You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/advanced-features.md
+44-75Lines changed: 44 additions & 75 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: onboard
16
16
search.appverid: met150
17
-
ms.date: 04/08/2024
17
+
ms.date: 06/21/2024
18
18
---
19
19
20
20
# Configure advanced features in Defender for Endpoint
@@ -32,7 +32,7 @@ Depending on the Microsoft security products that you use, some advanced feature
32
32
33
33
## Enable advanced features
34
34
35
-
1.Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139)using an account with the Security administrator or Global administrator role assigned.
35
+
1.Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139)and sign in.
36
36
37
37
2. In the navigation pane, select **Settings**\>**Endpoints**\>**Advanced features**.
38
38
@@ -42,22 +42,6 @@ Depending on the Microsoft security products that you use, some advanced feature
42
42
43
43
Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations.
44
44
45
-
## Live response
46
-
47
-
Turn on this feature so that users with the appropriate permissions can start a live response session on devices.
48
-
49
-
For more information about role assignments, see [Create and manage roles](user-roles.md).
50
-
51
-
## Live response for servers
52
-
53
-
Turn on this feature so that users with the appropriate permissions can start a live response session on servers.
54
-
55
-
For more information about role assignments, see [Create and manage roles](user-roles.md).
56
-
57
-
## Live response unsigned script execution
58
-
59
-
Enabling this feature allows you to run unsigned scripts in a live response session.
60
-
61
45
## Restrict correlation to within scoped device groups
62
46
63
47
This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. By turning on this setting, an incident composed of alerts that cross-device groups will no longer be considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC will see several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
@@ -71,15 +55,11 @@ This configuration can be used for scenarios where local SOC operations would li
71
55
72
56
Endpoint detection and response (EDR) in block mode provides protection from malicious artifacts, even when Microsoft Defender Antivirus is running in passive mode. When turned on, EDR in block mode blocks malicious artifacts or behaviors that are detected on a device. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post breach.
73
57
74
-
## Autoresolve remediated alerts
75
-
76
-
For tenants created on or after Windows 10, version 1809, the automated investigation, and remediation capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
58
+
## Automatically resolve alerts
77
59
78
-
> [!TIP]
79
-
> For tenants created prior to that version, you'll need to manually turn this feature on from the [Advanced features](https://security.microsoft.com//preferences2/integration) page.
60
+
Turn this setting on to automatically resolve alerts where no threats were found or where detected threats were remediated. If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
80
61
81
62
> [!NOTE]
82
-
>
83
63
> - The result of the auto-resolve action may influence the Device risk level calculation which is based on the active alerts found on a device.
84
64
> - If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overwrite it.
85
65
@@ -94,13 +74,13 @@ This feature enables you to block potentially malicious files in your network. B
94
74
95
75
To turn **Allow or block** files on:
96
76
97
-
1. In the navigation pane, select **Settings**\>**Endpoints**\>**General**\>**Advanced features**\>**Allow or block file**.
77
+
1. In the Microsoft Defender portal, in navigation pane, select **Settings**\>**Endpoints**\>**General**\>**Advanced features**\>**Allow or block file**.
1. Select **Save preferences** at the bottom of the page.
83
+
3. Select **Save preferences** at the bottom of the page.
104
84
105
85
After turning on this feature, you can [block files](respond-file-alerts.md#allow-or-block-file) via the **Add Indicator** tab on a file's profile page.
106
86
@@ -145,59 +125,63 @@ Enabling the Skype for Business integration gives you the ability to communicate
145
125
> [!NOTE]
146
126
> When a device is being isolated from the network, there's a pop-up where you can choose to enable Outlook and Skype communications which allows communications to the user while they are disconnected from the network. This setting applies to Skype and Outlook communication when devices are in isolation mode.
147
127
148
-
## Office 365 Threat Intelligence connection
128
+
## Microsoft Defender for Cloud Apps
149
129
150
-
> [!IMPORTANT]
151
-
> This setting was used when Microsoft Defender for Office 365 and Microsoft Defender for Endpoint were in different portals previously. After the convergence of security experiences into a unified portal that is now called Microsoft Defender XDR, these settings are irrelevant and don't have any functionality associated with them. You can safely ignore the status of the control until it is removed from the portal.
