Skip to content

Commit 2eee86f

Browse files
committed
Merge branch 'main' into RespComp-chrisda
2 parents 92db2de + 874c050 commit 2eee86f

File tree

7 files changed

+49
-45
lines changed

7 files changed

+49
-45
lines changed

ATPDocs/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Security assessment: Remove Resource Based Constrained Delegation for Microsoft Entra seamless SSO account'
33
description: This article describes Microsoft Defender for Identity's Microsoft Entra Seamless Single sign-on (SSO) account with Resource Based Constrained Delegation (RBCD) applied security posture assessment report.
44
author: RonitLitinsky
5-
ms.author: t-rlitinsky
5+
ms.author: rlitinsky
66
ms.service: microsoft-defender-for-identity
77
ms.topic: article
88
ms.date: 08/22/2024

CloudAppSecurityDocs/discovery-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This article describes how to configure automatic log upload for continuous repo
3838
1. Run the helm command using the following syntax:
3939
4040
```AzureCLI
41-
helm install <release-name> oci://agentspublic.azurecr.io/logcollector-chart --version 1.0.0 --set inputString="<generated id> ",env.PUBLICIP="<public ip>",env.SYSLOG="true",env.COLLECTOR="<collector-name>",env.CONSOLE="<Console-id>",env.INCLUDE_TLS="on" --set-file ca=<absolute path of ca.pem file> --set-file serverkey=<absolute path of server-key.pem file> --set-file servercert=<absolute path of server-cert.pem file> --set replicas=<no of replicas> --set image.tag=0.272.0
41+
helm install <release-name> oci://mcr.microsoft.com/mcas/helmchart/logcollector-chart --version 1.0.5 --set inputString="<generated id> ",env.PUBLICIP="<public ip>",env.SYSLOG="true",env.COLLECTOR="<collector-name>",env.CONSOLE="<Console-id>",env.INCLUDE_TLS="on" --set-file ca=<absolute path of ca.pem file> --set-file serverkey=<absolute path of server-key.pem file> --set-file servercert=<absolute path of server-cert.pem file> --set replicas=<no of replicas> -n <namespace>
4242
```
4343
4444
Find the values for the helm command using the docker command used when the collector is configured. For example:

defender-endpoint/ios-new-ux.md

Lines changed: 17 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 03/20/2025
9+
ms.date: 03/21/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -18,58 +18,56 @@ ms.subservice: ios
1818
search.appverid: met150
1919
---
2020

21-
# User experiences in Microsoft Defender for Endpoint on iOS
21+
# User Experiences in Microsoft Defender for Endpoint on iOS
2222

23-
As part of our ongoing commitment to delivering an exceptional user experience, we're excited to announce a series of upcoming enhancements to the user interface and overall experience of our **Microsoft Defender for Endpoint (MDE)** mobile app.
23+
As part of our ongoing commitment to delivering an exceptional user experience, we're excited to announce a series of upcoming enhancements to the user interface and overall experience of our **Microsoft Defender for Endpoint** mobile app.
2424

2525
These updates are designed to improve usability, streamline navigation, and ensure that app meets the evolving needs of our users.
2626

27-
## Key Changes
27+
## Key changes
2828

29-
We're pleased to introduce the Device Protection feature card for our enterprise users which includes **Web Protection**, **Device Health**, and **Jail break** features are designed to be more user-friendly and accessible.
29+
We're pleased to introduce the Device Protection feature card for our enterprise users, which includes **Web Protection**, **Device Health**, and **Jail break** features that are designed to be more user-friendly and accessible.
3030

31-
The updated cards also include **recommendation cards**, which prominently display any active alerts, keeping you informed. Features are now displayed as tiles on L2 screens to improve user experience and navigation efficiency.
31+
The updated cards also include **recommendation cards**, which prominently display any active alerts, keeping you informed. Features are now displayed as tiles to improve user experience and navigation efficiency.
3232

3333
**The main changes involved are**:
3434

35-
1. Main Dashboard changes
36-
2. List the features inside one Feature Card
37-
3. Detailed Feature Experience
38-
4. Recommendation Cards for Alerts
35+
- Main dashboard changes
36+
- List the features inside one feature card
37+
- Detailed features experience
38+
- Recommendation cards for alerts
3939

4040
### Main Dashboard changes
4141

4242
The main Dashboard screen that appears for enterprise users as per our latest rollout of enhancements to the application.
4343

4444
:::image type="content" source="media/mde-ios-main-dash-new.png" alt-text="Screenshot that shows the Microsoft Defender for Endpoint Mobile Dashboard on iOS devices before the new update." lightbox="media/mde-ios-main-dash-new.png":::
4545

