Skip to content

Commit 22b1763

Browse files
authored
Merge branch 'main' into WI410649-new-article-identity-security-iniatives
2 parents 0055199 + 6d0acc3 commit 22b1763

File tree

88 files changed

+528
-812
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

88 files changed

+528
-812
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,17 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5-
5+
6+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
8+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
9+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
10+
611
on:
712
schedule:
8-
- cron: "0 9 1 * *"
13+
- cron: "0 9 1,15-31 * *"
914

10-
# workflow_dispatch:
15+
workflow_dispatch:
1116

1217

1318
jobs:

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,11 @@
149149
"source_path": "defender-endpoint/onboard-windows-server-2012r2-2016.md",
150150
"redirect_url": "/defender-endpoint/onboard-server",
151151
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "defender-endpoint/mde-linux-arm.md",
155+
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",
156+
"redirect_document_id": false
152157
}
153158
]
154159
}
765 Bytes
Loading

CloudAppSecurityDocs/protect-atlassian.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
88

99

1010

11-
Atlassian is an online collaborative and software development platform (including Confluence, Jira and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
11+
Atlassian is an online collaborative and software development platform (including Confluence, Jira, and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
1212

13-
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities.
13+
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities.
1414

1515
Main threats include:
1616

@@ -68,7 +68,7 @@ For more information, see:
6868
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Atlassian products using the App Connector APIs. This connection gives you visibility into and control over your organization's Atlassian use.
6969

7070
>[!NOTE]
71-
>The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
71+
>The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
7272
7373
### Prerequisites
7474

@@ -116,19 +116,17 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
116116
>[!NOTE]
117117
>
118118
> - The first connection can take up to four hours to get all users and their activities.
119-
> - The activities that will display are the activities that were generated from the moment the connector is connected.
119+
> - The activities displayed are the activities that were generated from the moment the connector is connected.
120120
> - Activities from the "Atlassian Access" audit log are fetched by Defender for Cloud apps. Other activities aren't fetched currently. See [Product Audit Logs](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/).
121121
> - After the connector’s **Status** is marked as **Connected**, the connector is live and works.
122122
123123
### Revoke and renew API keys
124124

125125
1. Microsoft recommends using short lived keys or tokens for connecting apps as a security best practice.
126126
1. We recommend refreshing the Atlassian API key every 6 months as a best practice. To refresh the key, revoke the existing API key and generate a new key.
127-
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration and select **Revoke**.
127+
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration, and select **Revoke**.
128128
1. Recreate an API key in the Atlassian admin portal with the steps described above.
129-
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector:
130-
131-
![Edit connector.](media/atlassian-edit-connector.png)
129+
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector.
132130

133131
1. Enter the new generated new **API key** and select **Connect Atlassian**.
134132
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
@@ -148,13 +146,13 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
148146

149147
## Rate limits and limitations
150148

151-
- **Rate limits** include 1000 requests per minute (per API key/connector instance).
149+
- **Rate limits** include 1,000 requests per minute (per API key/connector instance).
152150

153151
For more information about the Atlassian API limitation, see [Atlassian admin REST APIs](https://developer.atlassian.com/cloud/admin/about/#about-the-cloud-admin-rest-apis).
154152

155153
- **Limitations** include:
156154

157-
- Activities will be shown in Defender for Cloud Apps only for users with a verified domain.
155+
- Activities are shown in Defender for Cloud Apps only for users with a verified domain.
158156

159157
- The API key has a maximum expiration period of one year. After one year, you'll need to create another API key from the Atlassian Admin portal and replace it for the old API Key in the Defender for Cloud Apps console.
160158

CloudAppSecurityDocs/protect-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99

1010

11-
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
11+
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
1212

1313
Connecting Azure to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, and unusual deletions of VMs.
1414

@@ -74,7 +74,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
7474
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7575

7676
> [!NOTE]
77-
> After connecting Azure, data will be pulled. You will see data from then onwards.
77+
> After connecting to Azure, data will be pulled. You'll see data from then onwards.
7878
7979
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
8080

defender-endpoint/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -275,8 +275,6 @@
275275
href: linux-install-manually.md
276276
- name: Direct onboarding with Defender for Cloud
277277
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
278-
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
279-
href: mde-linux-arm.md
280278
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
281279
href: mde-linux-deployment-on-sap.md
282280
- name: 3 - Configuration
@@ -552,6 +550,8 @@
552550
href: onboarding-endpoint-configuration-manager.md
553551
- name: Onboarding using Microsoft Intune
554552
href: onboarding-endpoint-manager.md
553+
- name: Deploy Microsoft Defender for Endpoint prerelease builds on Android devices
554+
href: mobile-pretest-android.md
555555