130
+
Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
131
+
132
+
> [!NOTE]
133
+
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
134
+
135
+
## Web content filtering
136
+
137
+
Block access to websites containing unwanted content and track web activity across all domains. To specify the web content categories you want to block, create a [web content filtering policy](https://security.microsoft.com/preferences2/web_content_filtering_policy). Ensure you've network protection in block mode when deploying the [Microsoft Defender for Endpoint security baseline](https://devicemanagement.microsoft.com/#blade/Microsoft_Intune_Workflows/SecurityBaselineSummaryMenu/overview/templateType/2).
152
138
153
-
This feature is only available if you have an active subscription for Office 365 E5 or the Threat Intelligence add-on. For more information, see the [Office 365 E5 product page](https://www.microsoft.com/microsoft-365/enterprise/office-365-e5?activetab=pivot:overviewtab).
139
+
## Unified audit log
154
140
155
-
This feature enables you to incorporate data from Microsoft Defender for Office 365 into Microsoft Defender XDR to conduct a comprehensive security investigation across Office 365 mailboxes and Windows devices.
141
+
Search in Microsoft Purview enables your security and compliance team to view critical audit log event data to gain insight and investigate user activities. Whenever an audited activity is performed by a user or an admin, an audit record is generated and stored in the Microsoft 365 audit log for your organization. For more information, see the [Search the audit log](/purview/audit-search).
142
+
143
+
## Device discovery
144
+
145
+
Helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Using onboarded devices, you can find unmanaged devices in your network and assess vulnerabilities and risks. For more information, see [Device discovery](device-discovery.md).
156
146
157
147
> [!NOTE]
158
-
> You'll need to have the appropriate license to enable this feature.
148
+
> You can always apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
159
149
160
-
To receive contextual device integration in Office 365 Threat Intelligence, you'll need to enable the Defender for Endpoint settings in the Security & Compliance dashboard. For more information, see [Threat investigation and response](/defender-office-365/office-365-ti).
150
+
## Download quarantined files
161
151
162
-
## Endpoint Attack Notifications
152
+
Backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. The **Download file** button will always be available in the file page. This setting is turned on by default. [Learn more about requirements](respond-file-alerts.md#download-quarantined-files)
163
153
164
-
[Endpoint Attack Notifications](endpoint-attack-notifications.md) enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
154
+
## Default to streamlined connectivity when onboarding devices in the Defender portal
165
155
166
-
For proactive hunting across the full scope of Microsoft Defender XDR, including threats that span email, collaboration, identity, cloud applications, and endpoints, [learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
156
+
This setting will set the default onboarding package to [streamlined connectivity](configure-device-connectivity.md) for applicable operating systems. You still have the option to use the standard onboarding package within the onboarding page, but you must specifically select it in the drop-down.
167
157
168
-
## Microsoft Defender for Cloud Apps
169
158
170
-
Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
159
+
## Live response
171
160
172
-
> [!NOTE]
173
-
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
161
+
Turn on this feature so that users with the appropriate permissions can start a live response session on devices.
174
162
175
-
### Enable the Microsoft Defender for Endpoint integration from the Microsoft Defender for Identity portal
163
+
For more information about role assignments, see [Create and manage roles](user-roles.md).
176
164
177
-
To receive contextual device integration in Microsoft Defender for Identity, you'll also need to enable the feature in the Microsoft Defender for Identity portal.
165
+
## Live response for servers
178
166
179
-
1. Sign in to the [Microsoft Defender for Identity portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role.
167
+
Turn on this feature so that users with the appropriate permissions can start a live response session on servers.
180
168
181
-
2. Select **Create your instance**.
169
+
For more information about role assignments, see [Create and manage roles](user-roles.md).
182
170
183
-
3. Toggle the Integration setting to **On** and select **Save**.
171
+
## Live response unsigned script execution
184
172
185
-
After completing the integration steps on both portals, you'll be able to see relevant alerts in the device details or user details page.
173
+
Enabling this feature allows youto run unsigned scripts in a live response session.
