Skip to content

Commit 3ab20f5

Browse files
authored
Merge pull request #763 from MicrosoftDocs/deniseb-global-admin
deniseb global admin
2 parents 4ca40d6 + b535a95 commit 3ab20f5

File tree

1 file changed

+44
-75
lines changed

1 file changed

+44
-75
lines changed

defender-endpoint/advanced-features.md

Lines changed: 44 additions & 75 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 04/08/2024
17+
ms.date: 06/21/2024
1818
---
1919

2020
# Configure advanced features in Defender for Endpoint
@@ -32,7 +32,7 @@ Depending on the Microsoft security products that you use, some advanced feature
3232

3333
## Enable advanced features
3434

35-
1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
35+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in.
3636

3737
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features**.
3838

@@ -42,22 +42,6 @@ Depending on the Microsoft security products that you use, some advanced feature
4242

4343
Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations.
4444

45-
## Live response
46-
47-
Turn on this feature so that users with the appropriate permissions can start a live response session on devices.
48-
49-
For more information about role assignments, see [Create and manage roles](user-roles.md).
50-
51-
## Live response for servers
52-
53-
Turn on this feature so that users with the appropriate permissions can start a live response session on servers.
54-
55-
For more information about role assignments, see [Create and manage roles](user-roles.md).
56-
57-
## Live response unsigned script execution
58-
59-
Enabling this feature allows you to run unsigned scripts in a live response session.
60-
6145
## Restrict correlation to within scoped device groups
6246

6347
This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. By turning on this setting, an incident composed of alerts that cross-device groups will no longer be considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC will see several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
@@ -71,15 +55,11 @@ This configuration can be used for scenarios where local SOC operations would li
7155

7256
Endpoint detection and response (EDR) in block mode provides protection from malicious artifacts, even when Microsoft Defender Antivirus is running in passive mode. When turned on, EDR in block mode blocks malicious artifacts or behaviors that are detected on a device. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post breach.
7357

74-
## Autoresolve remediated alerts
75-
76-
For tenants created on or after Windows 10, version 1809, the automated investigation, and remediation capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
58+
## Automatically resolve alerts
7759

78-
> [!TIP]
79-
> For tenants created prior to that version, you'll need to manually turn this feature on from the [Advanced features](https://security.microsoft.com//preferences2/integration) page.
60+
Turn this setting on to automatically resolve alerts where no threats were found or where detected threats were remediated. If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
8061

8162
> [!NOTE]
82-
>
8363
> - The result of the auto-resolve action may influence the Device risk level calculation which is based on the active alerts found on a device.
8464
> - If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overwrite it.
8565
@@ -94,13 +74,13 @@ This feature enables you to block potentially malicious files in your network. B
9474

9575
To turn **Allow or block** files on:
9676

97-
1. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Allow or block file**.
77+
1. In the Microsoft Defender portal, in navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Allow or block file**.
9878

99-
1. Toggle the setting between **On** and **Off**.
79+
2. Toggle the setting between **On** and **Off**.
10080

10181
:::image type="content" source="/defender/media/alloworblockfile.png" alt-text="The Endpoints screen" lightbox="/defender/media/alloworblockfile.png":::
10282

103-
1. Select **Save preferences** at the bottom of the page.
83+
3. Select **Save preferences** at the bottom of the page.
10484

10585
After turning on this feature, you can [block files](respond-file-alerts.md#allow-or-block-file) via the **Add Indicator** tab on a file's profile page.
10686

@@ -145,59 +125,63 @@ Enabling the Skype for Business integration gives you the ability to communicate
145125
> [!NOTE]
146126
> When a device is being isolated from the network, there's a pop-up where you can choose to enable Outlook and Skype communications which allows communications to the user while they are disconnected from the network. This setting applies to Skype and Outlook communication when devices are in isolation mode.
147127
148-
## Office 365 Threat Intelligence connection
128+
## Microsoft Defender for Cloud Apps
149129

