You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+14-9Lines changed: 14 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,12 +88,16 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
88
88
89
89
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
90
90
91
-
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
91
+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92
+
93
+
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
92
94
93
95
> [!NOTE]
94
96
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
95
97
96
-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
98
+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
99
+
100
+
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
97
101
98
102
## Onboarding Confirmation
99
103
@@ -104,7 +108,7 @@ To confirm the sensor has been onboarded:
104
108
2. Check that the onboarded domain controller is listed.
105
109
106
110
> [!NOTE]
107
-
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
111
+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
108
112
109
113
## Test activated capabilities
110
114
@@ -126,7 +130,6 @@ In the Defender portal, select **Identities** > **Dashboard**, and review the de
126
130
127
131
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
128
132
129
-
130
133
### Confirm entity page details
131
134
132
135
Confirm that entities, such as domain controllers, users, and groups, are populated as expected.
@@ -139,7 +142,7 @@ In the Defender portal, check for the following details:
139
142
140
143
-**Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
141
144
142
-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
145
+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
143
146
144
147
For more information, see [Investigate assets](../investigate-assets.md).
145
148
@@ -205,18 +208,20 @@ Test remediation actions on a test user. For example:
205
208
206
209
1. In the Defender portal, go to the user details page for a test user.
207
210
208
-
1. From the **Options** menu, select any of the available remediation actions.
211
+
2. From the **Options** menu, select any of the available remediation actions.
209
212
210
-
1. Check Active Directory for the expected activity.
213
+
3. Check Active Directory for the expected activity.
211
214
212
215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
213
216
214
217
## Deactivate Defender for Identity capabilities on your domain controller
215
218
216
219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
217
220
218
-
1. In the Defender portal, select **Settings > Identities > Sensors**.
219
-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
221
+
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
222
+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223
+
224
+
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
220
225
221
226
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
> Use Microsoft Defender Antivirus extensions sparingly. Make sure to review the information in [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
49
+
> Use Microsoft Defender Antivirus exclusions sparingly. Make sure to review the information in [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
50
50
> Variables, such as `%USERPROFILE%` aren't interpreted in exclusion settings. We recommend using an explicit path format
51
51
52
52
If you're using Microsoft Intune to manage Microsoft Defender Antivirus or Microsoft Defender for Endpoint, use the following procedures to define exclusions:
Copy file name to clipboardExpand all lines: defender-endpoint/migrate-devices-streamlined.md
+24-8Lines changed: 24 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- tier1
14
14
ms.topic: how-to
15
15
ms.subservice: onboard
16
-
ms.date: 05/09/2024
16
+
ms.date: 03/06/2025
17
17
---
18
18
19
19
# Migrate devices to use the streamlined connectivity method
@@ -31,12 +31,10 @@ This article describes how to migrate (reonboard) devices that had been previous
31
31
In most cases, full device offboarding isn't required when reonboarding. You can run the updated onboarding package and reboot your device to switch connectivity over. See the following information for details on individual operating systems.
32
32
33
33
> [!IMPORTANT]
34
-
> Limitations and known issues:
35
-
>
36
-
> - We found a back-end issue with populating the `ConnectivityType` column in the `DeviceInfo table` in advanced hunting so that you can track migration progress. We aim to resolve this issue as soon as possible.
37
-
> - For device migrations (reonboarding): Offboarding is not required to switch over to streamlined connectivity method. Once the updated onboarding package is run, a full device reboot is required for Windows devices and a service restart for macOS and Linux. For more information, see the details included in this article.
38
-
> - Windows 10 versions 1607, 1703, 1709, and 1803 do not support reonboarding. Offboard first and then onboard using the updated package. These versions also require a longer URL list.
39
-
> - Devices running the MMA agent are not supported and must continue using the MMA onboarding method.
34
+
> Limitations and known issues:- For device migrations (reonboarding): Offboarding is not required to switch over to streamlined connectivity method. Once the updated onboarding package is run, a full device reboot is required for Windows devices and a service restart for macOS and Linux. For more information, see the details included in this article.
