You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -136,7 +136,7 @@ The following table lists the supported operating systems for rules that are cur
136
136
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later | Y | Y |
137
137
138
138
> [!NOTE]
139
-
> - For Windows Server 2012 R2 and Windows Server 2016, see [Onboard Windows Server 2012 R2 and Windows Server 2016](onboard-server.md#onboard-windows-server-2012-r2-and-windows-server-2016).
139
+
> - For Windows Server 2012 R2 and Windows Server 2016, see [Onboard Windows Server 2016 and Windows Server 2012 R2](onboard-server.md#onboard-windows-server-2016-and-windows-server-2012-r2).
140
140
> - If you're using Configuration Manager, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
141
141
> - For Windows client devices, "version 1809 or later" and "version 1903 (build 18362)" apply to Windows 10 only.
Copy file name to clipboardExpand all lines: defender-endpoint/server-migration.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
author: emmwalshh
7
7
ms.author: ewalsh
8
8
ms.localizationpriority: medium
9
-
ms.date: 04/06/2025
9
+
ms.date: 04/16/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -47,7 +47,7 @@ To facilitate upgrades when Microsoft Endpoint Configuration Manager isn't yet a
47
47
48
48
2. Remove System Center Endpoint Protection (SCEP) client if installed.
49
49
50
-
3. Review the [Prerequisites for Windows Server 2016 and Windows Server 2012 R2](onboard-server.md#prerequisites-for-windows-server-2016-and-windows-server-2012-r2).
50
+
3. Review the [Prerequisites for Windows Server 2016 and 2012 R2](onboard-server.md#prerequisites-for-windows-server-2016-and-2012-r2).
51
51
52
52
4. Enable and update the Microsoft Defender Antivirus feature on Windows Server 2016.
53
53
@@ -70,13 +70,13 @@ For instructions on how to migrate using Configuration Manager older than versio
70
70
71
71
## If you are running a non-Microsoft antivirus solution
72
72
73
-
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites for Windows Server 2016](onboard-server.md#prerequisites-for-windows-server-2016-and-windows-server-2012-r2) are met.
73
+
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [Prerequisites for Windows Server 2016 and 2012 R2](onboard-server.md#prerequisites-for-windows-server-2016-and-2012-r2) are met.
74
74
75
75
2. Ensure your non-Microsoft antivirus management solution no longer pushes antivirus agents to these machines.
76
76
77
77
3. Author your policies for the protection capabilities in Defender for Endpoint and target those to the machine in the tool of your choice.
78
78
79
-
4. Install the Defender for Endpoint package for Windows Server 2012 R2 and Windows Server 2016, and set it to passive mode. See [Onboard Windows Server 2012 R2 and Windows Server 2016](onboard-server.md#onboard-windows-server-2012-r2-and-windows-server-2016).
79
+
4. Install the Defender for Endpoint package for Windows Server 2012 R2 and Windows Server 2016, and set it to passive mode.
80
80
81
81
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
82
82
@@ -98,7 +98,7 @@ In the preceding procedure, steps 2 and 7 apply only if you intend to replace yo
98
98
99
99
## If you are running System Center Endpoint Protection but aren't managing the machine using Configuration Manager (MECM/ConfigMgr)
100
100
101
-
1. Fully update the device, including Microsoft Defender Antivirus (on Windows Server 2016) ensuring [prerequisites](onboard-server.md#prerequisites-for-windows-server-2016-and-windows-server-2012-r2) are met.
101
+
1. Fully update the device, including Microsoft Defender Antivirus (on Windows Server 2016) ensuring [Prerequisites for Windows Server 2016 and 2012 R2](onboard-server.md#prerequisites-for-windows-server-2016-and-2012-r2) are met.
102
102
103
103
2. Create and apply policies using Group Policy, PowerShell, or a non-Microsoft management solution.
Copy file name to clipboardExpand all lines: defender-endpoint/switch-to-mde-phase-2.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ If Microsoft Defender Antivirus features and installation files were previously
78
78
79
79
### Are you using Windows Server 2012 R2 or Windows Server 2016?
80
80
81
-
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Onboarding Windows Server 2016 and Windows Server 2012 R2](onboard-server.md#onboarding-windows-server-2016-and-windows-server-2012-r2).
