Skip to content

Commit 4d31d97

Browse files
committed
Merge branch 'main' into AttackSim-chrisda
2 parents 4534182 + 4576eba commit 4d31d97

File tree

172 files changed

+229
-331
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

172 files changed

+229
-331
lines changed

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Advanced technologies at the core of Microsoft Defender Antivirus
33
description: Microsoft Defender Antivirus engines and advanced technologies
44
author: YongRhee-MSFT
55
ms.author: yongrhee
6-
manager: dansimp
6+
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
99
ms.date: 02/28/2024

defender-endpoint/amsi-on-mdav.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Anti-malware Scan Interface (AMSI) integration with Microsoft Defender A
33
description: Describes fileless malware and how Microsoft Defender Antivirus uses AMSI to protect against hidden threats.
44
author: YongRhee-MSFT
55
ms.author: yongrhee
6-
manager: dansimp
6+
manager: deniseb
77
ms.date: 02/27/2024
88
ms.topic: conceptual
99
ms.service: defender-endpoint

defender-endpoint/behavior-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Behavior monitoring in Microsoft Defender Antivirus
33
description: Learn about Behavior monitoring in Microsoft Defender Antivirus and Defender for Endpoint.
44
author: YongRhee-MSFT
55
ms.author: yongrhee
6-
manager: dansimp
6+
manager: deniseb
77
audience: ITPro
88
ms.topic: conceptual
99
ms.service: defender-endpoint

defender-endpoint/configure-device-connectivity.md

Lines changed: 3 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 05/13/2024
17+
ms.date: 06/14/2024
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -154,7 +154,7 @@ With streamlined connectivity, IP-based solutions can be used as an alternative
154154
- Defender for Endpoint Command and Control
155155

156156
> [!IMPORTANT]
157-
> The EDR Cyber data service must be configured separately if you are using the IP method (this service is only consolidated on a URL level).You must also maintain connectivity with other required services including SmartScreen, CRL, Windows Update, and other services.<br/>
157+
> The EDR Cyber data service (OneDsCollector) *must* be configured separately if you are using the IP method (this service is only consolidated on a URL level).You must also maintain connectivity with other required services including SmartScreen, CRL, Windows Update, and other services.<br/>
158158
159159
In order to stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Endpoint services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
160160

@@ -163,7 +163,7 @@ In order to stay up to date on IP ranges, it's recommended to refer to the follo
163163
| MicrosoftDefenderForEndpoint | MAPS, Malware Sample Submission Storage, Auto-IR Sample Storage, Command and Control. |
164164
| OneDsCollector | EDR Cyberdata <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
165165

166-
The following table lists the current static IP ranges. For latest list, refer to the Azure service tags.
166+
The following table lists the current static IP ranges covered by the MicrosoftDefenderForEndpoint service tag. For latest list, refer to the Azure service tags.
167167

168168

169169
|Geo|IP Ranges|
@@ -221,18 +221,4 @@ Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and
221221

222222
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
223223

224-
### Stage 5. Set the default onboarding package to streamlined connectivity
225-
226-
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**).
227-
228-
<img width="593" alt="image" src="https://github.com/MicrosoftDocs/defender-docs-pr/assets/30799281/3509aeec-bbab-4efd-a328-0608a11cc6d1">
229-
230-
This setting sets the default onboarding package to 'streamlined' for applicable operating systems. You can still use the standard onboarding package within the onboarding page but you must specifically select it in the drop-down.
231-
232-
For onboarding through Intune & Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded don't automatically reonboard; you need to create a new policy in Intune, where it's recommended to first assign the policy to a set of test devices to verify connectivity is successful, before expanding the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script.
233-
234-
> [!NOTE]
235-
> - Only tenants created on or before May 8th, 2024 have the option to switch between standard and streamlined connectivity. Newer tenants will only support streamlined connectivity.
236-
> - Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
237-
238224

defender-endpoint/configure-environment.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ search.appverid: met150
55
ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
8-
ms.reviewer: mkaminska
8+
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
ms.topic: how-to
1616
ms.subservice: onboard
17-
ms.date: 06/06/2024
17+
ms.date: 06/14/2024
1818
---
1919

2020
# STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service
@@ -59,6 +59,8 @@ The following destinations are required to allow Defender for Endpoint communica
5959
|`*.blob.core.windows.net`|Port 443|Outbound|Yes|
6060
|`*.azure-automation.net`|Port 443|Outbound|Yes|
6161

62+
To determine the exact destinations in use for your subscription within the domains listed above, see [Microsoft Monitoring Agent (MMA) Service URL connections](verify-connectivity.md#microsoft-monitoring-agent-mma-service-url-connections).
63+
6264
> [!NOTE]
6365
> Services using MMA-based solutions are not able to leverage the new streamlined connectivity solution (consolidated URL and option to use static IPs). For Windows Server 2016 and Windows Server 2012 R2, you will need to update to the new unified solution. Instructions to onboard these operating systems with the new unified solution are at [Onboard Windows servers](configure-server-endpoints.md), or migrate already onboarded devices to the new unified solution at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
6466

defender-endpoint/elam-on-mdav.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Early Launch Antimalware (ELAM) and Microsoft Defender Antivirus
33
description: How Microsoft Defender Antivirus incorporates Early Launch Antimalware (ELAM) for preventing rootkit and drivers with malware from loading before the antivirus service and drivers are loaded.
44
author: YongRhee-MSFT
55
ms.author: yongrhee
6-
manager: dansimp
6+
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
99
ms.date: 02/26/2024

defender-endpoint/evaluate-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: conceptual
77
author: YongRhee-MSFT
88
ms.author: yongrhee
9-
manager: dansimp
9+
manager: deniseb
1010
ms.custom: nextgen
1111
ms.date: 10/18/2018
1212
ms.subservice: ngp

defender-endpoint/hardware-acceleration-and-mdav.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Hardware acceleration and Microsoft Defender Antivirus.
33
description: How Microsoft Defender Antivirus incorporates hardware acceleration and Microsoft Defender Antivirus.
44
author: YongRhee-MSFT
55
ms.author: yongrhee
6-
manager: dansimp
6+
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
99
ms.date: 02/26/2024

defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: dansimp
66
author: dansimp
77
ms.reviewer: gopkr
88
ms.localizationpriority: medium
9-
manager: dansimp
9+
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security

defender-endpoint/linux-exclusions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: dansimp
66
author: dansimp
77
ms.reviewer: gopkr
88
ms.localizationpriority: medium
9-
manager: dansimp
9+
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security

0 commit comments

Comments
 (0)