Skip to content

Commit 505405a

Browse files
authored
Merge pull request #1123 from MicrosoftDocs/main
Publish main to live 08/12/2024, 3:30 PM
2 parents f09c424 + a7f8bc9 commit 505405a

8 files changed

+91
-59
lines changed

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 03/28/2024
17+
ms.date: 08/12/2024
1818
---
1919

2020
# Onboard Windows devices to Defender for Endpoint using Intune
@@ -65,31 +65,39 @@ For security reasons, the package used to Offboard devices will expire 7 days af
6565
> [!NOTE]
6666
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
6767
68-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
68+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) as follows:
6969

70-
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
70+
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
7171

72-
3. Select Windows 10 or Windows 11 as the operating system.
72+
2. Select **Windows 10 or Windows 11** as the operating system.
7373

74-
4. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
74+
3. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
7575

76-
5. Click **Download package**, and save the .zip file.
76+
4. Click **Download package**, and save the .zip file.
7777

78-
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
78+
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
7979

80-
3. Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings.
80+
3. In Microsoft Intune admin center, create a custom configuration policy.
8181

82-
- OMA-URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding
83-
- Date type: String
84-
- Value: [Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file]
82+
1. In the navigation pane, select **Devices** \> **By platform** \> **Windows** \> **Manage Devices** \> **Configuration**.
83+
2. Under **Policies** click **Create** \> **New Policy**.
84+
3. In the **Create a profile** slide out, select **Windows 10 and later** as **Platform** and **Templates** as **Profile Type**.
85+
4. Under **Template Name**, click the **Custom** template and click **Create**.
86+
5. Enter a value for **Name** and click **Next**.
87+
6. Under **Configuration settings**, click **Add** and use the following OMA-URI settings.
88+
- Name: Provide a name
89+
- OMA-URI: `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding`
90+
- Date type: String
91+
- Value: *Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file*
92+
7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, click the **Create** button to finish the policy.
8593

8694
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
8795

8896
> [!NOTE]
8997
> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
9098
9199
> [!IMPORTANT]
92-
> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
100+
> Offboarding causes the device to stop sending sensor data to Defender for Endpoint, but data from the device, including references to any alerts it has, is retained for up to 6 months.
93101
94102
## Related articles
95103

defender-endpoint/data-storage-privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 05/14/2024
19+
ms.date: 08/12/2024
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -63,7 +63,7 @@ In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wi
6363

6464
## Data storage location
6565

66-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
66+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
6767

6868
Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
6969

defender-endpoint/mde-plugin-wsl.md

Lines changed: 30 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 08/05/2024
18+
ms.date: 08/12/2024
1919
search.appverid: MET150
2020
---
2121

@@ -145,28 +145,12 @@ For example, if your host machine has both `Winhttp proxy` and `Network & Intern
145145
146146
## Connectivity test for Defender running in WSL
147147

148-
The following procedure describes how to confirm that Defender in Endpoint in WSL has internet connectivity.
148+
The defender connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
149149

150-
1. Open Registry Editor as an administrator.
151-
152-
2. Create a registry key with the following details:
153-
154-
- **Name**: `ConnectivityTest`
155-
- **Type**: `REG_DWORD`
156-
- **Value**: `Number of seconds plug-in must wait before running the test. (Recommended: 60 seconds)`
157-
- **Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
158-
159-
3. Once the registry is set, restart wsl using the following steps:
160-
161-
1. Open Command Prompt and run the command, `wsl --shutdown`.
162-
163-
2. Run the command `wsl`.
164-
165-
4. Wait for five minutes, and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
166-
167-
If successful, you can see that the connectivity test was successful. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from WSL to Defender for Endpoint service URLs is failing.
150+
On starting your wsl machine, wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test). If successful, you can see that the connectivity test was a success. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from MDE plug-in for WSL to Defender for Endpoint service URLs is failing.
168151

