Skip to content

Commit 335696a

Browse files
authored
Merge branch 'main' into docs-editor/linux-preferences-1720765812
2 parents a090694 + 2db46b6 commit 335696a

22 files changed

+74
-52
lines changed

defender-endpoint/client-behavioral-blocking.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ ms.reviewer: shwetaj
88
audience: ITPro
99
ms.topic: conceptual
1010
ms.service: defender-endpoint
11+
ms.subservice: ngp
1112
ms.localizationpriority: medium
1213
ms.custom:
1314
- next-gen
@@ -16,7 +17,7 @@ ms.collection:
1617
- m365-security
1718
- tier2
1819
search.appverid: met150
19-
ms.date: 12/18/2020
20+
ms.date: 07/22/2024
2021
---
2122

2223
# Client behavioral blocking

defender-endpoint/defender-endpoint-demonstration-app-reputation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Microsoft Defender for Endpoint SmartScreen app reputation demonstration
33
description: Test how Microsoft Defender for Endpoint SmartScreen helps you identify phishing and malware websites
44
search.appverid: met150
55
ms.service: defender-endpoint
6+
ms.subservice: ngp
67
ms.author: siosulli
78
author: siosulli
89
ms.localizationpriority: medium
@@ -13,7 +14,7 @@ ms.collection:
1314
- tier2
1415
- demo
1516
ms.topic: article
16-
ms.date: 01/15/2024
17+
ms.date: 07/22/2024
1718
---
1819

1920
# SmartScreen app reputation demonstration

defender-endpoint/ios-configure-features.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 07/18/2024
17+
ms.date: 07/22/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on iOS features
@@ -97,6 +97,9 @@ Use the following steps to disable web protection for unenrolled devices.
9797
- Defender for Endpoint sends the heartbeat to the Microsoft Defender portal whenever a user opens the app.
9898
- Select **Next**, and then assign this profile to targeted devices/users.
9999

100+
> [!NOTE]
101+
> The `WebProtection` key is not applicable for the Control Filter in the list of supervised devices. If you want to disable web protection for supervised devices, you can remove the Control Filter profile.
102+
100103
## Configure network protection
101104

102105
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to configure network protection. This configuration is available for both enrolled devices through MDM config and unenrolled devices through MAM config.
@@ -275,8 +278,8 @@ End users install and open the Microsoft Defender app to start onboarding.
275278

276279
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are jailbroken. These jailbreak checks are done periodically. If a device is detected as jailbroken, these events occur:
277280

278-
- High-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
279-
- User data on app is cleared. When user opens the app after jailbreaking the VPN profile also is deleted and no web protection is offered.
281+
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
282+
- User data on app is cleared. When user opens the app after jailbreaking, the VPN profile (only Defender for Endpoint loopback VPN Profile) also is deleted, and no web protection is offered. VPN profiles delivered by Intune are not removed.
280283

281284
### Configure compliance policy against jailbroken devices
282285

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
33
description: Offline Security Intelligence Update in Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
5+
ms.subservice: linux
56
ms.author: dansimp
67
author: dansimp
78
ms.reviewer: gopkr
@@ -14,7 +15,7 @@ ms.collection:
1415
- mde-linux
1516
ms.topic: conceptual
1617
search.appverid: met150
17-
ms.date: 05/17/2024
18+
ms.date: 07/22/2024
1819
---
1920

2021
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux

defender-endpoint/mde-security-settings-management.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,9 @@ author: YongRhee-MSFT
55
ms.author: yongrhee
66
manager: deniseb
77
ms.service: defender-endpoint
8+
ms.subservice: ngp
89
ms.topic: how-to
9-
ms.date: 06/25/2024
10+
ms.date: 07/22/2024
1011
ms.collection:
1112
- m365-security
1213
- tier2

defender-endpoint/microsoft-defender-core-service-configurations-and-experimentation.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: YongRhee-MSFT
77
ms.author: yongrhee
88
manager: deniseb
99
ms.localizationpriority: medium
10-
ms.date: 03/26/2024
10+
ms.date: 07/19/2024
1111
audience: ITPro
1212
ms.topic: troubleshooting
1313
ms.subservice: ngp
@@ -21,6 +21,9 @@ ms.collection:
2121

2222
This article describes the interaction between Microsoft Defender Core Service and the Experimentation and Configuration Service (ECS). Microsoft Defender Core Service is a part of Microsoft Defender Antivirus and communicates with ECS to request and receive different kinds of payloads. These payloads include configurations, feature rollouts, and experiments.
2323

24+
> [!CAUTION]
25+
> If you disable communications with the service, this will affect Microsoft's ability to respond to a severe bug in a timely manner.
26+
2427
> [!IMPORTANT]
2528
> Make sure clients can access the following URLs so payloads can be received:
2629
>
@@ -31,27 +34,25 @@ This article describes the interaction between Microsoft Defender Core Service a
3134
>
3235
>Enterprise U.S. Government customers should allow the following URLs:
3336
> - `*.events.data.microsoft.com`
34-
> - `*.endpoint.security.microsoft.us (GCC-H & DoD)`
35-
> - `*.gccmod.ecs.office.com (GCC-M) *.config.ecs.gov.teams.microsoft.us (GCC-H)`
36-
> - `*.config.ecs.dod.teams.microsoft.us (DoD)`
37+
> - `*.endpoint.security.microsoft.us (GCC-H & DoD)`
38+
> - `*.gccmod.ecs.office.com (GCC-M)`
39+
>- `*.config.ecs.gov.teams.microsoft.us (GCC-H)`
40+
> - `*.config.ecs.dod.teams.microsoft.us (DoD)`
3741
3842
> [!NOTE]
39-
> This applies to Microsoft Defender Antivirus platform update version [4.18.24030](microsoft-defender-antivirus-updates.md) or later.
43+
> The information in this article applies to Microsoft Defender Antivirus platform update version [4.18.24030](microsoft-defender-antivirus-updates.md) or later.
4044
4145
## Configurations
4246