150-
> [!IMPORTANT]
151-
> This setting was used when Microsoft Defender for Office 365 and Microsoft Defender for Endpoint were in different portals previously. After the convergence of security experiences into a unified portal that is now called Microsoft Defender XDR, these settings are irrelevant and don't have any functionality associated with them. You can safely ignore the status of the control until it is removed from the portal.
130+
Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
131+
132+
> [!NOTE]
133+
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
134+
135+
## Web content filtering
136+
137+
Block access to websites containing unwanted content and track web activity across all domains. To specify the web content categories you want to block, create a [web content filtering policy](https://security.microsoft.com/preferences2/web_content_filtering_policy). Ensure you've network protection in block mode when deploying the [Microsoft Defender for Endpoint security baseline](https://devicemanagement.microsoft.com/#blade/Microsoft_Intune_Workflows/SecurityBaselineSummaryMenu/overview/templateType/2).
152138

153-
This feature is only available if you have an active subscription for Office 365 E5 or the Threat Intelligence add-on. For more information, see the [Office 365 E5 product page](https://www.microsoft.com/microsoft-365/enterprise/office-365-e5?activetab=pivot:overviewtab).
139+
## Unified audit log
154140

155-
This feature enables you to incorporate data from Microsoft Defender for Office 365 into Microsoft Defender XDR to conduct a comprehensive security investigation across Office 365 mailboxes and Windows devices.
141+
Search in Microsoft Purview enables your security and compliance team to view critical audit log event data to gain insight and investigate user activities. Whenever an audited activity is performed by a user or an admin, an audit record is generated and stored in the Microsoft 365 audit log for your organization. For more information, see the [Search the audit log](/purview/audit-search).
142+
143+
## Device discovery
144+
145+
Helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Using onboarded devices, you can find unmanaged devices in your network and assess vulnerabilities and risks. For more information, see [Device discovery](device-discovery.md).
156146

157147
> [!NOTE]
158-
> You'll need to have the appropriate license to enable this feature.
148+
> You can always apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
159149
160-
To receive contextual device integration in Office 365 Threat Intelligence, you'll need to enable the Defender for Endpoint settings in the Security & Compliance dashboard. For more information, see [Threat investigation and response](/defender-office-365/office-365-ti).
150+
## Download quarantined files
161151

162-
## Endpoint Attack Notifications
152+
Backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. The **Download file** button will always be available in the file page. This setting is turned on by default. [Learn more about requirements](respond-file-alerts.md#download-quarantined-files)
163153

164-
[Endpoint Attack Notifications](endpoint-attack-notifications.md) enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
154+
## Default to streamlined connectivity when onboarding devices in the Defender portal
165155

166-
For proactive hunting across the full scope of Microsoft Defender XDR, including threats that span email, collaboration, identity, cloud applications, and endpoints, [learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
156+
This setting will set the default onboarding package to [streamlined connectivity](configure-device-connectivity.md) for applicable operating systems. You still have the option to use the standard onboarding package within the onboarding page, but you must specifically select it in the drop-down.
167157

168-
## Microsoft Defender for Cloud Apps
169158

170-
Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
159+
## Live response
171160

172-
> [!NOTE]
173-
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
161+
Turn on this feature so that users with the appropriate permissions can start a live response session on devices.
174162

175-
### Enable the Microsoft Defender for Endpoint integration from the Microsoft Defender for Identity portal
163+
For more information about role assignments, see [Create and manage roles](user-roles.md).
176164

177-
To receive contextual device integration in Microsoft Defender for Identity, you'll also need to enable the feature in the Microsoft Defender for Identity portal.
165+
## Live response for servers
178166

179-
1. Sign in to the [Microsoft Defender for Identity portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role.
167+
Turn on this feature so that users with the appropriate permissions can start a live response session on servers.
180168

181-
2. Select **Create your instance**.
169+
For more information about role assignments, see [Create and manage roles](user-roles.md).
182170

183-
3. Toggle the Integration setting to **On** and select **Save**.
171+
## Live response unsigned script execution
184172

185-
After completing the integration steps on both portals, you'll be able to see relevant alerts in the device details or user details page.
173+
Enabling this feature allows you to run unsigned scripts in a live response session.
186174

