You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Learn more:
35
35
|---------|------------|-------------|
36
36
|New predictive shielding response actions. |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
37
37
|[Custom data collection](custom-data-collection.md)|Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
38
-
|[Defender deployment tool](./defender-deployment-tool-windows.md)| Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
38
+
| Defender deployment tool<br/>- [for Windows devices](./defender-deployment-tool-windows.md)<br/>- [for Linux devices](./linux-install-with-defender-deployment-tool.md)| Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
39
39
|[Defender endpoint security solution for Windows 7 SP1 and Windows Server 2008 R2 SP1](./onboard-downlevel.md#use-the-defender-deployment-tool-to-deploy-defender-endpoint-security)| Preview | A Defender for endpoint security solution is now available for legacy Windows 7 SP1 and Windows Server 2008 R2 SP1 devices. The solution provides advanced protection capabilities and improved functionality for these devices compared to other solutions. The new solution is available using the new [Defender deployment tool](./defender-deployment-tool-windows.md). |
Copy file name to clipboardExpand all lines: defender-for-identity/configure-scoped-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ The following table lists the current limitations and supported scenarios for sc
56
56
57
57
> [!NOTE]
58
58
> - Custom roles apply only to new alerts and activities. Alerts and activities triggered before a custom role was created aren't retroactively tagged or filtered.
59
-
>
59
+
>- The Exposure Management section in the Defender Portal is not visible to users with an MDI scope assignment.
60
60
> - Microsoft Entra ID IP alerts aren't included within scoped MDI detections.
61
61
62
62
|Defender for Identity experience |Scoping by OU's|Scoping by AD domain|
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/active-directory-federation-services.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ These considerations apply:
18
18
19
19
## Prerequisites
20
20
21
-
Prerequisites for installing Defender for Identity sensors on AD FS, AD CS, or Microsoft Entra Connect servers are the can be found in [Microsoft Defender for Identity prerequisites](prerequisites-sensor-version-2.md) article.
21
+
Prerequisites for installing Defender for Identity sensors on AD FS, AD CS, or Microsoft Entra Connect servers can be found in [Microsoft Defender for Identity prerequisites](prerequisites-sensor-version-2.md) article.
22
22
23
23
A sensor installed on an AD FS, AD CS, or Microsoft Entra Connect server can't use the local service account to connect to the domain. Instead, you need to configure a [Directory Service Account](directory-service-accounts.md).
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ For updates about versions and features released six months ago or earlier, see
31
31
32
32
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x
33
33
34
-
Defender for Identity now offers automatic Windows event-auditing configuration for Defender for Identity sensors v3.x. Automatic event auditing streamlines deployment by applying required Windows auditing settings to new sensors and fixing any misconfigurations on existing sensors. Admins can enable the option in the Defender portal or using Graph API.
34
+
Defender for Identity offers automatic Windows event-auditing configuration for sensors v3.x, streamlining deployment by applying required auditing settings to new sensors and fixing misconfigurations on existing ones; admins can enable it in the Defender portal or via the Graph API, and the feature, along with its related health alerts, will roll out gradually over the next few weeks.
35
35
36
36
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
37
37
@@ -49,7 +49,6 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
49
49
**Identity-level remediation actions**
50
50
51
51
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
52
-
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
53
52
54
53
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
55
54
@@ -302,7 +301,7 @@ New [health issue](health-alerts.md) for cases where sensors running on VMware h
302
301
Identities listed in the [Identity inventory](identity-inventory.md) in Microsoft Defender portal now include a **“Privileged account”** tag for accounts managed by a **Privileged Identity Management (PIM)** service.
303
302
Privileged accounts are prime targets for attackers. Tagging them in the inventory helps you quickly identify high-risk or high-value accounts, prioritize investigation and mitigation efforts, and streamline incident response workflows.
304
303
305
-
Learn more about [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure)
304
+
Learn more about [Privileged Identity Management.](/entra/id-governance/privileged-identity-management/pim-configure)
Copy file name to clipboardExpand all lines: defender-office-365/advanced-delivery-policy-configure.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ Messages identified by the advanced delivery policy aren't security threats, so
71
71
72
72
## Use the Microsoft Defender portal to configure SecOps mailboxes in the advanced delivery policy
73
73
74
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
74
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
75
75
76
76
On the **Advanced delivery** page, verify that the **SecOps mailbox** tab is selected.
77
77
@@ -99,7 +99,7 @@ Back on the **SecOps mailbox** tab, the SecOps mailbox entries that you configur
99
99
100
100
## Use the Microsoft Defender portal to modify or remove SecOps mailboxes in the advanced delivery policy
101
101
102
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
102
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
103
103
104
104
On the **Advanced delivery** page, verify that the **SecOps mailbox** tab is selected.
105
105
@@ -148,7 +148,7 @@ If your MX record doesn't point to Microsoft 365, the IP address in the `Authent
148
148
>
149
149
> - Adding phishing simulation URLs to the **Do not rewrite the following URLs in email** section in Safe Links policies might result in unwanted alerts for URL clicks. Phishing simulation URLs in email messages are automatically allowed both during mail flow and at time of click.
