Skip to content

Commit 56d841a

Browse files
authored
Merge branch 'main' into docs-editor/fixed-reported-inaccuracies-1730799503
2 parents 9c968e6 + 29eed48 commit 56d841a

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: how-to
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 04/03/2024
9+
ms.date: 11/10/2024
1010
ms.reviewer: pahuijbr
1111
manager: deniseb
1212
ms.custom: nextgen
@@ -81,7 +81,7 @@ For more information about the specific network-connectivity requirements to ens
8181

8282
| Task | Steps |
8383
|---------|---------|
84-
| Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
84+
| Create a new policy | 1. For **Platform**, select **Windows**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
8585
| Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
8686

8787
> [!TIP]

defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: how-to
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 07/25/2024
9+
ms.date: 11/10/2024
1010
manager: deniseb
1111
ms.custom: nextgen
1212
ms.subservice: ngp
@@ -38,16 +38,16 @@ Cloud protection works together with Microsoft Defender Antivirus to deliver pro
3838

3939
3. Select an antivirus profile. If you don't have one yet, or if you want to create a new profile, see [Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure).
4040

41-
4. Select **Properties**. Then, next to **Configuration settings**, choose **Edit**.
41+
4. Next to **Configuration settings**, choose **Edit**.
4242

43-
5. Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following:
43+
5. Scroll down to **Cloud Block Level**, and select one of the following:
4444

4545
- **Not configured**: Default state.
4646
- **High**: Applies a strong level of detection.
47-
- **High plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
48-
- **Zero tolerance**: Blocks all unknown executables.
47+
- **High Plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
48+
- **Zero Tolerance**: Blocks all unknown executables.
4949

50-
6. Choose **Review + save**, and then choose **Save**.
50+
6. Choose **Next**, and then choose **Save**.
5151

5252
> [!TIP]
5353
> Need some help? See the following resources:

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The *arg()* operator can be used to query across deployed Azure resources like s
4848

4949
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.
5050

51-
Read [Query data in Azure Resource Graph by using arg()](/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy#query-data-in-azure-resource-graph-by-using-arg-preview) for more details.
51+
Note that queries using the `arg()` operator return the first 1,000 records only. Read [Query data in Azure Resource Graph by using arg()](/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy#query-data-in-azure-resource-graph-by-using-arg-preview) for more details.
5252

5353
In the query editor, enter *arg("").* followed by the Azure Resource Graph table name.
5454

0 commit comments

Comments
 (0)