Skip to content

Commit 5f41c9a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into yelevin/multi-tenant-case-mgmt
2 parents 6b5a277 + 202cbf2 commit 5f41c9a

36 files changed

+79
-96
lines changed

ATPDocs/troubleshooting-known-issues.md

Lines changed: 3 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshooting known issues
33
description: Describes how you can troubleshoot issues in Microsoft Defender for Identity.
4-
ms.date: 09/02/2024
4+
ms.date: 05/08/2025
55
ms.topic: troubleshooting
66
---
77

@@ -117,31 +117,16 @@ The issue can be caused when the trusted root certification authorities certific
117117

118118
Run the following PowerShell cmdlet to verify that the required certificates are installed.
119119

120-
In the following example, use the "DigiCert Baltimore Root" certificate for all customers. In addition, use the "DigiCert Global Root G2" certificate for commercial customers or use the "DigiCert Global Root CA" certificate for US Government GCC High customers, as indicated.
120+
In the following example the "DigiCert Global Root G2" certificate is for commercial customers and the "DigiCert Global Root CA" certificate for US Government GCC High customers, as indicated.
121121

122122
```powershell
123-
# Certificate for all customers
124-
Get-ChildItem -Path "Cert:\LocalMachine\Root" | where { $_.Thumbprint -eq "D4DE20D05E66FC53FE1A50882C78DB2852CAE474"} | fl
125-
126123
# Certificate for commercial customers
127124
Get-ChildItem -Path "Cert:\LocalMachine\Root" | where { $_.Thumbprint -eq "df3c24f9bfd666761b268073fe06d1cc8d4f82a4"} | fl
128125
129126
# Certificate for US Government GCC High customers
130127
Get-ChildItem -Path "Cert:\LocalMachine\Root" | where { $_.Thumbprint -eq "a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436"} | fl
131128
```
132129

133-
Output for certificate for all customers:
134-
135-
```Output
136-
Subject : CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
137-
Issuer : CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
138-
Thumbprint : D4DE20D05E66FC53FE1A50882C78DB2852CAE474
139-
FriendlyName : DigiCert Baltimore Root
140-
NotBefore : 5/12/2000 11:46:00 AM
141-
NotAfter : 5/12/2025 4:59:00 PM
142-
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
143-
```
144-
145130
Output for certificate for commercial customers certificate:
146131

147132
```Output
@@ -168,19 +153,14 @@ Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.O
168153

169154
If you don't see the expected output, use the following steps:
170155

171-
1. Download the following certificates to the Server Core machine. For all customers, download the [Baltimore CyberTrust root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt) certificate.
172-
173-
In addition:
156+
1. Download the following certificates to the machine:
174157

175158
- For commercial customers, download the [DigiCert Global Root G2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) certificate
176159
- For US Government GCC High customers, download the [DigiCert Global Root CA](https://cacerts.digicert.com/DigiCertGlobalRootCA.crt) certificate
177160

178161
1. Run the following PowerShell cmdlet to install the certificate.
179162

180163
```powershell
181-
# For all customers, install certificate
182-
Import-Certificate -FilePath "<PATH_TO_CERTIFICATE_FILE>\bc2025.crt" -CertStoreLocation Cert:\LocalMachine\Root
183-
184164
# For commercial customers, install certificate
185165
Import-Certificate -FilePath "<PATH_TO_CERTIFICATE_FILE>\DigiCertGlobalRootG2.crt" -CertStoreLocation Cert:\LocalMachine\Root
186166

defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: emmwalshh
88
ms.author: ewalsh
99
ms.reviewer: yongrhee
1010
ms.topic: conceptual
11-
ms.date: 04/03/2024
11+
ms.date: 05/08/2025
1212
manager: deniseb
1313
ms.custom: nextgen
1414
ms.collection:

defender-endpoint/device-discovery.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: onboard
66
f1.keywords:
77
- NOCSH
8-
ms.author: deniseb
9-
author: denisebmsft
8+
ms.author: ewalsh
9+
author: emmwalshh
1010
ms.localizationpriority: medium
1111
manager: deniseb
1212
audience: ITPro
@@ -18,7 +18,7 @@ ms.collection:
1818
ms.custom: admindeeplinkDEFENDER
1919
ms.topic: conceptual
2020
search.appverid: met150
21-
ms.date: 04/23/2024
21+
ms.date: 05/08/2025
2222
---
2323

2424
# Device discovery overview

defender-endpoint/host-firewall-reporting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: Host firewall reporting in Microsoft Defender for Endpoint
33
description: Host and view firewall reporting in Microsoft Defender portal.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 04/11/2024
6+
ms.date: 05/08/2025
77
audience: ITPro
88
ms.topic: conceptual
9-
author: denisebmsft
10-
ms.author: deniseb
9+
author: emmwalshh
10+
ms.author: ewalsh
1111
manager: deniseb
1212
ms.subservice: asr
1313
ms.collection:

defender-endpoint/mac-device-control-manual.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 04/30/2024
18+
ms.date: 05/08/2025
1919
---
2020

2121
# Deploy and manage Device Control manually

defender-endpoint/mac-install-jamfpro-login.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 04/30/2024
18+
ms.date: 05/08/2025
1919
---
2020

2121
# Sign in to Jamf Pro

defender-endpoint/mac-install-with-jamf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 04/30/2024
18+
ms.date: 05/08/2025
1919
---
2020

2121
# Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro

defender-endpoint/mac-jamfpro-device-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 04/30/2024
18+
ms.date: 05/08/2025
1919
---
2020

2121
# Set up Microsoft Defender for Endpoint on macOS device groups in Jamf Pro

defender-endpoint/mac-jamfpro-enroll-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: how-to
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 04/30/2024
18+
ms.date: 05/08/2025
1919
---
2020

2121
# Enroll Microsoft Defender for Endpoint on macOS devices into Jamf Pro

defender-endpoint/mac-sysext-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.topic: conceptual
1717
ROBOTS: noindex,nofollow
1818
ms.subservice: macos
19-
ms.date: 04/30/2024
19+
ms.date: 05/08/2025
2020
---
2121

2222
# New configuration profiles for macOS Big Sur and newer versions of macOS

0 commit comments

Comments
 (0)