You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,8 +31,8 @@ ms.date: 05/02/2024
31
31
**Platforms**
32
32
- Windows
33
33
34
-
> [!TIP]
35
-
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268615), which helps you utilize essential tools and automated features such as attack surface reduction and next-generation protection. When signed in to the Microsoft 365 admin center, this guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268522).
## Why attack surface reduction rules are important
37
37
38
38
Your organization's attack surface includes all the places where an attacker could compromise your organization's devices or networks. Reducing your attack surface means protecting your organization's devices and network, which leaves attackers with fewer ways to perform attacks. Configuring attack surface reduction rules in Microsoft Defender for Endpoint can help!
Copy file name to clipboardExpand all lines: defender-endpoint/configure-server-endpoints.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,8 +38,7 @@ This article describes how to onboard specific Windows servers to Microsoft Defe
38
38
39
39
For guidance on how to download and use Windows Security Baselines for Windows servers, see [Windows Security Baselines](/windows/device-security/windows-security-baselines).
40
40
41
-
> [!TIP]
42
-
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268615), which helps you utilize essential tools and automated features such as attack surface reduction and next-generation protection. When signed in to the Microsoft 365 admin center, this guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268522).
Copy file name to clipboardExpand all lines: defender-endpoint/defender-compatibility.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,8 +35,8 @@ The Microsoft Defender for Endpoint agent depends on Microsoft Defender Antiviru
35
35
36
36
For optimal protection, configure the following settings for devices that are onboarded to Defender for Endpoint, whether Microsoft Defender Antivirus is the active antimalware solution or not:
37
37
38
-
- Security intelligence updates (which also updates the scan engine)
39
-
- Platform Update updates
38
+
-[Security intelligence updates](microsoft-defender-antivirus-updates.md#security-intelligence-updates) (which also updates the scan engine)
Copy file name to clipboardExpand all lines: defender-endpoint/device-timeline-event-flag.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ ms.date: 11/06/2023
24
24
25
25
**Applies to:**
26
26
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27
-
-[Microsoft Defender XDR](/defender-xdr)
27
+
28
28
29
29
> [!NOTE]
30
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
|`downloadFolder`| string | Maps to the location where the script downloads the files to |
141
-
|`downloadLinuxUpdates`| bool | When set to true, the script downloads the Linux specific updates to the `downloadFolder`|
141
+
|`downloadLinuxUpdates`| bool | When set to `true`, the script downloads the Linux specific updates to the `downloadFolder`|
142
142
|`logFilePath`| string | Sets up the diagnostic logs at a given folder. This file can be shared with Microsoft for debugging the script if there are any issues |
143
143
|`downloadMacUpdates`| bool | The script downloads the Mac specific updates to the `downloadFolder`|
144
144
|`downloadPreviewUpdates`| bool | Downloads the preview version of the updates available for the specific OS |
@@ -189,17 +189,21 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
|`automaticDefinitionUpdateEnabled`| True / False | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively |
199
-
|`definitionUpdatesInterval`| Numeric | Time of interval between each automatic update of signatures (in seconds) |
200
-
|`offlineDefinitionUpdateUrl`| String | URL value generated as part of the Mirror Server set up |
201
-
|`offlineDefinitionUpdate`| enabled / disabled | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
202
-
|`offlineDefinitionUpdateFallbackToCloud`| True / False | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
201
+
|`automaticDefinitionUpdateEnabled`|`True` / `False`| Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
202
+
|`definitionUpdatesInterval`| Numeric | Time of interval between each automatic update of signatures (in seconds). |
203
+
|`offlineDefinitionUpdateUrl`| String | URL value generated as part of the Mirror Server set up. |
204
+
|`offlineDefinitionUpdate`|`enabled` / `disabled`| When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
205
+
|`offlineDefinitionUpdateFallbackToCloud`|`True` / `False`| Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
206
+
|`offlineDefinitionUpdateVerifySig`|`enabled` / `disabled`| When set to `enabled`, downloaded definitions are verified on the endpoints, else vice versa. |
203
207
204
208
> [!NOTE]
205
209
> As of today the offline security intelligence update feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
@@ -212,9 +216,9 @@ To test if the settings are applied correctly on the Linux endpoints, run the fo
212
216
mdatp health --details definitions
213
217
```
214
218
215
-
For example, a sample output would look like:
219
+
A sample output would look like the following code snippet:
Offline signature update might fail in the following scenario:
297
-
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
301
+
302
+
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
298
303
299
304
Mitigation steps:
300
-
The fix for this will be available in the upcoming release.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-whatsnew.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: dansimp
6
6
author: dansimp
7
7
ms.reviewer: kumasumit, gopkr
8
8
ms.localizationpriority: medium
9
-
ms.date: 05/16/2024
9
+
ms.date: 05/24/2024
10
10
manager: dansimp
11
11
audience: ITPro
12
12
ms.collection:
@@ -65,6 +65,14 @@ There are multiple fixes and new changes in this release:
65
65
- Stability and performance improvements.
66
66
- Other bug fixes.
67
67
68
+
**Known Issues**
69
+
70
+
- There's a known issue with enrolling devices to MDE Security Management using "Device Tagging" mechanism in 24032.007 using mdatp_managed.json. To mitigate this issue, use the following mdatp CLI command to tag devices:
71
+
72
+
```bash
73
+
sudo mdatp edr tag set --name GROUP --value MDE-Management
0 commit comments