187-
## Web content filtering
175+
## Deception
188176

189-
Block access to websites containing unwanted content and track web activity across all domains. To specify the web content categories you want to block, create a [web content filtering policy](https://security.microsoft.com/preferences2/web_content_filtering_policy). Ensure you've network protection in block mode when deploying the [Microsoft Defender for Endpoint security baseline](https://devicemanagement.microsoft.com/#blade/Microsoft_Intune_Workflows/SecurityBaselineSummaryMenu/overview/templateType/2).
177+
Deception enables your security team to manage and deploy lures and decoys to catch attackers in your environment. After you turn this on, go to Rules > Deception rules to run deception campaigns. See [Manage the deception capability in Microsoft Defender XDR](/defender-xdr/deception-overview).
190178

191-
## Share endpoint alerts with Microsoft Purview compliance portal
179+
## Share endpoint alerts with Microsoft Compliance Center
192180

193181
Forwards endpoint security alerts and their triage status to Microsoft Purview compliance portal, allowing you to enhance insider risk management policies with alerts and remediate internal risks before they cause harm. Forwarded data is processed and stored in the same location as your Office 365 data.
194182

195183
After configuring the [Security policy violation indicators](/microsoft-365/compliance/insider-risk-management-settings#indicators) in the insider risk management settings, Defender for Endpoint alerts will be shared with insider risk management for applicable users.
196184

197-
## Authenticated telemetry
198-
199-
You can **Turn on** Authenticated telemetry to prevent spoofing telemetry into your dashboard.
200-
201185
## Microsoft Intune connection
202186

203187
Defender for Endpoint can be integrated with [Microsoft Intune](/intune/what-is-intune) to [enable device risk-based conditional access](/intune/advanced-threat-protection). When you [turn on this feature](configure-conditional-access.md), you'll be able to share Defender for Endpoint device information with Intune, enhancing policy enforcement.
@@ -210,19 +194,9 @@ This feature is only available if you've the following prerequisites:
210194
- A licensed tenant for Enterprise Mobility + Security E3, and Windows E5 (or Microsoft 365 Enterprise E5)
211195
- An active Microsoft Intune environment, with Intune-managed Windows devices [Microsoft Entra joined](/azure/active-directory/devices/concept-azure-ad-join/).
212196

213-
### Conditional Access policy
214-
215-
When you enable Intune integration, Intune will automatically create a classic Conditional Access (CA) policy. This classic CA policy is a prerequisite for setting up status reports to Intune. It shouldn't be deleted.
216-
217-
> [!NOTE]
218-
> The classic CA policy created by Intune is distinct from modern [Conditional Access policies](/azure/active-directory/conditional-access/overview/), which are used for configuring endpoints.
219-
220-
## Device discovery
221-
222-
Helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Using onboarded devices, you can find unmanaged devices in your network and assess vulnerabilities and risks. For more information, see [Device discovery](device-discovery.md).
197+
## Authenticated telemetry
223198

224-
> [!NOTE]
225-
> You can always apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
199+
You can **Turn on** Authenticated telemetry to prevent spoofing telemetry into your dashboard.
226200

227201
## Preview features
228202

@@ -234,20 +208,15 @@ If you already have preview features turned on, manage your settings from the ma
234208

235209
For more information, see [Microsoft Defender XDR preview features](/defender-xdr/preview)
236210

237-
## Download quarantined files
238-
239-
Backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. The **Download file** button will always be available in the file page. This setting is turned on by default. [Learn more about requirements](respond-file-alerts.md#download-quarantined-files)
240-
241-
242-
## Streamlined connectivity during device onboarding (Preview)
243-
244-
This setting will set the default onboarding package to 'streamlined' for applicable operating systems.
211+
## Endpoint Attack Notifications
245212

246-
You will still have the option to use the standard onboarding package within the onboarding page but you will need to specifically select it in the drop-down.
213+
[Endpoint Attack Notifications](endpoint-attack-notifications.md) enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
247214

215+
For proactive hunting across the full scope of Microsoft Defender XDR, including threats that span email, collaboration, identity, cloud applications, and endpoints, [learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
248216

249217
## Related topics
250218

251219
- [Update data retention settings](preferences-setup.md)
252220
- [Configure alert notifications](/defender-xdr/configure-email-notifications)
221+
253222
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)