Skip to content

Commit 222afe5

Browse files
authored
Merge branch 'main' into diannegali-updatethreatactorlist
2 parents 7c37109 + 4e730ee commit 222afe5

34 files changed

+389
-110
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 07/25/2024
17+
ms.date: 08/08/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -124,14 +124,14 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
124124

125125
1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
126126

127-
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
127+
2. Select **Continue**. A screen is presented which recommends downloading and setting up of the Microsoft Defender: Antivirus (Mobile) app.
128128

129129
3. Select **Download**. You'll be redirected to the app store (Google play).
130130

131-
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
132-
133-
:::image type="content" source="media/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="media/download-mde.png":::
131+
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
134132

133+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134+
135135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136136

137137
6. Select **Continue** to log into the managed application.

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 03/28/2024
17+
ms.date: 08/12/2024
1818
---
1919

2020
# Onboard Windows devices to Defender for Endpoint using Intune
@@ -65,31 +65,39 @@ For security reasons, the package used to Offboard devices will expire 7 days af
6565
> [!NOTE]
6666
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
6767
68-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
68+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) as follows:
6969

70-
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
70+
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
7171

72-
3. Select Windows 10 or Windows 11 as the operating system.
72+
2. Select **Windows 10 or Windows 11** as the operating system.
7373

74-
4. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
74+
3. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
7575

76-
5. Click **Download package**, and save the .zip file.
76+
4. Click **Download package**, and save the .zip file.
7777

78-
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
78+
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
7979

80-
3. Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings.
80+
3. In Microsoft Intune admin center, create a custom configuration policy.
8181

82-
- OMA-URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding
83-
- Date type: String
84-
- Value: [Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file]
82+
1. In the navigation pane, select **Devices** \> **By platform** \> **Windows** \> **Manage Devices** \> **Configuration**.
83+
2. Under **Policies** click **Create** \> **New Policy**.
84+
3. In the **Create a profile** slide out, select **Windows 10 and later** as **Platform** and **Templates** as **Profile Type**.
85+
4. Under **Template Name**, click the **Custom** template and click **Create**.
86+
5. Enter a value for **Name** and click **Next**.
87+
6. Under **Configuration settings**, click **Add** and use the following OMA-URI settings.
88+
- Name: Provide a name
89+
- OMA-URI: `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding`
90+
- Date type: String
91+
- Value: *Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file*
92+
7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, click the **Create** button to finish the policy.
8593

8694
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
8795

8896
> [!NOTE]
8997
> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
9098
9199
> [!IMPORTANT]
92-
> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
100+
> Offboarding causes the device to stop sending sensor data to Defender for Endpoint, but data from the device, including references to any alerts it has, is retained for up to 6 months.
93101
94102
## Related articles
95103

defender-endpoint/data-storage-privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 05/14/2024
19+
ms.date: 08/12/2024
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -63,7 +63,7 @@ In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wi
6363

6464
## Data storage location
6565

66-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
66+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
6767

6868
Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
6969

defender-endpoint/ios-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ ms.date: 06/19/2024
3232
This article provides troubleshooting information to help you address issues that might arise with Microsoft Defender for Endpoint on iOS.
3333

3434
> [!NOTE]
35-
> - Defender for Endpoint on iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
36-
> - For customers who don't want to set up a VPN, there's an option to disable Web Protection and deploy Defender for Endpoint without that feature. In such scenario, Defender sends the heartbeat to the Microsoft Defender portal whenever user opens the app.
35+
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
36+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
3737
3838
## Apps don't work when VPN is turned on
3939

defender-endpoint/mde-plugin-wsl.md

Lines changed: 30 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 08/05/2024
18+
ms.date: 08/12/2024
1919
search.appverid: MET150
2020
---
2121

@@ -145,28 +145,12 @@ For example, if your host machine has both `Winhttp proxy` and `Network & Intern
145145
146146
## Connectivity test for Defender running in WSL
147147

148-
The following procedure describes how to confirm that Defender in Endpoint in WSL has internet connectivity.
148+
The defender connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
149149