46-
### List the features inside one Feature Card
46+
### List the features inside one feature card
4747

48-
We list the feature Web Protection, Device Health, and Jail Break under one feature Card "Device Protection," which earlier had a new card on Dashboard screen for each functionality.
48+
One feature card called **Device Protection** lists Web Protection, Device Health, and Jail Break. Previously, the dashboard had one card for each set of capabilities. In the new experience, only the Device Protection card changes.
4949

5050
:::image type="content" source="media/mde-ios-list-new.png" alt-text="Screenshot that shows the Microsoft Defender for Endpoint Feature Card." lightbox="media/mde-ios-list-new.png":::
5151

5252
### Detailed Feature Experience
5353

54-
We updated all the subordinating screens associated with the feature
54+
We updated all the subordinating screens associated with the **Device Protection** feature
5555

5656
1. **Web Protection**
5757

58-
:::image type="content" source="media/mde-ios-web-protection-new.png" alt-text="Screenshot that shows the web protection feature on the MDE iOS app." lightbox="media/mde-ios-web-protection-new.png":::
58+
:::image type="content" source="media/mde-ios-web-protection-new.png" alt-text="Screenshot that shows the web protection feature on the Defender for Endpoint on iOS app." lightbox="media/mde-ios-web-protection-new.png":::
5959

6060
2. **Device Health**
6161

62-
:::image type="content" source="media/mde-device-health-new.png" alt-text="Screenshot that shows the new device health feature on the MDE iOS app." lightbox="media/mde-device-health-new.png":::
62+
:::image type="content" source="media/mde-device-health-new.png" alt-text="Screenshot that shows the new device health feature on the Defender for Endpoint on iOS app." lightbox="media/mde-device-health-new.png":::
6363

6464
### Recommendation Cards for Alerts
6565

66-
Hero cards are implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard.
67-
68-
**Both the Recommendation Cards are attached to the Device Protection feature card**:
66+
The structure of the dashboard is updated to include a recommendation card that contains active alerts (if any). In case there are multiple alerts, resolving the top alert brings forward the next one. Recommendation cards are implemented to provide a more cohesive user experience. These cards are designed to display important alerts and notifications prominently on the dashboard. Here are a few examples:
6967

7068
1. **Web Protection**
7169

72-
:::image type="content" source="media/mde-ios-web-protection-rec-card.png" alt-text="Screenshot that shows the web protection recommendation card feature on the MDE iOS app." lightbox="media/mde-ios-web-protection-rec-card.png":::
70+
:::image type="content" source="media/mde-ios-web-protection-rec-card.png" alt-text="Screenshot that shows the web protection recommendation card feature on the Defender for Endpoint on iOS app." lightbox="media/mde-ios-web-protection-rec-card.png":::
7371

7472
2. **Device Health (iOS Update)**
7573

defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Microsoft Defender for Endpoint on iOS
33
ms.reviewer:
44
description: Describes how to install and use Microsoft Defender for Endpoint on iOS
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: ios
1717
search.appverid: met150
18-
ms.date: 02/12/2025
18+
ms.date: 03/21/2025
1919
---
2020

2121
# Microsoft Defender for Endpoint on iOS
@@ -32,7 +32,7 @@ ms.date: 02/12/2025
3232
**Microsoft Defender for Endpoint on iOS** offers protection against phishing and unsafe network connections from websites, emails, and apps. All alerts are available through a single pane of glass in the Microsoft Defender portal. The portal gives security teams a centralized view of threats on iOS devices along with other platforms.
3333

3434
> [!CAUTION]
35-
> Running other third-party endpoint protection products alongside Defender for Endpoint on iOS is likely to cause performance problems and unpredictable system errors.
35+
> Running other non-Microsoft endpoint protection products alongside Defender for Endpoint on iOS is likely to cause performance problems and unpredictable system errors.
3636
3737
## Prerequisites
3838

@@ -45,7 +45,7 @@ ms.date: 02/12/2025
4545
Intune Company Portal app can be downloaded from the [Apple App Store](https://apps.apple.com/us/app/intune-company-portal/id719171358).
4646

4747
> [!NOTE]
48-
> Apple does not allow redirecting users to download other apps from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
48+
> Apple doesn't allow redirecting users to download other apps from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
4949
5050
Devices are registered with Microsoft Entra ID. This configuration requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).
5151

@@ -54,8 +54,8 @@ ms.date: 02/12/2025
5454
- For more information on how to assign licenses, see [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign).
5555

5656
> [!NOTE]
57-
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
58-
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
57+
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it doesn't route traffic through a remote VPN server.
58+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app isn't opened for seven days, the device might be marked as inactive in the Microsoft Defender Portal.
5959
6060
### For Administrators
6161

