Skip to content

Commit 4c49c7e

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents 2b5d12f + 27d6348 commit 4c49c7e

File tree

2 files changed

+3
-7
lines changed

2 files changed

+3
-7
lines changed

defender-endpoint/edr-detection.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/06/2024
18+
ms.date: 08/15/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -76,7 +76,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
7676

7777
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
7878

79-
<!---
8079
### macOS
8180

8281
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,7 +128,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129128

130129
Look at the alert details and the device timeline, and perform the regular investigation steps.
131130

132-
--->
133131

134132
## Next steps
135133

defender-endpoint/switch-to-mde-phase-3.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- migrationguides
1818
- admindeeplinkDEFENDER
1919
ms.topic: how-to
20-
ms.date: 08/12/2024
20+
ms.date: 08/15/2024
2121
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee
2222
search.appverid: met150
2323
---
@@ -77,14 +77,12 @@ Deployment methods vary, depending on operating system and preferred methods. Th
7777
7878
## Step 2: Run a detection test
7979

80-
<!---Add this back later when the link works: Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>.--->
81-
8280
To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
8381

8482
|Operating system|Guidance|
8583
|---|---|
8684
|Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).|
87-
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| See [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
85+
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| Download and use the DIY app at [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy). Also see [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
8886
|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|1. Run the following command, and look for a result of **1**: `mdatp health --field real_time_protection_enabled`.<br/><br/>2. Open a Terminal window, and run the following command: `curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`.<br/><br/>3. Run the following command to list any detected threats: `mdatp threat list`.<br/><br/>For more information, see [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).|
8987

9088
## Step 3: Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints

0 commit comments

Comments
 (0)