Skip to content

Commit 59fe866

Browse files
authored
Merge pull request #796 from MicrosoftDocs/deniseb-globaladmin
deniseb globaladmin
2 parents 8afb891 + 46410b1 commit 59fe866

6 files changed

+62
-64
lines changed

defender-endpoint/api/device-health-api-methods-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Data that is collected using either '_JSON response_ or _via files_' is the curr
5050
> [!IMPORTANT]
5151
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
5252
>
53-
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft 365 Security dashboard, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
53+
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
5454
5555
### 1.1 Export device antivirus health details API methods
5656

defender-endpoint/api/device-health-export-antivirus-health-report-api.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: siosulli
66
author: siosulli
77
ms.localizationpriority: medium
8-
ms.date: 11/03/2022
8+
ms.date: 06/25/2024
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -46,19 +46,13 @@ This API has two methods to retrieve Microsoft Defender Antivirus device antivir
4646

4747
Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages. See [Export device health details API methods and properties](device-health-api-methods-properties.md).
4848

49-
> [!IMPORTANT]
50-
>
51-
> Currently, only the **Antivirus Health JSON Response** is generally available. **Antivirus Health API via files** is currently only available in public preview.
52-
>
53-
> **Advanced Hunting custom query** is currently only available in public preview, even if the queries are still visible.
54-
5549
> [!IMPORTANT]
5650
>
5751
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
5852
5953
> [!NOTE]
6054
>
61-
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft 365 Security dashboard, see: [Device health and antivirus compliance report in Microsoft Defender for Endpoint](../device-health-reports.md).
55+
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus compliance report in Microsoft Defender for Endpoint](../device-health-reports.md).
6256
>
6357
6458
## 1 Export health reporting (JSON response)

defender-endpoint/device-health-reports.md

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 09/06/2022
9+
ms.date: 06/25/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -32,9 +32,9 @@ ms.reviewer: mkaminska
3232
The Device Health report provides information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, Windows 10 versions, and Microsoft Defender Antivirus update versions.
3333

3434
> [!IMPORTANT]
35-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
35+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
3636
37-
In the Microsoft 365 Security dashboard navigation panel, select **Reports**, and then open **Device health and compliance**.
37+
In the Microsoft Defender portal navigation panel, select **Reports**, and then open **Device health and compliance**.
3838
The Device health and compliance dashboard is structured in two tabs:
3939

4040
- The [**Sensor health & OS** tab](device-health-sensor-health-os.md#sensor-health--os-tab) provides general operating system information, divided into three cards that display the following device attributes:
@@ -54,20 +54,30 @@ The Device health and compliance dashboard is structured in two tabs:
5454

5555
## Report access permissions
5656

57-
To access the Device health and antivirus compliance report in the Microsoft 365 Security dashboard, the following permissions are required:
57+
To access the Device health and antivirus compliance report in the Microsoft Defender portal, the following permissions are required:
5858

5959
| Permission name | Permission type |
6060
|:---|:---|
6161
| View Data | Threat and vulnerability management (TVM) |
6262

63+
> [!IMPORTANT]
64+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
65+
66+
6367
To Assign these permissions:
6468

65-
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
69+
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using account with Security administrator or Global administrator role assigned.
70+
6671
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
72+
6773
1. Select the role you'd like to edit.
74+
6875
1. Select **Edit**.
76+
6977
1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
78+
7079
1. In **Description** type a brief summary of the role.
80+
7181
1. In **Permissions**, select **View Data**, and under **View Data** select **Threat and vulnerability management** (TVM).
7282

7383
## See also
@@ -92,4 +102,5 @@ To Assign these permissions:
92102
93103
- [Create and manage roles for role-based access control](user-roles.md).
94104
- [Export device antivirus health details API methods and properties](api/device-health-api-methods-properties.md)
105+
95106
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/device-health-sensor-health-os.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,9 @@ ms.reviewer: mkaminska
3232
The Device Health report provides information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, Windows 10 versions, and Microsoft Defender Antivirus update versions.
3333

3434
> [!IMPORTANT]
35-
> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
35+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
3636
37-
In the Microsoft 365 Security dashboard navigation panel, select **Reports**, and then open **Device health and compliance**.
37+
In the Microsoft Defender portalnel, select **Reports**, and then open **Device health and compliance**.
3838

3939
- The [**Sensor health & OS** tab](#sensor-health--os-tab) provides general operating system information, divided into three cards that display the following device attributes:
4040
- [Sensor health card](#sensor-health-card)
@@ -43,20 +43,29 @@ In the Microsoft 365 Security dashboard navigation panel, select **Reports**, an
4343

4444
## Report access permissions
4545

46-
To access the Device health and antivirus compliance report in the Microsoft 365 Security dashboard, the following permissions are required:
46+
To access the Device health and antivirus compliance report in the Microsoft Defender portal, the following permissions are required:
4747

