Skip to content

Commit 335e86d

Browse files
authored
Merge branch 'main' into docs-editor/mac-install-with-intune-1726076927
2 parents 7a50f07 + cbe6892 commit 335e86d

13 files changed

+119
-71
lines changed

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: siosulli
77
manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
10-
ms.date: 06/25/2024
10+
ms.date: 09/10/2024
1111
ms.collection:
1212
- m365-security
1313
- tier2
@@ -49,7 +49,7 @@ This playbook is a simple guide to help you make the most of your free trial. Us
4949
<a href="microsoft-defender-endpoint.md#apis"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
5050
</tr>
5151
<tr>
52-
<td colspan="7"><a href="microsoft-defender-endpoint.md#mtp"><center><b>Microsoft Defender XDR</a></center></b></td>
52+
<td colspan="7"><a href="microsoft-defender-endpoint.md#mtp"><center><b>Microsoft Defender portal</a></center></b></td>
5353
</tr>
5454
</table>
5555
<br>
@@ -63,7 +63,7 @@ This playbook is a simple guide to help you make the most of your free trial. Us
6363
3. [Visit the Microsoft Defender portal](#step-3-visit-the-microsoft-365-defender-portal).
6464
4. [Onboard endpoints using any of the supported management tools](#step-4-onboard-endpoints-using-any-of-the-supported-management-tools).
6565
5. [Configure capabilities](#step-5-configure-capabilities).
66-
6. [Set up the Microsoft Defender for Endpoint evaluation lab](#step-6-set-up-the-microsoft-defender-for-endpoint-evaluation-lab).
66+
6. [Visit the Microsoft Defender portal](#step-6-visit-the-microsoft-defender-portal).
6767

6868
## Step 1: Confirm your license state
6969

@@ -109,14 +109,13 @@ This section outlines the general steps you to onboard devices (endpoints).
109109

110110
After onboarding devices (endpoints), you'll configure the various capabilities, such as endpoint detection and response, next-generation protection, and attack surface reduction.
111111

112-
Use [this table](onboarding.md) to choose components to configure. We recommend configuring all available capabilities, but you're able to skip the ones that don't apply.
112+
Use [the device onboarding table](onboarding.md) to choose components to configure. We recommend configuring all available capabilities, but you're able to skip the ones that don't apply.
113113

114-
## Step 6: Set up the Microsoft Defender for Endpoint evaluation lab
114+
After you have onboarded devices, [run a detection test](run-detection-test.md).
115115

116-
The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action. Using the simplified set-up experience in evaluation lab, you can focus on running your own test scenarios and the pre-made simulations to see how Defender for Endpoint performs.
116+
## Step 6: Visit the Microsoft Defender portal
117117

118-
- [Watch the video overview](https://www.microsoft.com/videoplayer/embed/RE4qLUM) of the evaluation lab
119-
- [Get started with the lab](evaluate-microsoft-defender-antivirus.md)
118+
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is a central location where you can view onboarded devices, security recommendations, detected threats, alerts, and more. To get started, see [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal).
120119

121120

122121
## See also
Lines changed: 29 additions & 0 deletions
Loading
6.07 KB
Loading

defender-endpoint/partner-applications.md

Lines changed: 49 additions & 49 deletions
Large diffs are not rendered by default.

defender-office-365/quarantine-admin-manage-messages-files.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
2020
ms.service: defender-office-365
21-
ms.date: 08/30/2024
21+
ms.date: 09/11/2024
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -106,6 +106,10 @@ You can sort the entries by clicking on an available column header. Select :::im
106106
- **None**
107107
- **Message sender is blocked by recipient settings**
108108
- **Message sender is blocked by administrator settings**
109+
110+
> [!TIP]
111+
> If a sender is blocked and **Don't show blocked senders** is selected (default), messages from those senders are shown on the **Quarantine** page and are included in quarantine notifications when the **Sender address override reason** value is **None**. This behavior occurs because the messages were blocked due to reasons other than sender address overrides.
112+
109113
- **Released by**<sup>\*</sup>
110114
- **Message ID**
111115
- **Policy name**
@@ -149,6 +153,10 @@ To filter the entries, select :::image type="icon" source="media/m365-cc-sc-filt
149153
- **Blocked sender**: One of the following values:
150154
- **Don't show blocked senders** (default)
151155
- **Show all senders**
156+
157+
> [!TIP]
158+
> If a sender is blocked and **Don't show blocked senders** is selected, messages from those senders are shown on the **Quarantine** page and are included in quarantine notifications when the **Sender address override reason** value is **None**. This behavior occurs because the messages were blocked due to reasons other than sender address overrides.
159+
152160
- **Release status**: Select one or more of the following values
153161
- **Needs review**
154162
- **Approved**