556556
- name: Migration guides
557557
items:

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 03/21/2025
18+
ms.date: 04/18/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -28,6 +28,17 @@ ms.date: 03/21/2025
2828

2929
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

31+
#### Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks
32+
33+
April 2025
34+
35+
**Setup a secure environment to test prerelease builds of Defender for Endpoint on Android**. Learn the steps on how to set up your environment for prerelease testing of Defender for Endpoint on Android. These steps are for Android devices that are onboarded to Microsoft Defender for Endpoint through the following methods:
36+
37+
- Android Enterprise scenarios
38+
- Mobile Application Mangement (MAM) enrollment scenarios
39+
40+
For more information, see [Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks](mobile-pretest-android.md).
41+
3142
#### Defender for Endpoint on Android now supports Android 10 as the minimum version
3243

3344
February 2025

defender-endpoint/deployment-strategy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 04/15/2025
16+
ms.date: 04/17/2025
1717
---
1818

1919
# Identify your architecture and select a deployment method for Defender for Endpoint
@@ -52,7 +52,7 @@ Once you have determined the architecture of your environment and have created a
5252
| **Windows client devices** |[Microsoft Intune / Mobile Device Management (MDM)](configure-endpoints-mdm.md) <br/>[Microsoft Configuration Manager](configure-endpoints-sccm.md)<br/>[Local script (up to 10 devices)](configure-endpoints-script.md)<br/>[Group Policy](configure-endpoints-gp.md)<br/>[Non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)<br/>[Azure Virtual Desktop](onboard-windows-multi-session-device.md)<br/>[System Center Endpoint Protection and Microsoft Monitoring Agent](onboard-downlevel.md) (for previous versions of Windows) |
5353
|**Windows Server** <br/>(Requires a server plan) | [Local script](configure-endpoints-script.md)<br/>[Integration with Microsoft Defender for Cloud](azure-server-integration.md)<br/>[Guidance for Windows Server with SAP](mde-sap-windows-server.md) |
5454
|**macOS**| [Intune](mac-install-with-intune.md)<br/>[JAMF Pro](mac-install-with-jamf.md) <br/>[Local script](mac-install-manually.md)(manual deployment) <br/>[MDM tools](mac-install-with-other-mdm.md)|
55-
|**Linux server**<br/>(Requires a server plan)|[Installer script based deployment](linux-installer-script.md)<br/>[Ansible](linux-install-with-ansible.md)<br/>[Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/>[Puppet](linux-install-with-puppet.md) <br/>[Saltstack](linux-install-with-saltack.md)<br/>[Manual deployment](linux-install-manually.md)<br/>[Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)<br/>[Guidance for ARM64-based devices (preview)](mde-linux-arm.md)<br/>[Guidance for Linux with SAP](mde-linux-deployment-on-sap.md)|
55+
|**Linux server**<br/>(Requires a server plan)|[Installer script based deployment](linux-installer-script.md)<br/>[Ansible](linux-install-with-ansible.md)<br/>[Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/>[Puppet](linux-install-with-puppet.md) <br/>[Saltstack](linux-install-with-saltack.md)<br/>[Manual deployment](linux-install-manually.md)<br/>[Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)<br/>[Guidance for Linux with SAP](mde-linux-deployment-on-sap.md)|
5656
|**Android**|[Microsoft Intune](android-intune.md)|
5757
|**iOS**|[Microsoft Intune](ios-install.md) <br/> [Mobile Application Manager](ios-install-unmanaged.md) |
5858

defender-endpoint/device-discovery-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ By default, all onboarded devices running on Windows 10 version 1809 or later, W
7878
- `DHCPv6`
7979
- `IP` (headers)
8080
- `LLDP`
81-
- LL`MNR
81+
- `LLMNR`
8282
- `mDNS`
8383
- `MNDP`
8484
- `MSSQL`

defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: How to Deploy Defender for Endpoint on Linux with Chef
33
description: Learn how to deploy Defender for Endpoint on Linux with Chef.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.reviewer: gopkr
88
ms.localizationpriority: medium
99
manager: deniseb
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 04/10/2025
18+
ms.date: 04/17/2025
1919
---
2020

2121
# Deploy Defender for Endpoint on Linux with Chef
@@ -243,7 +243,6 @@ To include this step as part of the recipe, add `include_recipe ':: uninstall_md
243243
- [Deploy Defender for Endpoint on Linux with Saltstack](linux-install-with-saltack.md)
244244
- [Deploy Defender for Endpoint on Linux manually](linux-install-manually.md)
245245
- [Connect your non-Azure machines to Microsoft Defender for Cloud with Defender for Endpoint](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint) (direct onboarding using Defender for Cloud)
246-
- [Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)
247246
- [Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md)
248247
249248
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)