150
150
151
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
151
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
152
152
153
153
On the **Advanced delivery** page, select the **Phishing simulation** tab.
154
154
@@ -213,7 +213,7 @@ Back on the **Phishing simulation** tab, the non-Microsoft phishing simulation e
213
213
214
214
## Use the Microsoft Defender portal to modify or remove non-Microsoft phishing simulations in the advanced delivery policy
215
215
216
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
216
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
217
217
218
218
On the **Advanced delivery** page, select the **Phishing simulation** tab.
Copy file name to clipboardExpand all lines: defender-office-365/anti-malware-policies-configure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ You can configure anti-malware policies in the Microsoft Defender portal or in [
64
64
65
65
## Use the Microsoft Defender portal to create anti-malware policies
66
66
67
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-Malware** in the **Policies** section. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
67
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-Malware** in the **Policies** section. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
68
68
69
69
2. On the **Anti-malware** page, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Create** to open the new anti-malware policy wizard.
70
70
@@ -161,7 +161,7 @@ You can configure anti-malware policies in the Microsoft Defender portal or in [
161
161
162
162
## Use the Microsoft Defender portal to view anti-malware policy details
163
163
164
-
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-Malware** in the **Policies** section. Or, to go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
164
+
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-Malware** in the **Policies** section. Or, to go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
165
165
166
166
On the **Anti-malware** page, the following properties are displayed in the list of anti-malware policies:
167
167
@@ -184,7 +184,7 @@ Select a policy by clicking anywhere in the row other than the check box next to
184
184
185
185
## Use the Microsoft Defender portal to take action on anti-malware policies
186
186
187
-
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-Malware** in the **Policies** section. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
187
+
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-Malware** in the **Policies** section. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
188
188
189
189
On the **Anti-malware** page, select the anti-malware policy by using either of the following methods:
Copy file name to clipboardExpand all lines: defender-office-365/anti-phishing-mdo-impersonation-insight.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ Admins can use the impersonation insight in the Microsoft Defender portal to qui
62
62
63
63
## Open the impersonation insight in the Microsoft Defender portal
64
64
65
-
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
65
+
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
66
66
67
67
On the **Anti-phishing** page, the impersonation insight looks like this:
Copy file name to clipboardExpand all lines: defender-office-365/anti-phishing-policies-eop-configure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ For anti-phishing policy procedures in organizations with Microsoft Defender for
61
61
62
62
## Use the Microsoft Defender portal to create anti-phishing policies
63
63
64
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
64
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
65
65
66
66
2. On the **Anti-phishing** page, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Create** to open the new anti-phishing policy wizard.
67
67
@@ -154,7 +154,7 @@ For anti-phishing policy procedures in organizations with Microsoft Defender for
154
154
155
155
## Use the Microsoft Defender portal to view anti-phishing policy details
156
156
157
-
In the Microsoft Defender portal, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
157
+
In the Microsoft Defender portal, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
158
158
159
159
On the **Anti-phishing** page, the following properties are displayed in the list of anti-phishing policies:
160
160
@@ -179,7 +179,7 @@ Select a policy by clicking anywhere in the row other than the check box next to
179
179
180
180
## Use the Microsoft Defender portal to take action on anti-phishing policies
181
181
182
-
1. In the Microsoft Defender portal, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
182
+
1. In the Microsoft Defender portal, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
183
183
184
184
2. On the **Anti-phishing** page, select the anti-phishing policy by using either of the following methods:
Copy file name to clipboardExpand all lines: defender-office-365/anti-phishing-policies-mdo-configure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ For anti-phishing policy procedures in organizations without Defender for Office
67
67
68
68
## Use the Microsoft Defender portal to create anti-phishing policies
69
69
70
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
70
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
71
71
72
72
2. On the **Anti-phishing** page, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Create** to open the new anti-phishing policy wizard.
73
73
@@ -342,7 +342,7 @@ For anti-phishing policy procedures in organizations without Defender for Office
342
342
343
343
## Use the Microsoft Defender portal to view anti-phishing policy details
344
344
345
-
In the Microsoft Defender portal, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
345
+
In the Microsoft Defender portal, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
346
346
347
347
On the **Anti-phishing** page, the following properties are displayed in the list of anti-phishing policies:
348
348
@@ -367,7 +367,7 @@ Select a policy by clicking anywhere in the row other than the check box next to
367
367
368
368
## Use the Microsoft Defender portal to take action on anti-phishing policies
369
369
370
-
1. In the Microsoft Defender portal, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
370
+
1. In the Microsoft Defender portal, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
371
371
372
372
2. On the **Anti-phishing** page, select the anti-phishing policy by using either of the following methods:
Copy file name to clipboardExpand all lines: defender-office-365/anti-spam-bulk-senders-insight.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ The bulk senders insight is available in the following locations:
72
72
73
73
- In the properties of the default anti-spam policy or custom anti-spam policies:
74
74
75
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
75
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
76
76
77
77
2. On the **Anti-spam policies** page, select a custom anti-spam policy (the **Type** value is **Custom anti-spam policy**) or the default anti-spam policy named **Anti-spam inbound policy (Default)** by clicking anywhere in the row other than the check box next to the first column.
0 commit comments