Skip to content

Commit 6023132

Browse files
committed
Merge branch 'main' into GA-chrisda
2 parents e89c00f + 3ab20f5 commit 6023132

File tree

56 files changed

+754
-593
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+754
-593
lines changed

defender-business/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
href: trial-playbook-defender-business.md
2626
- name: Visit the Microsoft Defender portal
2727
href: mdb-get-started.md
28-
- name: Try tutorials and simulations
28+
- name: Find training and learning resources
2929
href: mdb-tutorials.md
3030
- name: Set up and configure Defender for Business
3131
items:

defender-business/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ landingContent:
5656
url: trial-playbook-defender-business.md
5757
- text: Turn on preview features
5858
url: /defender-xdr/preview
59+
- text: Find training and learning resources
60+
url: mdb-tutorials.md
5961

6062
# Card
6163
- title: Setup information

defender-business/mdb-add-users.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 06/07/2024
12+
ms.date: 06/19/2024
1313
ms.collection:
1414
- m365-security
1515
- tier1
@@ -59,8 +59,8 @@ One good way to make sure MFA is enabled for all users is by using [security def
5959

6060
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
6161

62-
> [!CAUTION]
63-
> If your organization is using Conditional Access policies, you won't be able to enable security defaults. You'll see a message that indicates you're using classic policies instead. You can use *either* security defaults *or* Conditional Access, but not both. For most organizations, security defaults offer a good level of sign-in security. But if your organization must meet more stringent requirements, you can use Conditional Access policies instead. To learn more, see the following articles:
62+
> [!NOTE]
63+
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
6464
> - [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
6565
> - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
6666
@@ -69,5 +69,6 @@ One good way to make sure MFA is enabled for all users is by using [security def
6969
## Next steps
7070

7171
- [Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
72+
7273
- [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
7374

defender-business/mdb-create-edit-device-groups.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/17/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- SMB
@@ -30,7 +30,6 @@ In Defender for Business, policies are applied to devices through certain collec
3030
- [How to view an existing device group](#view-an-existing-device-group)
3131
- [What the Add All Devices option does](#what-does-the-add-all-devices-option-do)
3232

33-
3433
## What is a device group?
3534

3635
A device group is a collection of devices that are grouped together because of certain specified criteria, such as operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. In Defender for Business, policies are applied to devices by using device groups.

defender-business/mdb-email-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/01/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- m365-security
@@ -45,7 +45,7 @@ When you set up email notifications, you can choose from two types, as described
4545
> [!TIP]
4646
> **Email notifications are not the only way your security team can find out about new alerts or vulnerabilities**.
4747
>
48-
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are others! For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they'll see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
48+
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are other methods you can use as well. For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
4949
>
5050
> Your security team can also choose **Incidents** in the navigation pane to view information. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
5151

defender-business/mdb-firewall.md

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 05/04/2023
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,10 +34,29 @@ You can use firewall protection to specify whether to allow or to block connecti
3434

3535
Depending on whether you're using the Microsoft Defender portal or Intune to manage your firewall protection, use one of the following procedures.
3636

37-
| Portal | Procedure |
38-
|:---|:---|
39-
| Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.<br/>2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.<br/>3. Select an operating system tab (such as **Windows clients**).<br/>4. Expand **Firewall** to view your list of policies.<br/>5. Select a policy to view the details. <br/><br/>To make changes or to learn more about policy settings, see the following articles:<br/>- [View or edit device policies](mdb-view-edit-create-policies.md)<br/>- [Firewall settings](mdb-firewall.md)<br/>- [Manage your custom rules for firewall policies](mdb-firewall.md) |
40-
| Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) |1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.<br/>2. Select **Endpoint security**.<br/>3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. <br/><br/>For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).|
37+
### Use the Microsoft Defender portal to view or edit firewall policies
38+
39+
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
40+
41+
2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.
42+
43+
3. Select an operating system tab (such as **Windows clients**).
44+
45+
4. Expand **Firewall** to view your list of policies.
46+
47+
5. Select a policy to view the details. To make changes or to learn more about policy settings, see the following articles:
48+
49+
- [View or edit device policies](mdb-view-edit-create-policies.md)
50+
- [Firewall settings](mdb-firewall.md)
51+
- [Manage your custom rules for firewall policies](mdb-firewall.md)
52+
53+
### Use the Intune admin center to view or edit firewall policies
54+
55+
1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.
56+
57+
2. Select **Endpoint security**.
58+
59+
3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. To get help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
4160

4261
## Manage your custom rules for firewall policies in Microsoft Defender for Business
4362

@@ -56,10 +75,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
5675
5. To create a custom rule, follow these steps:
5776