4347
Configurations are the payload meant to ensure product health, security, and privacy compliance, and are intended to have the same value for all the users (based on platforms and channels.) This could be to enable a feature flag for a domain action, and can also be used to disable a feature flag in the event of a bug.
4448

45-
## Controlled Feature Rollout
49+
## Controlled feature rollout
4650

47-
Controlled Feature Rollout (CFR) is a procedure for slowly increasing the size of the user group that receives a feature. By distributing a new feature to a randomly selected subset of the user population, it's possible to compare user feedback to an equally sized control group without the feature to measure the impact of the feature.
51+
Controlled feature rollout (CFR) is a procedure for slowly increasing the size of the user group that receives a feature. By distributing a new feature to a randomly selected subset of the user population, it's possible to compare user feedback to an equally sized control group without the feature to measure the impact of the feature.
4852

4953
## Experiments
5054

51-
Microsoft Defender Core Service builds have features and functionality that are still in development or are experimental. Experiments are like CFR, but the size of the user group is much smaller for testing the new concept. These features are hidden by default until the feature's rolled out or the experiment's finished. Experiment flags are used to enable and disable these features.
52-
53-
> [!CAUTION]
54-
> If you disable communications with the service, this will affect Microsoft's ability to respond to a severe bug in a timely manner.
55+
Currently, Microsoft Defender Core service doesn't do any experimental testing. Development is carried out via the [Gradual Rollout process](/defender-endpoint/manage-gradual-rollout#microsoft-gradual-rollout-model). If this changes, an announcement will be posted in the [Message Center](/microsoft-365/admin/manage/message-center).
5556

5657
## See also
5758

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141
- [What's new in Microsoft Defender for Office 365](/defender-office-365/defender-for-office-365-whats-new)
4242
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4343
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
44+
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4445

4546
For more information on Microsoft Defender for Endpoint on specific operating systems:
4647

defender-for-iot/microsoft-defender-iot.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,16 @@ In this article, you learn how Microsoft Defender customers can extend their pro
1818

1919
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
2020

21-
## What are the different flavors for Microsoft Defender for IoT?
21+
## What are the different management portals for Microsoft Defender for IoT?
2222

23-
You can work with these different flavors of Defender for IoT:
23+
You can work with these different management portals:
2424

25-
|Flavor|Details|Next steps|
25+
|Portal|Details|Next steps|
2626
|---|---|---|
27-
|Defender for IoT in the Defender portal (Preview)|Microsoft Defender customers can use this flavor for a unified IT/OT experience, extending Defender XDR protection to OT environments. [Learn about the main use cases](#what-are-the-main-defender-for-iot-use-cases).|[Get started](get-started.md) with Defender for IoT in the Defender portal.|
28-
|Defender for IoT in the classic, Azure portal|All customers can use this flavor to identify OT devices, vulnerabilities, and threats in the Azure portal.|See the [Defender for IoT on Azure overview](/azure/defender-for-iot/organizations/overview).|
29-
|Protection for enterprise IoT devices|Microsoft Defender customers can enable protection for enterprise IoT devices, like printers, smart TVs, and conferencing systems and purpose-built, proprietary devices.|[Get started](/azure/defender-for-iot/organizations/eiot-sensor) with enterprise IoT monitoring.|
27+
|Defender for IoT in the Defender portal (Preview)|Microsoft Defender customers can use this portal for a unified IT/OT experience, extending Defender XDR protection to OT environments. [Learn about the main use cases](#what-are-the-main-defender-for-iot-use-cases).|[Get started](get-started.md) with Defender for IoT in the Defender portal.|
28+
|Defender for IoT in the classic, Azure portal|All customers can use this portal to identify OT devices, vulnerabilities, and threats in the Azure portal.|See the [Defender for IoT on Azure overview](/azure/defender-for-iot/organizations/overview).|
29+
30+
Protection for enterprise IoT devices is available for Microsoft Defender customers. These customers can enable protection for enterprise IoT devices, like printers, smart TVs, and conferencing systems and purpose-built, proprietary devices. [Get started](/azure/defender-for-iot/organizations/eiot-sensor) with enterprise IoT monitoring.
3031

3132
## Who uses Defender for IoT?
3233

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141

4242
## July 2024
4343

44-
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, and if the entity isn't submitted again, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
44+
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
4545

4646
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
4747

defender-office-365/safe-attachments-policies-configure.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email.
1919
ms.custom: seo-marvel-apr2020
2020
ms.service: defender-office-365
21-
ms.date: 4/26/2024
21+
ms.date: 07/22/2024
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -511,6 +511,4 @@ To verify that you've successfully created, modified, or removed Safe Attachment
511511
Get-SafeAttachmentRule -Identity "<Name>" | Format-List
512512
```
513513

514-
- Add the URL `http://spamlink.contoso.com` to a file (for example, a Word document), and attach that file in an email message to test Safe Attachments protection. This URL is similar to the GTUBE text string for testing anti-spam solutions. This URL isn't harmful, but when it's included in an email attachment, it triggers a Safe Attachments protection response.
515-
516514
- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).

0 commit comments

Comments
 (0)