169152
> [!NOTE]
153+
> The `ConnectivityTest` registry key is no longer supported.
170154
> To set a proxy for use in WSL containers (the distributions running on the subsystem), see [Advanced settings configuration in WSL](/windows/wsl/wsl-config).
171155
172156
## Verifying functionality and SOC analyst experience
@@ -187,6 +171,31 @@ After installing the plug-in, the subsystem and all its running containers are o
187171

188172
The timeline is populated, similar to Defender for Endpoint on Linux, with events from inside the subsystem (file, process, network). You can observe activity and detections in the timeline view. Alerts and incidents are generated as appropriate as well.
189173

174+
## Setting up custom tag for your WSL machine
175+
176+
The plug-in onboards the WSL machine with the tag `WSL2`. Should you or your organization need a custom tag, please follow the steps outlined below:
177+
178+
1. Open Registry Editor as an administrator
179+
180+
2. Create a registry key with the following details:
181+
182+
- Name: `GROUP`
183+
- Type: `REG_SZ` or registry string
184+
- Value: `Custom tag`
185+
- Path: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging`
186+
187+
3. Once the registry is set, restart wsl using the following steps:
188+
189+
1. Open Command Prompt and run the command, `wsl --shutdown`.
190+
191+
2. Run the `wsl` command.
192+
193+
4. Wait for 5-10 minutes for the portal to reflect the changes.
194+
195+
> [!NOTE]
196+
> The custom tag set in registry will be followed by a `_WSL2`.
197+
> For example, if the registry value set is `Microsoft`, then the custom tag will be `Microsoft_WSL2` and the same will be visible in the portal.
198+
190199
### Test the plug-in
191200

192201
To test the plug-in after installation, follow these steps:
@@ -371,8 +380,6 @@ DeviceProcessEvents
371380

372381
1. In Control Panel, go to **Programs** > **Programs and Features**.
373382

374-
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**.
375-
376-
This should fix the problem by placing the right files in the expected directories.
383+
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
377384

378385
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 08/08/2024
6+
ms.date: 08/12/2024
77
audience: ITPro
88
ms.topic: reference
99
author: siosulli
@@ -212,12 +212,12 @@ Updates are released for x86, x64, and ARM64 Windows architecture.
212212

213213
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
214214

215-
After a new package version is released, support for the previous two versions is reduced to technical support only.
215+
After a new package version is released, support for the previous two versions is reduced to technical support only. To view a list of previous versions, see [Previous DISM updates (no longer supported)](msda-updates-previous-versions-technical-upgrade-support.md#previous-dism-updates-no-longer-supported).
216216

217-
### 1.415.235.0
217+
### 1.415.295.0
218218

219-
- Defender package version: `1.415.235.0`
220-
- Security intelligence version: `1.415.235.0`
219+
- Defender package version: `1.415.295.0`
220+
- Security intelligence version: `1.415.295.0`
221221
- Engine version: `1.24070.1`
222222
- Platform version: `4.18.24070.5`
223223

@@ -229,12 +229,12 @@ After a new package version is released, support for the previous two versions i
229229

230230
- None
231231

232-
### 1.411.111.0
232+
### 1.415.235.0
233233

234-
- Defender package version: `1.411.111.0`
235-
- Security intelligence version: `1.411.111.0`
236-
- Engine version: `1.24050.2`
237-
- Platform version: `4.18.24050.7`
234+
- Defender package version: `1.415.235.0`
235+
- Security intelligence version: `1.415.235.0`
236+
- Engine version: `1.24070.1`
237+
- Platform version: `4.18.24070.5`
238238

239239
#### Fixes
240240

@@ -244,12 +244,12 @@ After a new package version is released, support for the previous two versions i
244244

245245
- None
246246

247-
### 1.411.9.0
247+
### 1.411.111.0
248248

249-
- Defender package version: `1.411.9.0`
250-
- Security intelligence version: `1.411.9.0`
251-
- Engine version: `1.24040.1`
252-
- Platform version: `4.18.24040.4`
249+
- Defender package version: `1.411.111.0`
250+
- Security intelligence version: `1.411.111.0`
251+
- Engine version: `1.24050.2`
252+
- Platform version: `4.18.24050.7`
253253