35
+
- Windows 10 versions 1607, 1703, 1709, and 1803 do not support reonboarding. Offboard first and then onboard using the updated package. These versions also require a longer URL list.
36
+
- Devices running the MMA agent are not supported and must continue using the MMA onboarding method.
37
+
40
38
41
39
## Migrating devices using the streamlined method
42
40
@@ -333,7 +331,25 @@ For example: `https:mdav.us.endpoint.security.microsoft/com/storage`
333
331
334
332
### Tracking with advanced hunting in Microsoft Defender XDR
335
333
336
-
Follow the same instructions as for Windows.
334
+
To view all devices (limit 30k) and their most recently reported connectivity type:
335
+
336
+
337
+
```kusto
338
+
DeviceInfo
339
+
| where OnboardingStatus == "Onboarded"
340
+
| summarize arg_max(ConnectivityType, Timestamp) by DeviceName
341
+
```
342
+
343
+
To view a count of Devices by OSPlatform and their connectivity type in a bar chart:
344
+
345
+
346
+
```kusto
347
+
DeviceInfo
348
+
| where OnboardingStatus == "Onboarded"
349
+
| summarize arg_max(ConnectivityType, Timestamp, OSPlatform) by DeviceName
350
+
| summarize count() by OSPlatform, ConnectivityType
351
+
| render columnchart
352
+
```
337
353
338
354
### Use Defender for Endpoint Client Analyzer (cross-platform) to validate connectivity for newly migrated endpoints
Copy file name to clipboardExpand all lines: defender-vulnerability-management/get-defender-vulnerability-management.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- m365-security
15
15
- tier1
16
16
- essentials-get-started
17
-
ms.date: 02/28/2025
17
+
ms.date: 03/06/2025
18
18
---
19
19
20
20
# Sign up for Microsoft Defender Vulnerability Management
@@ -38,13 +38,13 @@ You can [request one extension](https://productledgrowth.powerappsportals.com/Ad
38
38
39
39
You must be a Global Administrator to start a trial. Or, you can allow users to start a trial on behalf of your organization by enabling this option:
40
40
41
-
1. In the [Microsoft 365 admin center](https://admin.microsoft.com), go to **Settings** > **Org settings** > **Services**> **User owned apps and services**
41
+
1. In the [Microsoft 365 admin center](https://admin.microsoft.com), go to **Settings** > **Org settings**. In the **Services**page, navigate to **User owned apps and services**.
42
42
43
-
2. Check **Let users start trials on behalf of your organization**
43
+
2. Check **Let users start trials on behalf of your organization**.
44
44
45
-
3. Select **Save**
45
+
3. Select **Save**.
46
46
47
-
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-user-starttrial.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
47
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-trial-admin-center.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
48
48
49
49
> [!NOTE]
50
50
> If you don't want users in your organization to be able to start trials, as a Global Administrator, you must disable this option once you've activated the trial.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-block-vuln-apps.md
+17-13Lines changed: 17 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,10 @@ audience: ITPro
11
11
ms.collection:
12
12
- m365-security
13
13
- Tier1
14
-
ms.topic: conceptual
14
+
ms.topic: concept-article
15
15
search.appverid: met150
16
-
ms.date: 12/05/2024
16
+
ms.date: 3/05/2024
17
+
#customer intent: To learn how to block vulnerable applications with Microsoft Defender Vulnerability Management.
17
18
---
18
19
19
20
# Block vulnerable applications with Microsoft Defender Vulnerability Management
@@ -24,6 +25,9 @@ ms.date: 12/05/2024
24
25
-[Microsoft Defender XDR](/defender-xdr)
25
26
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
26
27
28
+
> [!NOTE]
29
+
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
30
+
27
31
Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security administrators can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application until the remediation request is completed. The block option gives your IT teams time to patch an application without worrying your security administrators about the vulnerabilities.
28
32
29
33
While taking the remediation steps suggested by a security recommendation, security administrators can perform a mitigation action and block vulnerable versions of an application. File indicators of compromise (IOC)s are created for each of the executable files that belong to vulnerable versions of that application. Microsoft Defender Antivirus then enforces blocks on the devices that are in the specified scope.