186
174
187
-
## Web content filtering
175
+
## Deception
188
176
189
-
Block access to websites containing unwanted content and track web activity across all domains. To specify the web content categories you want to block, create a [web content filtering policy](https://security.microsoft.com/preferences2/web_content_filtering_policy). Ensure you've network protection in block mode when deploying the [Microsoft Defender for Endpoint security baseline](https://devicemanagement.microsoft.com/#blade/Microsoft_Intune_Workflows/SecurityBaselineSummaryMenu/overview/templateType/2).
177
+
Deception enables your security team to manage and deploy lures and decoys to catch attackers in your environment. After you turn this on, go to Rules > Deception rules to run deception campaigns. See [Manage the deception capability in Microsoft Defender XDR](/defender-xdr/deception-overview).
190
178
191
-
## Share endpoint alerts with Microsoft Purview compliance portal
179
+
## Share endpoint alerts with Microsoft Compliance Center
192
180
193
181
Forwards endpoint security alerts and their triage status to Microsoft Purview compliance portal, allowing you to enhance insider risk management policies with alerts and remediate internal risks before they cause harm. Forwarded data is processed and stored in the same location as your Office 365 data.
194
182
195
183
After configuring the [Security policy violation indicators](/microsoft-365/compliance/insider-risk-management-settings#indicators) in the insider risk management settings, Defender for Endpoint alerts will be shared with insider risk management for applicable users.
196
184
197
-
## Authenticated telemetry
198
-
199
-
You can **Turn on** Authenticated telemetry to prevent spoofing telemetry into your dashboard.
200
-
201
185
## Microsoft Intune connection
202
186
203
187
Defender for Endpoint can be integrated with [Microsoft Intune](/intune/what-is-intune) to [enable device risk-based conditional access](/intune/advanced-threat-protection). When you [turn on this feature](configure-conditional-access.md), you'll be able to share Defender for Endpoint device information with Intune, enhancing policy enforcement.
@@ -210,19 +194,9 @@ This feature is only available if you've the following prerequisites:
210
194
- A licensed tenant for Enterprise Mobility + Security E3, and Windows E5 (or Microsoft 365 Enterprise E5)
211
195
- An active Microsoft Intune environment, with Intune-managed Windows devices [Microsoft Entra joined](/azure/active-directory/devices/concept-azure-ad-join/).
212
196
213
-
### Conditional Access policy
214
-
215
-
When you enable Intune integration, Intune will automatically create a classic Conditional Access (CA) policy. This classic CA policy is a prerequisite for setting up status reports to Intune. It shouldn't be deleted.
216
-
217
-
> [!NOTE]
218
-
> The classic CA policy created by Intune is distinct from modern [Conditional Access policies](/azure/active-directory/conditional-access/overview/), which are used for configuring endpoints.
219
-
220
-
## Device discovery
221
-
222
-
Helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Using onboarded devices, you can find unmanaged devices in your network and assess vulnerabilities and risks. For more information, see [Device discovery](device-discovery.md).
197
+
## Authenticated telemetry
223
198
224
-
> [!NOTE]
225
-
> You can always apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
199
+
You can **Turn on** Authenticated telemetry to prevent spoofing telemetry into your dashboard.
226
200
227
201
## Preview features
228
202
@@ -234,20 +208,15 @@ If you already have preview features turned on, manage your settings from the ma
234
208
235
209
For more information, see [Microsoft Defender XDR preview features](/defender-xdr/preview)
236
210
237
-
## Download quarantined files
238
-
239
-
Backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. The **Download file** button will always be available in the file page. This setting is turned on by default. [Learn more about requirements](respond-file-alerts.md#download-quarantined-files)
240
-
241
-
242
-
## Streamlined connectivity during device onboarding (Preview)
243
-
244
-
This setting will set the default onboarding package to 'streamlined' for applicable operating systems.
211
+
## Endpoint Attack Notifications
245
212
246
-
You will still have the option to use the standard onboarding package within the onboarding page but you will need to specifically select it in the drop-down.
213
+
[Endpoint Attack Notifications](endpoint-attack-notifications.md) enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
247
214
215
+
For proactive hunting across the full scope of Microsoft Defender XDR, including threats that span email, collaboration, identity, cloud applications, and endpoints, [learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
248
216
249
217
## Related topics
250
218
251
219
-[Update data retention settings](preferences-setup.md)
0 commit comments