4848
| Permission name | Permission type |
4949
|:---|:---|
5050
| View Data | Threat and vulnerability management (TVM) |
5151

52-
To Assign these permissions:
52+
> [!IMPORTANT]
53+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
54+
55+
To assign these permissions:
56+
57+
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using account with Security administrator or Global administrator role assigned.
5358

54-
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
5559
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
60+
5661
1. Select the role you'd like to edit.
62+
5763
1. Select **Edit**.
64+
5865
1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
66+
5967
1. In **Description** type a brief summary of the role.
68+
6069
1. In **Permissions**, select **View Data**, and under **View Data** select **Threat and vulnerability management** (TVM).
6170

6271
For more information about user role management, see [Create and manage roles for role-based access control](user-roles.md).
@@ -89,7 +98,9 @@ Use the provided filters to include or exclude devices with certain attributes.
8998
For example, to show data about Windows 10 devices with Active sensor health state:
9099

91100
1. Under **Filters** > **Sensor health state** > **Active**.
101+
92102
2. Then select **OS platforms** > **Windows 10**.
103+
93104
3. Select **Apply**.
94105

95106
### Sensor health card
@@ -144,4 +155,5 @@ The Windows version trend graph can help you quickly determine whether your orga
144155
>
145156
146157
[Microsoft Defender Antivirus health](device-health-microsoft-defender-antivirus-health.md#microsoft-defender-antivirus-health-tab)
158+
147159
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/manage-security-policies.md

Lines changed: 12 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: how-to
1414
search.appverid: met150
15-
ms.date: 05/06/2024
15+
ms.date: 06/25/2024
1616
---
1717

1818
# Manage endpoint security policies in Microsoft Defender for Endpoint
@@ -26,12 +26,15 @@ ms.date: 05/06/2024
2626
- [Microsoft Defender XDR](/defender-xdr)
2727

2828

29-
Use security policies to manage security settings on devices. As a security administrator, you can configure security policy settings in Microsoft Defender XDR.
29+
Use security policies to manage security settings on devices. As a Security Administrator, you can configure security policy settings in the Microsoft Defender portal.
3030

31-
You'll find endpoint security policies under **Endpoints > Configuration management > Endpoint security policies**.
31+
> [!IMPORTANT]
32+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
33+
34+
You'll find endpoint security policies under **Endpoints** > **Configuration management** > **Endpoint security policies**.
3235

3336
> [!NOTE]
34-
> The **Endpoint Security Policies** page in Microsoft Defender XDR is available only for [users with the security administrator role in Microsoft Defender XDR](assign-portal-access.md). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and Microsoft Defender XDR.
37+
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
3538
3639
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
3740

@@ -50,14 +53,10 @@ The following list provides a brief description of each endpoint security policy
5053

5154
## Create an endpoint security policy
5255

53-
>[!NOTE]
54-
>Currently, only antivirus policies are supported.
55-
56-
1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using at least a security admin role.
56+
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using at least a Security Administrator role.
5757

5858
2. Select **Endpoints > Configuration management > Endpoint security policies** and then select **Create new Policy**.
5959

60-
6160
3. Select a platform from the dropdown list.
6261

6362
4. Select a template, then select **Create policy**.
@@ -75,10 +74,8 @@ The following list provides a brief description of each endpoint security policy
7574

7675
8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
7776

78-
79-
>[!NOTE]
80-
>To edit the scope tags, you'll need to go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
81-
77+
> [!NOTE]
78+
> To edit the scope tags, you'll need to go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
8279
8380
## To edit an endpoint security policy
8481

@@ -93,25 +90,19 @@ The following list provides a brief description of each endpoint security policy
9390

9491
4. After you've made changes, select **Save** to save your edits. Edits to one category must be saved before you can introduce edits to additional categories.
9592

96-
97-
98-
9993
## Verify endpoint security policies
10094

10195
To verify that you have successfully created a policy, select a policy name from the list of endpoint security policies.
10296

103-
>[!NOTE]
104-
>It can take up to 90 minutes for a policy to reach a device. To expedite the process, for devices Managed by Defender for Endpoint, you can select **Policy sync** from the actions menu so that it is applied in approximately 10 minutes.
97+
> [!NOTE]
98+
> It can take up to 90 minutes for a policy to reach a device. To expedite the process, for devices Managed by Defender for Endpoint, you can select **Policy sync** from the actions menu so that it is applied in approximately 10 minutes.
10599
> :::image type="content" source="./media/policy-sync.png" alt-text="Image showing policy sync button":::
106100
107101
The policy page displays details that summarize the status of the policy. You can view a policy's status, which devices it has been applied to, and assigned groups.
108102

109103
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md#security-policies).
110104

111-
112105
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies":::
113106

114107

115-
116-
117108
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)