Skip to content

Commit 5a98691

Browse files
committed
Merge branch 'main' into v-smandalika-8894710
2 parents e0ec785 + d8178d7 commit 5a98691

14 files changed

+39
-24
lines changed

defender-endpoint/client-behavioral-blocking.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ ms.reviewer: shwetaj
88
audience: ITPro
99
ms.topic: conceptual
1010
ms.service: defender-endpoint
11+
ms.subservice: ngp
1112
ms.localizationpriority: medium
1213
ms.custom:
1314
- next-gen
@@ -16,7 +17,7 @@ ms.collection:
1617
- m365-security
1718
- tier2
1819
search.appverid: met150
19-
ms.date: 12/18/2020
20+
ms.date: 07/22/2024
2021
---
2122

2223
# Client behavioral blocking

defender-endpoint/defender-endpoint-demonstration-app-reputation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Microsoft Defender for Endpoint SmartScreen app reputation demonstration
33
description: Test how Microsoft Defender for Endpoint SmartScreen helps you identify phishing and malware websites
44
search.appverid: met150
55
ms.service: defender-endpoint
6+
ms.subservice: ngp
67
ms.author: siosulli
78
author: siosulli
89
ms.localizationpriority: medium
@@ -13,7 +14,7 @@ ms.collection:
1314
- tier2
1415
- demo
1516
ms.topic: article
16-
ms.date: 01/15/2024
17+
ms.date: 07/22/2024
1718
---
1819

1920
# SmartScreen app reputation demonstration

defender-endpoint/ios-configure-features.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 07/18/2024
17+
ms.date: 07/22/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on iOS features
@@ -97,6 +97,9 @@ Use the following steps to disable web protection for unenrolled devices.
9797
- Defender for Endpoint sends the heartbeat to the Microsoft Defender portal whenever a user opens the app.
9898
- Select **Next**, and then assign this profile to targeted devices/users.
9999

100+
> [!NOTE]
101+
> The `WebProtection` key is not applicable for the Control Filter in the list of supervised devices. If you want to disable web protection for supervised devices, you can remove the Control Filter profile.
102+
100103
## Configure network protection
101104

102105
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to configure network protection. This configuration is available for both enrolled devices through MDM config and unenrolled devices through MAM config.
@@ -275,8 +278,8 @@ End users install and open the Microsoft Defender app to start onboarding.
275278

276279
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are jailbroken. These jailbreak checks are done periodically. If a device is detected as jailbroken, these events occur:
277280

278-
- High-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
279-
- User data on app is cleared. When user opens the app after jailbreaking the VPN profile also is deleted and no web protection is offered.
281+
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
282+
- User data on app is cleared. When user opens the app after jailbreaking, the VPN profile (only Defender for Endpoint loopback VPN Profile) also is deleted, and no web protection is offered. VPN profiles delivered by Intune are not removed.
280283

281284
### Configure compliance policy against jailbroken devices
282285

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
33
description: Offline Security Intelligence Update in Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
5+
ms.subservice: linux
56
ms.author: dansimp
67
author: dansimp
78
ms.reviewer: gopkr
@@ -14,7 +15,7 @@ ms.collection:
1415
- mde-linux
1516
ms.topic: conceptual
1617
search.appverid: met150
17-
ms.date: 05/17/2024
18+
ms.date: 07/22/2024
1819
---
1920

2021
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux

defender-endpoint/mde-security-settings-management.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,9 @@ author: YongRhee-MSFT
55
ms.author: yongrhee
66
manager: deniseb
77
ms.service: defender-endpoint
8+
ms.subservice: ngp
89
ms.topic: how-to
9-
ms.date: 06/25/2024
10+
ms.date: 07/22/2024
1011
ms.collection:
1112
- m365-security
1213
- tier2

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141
- [What's new in Microsoft Defender for Office 365](/defender-office-365/defender-for-office-365-whats-new)
4242
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4343
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
44+
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4445

4546
For more information on Microsoft Defender for Endpoint on specific operating systems:
4647

defender-office-365/safe-attachments-policies-configure.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email.
1919
ms.custom: seo-marvel-apr2020
2020
ms.service: defender-office-365
21-
ms.date: 4/26/2024
21+
ms.date: 07/22/2024
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -511,6 +511,4 @@ To verify that you've successfully created, modified, or removed Safe Attachment
511511
Get-SafeAttachmentRule -Identity "<Name>" | Format-List
512512
```
513513

514-
- Add the URL `http://spamlink.contoso.com` to a file (for example, a Word document), and attach that file in an email message to test Safe Attachments protection. This URL is similar to the GTUBE text string for testing anti-spam solutions. This URL isn't harmful, but when it's included in an email attachment, it triggers a Safe Attachments protection response.
515-
516514
- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).

defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.topic: conceptual
1414
ms.date: 07/09/2024
1515
---
1616

17-
# What's new in Microsoft Defender Vulnerability Management Public Preview
17+
# What's new in Microsoft Defender Vulnerability Management
1818

19-
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management public preview.
19+
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management.
2020

2121
> [!TIP]
2222
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).

defender-xdr/incident-queue.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 07/02/2024
21+
ms.date: 07/18/2024
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -107,6 +107,9 @@ You can also create filter sets within the incidents page by selecting **Saved f
107107

108108
:::image type="content" source="/defender/media/incidents-queue/fig2-newfilters.png" alt-text="The create filter sets option for the incident queue in the Microsoft Defender portal." lightbox="/defender/media/incidents-queue/fig2-newfilters.png":::
109109

110+
> [!NOTE]
111+
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
112+
110113
### Save custom filters as URLs
111114

112115
Once you've configured a useful filter in the incidents queue, you can bookmark the URL of the browser tab or otherwise save it as a link on a Web page, a Word document, or a place of your choice. Bookmarking gives you single-click access to key views of the incident queue, such as:

defender-xdr/investigate-alerts.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.topic: conceptual
2222
search.appverid:
2323
- MOE150
2424
- met150
25-
ms.date: 07/02/2024
25+
ms.date: 07/18/2024
2626
---
2727

2828
# Investigate alerts in Microsoft Defender XDR
@@ -64,6 +64,9 @@ You can filter alerts according to these criteria:
6464
- Automated investigation state
6565
- Alert subscription IDs
6666

67+
> [!NOTE]
68+
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
69+
6770
An alert can have system tags and/or custom tags with certain color backgrounds. Custom tags use the white background while system tags typically use red or black background colors. System tags identify the following in an incident:
6871

6972
- A **type of attack**, like ransomware or credential phishing

0 commit comments

Comments
 (0)