81
+
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Onboarding Windows Server 2016 and Windows Server 2012 R2](onboard-server.md#onboard-windows-server-2016-and-windows-server-2012-r2).
82
82
83
83
## Step 2: Configure Defender for Endpoint Plan 1 or Plan 2
Copy file name to clipboardExpand all lines: defender-endpoint/verify-connectivity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ For more info on how to access streamlined onboarding script, see [Onboarding de
108
108
109
109
See the following guidance to eliminate the wildcard (*) requirement for your specific environment when using the Microsoft Monitoring Agent (MMA) for previous versions of Windows.
110
110
111
-
1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Defender for Endpoint (for more information, see [Onboard Windows Server 2012 R2 and Windows Server 2016](onboard-server.md#onboard-windows-server-2012-r2-and-windows-server-2016).
111
+
1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Defender for Endpoint. For more information, see [Onboard Windows Server 2016 and Windows Server 2012 R2](onboard-server.md#onboard-windows-server-2016-and-windows-server-2012-r2).
112
112
113
113
2. Ensure the machine is successfully reporting into the Microsoft Defender portal.
Copy file name to clipboardExpand all lines: defender-xdr/threat-analytics.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ ms.custom:
20
20
- cx-ta
21
21
- seo-marvel-apr2020
22
22
search.appverid: met150
23
-
ms.date: 03/26/2025
23
+
ms.date: 04/17/2025
24
24
---
25
25
26
26
# Threat analytics in Microsoft Defender XDR
@@ -91,21 +91,22 @@ Select a threat from the dashboard to view the report for that threat. You can a
91
91
92
92
You can filter the threat report list and view the most relevant reports according to a specific threat type or by type of report.
93
93
94
-
-**Threat tags**—assist you in viewing the most relevant reports according to a specific threat category. For example, the **Ransomware** tag includes all reports related to ransomware.
95
94
-**Report types**—assist you in viewing the most relevant reports according to a specific report type. For example, the **Tools & techniques** tag includes all reports that cover tools and techniques.
95
+
-**Threat tags**—assist you in viewing the most relevant reports according to a specific threat category. For example, the **Ransomware** tag includes all reports related to ransomware.
96
+
96
97
97
98
The different tags have equivalent filters that assist you in efficiently reviewing the threat report list and filtering the view based on a specific threat tag or report type. For example, to view all threat reports related to ransomware category, or threat reports that involve vulnerabilities.
98
99
100
+
Report types are presented at the top of the threat analytics page. There are counters for the number of available reports under each type.
101
+
102
+
:::image type="content" source="/defender/media/threat-analytics/ta-dashboard-tags.png" alt-text="Screenshot of the threat analytics report types." lightbox="/defender/media/threat-analytics/ta-dashboard-tags.png":::
103
+
99
104
The Microsoft Threat Intelligence team adds threat tags to each threat report. The following threat tags are currently available:
100
105
- Ransomware
101
106
- Phishing
102
107
- Activity group
103
108
- Vulnerability
104
109
105
-
Threat tags are presented at the top of the threat analytics page. There are counters for the number of available reports under each tag.
106
-
107
-
:::image type="content" source="/defender/media/threat-analytics/ta-dashboard-tags.png" alt-text="Screenshot of the threat analytics report tags." lightbox="/defender/media/threat-analytics/ta-dashboard-tags.png":::
108
-
109
110
To set the types of reports you want in the list, select **Filters**, choose from the list, and select **Apply**.
110
111
111
112
:::image type="content" source="/defender/media/threat-analytics/ta-threattag-filters-mtp-tb.png" alt-text="Screenshot of the Filters list." lightbox="/defender/media/threat-analytics/ta-threattag-filters-mtp.png":::
0 commit comments