254254
#### Fixes
255255

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 08/07/2024
9+
ms.date: 08/12/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -1100,12 +1100,27 @@ Microsoft regularly releases [security intelligence updates and product updates
11001100

11011101
#### Known issues
11021102

1103-
- When this update is installed, the device needs the jump package 4.18.2001.10 to be able to update to the latest platform version.
1103+
- When this update is installed, the device needs the jump package `4.18.2001.10` to be able to update to the latest platform version.
11041104

11051105
## Previous DISM updates (no longer supported)
11061106

11071107
The versions listed in this section are no longer supported. To view current versions, see [Updates for Deployment Image Servicing and Management (DISM)](microsoft-defender-antivirus-updates.md#updates-for-deployment-image-servicing-and-management-dism).
11081108

1109+
### 1.411.9.0
1110+
1111+
- Defender package version: `1.411.9.0`
1112+
- Security intelligence version: `1.411.9.0`
1113+
- Engine version: `1.24040.1`
1114+
- Platform version: `4.18.24040.4`
1115+
1116+
#### Fixes
1117+
1118+
- None
1119+
1120+
#### Additional information
1121+
1122+
- None
1123+
11091124
### 20230809.1
11101125

11111126
- Defender package version: `20230809.1`

defender-endpoint/switch-to-mde-phase-3.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- migrationguides
1818
- admindeeplinkDEFENDER
1919
ms.topic: how-to
20-
ms.date: 10/24/2023
20+
ms.date: 08/12/2024
2121
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee
2222
search.appverid: met150
2323
---
@@ -77,12 +77,14 @@ Deployment methods vary, depending on operating system and preferred methods. Th
7777
7878
## Step 2: Run a detection test
7979

80+
<!---Add this back later when the link works: Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>.--->
81+
8082
To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
8183

8284
|Operating system|Guidance|
8385
|---|---|
8486
|Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).|
85-
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md)|Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>. <br/><br/> For more information, see [Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md).|
87+
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| See [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
8688
|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|1. Run the following command, and look for a result of **1**: `mdatp health --field real_time_protection_enabled`.<br/><br/>2. Open a Terminal window, and run the following command: `curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`.<br/><br/>3. Run the following command to list any detected threats: `mdatp threat list`.<br/><br/>For more information, see [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).|
8789

8890
## Step 3: Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints

defender-office-365/mail-flow-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To verify that EOP mail flow is working correctly, use the following tests:
5858

5959
## Support for anonymous inbound email over IPv6
6060

61-
EOP supports receiving anonymous inbound email over IPv6, but an admin is required to opt in by contacting Microsoft support. To open a support request, see [Get support for Microsoft 365 for business](/microsoft-365/admin/get-help-support).
61+
EOP supports receiving anonymous inbound email over IPv6; we are rolling out IPv6 by default to all Exchange Online customers by end of Q1CY25. If you need to enable inbound IPv6 for your Accepted Domains before then, an admin is required to opt in by contacting Microsoft support. To open a support request, see [Get support for Microsoft 365 for business](/microsoft-365/admin/get-help-support).
6262

6363
After the organization has opted in, the organization can receive anonymous inbound email over IPv6 as long as the source IPv6 email server meets both of the following requirements:
6464

defender-xdr/data-privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.topic: conceptual
1919
search.appverid:
2020
- MOE150
2121
- MET150
22-
ms.date: 05/14/2024
22+
ms.date: 08/12/2024
2323
---
2424

2525
# Microsoft Defender XDR data security and privacy
@@ -30,7 +30,7 @@ ms.date: 05/14/2024
3030
**Applies to:**
3131
- Microsoft Defender XDR
3232

33-
Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, and Switzerland. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
33+
Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, and India. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
3434

3535
Customer data in pseudonymized form might also be stored in central storage and processing systems in the United States.
3636

0 commit comments

Comments
 (0)