Skip to content

Commit 44b6321

Browse files
authored
Merge branch 'main' into docs-editor/advanced-hunting-devicetvmsecu-1732134293
2 parents 151fbfb + 0f3a93e commit 44b6321

13 files changed

+196
-185
lines changed

ATPDocs/deploy/test-connectivity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ After preparing the server that you're going to use for your Microsoft Defender
1414

1515
For more information, see [Required ports](../prerequisites.md#ports).
1616

17+
> [!NOTE]
18+
> To get the name and other important details about your Defender for Identity workspace, see the [About page](../settings-about.md) in the [Microsoft Defender XDR](https://security.microsoft.com/) portal.
19+
1720
## Test connectivity using a browser
1821

1922
1. Open a browser. If you're using a proxy, make sure that your browser uses the same proxy settings being used by the sensor.

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
3232
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
3333

34-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
3535

3636
|Customer provisioning location |Data storage location |
3737
|---------|---------|
@@ -65,7 +65,7 @@ Defender for Cloud Apps shares data, including customer data, among the followin
6565
- Microsoft Defender for Cloud
6666
- Microsoft Sentinel
6767
- Microsoft Defender for Endpoint
68-
- Microsoft Security Exposure Management (Preview)
68+
- Microsoft Security Exposure Management
6969
- Microsoft Purview
7070
- Microsoft Entra ID Protection
7171

defender-endpoint/api/get-assessment-secure-config.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 06/04/2021
18+
ms.date: 01/06/2025
1919
---
2020

2121
# Export secure configuration assessment per device
@@ -245,18 +245,18 @@ GET /api/machines/SecureConfigurationsAssessmentExport
245245
### 2.5 Properties
246246

247247
> [!NOTE]
248-
>
249-
> - The files are gzip compressed & in multiline Json format.
250-
> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
248+
> - The files are GZIP compressed & in multiline JSON format.
249+
> - The download URLs are only valid for 1 hour; otherwise you can use the parameter.
251250
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.
252251
252+
253253
<br>
254254

255255
****
256256

257257
Property (ID)|Data type|Description|Example of a returned value
258258
---|---|---|---
259-
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
259+
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
260260
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
261261
|
262262

defender-endpoint/indicator-ip-domain.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice:
1717
search.appverid: met150
18-
ms.date: 12/11/2024
18+
ms.date: 01/03/2025
1919
---
2020

2121
# Create indicators for IPs and URLs/domains
@@ -32,7 +32,7 @@ ms.date: 12/11/2024
3232
3333
## Overview
3434

35-
By creating indicators for IPs and URLs or domains, you can now allow or block IPs, URLs, or domains based on your own threat intelligence. You can also warn users with a prompt if they open a risky app. The prompt won't stop them from using the app but you can provide a custom message and links to a company page that describes appropriate usage of the app. Users can still bypass the warning and continue to use the app if they need.
35+
By creating indicators for IPs and URLs or domains, you can now allow or block IPs, URLs, or domains based on your own threat intelligence. You can also warn users if they open a risky app. The prompt doesn't stop them from using the app; users can bypass the warning and continue to use the app if needed.
3636

3737
To block malicious IPs/URLs (as determined by Microsoft), Defender for Endpoint can use:
3838

@@ -61,19 +61,19 @@ You can block malicious IPs/URLs through the settings page or by machine groups,
6161

6262
## Before you begin
6363

64-
It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains.
64+
It's important to understand the following prerequisites before creating indicators for IPS, URLs, or domains.
6565

6666
### Microsoft Defender Antivirus version requirements
6767

68-
- Your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows). Microsoft Defender Antivirus must be in active mode for non-Microsoft browsers. With Microsoft browsers, like Edge, Microsoft Defender Antivirus can be in active or passive mode.
68+
- Your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows). Microsoft Defender Antivirus must be in active mode for non-Microsoft browsers. With Microsoft browsers, like Microsoft Edge, Microsoft Defender Antivirus can be in active or passive mode.
6969

7070
- [Behavior Monitoring](/defender-endpoint/behavior-monitor) is enabled.
7171

7272
- [Cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus) is turned on.
7373

7474
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is turned on.
7575

76-
- The antimalware client version must be `4.18.1906.x` or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates).
76+
- The anti-malware client version must be `4.18.1906.x` or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates).
7777

7878
### Network Protection requirements
7979

@@ -89,23 +89,23 @@ For support of indicators on Android, see [Microsoft Defender for Endpoint on An
8989

9090
### IoC indicator list limitations
9191

92-
Only external IPs can be added to the indicator list. Indicators can't be created for internal IPs. For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge leverages [Network Protection](network-protection.md) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).
92+
Only external IPs can be added to the indicator list. Indicators can't be created for internal IPs. For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge uses [Network Protection](network-protection.md) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).
9393

