You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-portaloverview-abovefoldlink)
32
31
33
32
> [!NOTE]
34
-
> The [Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548)Blog \(published 04-13-2021\) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how get started using these new capabilities.
33
+
> The [Tech Community Blog: Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548) (published 04-13-2021) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how get started using these new capabilities.
35
34
36
35
Network discovery capabilities are available in the **Device inventory** section of the [Microsoft Defender portal](https://security.microsoft.com) and Microsoft Defender XDR consoles.
37
36
@@ -42,8 +41,9 @@ Once the network devices are discovered and classified, security administrators
42
41
## Approach
43
42
44
43
Network devices aren't managed as standard endpoints since Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan obtains the necessary information from the devices. Depending on the network topology and characteristics, a single device or a few devices onboarded to Microsoft Defender for Endpoint performs authenticated scans of network devices using SNMP (read-only).
45
-
>[!NOTE]
46
-
>The authenticated scans support SNMPv2, SNMPv3
44
+
45
+
> [!NOTE]
46
+
> Authenticated scans support `SNMPv2` and `SNMPv3`.
47
47
48
48
There are two types of devices to keep in mind:
49
49
@@ -87,9 +87,9 @@ Your first step is to select a device that performs the authenticated network sc
87
87
88
88
8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
89
89
90
-
-\*.security.microsoft.com
91
-
- login.microsoftonline.com
92
-
-\*.blob.core.windows.net/networkscannerstable/\*
90
+
-`*.security.microsoft.com`
91
+
-`login.microsoftonline.com`
92
+
-`*.blob.core.windows.net/networkscannerstable/*`
93
93
94
94
> [!NOTE]
95
95
> Not all URLs are specified in the Defender for Endpoint documented list of allowed data collection.
@@ -111,7 +111,7 @@ The scanner is supported on Windows 10, version 1903 and Windows Server, version
111
111
112
112
2. Download the scanner and install it on the designated Defender for Endpoint scanning device.
113
113
114
-
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan-new.png":::
114
+
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan-new.png":::
115
115
116
116
## Scanner installation & registration
117
117
@@ -124,8 +124,8 @@ To complete the scanner registration process:
124
124
125
125
1. Copy and follow the URL that appears on the command line and use the provided installation code to complete the registration process.
126
126
127
-
> [!NOTE]
128
-
> You may need to change Command Prompt settings to be able to copy the URL.
127
+
> [!NOTE]
128
+
> You may need to change Command Prompt settings to be able to copy the URL.
129
129
130
130
2. Enter the code and sign in using a Microsoft account that has the Defender for Endpoint permission called "Manage security settings in Defender."
131
131
@@ -143,7 +143,7 @@ If there's a difference between the two versions, the update process determines
143
143
144
144
2. Select **Add new scan** and choose **Network device authenticated scan** and select **Next**.
145
145
146
-
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan.png":::
146
+
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan.png":::
147
147
148
148
3. Choose whether to **Activate scan**.
149
149
@@ -161,9 +161,9 @@ If there's a difference between the two versions, the update process determines
0 commit comments