You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Due to product constrains, the device profile does not consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
53
+
> Due to product constrains, the device profile doesn't consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
54
54
> For example, the 'Last seen' value in the Device page may show an older time frame even though more recent alerts or data is available in the machine's timeline.
55
55
56
56
## Device details
@@ -152,16 +152,25 @@ To further inspect the event and related events, you can quickly run an [advance
152
152
153
153
**Security recommendations** are generated from Microsoft Defender for Endpoint's [Vulnerability Management](/defender-vulnerability-management/tvm-dashboard-insights) capability. Selecting a recommendation shows a panel where you can view relevant details such as description of the recommendation and the potential risks associated with not enacting it. See [Security recommendation](api/ti-indicator.md) for details.
154
154
155
+
### Configuration management - Security policies
155
156
157
+
The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
156
158
159
+
:::image type="content" source="media/mde-security-policies.png" alt-text="Image showing the Security policies tab" lightbox="media/mde-security-policies.png":::
157
160
158
-
### Security policies
161
+
### Configuration management - Effective settings
159
162
160
-
The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
163
+
The **Effective settings** tab provides visibility into the actual value of each security setting and identifies the source that configured it. It lists setting names, policy types, effective values, the source of each effective value, and the last report time.
161
164
165
+
Configuration sources can include tools like Microsoft Defender for Endpoint, Group Policy, Intune, or default settings. They can also be specific registry paths, such as the MDM or Group Policy hives. If the source is a registry location, the Configured By field shows as **Unknown** along with the registry path.
166
+
167
+
Select a setting to open a side panel with more details. You see the current value, any other configuration attempts that didn’t take effect, and—for complex settings like ASR rules or AV exclusions—a breakdown of all configured rules, their sources, and any exclusions.
168
+
169
+
[!NOTE] The presented settings are AV security settings, Attack Surface Reduction rules, and exclusions, for Windows platforms.
:::image type="content" source="media/mde-effective-settings.png" alt-text="Image showing the Effective settings tab" lightbox="media/mde-effective-settings.png":::
164
172
173
+
:::image type="content" source="media/mde-effective-settings-open.png" alt-text="Image showing the Effective settings value opened tab" lightbox="media/mde-effective-settings-open.png":::
0 commit comments