5877
1. Under **Custom rules**, choose **+ Add rule**. (You can have up to 150 custom rules.)
78+
5979
2. On the **Create new rule** flyout, specify a name and description for the rule.
80+
6081
3. Select a profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
82+
6183
4. In the **Remote address type** list, select either **IP** or **Application file path**.
84+
6285
5. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6d, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
86+
6387
6. On the **Create new rule** flyout, select **Create rule**.
6488

6589
6. On the **Configuration settings** screen, choose **Next**.
@@ -81,10 +105,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
81105
6. To edit your custom rule, follow these steps:
82106

83107
1. On the **Edit rule** flyout, review and edit the rule's name and description.
108+
84109
2. Review and if necessary, edit the rule's profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
110+
85111
3. In the **Remote address type** list, select either **IP** or **Application file path**.
112+
86113
4. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6c, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
114+
87115
5. Set **Enable rule** to **On** to make the rule active. Or, to disable the rule, set the switch to **Off**.
116+
88117
6. On the **Edit rule** flyout, select **Update rule**.
89118

90119
7. On the **Configuration settings** screen, choose **Next**.

defender-business/mdb-get-started.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 04/10/2024
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -43,7 +43,6 @@ Use the navigation bar on the left side of the screen to access your incidents,
4343
| **Partner catalog** | Lists Microsoft partners who provide technical and professional services. |
4444
| **Assets** > **Devices** | Enables you to view devices, such as computers and mobile devices that are enrolled in [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). |
4545
| **Endpoints** > **Vulnerability management** | Enables you to access your [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Provides a dashboard, recommendations, remediation activities, a software inventory, and a list of potential weaknesses within your company. |
46-
| **Endpoints** > **Tutorials** | Provides access to walkthroughs and simulations to help you learn more about how your threat protection features work. Select the **Read the walkthrough** link before attempting to get the simulation file for each tutorial. Some simulations require Office apps, such as Microsoft Word, to read the walkthrough. |
4746
| **Endpoints** > **Configuration management** > **Device configuration** | Lists your security policies by operating system and by type. To learn more about your security policies, see [View or edit policies in Defender for Business](mdb-view-edit-create-policies.md). |
4847
| **Endpoints** > **Configuration management** > **Device management reporting** | Lists devices that are onboarded to Defender for Business, along with their operating system version, sensor health state, and when they were last updated. |
4948
| **Email & collaboration** > **Policies & rules** | If your subscription includes Exchange Online Protection or Microsoft Defender for Office 365, this section is where you'll manage your security policies and settings for email and collaboration services. [Learn more about Office 365 security](/defender-office-365/mdo-about). *The standalone version of Defender for Business does not include email & collaboration policies, but Microsoft 365 Business Premium does include Exchange Online Protection and Defender for Office 365 Plan 1*. |

defender-business/mdb-lighthouse-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 09/28/2022
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,7 +34,7 @@ If you're a Microsoft Cloud Solution Provider (CSP) or Managed Service Provider
3434

3535
## Learn more about Microsoft 365 Lighthouse
3636

37-
Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users at scale.
37+
Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users for customers.
3838

3939
To learn more, see:
4040

defender-business/mdb-mtd.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of mobile threat defense in Defender for Business.
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 07/19/2023
7+
ms.date: 06/19/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -37,18 +37,16 @@ The following table summarizes the capabilities that are included in mobile thre
3737
| **Microsoft Defender Vulnerability Management**<br/>Vulnerability assessment of onboarded mobile devices. Includes vulnerability assessments for operating systems and apps for Android and iOS. <br/>See [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md). | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | See note 1 (below) |
3838
| **Network Protection** <br/>Protection against rogue Wi-Fi related threats and rogue certificates. <br/>Network protection is turned on by default with [next-generation protection](mdb-next-generation-protection.md). <br/>As part of mobile threat defense, network protection also includes the ability to allow root certification authority and private root certification authority certificates in Intune. It also establishes trust with endpoints. | See note 2 (below) | See note 2 (below) |
3939
| **Unified alerting** <br/>Alerts from all platforms are listed in the unified Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, choose **Incidents**). <br/>See [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md) | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
40-
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune <br/>(see note 3 below) | Requires Intune <br/>(see note 3 below) |
41-
| **Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune (see note 3 below) | Requires Intune (see note 3 below) |
42-
| **Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 4 below) | Requires Intune VPN Tunnel <br/>(see note 4 below) |
40+
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
41+
| **Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune | Requires Intune |
42+
| **Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 3 below) | Requires Intune VPN Tunnel <br/>(see note 3 below) |
4343

4444
> [!NOTE]
4545
> 1. Intune is required for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
4646
>
4747
> 2. Intune is required to configure or manage an allow list of root certification authority and private root certification authority certificates.
4848
>
49-
> 3. Intune is included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview). Intune can be added on to Defender for Business.
50-
>
51-
> 4. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
49+
> 3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
5250
>
5351
5452
## How to get mobile threat defense capabilities

0 commit comments

Comments
 (0)