defender-office-365/quarantine-end-user.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.custom:
2020
description: Users can learn how to view and manage quarantined messages in Exchange Online Protection (EOP) that should have been delivered to them.
2121
ms.service: defender-office-365
2222
adobe-target: true
23-
ms.date: 08/30/2024
23+
ms.date: 09/11/2024
2424
appliesto:
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2626
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -97,6 +97,10 @@ You can sort the entries by clicking on an available column header. Select :::im
9797
- **None**
9898
- **Message sender is blocked by recipient settings**
9999
- **Message sender is blocked by administrator settings**
100+
101+
> [!TIP]
102+
> If a sender is blocked and **Don't show blocked senders** is selected (default), messages from those senders are shown on the **Quarantine** page and are included in quarantine notifications when the **Sender address override reason** value is **None**. This behavior occurs because the messages were blocked due to reasons other than sender address overrides.
103+
100104
- **Released by**<sup>\*</sup>
101105
- **Message ID**
102106
- **Policy name**
@@ -130,6 +134,10 @@ To filter the entries, select :::image type="icon" source="media/m365-cc-sc-filt
130134
- **Blocked sender**: One of the following values:
131135
- **Don't show blocked senders** (default)
132136
- **Show all senders**
137+
138+
> [!TIP]
139+
> If a sender is blocked and **Don't show blocked senders** is selected, messages from those senders are shown on the **Quarantine** page and are included in quarantine notifications when the **Sender address override reason** value is **None**. This behavior occurs because the messages were blocked due to reasons other than sender address overrides.
140+
133141
- **Release status**: Any of the following values:
134142
- **Needs review**
135143
- **Approved**

defender-office-365/quarantine-faq.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.author: chrisda
77
author: chrisda
88
manager: deniseb
9-
ms.date: 08/07/2024
9+
ms.date: 09/11/2024
1010
audience: ITPro
1111
ms.topic: faq
1212

@@ -118,6 +118,9 @@ sections:
118118
119119
By default, messages from blocked senders are hidden from view in quarantine (quarantine is filtered by **Don't show blocked senders**). To see messages from all senders, select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** and then select **Show all senders**.
120120
121+
> [!TIP]
122+
> If a sender is blocked and **Don't show blocked senders** is selected (default), messages from those senders are shown on the **Quarantine** page and are included in quarantine notifications when the **Sender address override reason** value is **None**. This behavior occurs because the messages were blocked due to reasons other than sender address overrides.
123+
121124
- question: |
122125
A message was released from quarantine, but the original recipient can't find it. How can I determine what happened to the message?
123126
answer: |

defender-office-365/secure-by-default.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 07/31/2024
8+
ms.date: 09/12/2024
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.localizationpriority: medium
@@ -79,4 +79,5 @@ You should only consider using overrides in the following scenarios:
7979
- [Exchange mail flow rules to bypass spam filtering](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
8080
- Senders identified in the [Safe Senders list](configure-junk-email-settings-on-exo-mailboxes.md) in user mailboxes.
8181
- [Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list).
82+
- Senders identified in the [allowed senders list and allowed domains list in anti-spam policies](anti-spam-protection-about.md#allow-and-block-lists-in-anti-spam-policies).
8283
- False positives: To temporarily allow certain messages that are still being blocked by Microsoft, use [admin submissions](submissions-admin.md#report-good-email-to-microsoft). By default, allow entries for domains and email addresses, files, and URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). By default, allow entries for spoofed senders never expire.

defender-xdr/access-den-graph-api.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15-
- essentials-overview
1615
ms.topic: conceptual
1716
search.appverid: met150
1817
ms.date: 08/14/2024

defender-xdr/auditing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15-
- essentials-compliance
15+
- essentials-manage
1616
ms.topic: conceptual
1717
search.appverid: met150
1818
ms.date: 05/29/2023

0 commit comments

Comments
 (0)