Skip to content

Commit 3634ff0

Browse files
authored
Merge pull request #1601 from MicrosoftDocs/main
Publish main to live, Tuesday 10:30 PM PST, 10/15
2 parents 1fe3467 + 3b515e8 commit 3634ff0

File tree

3 files changed

+19
-18
lines changed

3 files changed

+19
-18
lines changed

defender-endpoint/android-intune.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 07/25/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -284,7 +284,10 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
284284

285285
> [!div class="mx-imgBorder"]
286286
> ![Screenshot showing a low touch onboarding configuration policy.](media/low-touch-user-upn.png)
287-
287+
288+
> [!Note]
289+
> Once the policy is created, these value types will show as string.
290+
288291
8. Assign the policy to the target user group.
289292

290293
9. Review and create the policy.

defender-endpoint/linux-install-manually.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/11/2024
18+
ms.date: 10/15/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -94,48 +94,46 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
9494

9595
- Install `yum-utils` if it isn't installed yet:
9696

97-
```bash
97+
```bash
9898
sudo yum install yum-utils
9999
```
100100

101-
> [!NOTE]
101+
> [!NOTE]
102102
> Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/rhel/`.
103103
104-
Use the following table to help guide you in locating the package:
104+
Use the following table to help guide you in locating the package:
105105

106106
|Distro & version|Package|
107107
|---|---|
108108
|For Alma 8.4 and higher|<https://packages.microsoft.com/config/alma/8/prod.repo>|
109109
|For Alma 9.2 and higher|<https://packages.microsoft.com/config/alma/9/prod.repo>|
110110
|For RHEL/Centos/Oracle 9.0-9.8|<https://packages.microsoft.com/config/rhel/9/prod.repo>|
111-
|For RHEL/Centos/Oracle 8.0-8.9|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
111+
|For RHEL/Centos/Oracle 8.0-8.10|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
112112
|For RHEL/Centos/Oracle 7.2-7.9 & Amazon Linux 2 |<https://packages.microsoft.com/config/rhel/7.2/prod.repo>|
113113
|For Amazon Linux 2023 |<https://packages.microsoft.com/config/amazonlinux/2023/prod.repo>|
114114
|For Fedora 33|<https://packages.microsoft.com/config/fedora/33/prod.repo>|
115115
|For Fedora 34|<https://packages.microsoft.com/config/fedora/34/prod.repo>|
116116
|For Rocky 8.7 and higher|<https://packages.microsoft.com/config/rocky/8/prod.repo>|
117117
|For Rocky 9.2 and higher|<https://packages.microsoft.com/config/rocky/9/prod.repo>|
118+
119+
In the following commands, replace *[version]* and *[channel]* with the information you've identified:
118120

119-
<!--|For RHEL/Centos 6.7-6.10|<https://packages.microsoft.com/config/rhel/6/[channel].repo>|-->
120-
121-
In the following commands, replace *[version]* and *[channel]* with the information you've identified:
122-
123-
```bash
121+
```bash
124122
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/[version]/[channel].repo
125123
```
126124

127-
> [!TIP]
125+
> [!TIP]
128126
> Use hostnamectl command to identify system related information including release *[version]*.
129127
130-
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
128+
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
131129

132-
```bash
130+
```bash
133131
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
134132
```
135133

136-
Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
134+
Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
137135

138-
```bash
136+
```bash
139137
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/insiders-fast.repo
140138
```
141139

defender-office-365/message-headers-eop-mdo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The individual fields and values are described in the following table.
5656
|Field|Description|
5757
|---|---|
5858
|`ARC`|The `ARC` protocol has the following fields: <ul><li>`AAR`: Records the content of the **Authentication-results** header from DMARC.</li><li>`AMS`: Includes cryptographic signatures of the message.</li><li>`AS`: Includes cryptographic signatures of the message headers. This field contains a tag of a chain validation called `"cv="`, which includes the outcome of the chain validation as **none**, **pass**, or **fail**.</li></ul>|
59-
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
59+
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BIMP`: Brand impersonation<sup>\*</sup></li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`BIMP`: Brand impersonation</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
6060
|`CIP:[IP address]`|The connecting IP address. You can use this IP address in the IP Allow List or the IP Block List. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).|
6161
|`CTRY`|The source country/region as determined by the connecting IP address, which might not be the same as the originating sending IP address.|
6262
|`DIR`|The Directionality of the message: <ul><li>`INB`: Inbound message.</li><li>`OUT`: Outbound message.</li><li>`INT`: Internal message.</li></ul>|

0 commit comments

Comments
 (0)