Skip to content

Commit 26dc270

Browse files
committed
Merge branch 'main' into Teams-chrisda
2 parents 40f1e15 + 250511a commit 26dc270

File tree

147 files changed

+2246
-378
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+2246
-378
lines changed

.github/workflows/AutoLabelAssign.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ jobs:
2626
name: Run assign and label
2727
if: github.repository_owner == 'MicrosoftDocs'
2828
needs: [download-payload]
29-
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoLabelAssign.yml@workflows-prod
29+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoLabelAssign.yml@workflows-test
3030
with:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
AutoAssignUsers: 1

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,6 @@
2020
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",
2121
"redirect_document_id": false
2222
},
23-
{
24-
"source_path": "defender-endpoint/linux-install-with-activator.md",
25-
"redirect_url": "/defender-endpoint/linux-custom-location-installation",
26-
"redirect_document_id": false
27-
},
2823
{
2924
"source_path": "defender-endpoint/preview.md",
3025
"redirect_url": "/defender-xdr/preview",
@@ -155,6 +150,11 @@
155150
"redirect_url": "/defender-endpoint/onboard-server",
156151
"redirect_document_id": false
157152
},
153+
{
154+
"source_path": "defender-endpoint/linux-install-with-activator.md",
155+
"redirect_url": "/defender-endpoint/linux-install-with-defender-deployment-tool",
156+
"redirect_document_id": false
157+
},
158158
{
159159
"source_path": "defender-endpoint/mde-linux-arm.md",
160160
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",

defender-business/get-defender-business.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Microsoft has a list of solution providers who are authorized to sell offerings,
6363

6464
Defender for Business provides advanced security protection for your company's devices. For more information, see [What is Microsoft Defender for Business](mdb-overview.md)?
6565

66-
1. Go to the [Microsoft Defender for Business](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-business) web page, and select an option to try or buy Defender for Business. Fill in the requested information.
66+
1. Go to the [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business) web page, and select an option to try or buy Defender for Business. Fill in the requested information.
6767

6868
If you're starting a trial, look for your acceptance email, which contains your promo code and a link to sign in. And be sure to see the [Trial user guide for Defender for Business](trial-playbook-defender-business.md).
6969

defender-business/mdb-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ sections:
2929
answer: |
3030
We recommend working with a [Microsoft partner](https://www.microsoft.com/security/business/find-a-partner).
3131
32-
If you prefer to try or buy Defender for Business on your own, go to the [Defender for Business](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-business) product page, and select the option to try or buy Defender for Business.
32+
If you prefer to try or buy Defender for Business on your own, go to the [Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business) product page, and select the option to try or buy Defender for Business.
3333
3434
For more information, see [Get Defender for Business](get-defender-business.md).
3535

defender-endpoint/TOC.yml

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,8 @@
135135
href: streamlined-device-connectivity-urls-gov.md
136136
- name: Onboard client devices
137137
items:
138+
- name: Onboard Windows devices using the Defender deployment tool
139+
href: defender-deployment-tool-windows.md
138140
- name: Onboard client devices running Windows or macOS
139141
href: onboard-client.md
140142
- name: Defender for Endpoint plug-in for WSL
@@ -174,6 +176,7 @@
174176
href: mde-linux-deployment-on-sap.md
175177
- name: Use custom detection rules to protect SAPXPG
176178
href: mde-sap-custom-detection-rules.md
179+
177180
- name: Defender for Endpoint on macOS
178181
items:
179182
- name: Deploy Defender for Endpoint on macOS
@@ -267,6 +270,8 @@
267270
items:
268271
- name: Enabling deployment to a custom location
269272
href: linux-custom-location-installation.md
273+
- name: Deployment tool based deployment
274+
href: linux-install-with-defender-deployment-tool.md
270275
- name: Installer script based deployment
271276
href: linux-installer-script.md
272277
- name: Ansible based deployment
@@ -625,6 +630,12 @@
625630
href: exclude-devices.md
626631
- name: Identifying transient devices
627632
href: transient-device-tagging.md
633+
- name: Collect custom device data
634+
items:
635+
- name: Overview
636+
href: custom-data-collection.md
637+
- name: Create custom data collection rules
638+
href: create-custom-data-collection-rules.md
628639
- name: Internet facing devices
629640
href: internet-facing-devices.md
630641
- name: Device timeline
@@ -1062,6 +1073,10 @@
10621073
href: respond-machine-alerts.md#contain-devices-from-the-network
10631074
- name: Contain user from the network
10641075
href: respond-machine-alerts.md#contain-user-from-the-network
1076+
- name: Automatically apply GPO hardening (predictive shielding)
1077+
href: respond-machine-alerts.md#gpo-hardening
1078+
- name: Automatically apply Safeboot hardening (predictive shielding)
1079+
href: respond-machine-alerts.md#safeboot-hardening
10651080
- name: Consult a threat expert
10661081
href: respond-machine-alerts.md#consult-a-threat-expert
10671082
- name: Check activity details in Action center
@@ -1098,10 +1113,7 @@
10981113
href: live-response-command-examples.md
10991114