9494
### Non Microsoft Edge and Internet Explorer processes
9595

96-
For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
96+
For processes other than Microsoft Edge and Internet Explorer, web protection scenarios use Network Protection for inspection and enforcement:
9797

9898
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
9999
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators
100-
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge)
101-
- Encrypted URLs (FQDN only) can be blocked in third party browsers (that is, other than Internet Explorer, Edge)
102-
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
100+
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer or Microsoft Edge)
101+
- Encrypted URLs (FQDN only) can be blocked in non-Microsoft browsers (that is, other than Internet Explorer or Microsoft Edge)
102+
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, can only be blocked on first party browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
103103
- Full URL path blocks can be applied for unencrypted URLs
104104
- If there are conflicting URL indicator policies, the longer path is applied. For example, the URL indicator policy `https://support.microsoft.com/office` takes precedence over the URL indicator policy `https://support.microsoft.com`.
105-
- In the case of URL indicator policy conflicts, the longer path may not be applied due to redirection. In such cases, register a non-redirected URL.
105+
- If URL indicator policy conflicts occur, the longer path might not be applied due to redirection. In such cases, register a non-redirected URL.
106106

107107
> [!NOTE]
108-
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
108+
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They can't enforce any enterprise web protection policies.
109109
110110
## Network protection and the TCP three-way handshake
111111

@@ -124,14 +124,14 @@ Here's an example of how that works:
124124
When using warn mode, you can configure the following controls:
125125

126126
- **Bypass ability**
127-
- Allow button in Edge
127+
- Allow button in Microsoft Edge
128128
- Allow button on toast (Non-Microsoft browsers)
129129
- Bypass duration parameter on the indicator
130130
- Bypass enforcement across Microsoft and Non-Microsoft browsers
131131

132132
- **Redirect URL**
133133
- Redirect URL parameter on the indicator
134-
- Redirect URL in Edge
134+
- Redirect URL in Microsoft Edge
135135
- Redirect URL on toast (Non-Microsoft browsers)
136136

137137
For more information, see [Govern apps discovered by Microsoft Defender for Endpoint](/cloud-app-security/mde-govern).
@@ -152,20 +152,20 @@ In the case where multiple different action types are set on the same indicator
152152

153153
### Defender for Cloud Apps Indicators
154154

155-
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators will be created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) will be created for the URLs associated with the application. Allow indicators cannot be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
155+
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators are created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) are created for the URLs associated with the application. Allow indicators can't be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
156156

157157
## Policy precedence
158158

159159
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to `Allow`, but Microsoft Defender Antivirus is set to `Block`, the policy defaults to `Allow`.
160160

161161
### Precedence for multiple active policies
162162

163-
Applying multiple different web content filtering policies to the same device will result in the more restrictive policy applying for each category. Consider the following scenario:
163+
Applying multiple different web content filtering policies to the same device result in the more restrictive policy applying for each category. Consider the following scenario:
164164

165165
- **Policy 1** blocks categories 1 and 2 and audits the rest
166166
- **Policy 2** blocks categories 3 and 4 and audits the rest
167167

168-
The result is that categories 1-4 are all blocked. This is illustrated in the following image.
168+
The result is that categories 1-4 are all blocked. This scenario is illustrated in the following image.
169169

170170
:::image type="content" source="media/web-content-filtering-policies-mode-precedence.png" alt-text="Diagram that shows the precedence of web content filtering policy block mode over audit mode.":::
171171

@@ -179,9 +179,9 @@ The result is that categories 1-4 are all blocked. This is illustrated in the fo
179179

180180
4. Specify the following details:
181181

182-
- Indicator - Specify the entity details and define the expiration of the indicator.
183-
- Action - Specify the action to be taken and provide a description.
184-
- Scope - Define the scope of the machine group.
182+
- **Indicator**: Specify the entity details and define the expiration of the indicator.
183+
- **Action**: Specify the action to be taken and provide a description.
184+
- **Scope**: Define the scope of the machine group.
185185

186186
5. Review the details in the **Summary** tab, then select **Save**.
187187

defender-endpoint/network-devices.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/02/2025
1818
---
1919

2020
# Network device discovery and vulnerability management
@@ -85,7 +85,6 @@ Your first step is to select a device that performs the authenticated network sc
8585

8686
8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
8787

88-
- login.windows.net
8988
- \*.security.microsoft.com
9089
- login.microsoftonline.com
9190
- \*.blob.core.windows.net/networkscannerstable/\*

0 commit comments

Comments
 (0)