150-
1. Open Registry Editor as an administrator.
151-
152-
2. Create a registry key with the following details:
153-
154-
- **Name**: `ConnectivityTest`
155-
- **Type**: `REG_DWORD`
156-
- **Value**: `Number of seconds plug-in must wait before running the test. (Recommended: 60 seconds)`
157-
- **Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
158-
159-
3. Once the registry is set, restart wsl using the following steps:
160-
161-
1. Open Command Prompt and run the command, `wsl --shutdown`.
162-
163-
2. Run the command `wsl`.
164-
165-
4. Wait for five minutes, and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
166-
167-
If successful, you can see that the connectivity test was successful. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from WSL to Defender for Endpoint service URLs is failing.
150+
On starting your wsl machine, wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test). If successful, you can see that the connectivity test was a success. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from MDE plug-in for WSL to Defender for Endpoint service URLs is failing.
168151

169152
> [!NOTE]
153+
> The `ConnectivityTest` registry key is no longer supported.
170154
> To set a proxy for use in WSL containers (the distributions running on the subsystem), see [Advanced settings configuration in WSL](/windows/wsl/wsl-config).
171155
172156
## Verifying functionality and SOC analyst experience
@@ -187,6 +171,31 @@ After installing the plug-in, the subsystem and all its running containers are o
187171

188172
The timeline is populated, similar to Defender for Endpoint on Linux, with events from inside the subsystem (file, process, network). You can observe activity and detections in the timeline view. Alerts and incidents are generated as appropriate as well.
189173

174+
## Setting up custom tag for your WSL machine
175+
176+
The plug-in onboards the WSL machine with the tag `WSL2`. Should you or your organization need a custom tag, please follow the steps outlined below:
177+
178+
1. Open Registry Editor as an administrator
179+
180+
2. Create a registry key with the following details:
181+
182+
- Name: `GROUP`
183+
- Type: `REG_SZ` or registry string
184+
- Value: `Custom tag`
185+
- Path: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging`
186+
187+
3. Once the registry is set, restart wsl using the following steps:
188+
189+
1. Open Command Prompt and run the command, `wsl --shutdown`.
190+
191+
2. Run the `wsl` command.
192+
193+
4. Wait for 5-10 minutes for the portal to reflect the changes.
194+
195+
> [!NOTE]
196+
> The custom tag set in registry will be followed by a `_WSL2`.
197+
> For example, if the registry value set is `Microsoft`, then the custom tag will be `Microsoft_WSL2` and the same will be visible in the portal.
198+
190199
### Test the plug-in
191200

192201
To test the plug-in after installation, follow these steps:
@@ -371,8 +380,6 @@ DeviceProcessEvents
371380

372381
1. In Control Panel, go to **Programs** > **Programs and Features**.
373382

374-
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**.
375-
376-
This should fix the problem by placing the right files in the expected directories.
383+
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
377384

378385
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
411 KB
Loading

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 08/08/2024
6+
ms.date: 08/12/2024
77
audience: ITPro
88
ms.topic: reference
99
author: siosulli
@@ -212,12 +212,12 @@ Updates are released for x86, x64, and ARM64 Windows architecture.
212212

213213
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
214214

215-
After a new package version is released, support for the previous two versions is reduced to technical support only.
215+
After a new package version is released, support for the previous two versions is reduced to technical support only. To view a list of previous versions, see [Previous DISM updates (no longer supported)](msda-updates-previous-versions-technical-upgrade-support.md#previous-dism-updates-no-longer-supported).
216216

217-
### 1.415.235.0
217+
### 1.415.295.0
218218

219-
- Defender package version: `1.415.235.0`
220-
- Security intelligence version: `1.415.235.0`
219+
- Defender package version: `1.415.295.0`
220+
- Security intelligence version: `1.415.295.0`
221221
- Engine version: `1.24070.1`
222222
- Platform version: `4.18.24070.5`
223223

@@ -229,12 +229,12 @@ After a new package version is released, support for the previous two versions i
229229