11001115
- name: Use sensitivity labels to prioritize incident response
1101-
href: information-protection-investigation.md
1102-
1103-
- name: Advanced hunting
1104-
href: /defender-xdr/advanced-hunting-overview?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
1116+
href: information-protection-investigation.md
11051117

11061118
- name: Threat analytics
11071119
items:

defender-endpoint/android-whatsnew.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,29 +15,40 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 11/06/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint
2121

2222
---
2323

2424
# What's new in Microsoft Defender for Endpoint on Android
2525

26-
2726
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2827

2928
### Releases for Defender for Endpoint on Android
3029

3130
#### November 2025
3231

32+
| Build| 1.0.8315.0101|
33+
| -------- | -------- |
34+
| Release Date | November 17, 2025 |
35+
36+
**What's New**
37+
38+
- Performance improvement and accessibility bug fixes
39+
40+
#### November 2025
41+
3342
| Build| 1.0.8303.0101|
3443
| -------- | -------- |
3544
| Release Date |November 4, 2025|
3645

3746
**What's New**
3847

3948
- An improved user feedback experience: See [Key changes - November 2025](./android-new-ux.md#key-changes---november-2025) for details.
40-
49+
50+
- Added landscape mode UI support for the Defender app.
51+
4152
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
4253

4354
#### October 2025

defender-endpoint/configure-endpoints-gp.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Onboard Windows Servers to Microsoft Defender for Endpoint via Group Policy
33
description: Use Group Policy to deploy the configuration package on Windows devices so that they're onboarded to the service.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier1
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
15-
ms.date: 10/13/2025
15+
ms.date: 11/17/2025
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
appliesto:
@@ -23,6 +23,8 @@ appliesto:
2323

2424
# Onboard Windows devices using Group Policy
2525

26+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
27+
2628
## Prerequisites
2729

2830
- To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Onboard Windows devices to Defender for Endpoint using Intune
33
description: Use Microsoft Intune to deploy the configuration package on devices so that they're onboarded to the Defender for Endpoint service.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -14,14 +14,15 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 10/31/2024
17+
ms.date: 11/17/2025
1818
appliesto:
1919
- Microsoft Defender for Endpoint Plan 1
2020
- Microsoft Defender for Endpoint Plan 2
2121

2222
---
2323
# Onboard Windows devices to Defender for Endpoint using Intune
2424

25+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
2526

2627
You can use mobile device management (MDM) solutions to configure Windows 10 devices. Defender for Endpoint supports MDMs by providing OMA-URIs to create policies to manage devices.
2728

defender-endpoint/configure-endpoints-sccm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,13 @@ ms.collection:
1212
- tier1
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
15-
ms.date: 10/27/2025
15+
ms.date: 11/17/2025
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
---
1919

2020
# Onboard Windows devices using Configuration Manager
2121

22-
2322
You can use Configuration Manager to onboard endpoints to the Microsoft Defender for Endpoint service.
2423

2524
There are several options you can use to onboard devices using Configuration Manager:
@@ -32,6 +31,7 @@ There are several options you can use to onboard devices using Configuration Man
3231
3332
You can create a detection rule on a Configuration Manager application to continuously check if a device has been onboarded. An application is a different type of object than a package and program. If a device is not yet onboarded (due to pending OOBE completion or any other reason), Configuration Manager reattempts to onboard the device until the rule detects the status change. For more information, see [Configure Detection Methods in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682159\(v=technet.10\)#step-4-configure-detection-methods-to-indicate-the-presence-of-the-deployment-type).
3433

34+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
3535

3636
## Prerequisites
3737

defender-endpoint/configure-endpoints-script.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard Windows Servers using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
1010
manager: bagol
@@ -15,22 +15,23 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: install-set-up-deploy
1717
ms.subservice: onboard
18-
ms.date: 04/16/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
2222

2323
---
2424
# Onboard Windows devices using a local script
2525

26-
2726
You can also manually onboard individual devices to Defender for Endpoint. You might want to onboard some devices when you're testing the service before you commit to onboarding all devices in your network.
2827

2928
> [!IMPORTANT]
3029
> The script described in this article is recommended for manually onboarding devices to Defender for Endpoint. It should only be used on a limited number of devices. If you're deploying to a production environment, see [other deployment options](onboard-client.md), such as Intune, Group Policy, or Configuration Manager.
3130
3231
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
3332

33+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
34+
3435
## Onboard devices
3536

3637
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):

0 commit comments

Comments
 (0)