@@ -54,23 +58,23 @@ For both actions, you can customize the message the users see. For example, you
54
58
55
59
## How to block vulnerable applications
56
60
57
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to**Vulnerability management** > **Recommendations** .
61
+
1.Sign in to the [Microsoft Defender portal](https://security.microsoft.com), then navigate to **Endpoints** >**Vulnerability management** > **Recommendations** .
58
62
59
63
2. Select a security recommendation to see a flyout with more information.
60
64
61
65
3. Select **Request remediation**.
62
66
63
-
4.Select whether you want to apply the remediation and mitigation to all device groups or only a few.
67
+
4.Fill out the form. In the **Remediation options** dropdown, select which of the options you want to request. The options are software update, software uninstall, and attention required.
64
68
65
-
5.Select the remediation options on the **Remediation request**page. The remediation options are software update, software uninstall, and attention required.
69
+
5.Under Task management tools, tick the box for **Open a ticket in Intune (for AAD joined devices)**if you want to create a ticket in Microsoft Intune for the remediation request.
66
70
67
-
6. Pick a **Remediation due date** and select **Next**.
71
+
6. Pick a **Remediation due date**.
68
72
69
-
7. Under **Mitigation action**, select **Block** or **Warn**. Once you submit a mitigation action, it's immediately applied.
73
+
7. Under **Priority**, select High, Medium, or Low.
8. Under **Add notes**, you can add any additional information. Select **Next**.
72
76
73
-
8. Review the selections you made and **Submit request**. On the final page, you can choose to go directly to the remediation page to view the progress of remediation activities and see the list of blocked applications.
77
+
9. Review the selections you made and then select **Submit**. On the final page, you can choose to edit the selections and export all remediation request to a .CSV file.
74
78
75
79
> [!NOTE]
76
80
> Beginning December 3, 2024, expect to see a reduction in the number of file indicators that are created by new application block policies. To reduce your current indicator usage, unblock any blocked applications, and create new block policies.
@@ -95,19 +99,19 @@ If you try to block an application and it doesn't work, you might have reached t
95
99
96
100
After you've submitted a request to block vulnerable applications, you can view remediation activities by following these steps:
97
101
98
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to **Vulnerability management** > **Remediation** > **Activities**.
102
+
1.Navigate to **Endpoints** > **Vulnerability management** > **Remediation**.
99
103
100
-
2.Filter the results by this mitigation type: `Block and/or Warn to view all activities pertaining to block or warn actions`.
104
+
2.In the **Activities** tab, you can choose to filter the results by mitigation type. The options are **Block**, **Warn**, **None**, and **Workaround**.
101
105
102
-
3.An activity log displays. Keep in mind that it's an activity log, not the current block status of the application. Select the relevant activity to see a flyout panel with details including the remediation description, mitigation description, and the device remediation status:
106
+
3. Select the relevant activity to see a flyout pane with details including the remediation description, mitigation description, and the device remediation status:
103
107
104
108
:::image type="content" alt-text="Remediation and mitigation details" source="/defender/media/defender-vulnerability-management/remediation-mitigation-details.png" lightbox="/defender/media/defender-vulnerability-management/remediation-mitigation-details.png":::
105
109
106
110
## View blocked applications
107
111
108
112
To view a list of blocked applications, follow these steps:
109
113
110
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to**Remediation** >**Blocked applications** tab:
114
+
1.Navigate to **Endpoints** > **Vulnerability management** >**Remediation**, then select the**Blocked applications** tab:
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-browser-extensions.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,9 @@ ms.date: 03/04/2025
25
25
-[Microsoft Defender XDR](/defender-xdr)
26
26
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
27
27
28
+
> [!NOTE]
29
+
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
30
+
28
31
This browser extension is a small software application that adds functionality to a web browser for use with Microsoft Defender Vulnerability Management. This extension provides your security team with visibility into installed browser extensions to help ensure the safe usage of extensions in your organization.
29
32
30
33
The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it, and whether it's turned on or off on a device.
0 commit comments