230230
- None
231231

232-
### 1.411.111.0
232+
### 1.415.235.0
233233

234-
- Defender package version: `1.411.111.0`
235-
- Security intelligence version: `1.411.111.0`
236-
- Engine version: `1.24050.2`
237-
- Platform version: `4.18.24050.7`
234+
- Defender package version: `1.415.235.0`
235+
- Security intelligence version: `1.415.235.0`
236+
- Engine version: `1.24070.1`
237+
- Platform version: `4.18.24070.5`
238238

239239
#### Fixes
240240

@@ -244,12 +244,12 @@ After a new package version is released, support for the previous two versions i
244244

245245
- None
246246

247-
### 1.411.9.0
247+
### 1.411.111.0
248248

249-
- Defender package version: `1.411.9.0`
250-
- Security intelligence version: `1.411.9.0`
251-
- Engine version: `1.24040.1`
252-
- Platform version: `4.18.24040.4`
249+
- Defender package version: `1.411.111.0`
250+
- Security intelligence version: `1.411.111.0`
251+
- Engine version: `1.24050.2`
252+
- Platform version: `4.18.24050.7`
253253

254254
#### Fixes
255255

defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,10 @@ ms.date: 02/22/2024
5353

5454
- For more information on how to assign licenses, see [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign).
5555

56+
> [!NOTE]
57+
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
58+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
59+
5660
### For Administrators
5761

5862
- Access to the Microsoft Defender portal.
@@ -66,6 +70,8 @@ ms.date: 02/22/2024
6670
> - Microsoft Defender for Endpoint now extends protection to an organization's data within a managed application for those who aren't using mobile device management (MDM) but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
6771
> - In addition, Microsoft Defender for Endpoint already supports devices that are enrolled using Intune mobile device management (MDM).
6872
73+
74+
6975
### System Requirements
7076

7177
- iOS device running iOS 15.0 and above. iPads are also supported.

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 08/07/2024
9+
ms.date: 08/12/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -1100,12 +1100,27 @@ Microsoft regularly releases [security intelligence updates and product updates
11001100

11011101
#### Known issues
11021102

1103-
- When this update is installed, the device needs the jump package 4.18.2001.10 to be able to update to the latest platform version.
1103+
- When this update is installed, the device needs the jump package `4.18.2001.10` to be able to update to the latest platform version.
11041104

11051105
## Previous DISM updates (no longer supported)
11061106

11071107
The versions listed in this section are no longer supported. To view current versions, see [Updates for Deployment Image Servicing and Management (DISM)](microsoft-defender-antivirus-updates.md#updates-for-deployment-image-servicing-and-management-dism).
11081108

1109+
### 1.411.9.0
1110+
1111+
- Defender package version: `1.411.9.0`
1112+
- Security intelligence version: `1.411.9.0`
1113+
- Engine version: `1.24040.1`
1114+
- Platform version: `4.18.24040.4`
1115+
1116+
#### Fixes
1117+
1118+
- None
1119+
1120+
#### Additional information
1121+
1122+
- None
1123+
11091124
### 20230809.1
11101125

11111126
- Defender package version: `20230809.1`

defender-endpoint/switch-to-mde-phase-3.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- migrationguides
1818
- admindeeplinkDEFENDER
1919
ms.topic: how-to
20-
ms.date: 10/24/2023
20+
ms.date: 08/12/2024
2121
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee
2222
search.appverid: met150
2323
---
@@ -77,12 +77,14 @@ Deployment methods vary, depending on operating system and preferred methods. Th
7777
7878
## Step 2: Run a detection test
7979

80+
<!---Add this back later when the link works: Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>.--->
81+
8082
To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
8183

8284
|Operating system|Guidance|
8385
|---|---|
8486
|Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).|
85-
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md)|Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>. <br/><br/> For more information, see [Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md).|
87+
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| See [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
8688
|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|1. Run the following command, and look for a result of **1**: `mdatp health --field real_time_protection_enabled`.<br/><br/>2. Open a Terminal window, and run the following command: `curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`.<br/><br/>3. Run the following command to list any detected threats: `mdatp threat list`.<br/><br/>For more information, see [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).|
8789

8890
## Step 3: Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints

0 commit comments

Comments
 (0)