@@ -90,6 +90,9 @@ Deployment of Microsoft Defender for Endpoint on iOS can be done via Microsoft I
9090
- For information on deploying on enrolled devices through Microsoft Configuration Manager or Intune, see [Deploy Microsoft Defender for Endpoint on iOS](ios-install.md).
9191
- For information on using Defender for Endpoint in app protection policy (MAM), see [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)
9292

93+
> [!NOTE]
94+
> If a user has a valid MDE license and is registered in the Authenticator App or Company Portal App, and signs in to the Defender App, the device appears in the Defender Portal.
95+
9396
## Resources
9497

9598
- Stay informed about upcoming releases by visiting [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md) or our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).

defender-endpoint/microsoft-defender-endpoint.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Microsoft Defender for Endpoint
33
description: Microsoft Defender for Endpoint is an enterprise endpoint security platform that helps defend against advanced persistent threats.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.localizationpriority: high
88
manager: deniseb
99
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.custom: intro-overview
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 09/25/2024
17+
ms.date: 03/21/2025
1818
---
1919

2020
# Microsoft Defender for Endpoint
@@ -45,7 +45,7 @@ Watch the following video to learn more about Defender for Endpoint:
4545
4646
Defender for Endpoint uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
4747

48-
- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.
48+
- **Endpoint behavioral sensors**: These sensors are embedded in Windows 10, collecting and processing behavioral signals from the operating system. The sensor data is then sent to your private, isolated cloud instance of Microsoft Defender for Endpoint.
4949

5050
- **Cloud security analytics**: Using big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.
5151

@@ -76,12 +76,12 @@ Defender for Endpoint uses the following combination of technology built into Wi
7676
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=95c63786-0382-413d-8a75-eb373e825fa6]
7777
7878
> [!TIP]
79-
> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).
79+
> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)?
8080
> - Microsoft Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
8181
8282

8383
> [!IMPORTANT]
84-
> The capabilities on non-Windows platforms may be different from the ones for Windows. For more information on what capabilities are available for non-Windows platforms, see [Microsoft Defender for Endpoint for non-Windows platforms](non-windows.md).
84+
> The capabilities on non-Windows platforms might be different from the ones for Windows. For more information on what capabilities are available for non-Windows platforms, see [Microsoft Defender for Endpoint for non-Windows platforms](non-windows.md).
8585
8686
<a name="tvm"></a>
8787

@@ -95,7 +95,7 @@ For more information on the different vulnerability management capabilities avai
9595

9696
**[Attack surface reduction](overview-attack-surface-reduction.md)**
9797

98-
The attack surface reduction set of capabilities provides the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
98+
The attack surface reduction set of capabilities provides the frontline of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
9999

100100
<a name="ngp"></a>
101101

@@ -113,7 +113,7 @@ Endpoint detection and response capabilities are put in place to detect, investi
113113

114114
**[Automated investigation and remediation](automated-investigations.md)**
115115

116-
In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
116+
With being able to quickly, respond to advanced attacks. Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
117117

118118
<a name="ss"></a>
119119

@@ -123,14 +123,14 @@ Defender for Endpoint includes Microsoft Secure Score for Devices to help you dy
123123

124124
<a name="mte"></a>
125125

126-
**[Microsoft Threat Experts](endpoint-attack-notifications.md)**
126+
**[Microsoft Defender Experts](endpoint-attack-notifications.md)**
127127

128-
Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and more context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
128+
Microsoft Defender for Endpoint's managed threat hunting service provides proactive hunting, prioritization, and more context and insights that further empower security operation centers (SOCs) to identify and respond to threats quickly and accurately.
129129

130130
> [!IMPORTANT]
131-
> Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
131+
> Defenders for Endpoint customers need to apply for the Microsoft's managed threat hunting service to get proactive Endpoint Attack Notifications and to collaborate with experts on demand. Experts on Demand are an add-on service. Endpoint Attack Notifications are always included after you have been accepted into Microsoft Defender Experts managed threat hunting service.
132132
>
133-
> If you aren't enrolled yet and would like to experience its benefits, go to **Settings** \> **General** \> **Advanced features** \> **Microsoft Threat Experts** to apply. Once accepted, you'll get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription.
133+
> If you aren't enrolled yet and would like to experience its benefits, go to **Settings** \> **Endpoints** \> **Advanced features** \> **Endpoint Attack Notifications** to apply. Once accepted, you get the benefits of Endpoint Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Expert on Demand subscription.
134134
135135
<a name="apis"></a>
136136

0 commit comments

Comments
 (0)