ -65,31 +65,39 @@ For security reasons, the package used to Offboard devices will expire 7 days af
65
65
> [!NOTE]
66
66
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
67
67
68
-
1. Get the offboarding package from <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
68
+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) as follows:
69
69
70
-
2. In the navigation pane, select **Settings**\>**Endpoints**\>**Device management**\>**Offboarding**.
70
+
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Device management**\>**Offboarding**.
71
71
72
-
3. Select Windows 10 or Windows 11 as the operating system.
72
+
2. Select **Windows 10 or Windows 11** as the operating system.
73
73
74
-
4. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
74
+
3. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
75
75
76
-
5. Click **Download package**, and save the .zip file.
76
+
4. Click **Download package**, and save the .zip file.
77
77
78
-
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
78
+
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
79
79
80
-
3.Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings.
80
+
3.In Microsoft Intune admin center, create a custom configuration policy.
- Value: *Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file*
92
+
7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, click the **Create** button to finish the policy.
85
93
86
94
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
87
95
88
96
> [!NOTE]
89
97
> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
90
98
91
99
> [!IMPORTANT]
92
-
> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
100
+
> Offboarding causes the device to stop sending sensor data to Defender for Endpoint, but data from the device, including references to any alerts it has, is retained for up to 6 months.
Copy file name to clipboardExpand all lines: defender-endpoint/data-storage-privacy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- essentials-compliance
17
17
ms.topic: conceptual
18
18
search.appverid: met150
19
-
ms.date: 05/14/2024
19
+
ms.date: 08/12/2024
20
20
---
21
21
22
22
# Microsoft Defender for Endpoint data storage and privacy
@@ -63,7 +63,7 @@ In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wi
63
63
64
64
## Data storage location
65
65
66
-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
66
+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
67
67
68
68
Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-troubleshoot.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,8 +32,8 @@ ms.date: 06/19/2024
32
32
This article provides troubleshooting information to help you address issues that might arise with Microsoft Defender for Endpoint on iOS.
33
33
34
34
> [!NOTE]
35
-
> - Defender for Endpoint on iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
36
-
> -For customers who don't want to set up a VPN, there's an option to disable Web Protection and deploy Defender for Endpoint without that feature. In such scenario, Defender sends the heartbeat to the Microsoft Defender portal whenever user opens the app.
35
+
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
36
+
> -Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
Copy file name to clipboardExpand all lines: defender-endpoint/mde-plugin-wsl.md
+30-23Lines changed: 30 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.custom:
16
16
- partner-contribution
17
17
audience: ITPro
18
-
ms.date: 08/05/2024
18
+
ms.date: 08/12/2024
19
19
search.appverid: MET150
20
20
---
21
21
@@ -145,28 +145,12 @@ For example, if your host machine has both `Winhttp proxy` and `Network & Intern
145
145
146
146
## Connectivity test for Defender running in WSL
147
147
148
-
The following procedure describes how to confirm that Defender in Endpoint in WSL has internet connectivity.
148
+
The defender connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
149
149
150
-
1. Open Registry Editor as an administrator.
151
-
152
-
2. Create a registry key with the following details:
153
-
154
-
-**Name**: `ConnectivityTest`
155
-
-**Type**: `REG_DWORD`
156
-
-**Value**: `Number of seconds plug-in must wait before running the test. (Recommended: 60 seconds)`
157
-
-**Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
158
-
159
-
3. Once the registry is set, restart wsl using the following steps:
160
-
161
-
1. Open Command Prompt and run the command, `wsl --shutdown`.
162
-
163
-
2. Run the command `wsl`.
164
-
165
-
4. Wait for five minutes, and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
166
-
167
-
If successful, you can see that the connectivity test was successful. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from WSL to Defender for Endpoint service URLs is failing.
150
+
On starting your wsl machine, wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test). If successful, you can see that the connectivity test was a success. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from MDE plug-in for WSL to Defender for Endpoint service URLs is failing.
168
151
169
152
> [!NOTE]
153
+
> The `ConnectivityTest` registry key is no longer supported.
170
154
> To set a proxy for use in WSL containers (the distributions running on the subsystem), see [Advanced settings configuration in WSL](/windows/wsl/wsl-config).
171
155
172
156
## Verifying functionality and SOC analyst experience
@@ -187,6 +171,31 @@ After installing the plug-in, the subsystem and all its running containers are o
187
171
188
172
The timeline is populated, similar to Defender for Endpoint on Linux, with events from inside the subsystem (file, process, network). You can observe activity and detections in the timeline view. Alerts and incidents are generated as appropriate as well.
189
173
174
+
## Setting up custom tag for your WSL machine
175
+
176
+
The plug-in onboards the WSL machine with the tag `WSL2`. Should you or your organization need a custom tag, please follow the steps outlined below:
177
+
178
+
1. Open Registry Editor as an administrator
179
+
180
+
2. Create a registry key with the following details:
3. Once the registry is set, restart wsl using the following steps:
188
+
189
+
1. Open Command Prompt and run the command, `wsl --shutdown`.
190
+
191
+
2. Run the `wsl` command.
192
+
193
+
4. Wait for 5-10 minutes for the portal to reflect the changes.
194
+
195
+
> [!NOTE]
196
+
> The custom tag set in registry will be followed by a `_WSL2`.
