Skip to content

Commit 411bf60

Browse files
Merge pull request #2707 from MicrosoftDocs/main
Publish main to live, 02/10/25, 3:30 PM PT
2 parents 96e3e78 + 167c5c7 commit 411bf60

14 files changed

+356
-274
lines changed

defender-endpoint/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -259,16 +259,18 @@
259259
items:
260260
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
261261
href: mde-linux-arm.md
262-
- name: Puppet based deployment
263-
href: linux-install-with-puppet.md
262+
- name: Installer script
263+
href: linux-installer-script.md
264264
- name: Ansible based deployment
265265
href: linux-install-with-ansible.md
266266
- name: Chef based deployment
267267
href: linux-deploy-defender-for-endpoint-with-chef.md
268-
- name: Manual deployment
269-
href: linux-install-manually.md
268+
- name: Puppet based deployment
269+
href: linux-install-with-puppet.md
270270
- name: Saltstack-based deployment
271271
href: linux-install-with-saltack.md
272+
- name: Manual deployment
273+
href: linux-install-manually.md
272274
- name: Advanced deployment for Defender for Endpoint on Linux
273275
href: comprehensive-guidance-on-linux-deployment.md
274276
- name: Deployment guidance for Defender for Endpoint on Linux for SAP

defender-endpoint/configure-updates.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 01/12/2024
18+
ms.date: 02/10/2025
1919
---
2020

2121
# Create a custom gradual rollout process for Microsoft Defender updates
@@ -49,19 +49,17 @@ The following table lists the available group policy settings for configuring up
4949
## Group Policy
5050

5151
> [!NOTE]
52-
> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
52+
> An updated Defender ADMX template is published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
5353
54-
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
55-
56-
In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
54+
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints. In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
5755

5856
1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
5957

6058
2. Using the Group Policy Management Editor go to **Computer configuration**.
6159

6260
3. Select **Administrative templates**.
6361

64-
4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
62+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
6563

6664
5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
6765

@@ -88,15 +86,22 @@ Set-MpPreference
8886
-DisableGradualRelease 1|0
8987
-DefinitionUpdatesChannel Staged|Broad|NotConfigured
9088
```
91-
9289
Example:
9390

9491
Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
9592

9693
For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
9794

95+
## Registry
96+
97+
These settings can be confirmed in the registry under `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`:
98+
99+
- `EngineRing`
100+
- `PlatformRing`
101+
- `SignaturesRing`
102+
98103
> [!NOTE]
99-
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
104+
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts).
100105
101106
> [!TIP]
102107
> If you're looking for Antivirus related information for other platforms, see:

defender-endpoint/enable-exploit-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier3
1616
- mde-asr
17-
ms.date: 11/15/2024
17+
ms.date: 02/10/2025
1818
search.appverid: met150
1919
---
2020

@@ -48,7 +48,7 @@ This section includes recommendations for you to be successful with deploying ex
4848
- Use safe deployment practices.
4949

5050
> [!WARNING]
51-
> If you do not test and do not go thru safe deployment practices, you could contribute to end-user productivity outages.
51+
> If you do not test and do not go through safe deployment practices, you could contribute to end-user productivity outages.
5252
5353
### Safe deployment practices
5454

defender-endpoint/ios-configure-features.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -317,9 +317,11 @@ Follow the steps below to create a compliance policy against jailbroken devices.
317317
Defender for Endpoint on iOS enables admins to configure custom indicators on iOS devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
318318

319319
> [!NOTE]
320-
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321-
>
322-
> For iOS, no alerts are generated on Microsoft Defender XDR when the URL or domain set in the indicator is accessed.
320+
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321+
>
322+
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
323+
>
324+
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
323325
324326
## Configure vulnerability assessment of apps
325327

0 commit comments

Comments
 (0)