Skip to content

Commit 27ce5f5

Browse files
authored
Merge branch 'public' into patch-4
2 parents b3ab3a4 + 133008f commit 27ce5f5

File tree

43 files changed

+846
-312
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+846
-312
lines changed

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Use the following steps to check the network connectivity of Microsoft Defender
102102
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
103103

104104
> [!NOTE]
105-
> - It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
105+
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
106106
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
107107
108108
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 06/05/2024
17+
ms.date: 08/01/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -69,7 +69,7 @@ This article provides instructions on how to run the tool via Live Response on W
6969
```console
7070
PutFile MDEClientAnalyzerPreview.zip -overwrite
7171
Run MDELiveAnalyzer.ps1
72-
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult.zip"
72+
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
7373
```
7474

7575
- For more information on gathering data locally on a machine in case the machine isn't communicating with Microsoft Defender for Endpoint cloud services, or doesn't appear in Microsoft Defender for Endpoint portal as expected, see [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md).

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -437,7 +437,7 @@
437437
items:
438438
- name: AIR overview
439439
href: air-about.md
440-
- name: How automated investigation and response works
440+
- name: AIR examples
441441
href: air-examples.md
442442
- name: Review and approve (or reject) pending actions
443443
href: air-review-approve-pending-completed-actions.md

defender-office-365/address-compromised-users-quickly.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ When a user account is compromised, alerts are triggered. And in some cases, tha
4747
- [View details about automated investigations](#view-details-about-automated-investigations)
4848

4949
> [!IMPORTANT]
50-
> You must have appropriate permissions to perform the following tasks. See [Required permissions to use AIR capabilities](air-about.md#required-permissions-to-use-air-capabilities).
50+
> You must have appropriate permissions to perform the following tasks. For more information, see [Required permissions to use AIR capabilities](air-about.md#required-permissions-and-licensing-for-air).
5151
5252
Watch this short video to learn how you can detect and respond to user compromise in Microsoft Defender for Office 365 using Automated Investigation and Response (AIR) and compromised user alerts.
5353

@@ -81,7 +81,7 @@ To learn more, see [View details of an investigation](air-view-investigation-res
8181

8282
## Next steps
8383

84-
- [Review the required permissions to use AIR capabilities](air-about.md#required-permissions-to-use-air-capabilities)
84+
- [Review the required permissions to use AIR capabilities](air-about.md#required-permissions-and-licensing-for-air)
8585

8686
- [Find and investigate malicious email in Office 365](threat-explorer-investigate-delivered-malicious-email.md)
8787

defender-office-365/air-about.md

Lines changed: 32 additions & 65 deletions
Large diffs are not rendered by default.

defender-office-365/air-custom-reporting.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,36 @@
11
---
22
title: Custom reporting solutions with automated investigation and response
3-
f1.keywords:
3+
f1.keywords:
44
- NOCSH
55
author: chrisda
66
ms.author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
1010
ms.localizationpriority: medium
11-
search.appverid:
11+
search.appverid:
1212
- MET150
1313
- MOE150
14-
ms.collection:
14+
ms.collection:
1515
- m365-security
1616
- tier2
1717
description: Learn how to integrate automated investigation and response with a custom or third-party reporting solution.
18-
ms.date: 06/09/2023
19-
ms.custom:
18+
ms.date: 07/10/2023
19+
ms.custom:
2020
- air
2121
ms.service: defender-office-365
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2525
---
2626

27-
# Custom or third-party reporting solutions for Microsoft Defender for Office 365
27+
# Custom or third-party reporting solutions for Microsoft Defender for Office 365 Plan 2
2828

2929
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3030

31-
With [Microsoft Defender for Office 365](mdo-about.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about [automated investigations](air-about.md) with such a solution, you can use the Office 365 Management Activity API.
31+
Automated investigation and response (AIR) in Microsoft Defender for Office 365 Plan 2 returns detailed information about the results. For more information, see [Details and results of automated investigation and response (AIR) in Microsoft Defender for Office 365 Plan 2](air-view-investigation-results.md).
32+
33+
However, some Microsoft 365 organizations use custom or third-party reporting solutions. Those organizations can use the **Office 365 Management Activity APIs** to integrate information from AIR into other reporting solutions.
3234

3335
|Resource|Description|
3436
|:---|:---|

0 commit comments

Comments
 (0)