197
+
> For example, if the registry value set is `Microsoft`, then the custom tag will be `Microsoft_WSL2` and the same will be visible in the portal.
198
+
190
199
### Test the plug-in
191
200
192
201
To test the plug-in after installation, follow these steps:
@@ -371,8 +380,6 @@ DeviceProcessEvents
371
380
372
381
1. In Control Panel, go to **Programs**>**Programs and Features**.
373
382
374
-
2. Search for and select**Microsoft Defender for Endpoint plug-in for WSL**. Then select**Repair**.
375
-
376
-
This should fix the problem by placing the right files in the expected directories.
383
+
2. Search forand select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right filesin the expected directories.
377
384
378
385
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-updates.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
3
3
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: high
6
-
ms.date: 08/08/2024
6
+
ms.date: 08/12/2024
7
7
audience: ITPro
8
8
ms.topic: reference
9
9
author: siosulli
@@ -212,12 +212,12 @@ Updates are released for x86, x64, and ARM64 Windows architecture.
212
212
213
213
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
214
214
215
-
After a new package version is released, support for the previous two versions is reduced to technical support only.
215
+
After a new package version is released, support for the previous two versions is reduced to technical support only. To view a list of previous versions, see [Previous DISM updates (no longer supported)](msda-updates-previous-versions-technical-upgrade-support.md#previous-dism-updates-no-longer-supported).
216
216
217
-
### 1.415.235.0
217
+
### 1.415.295.0
218
218
219
-
- Defender package version: `1.415.235.0`
220
-
- Security intelligence version: `1.415.235.0`
219
+
- Defender package version: `1.415.295.0`
220
+
- Security intelligence version: `1.415.295.0`
221
221
- Engine version: `1.24070.1`
222
222
- Platform version: `4.18.24070.5`
223
223
@@ -229,12 +229,12 @@ After a new package version is released, support for the previous two versions i
229
229
230
230
- None
231
231
232
-
### 1.411.111.0
232
+
### 1.415.235.0
233
233
234
-
- Defender package version: `1.411.111.0`
235
-
- Security intelligence version: `1.411.111.0`
236
-
- Engine version: `1.24050.2`
237
-
- Platform version: `4.18.24050.7`
234
+
- Defender package version: `1.415.235.0`
235
+
- Security intelligence version: `1.415.235.0`
236
+
- Engine version: `1.24070.1`
237
+
- Platform version: `4.18.24070.5`
238
238
239
239
#### Fixes
240
240
@@ -244,12 +244,12 @@ After a new package version is released, support for the previous two versions i
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-ios.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,10 @@ ms.date: 02/22/2024
53
53
54
54
- For more information on how to assign licenses, see [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign).
55
55
56
+
> [!NOTE]
57
+
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
58
+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
59
+
56
60
### For Administrators
57
61
58
62
- Access to the Microsoft Defender portal.
@@ -66,6 +70,8 @@ ms.date: 02/22/2024
66
70
> - Microsoft Defender for Endpoint now extends protection to an organization's data within a managed application for those who aren't using mobile device management (MDM) but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
67
71
> - In addition, Microsoft Defender for Endpoint already supports devices that are enrolled using Intune mobile device management (MDM).
68
72
73
+
74
+
69
75
### System Requirements
70
76
71
77
- iOS device running iOS 15.0 and above. iPads are also supported.
Copy file name to clipboardExpand all lines: defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md
+17-2Lines changed: 17 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
6
6
author: siosulli
7
7
ms.localizationpriority: medium
8
8
ms.reviewer: pahuijbr
9
-
ms.date: 08/07/2024
9
+
ms.date: 08/12/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -1100,12 +1100,27 @@ Microsoft regularly releases [security intelligence updates and product updates
1100
1100
1101
1101
#### Known issues
1102
1102
1103
-
- When this update is installed, the device needs the jump package 4.18.2001.10 to be able to update to the latest platform version.
1103
+
- When this update is installed, the device needs the jump package `4.18.2001.10` to be able to update to the latest platform version.
1104
1104
1105
1105
## Previous DISM updates (no longer supported)
1106
1106
1107
1107
The versions listed in this section are no longer supported. To view current versions, see [Updates for Deployment Image Servicing and Management (DISM)](microsoft-defender-antivirus-updates.md#updates-for-deployment-image-servicing-and-management-dism).
@@ -77,12 +77,14 @@ Deployment methods vary, depending on operating system and preferred methods. Th
77
77
78
78
## Step 2: Run a detection test
79
79
80
+
<!---Add this back later when the link works: Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>.--->
81
+
80
82
To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
81
83
82
84
|Operating system|Guidance|
83
85
|---|---|
84
86
|Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).|
85
-
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md)|Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>. <br/><br/> For more information, see [Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md).|
87
+
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| See [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
86
88
|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|1. Run the following command, and look for a result of **1**: `mdatp health --field real_time_protection_enabled`.<br/><br/>2. Open a Terminal window, and run the following command: `curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`.<br/><br/>3. Run the following command to list any detected threats: `mdatp threat list`.<br/><br/>For more information, see [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).|
87
89
88
90
## Step 3: Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints
0 commit comments