Skip to content

Commit 40029c9

Browse files
committed
new feature
1 parent 803cc08 commit 40029c9

File tree

4 files changed

+14
-5
lines changed

4 files changed

+14
-5
lines changed

defender-endpoint/investigate-machines.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 03/26/2025
17+
ms.date: 05/28/2025
1818
---
1919

2020
# Investigate devices in the Microsoft Defender for Endpoint Devices list
@@ -50,7 +50,7 @@ When you investigate a specific device, you see:
5050
:::image type="content" source="media/specific-device.png" alt-text="The device view" lightbox="media/specific-device.png":::
5151

5252
> [!NOTE]
53-
> Due to product constrains, the device profile does not consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
53+
> Due to product constrains, the device profile doesn't consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
5454
> For example, the 'Last seen' value in the Device page may show an older time frame even though more recent alerts or data is available in the machine's timeline.
5555
5656
## Device details
@@ -152,16 +152,25 @@ To further inspect the event and related events, you can quickly run an [advance
152152

153153
**Security recommendations** are generated from Microsoft Defender for Endpoint's [Vulnerability Management](/defender-vulnerability-management/tvm-dashboard-insights) capability. Selecting a recommendation shows a panel where you can view relevant details such as description of the recommendation and the potential risks associated with not enacting it. See [Security recommendation](api/ti-indicator.md) for details.
154154

155+
### Configuration management - Security policies
155156

157+
The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
156158

159+
:::image type="content" source="media/mde-security-policies.png" alt-text="Image showing the Security policies tab" lightbox="media/mde-security-policies.png":::
157160

158-
### Security policies
161+
### Configuration management - Effective settings
159162

160-
The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
163+
The **Effective settings** tab provides visibility into the actual value of each security setting and identifies the source that configured it. It lists setting names, policy types, effective values, the source of each effective value, and the last report time.
161164

165+
Configuration sources can include tools like Microsoft Defender for Endpoint, Group Policy, Intune, or default settings. They can also be specific registry paths, such as the MDM or Group Policy hives. If the source is a registry location, the Configured By field shows as **Unknown** along with the registry path.
166+
167+
Select a setting to open a side panel with more details. You see the current value, any other configuration attempts that didn’t take effect, and—for complex settings like ASR rules or AV exclusions—a breakdown of all configured rules, their sources, and any exclusions.
168+
169+
[!NOTE] The presented settings are AV security settings, Attack Surface Reduction rules, and exclusions, for Windows platforms.
162170

163-
:::image type="content" source="media/security-policies-tab.png" alt-text="The Security policies tab" lightbox="media/security-policies-tab.png":::
171+
:::image type="content" source="media/mde-effective-settings.png" alt-text="Image showing the Effective settings tab" lightbox="media/mde-effective-settings.png":::
164172

173+
:::image type="content" source="media/mde-effective-settings-open.png" alt-text="Image showing the Effective settings value opened tab" lightbox="media/mde-effective-settings-open.png":::
165174

166175
### Software inventory
167176

453 KB
Loading
226 KB
Loading
170 KB
Loading

0 commit comments

Comments
 (0)