Skip to content

Commit 624c841

Browse files
Merge branch 'main' into wi366674-1-customer-intents-defender
2 parents 3d609b1 + 2dfc46f commit 624c841

File tree

825 files changed

+5814
-4418
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

825 files changed

+5814
-4418
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["ATADocs/" "ATPDocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["advanced-threat-analytics/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud-apps/" "defender-for-cloud/" "defender-for-identity/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

.github/workflows/AutoLabelAssign.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,11 @@ jobs:
3030
with:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
AutoAssignUsers: 1
33+
AutoAssignReviewers: 1
3334
AutoLabel: 1
3435
ExcludedUserList: '["user1", "user2"]'
3536
ExcludedBranchList: '["branch1", "branch2"]'
3637
secrets:
37-
AccessToken: ${{ secrets.GITHUB_TOKEN }}
38+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
39+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}
40+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}

.github/workflows/BackgroundTasks.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ permissions:
66

77
on:
88
pull_request_target:
9+
types: [opened, synchronize, reopened, ready_for_review]
910

1011
jobs:
1112
upload:

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1015,5 +1015,10 @@
10151015
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
10161016
"redirect_document_id": true
10171017
},
1018+
{
1019+
"source_path": "defender-for-cloud-apps/cloud-discovery-anomaly-detection-policy.md",
1020+
"redirect_url": "/defender-cloud-apps/cloud-discovery-policies",
1021+
"redirect_document_id": false
1022+
}
10181023
]
10191024
}

.openpublishing.redirection.defender-identity.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -859,6 +859,11 @@
859859
"source_path": "defender-for-identity/manage-security-alerts.md",
860860
"redirect_url": "/defender-for-identity/understanding-security-alerts",
861861
"redirect_document_id": false
862-
},
862+
},
863+
{
864+
"source_path": "defender-for-identity/automated-response-exclusions.md",
865+
"redirect_url": "/defender-xdr/automatic-attack-disruption-exclusions",
866+
"redirect_document_id": false
867+
}
863868
]
864869
}

defender-business/mdb-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,9 +163,9 @@ sections:
163163
164164
- question: Can I have a mix of Microsoft endpoint security subscriptions?
165165
answer: |
166-
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in Microsoft 365 E5 Security) defaults to the Defender for Business experience.
166+
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in the Microsoft Defender Suite) defaults to the Defender for Business experience.
167167
168-
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add Microsoft 365 E5 Security for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or Microsoft 365 E5 Security), and then contact Microsoft Support to request the switch for your tenant.
168+
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add the Microsoft Defender Suite for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or the Microsoft Defender Suite), and then contact Microsoft Support to request the switch for your tenant.
169169
170170
For more information, see [Manage your subscription settings](mdb-manage-subscription.md).
171171

defender-business/mdb-manage-subscription.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection:
2222

2323
[Microsoft Defender for Business](mdb-overview.md) and [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) are endpoint security subscriptions that your organization can use to protect devices, such as computers, tablets, and phones.
2424

25-
As your organization grows, you might be thinking about changing from Defender for Business to Defender for Endpoint. For example, if you have Defender for Business as part of a [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview) subscription, and you add Microsoft 365 E5 Security to your subscription, you now have Defender for Endpoint Plan 2 capabilities while retaining the Defender for Business experience.
25+
As your organization grows, you might be thinking about changing from Defender for Business to Defender for Endpoint. For example, if you have Defender for Business as part of a [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview) subscription, and you add the Microsoft Defender Suite to your subscription, you now have Defender for Endpoint Plan 2 capabilities while retaining the Defender for Business experience.
2626

2727
This article describes how to view your current license state and, if needed, change your experience from Defender for Business to Defender for Endpoint.
2828

defender-endpoint/access-mssp-portal.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Access the Microsoft Defender XDR MSSP customer portal
33
description: Access the Microsoft Defender XDR MSSP customer portal
44
ms.service: defender-endpoint
@@ -14,19 +14,16 @@ ms.collection:
1414
ms.topic: how-to
1515
search.appverid: met150
1616
ms.date: 03/21/2025
17-
---
17+
appliesto:
18+
- Microsoft Defender for Endpoint Plan 1
19+
- Microsoft Defender for Endpoint Plan 2
1820

21+
---
1922
# Access the Microsoft Defender XDR MSSP customer portal
2023

21-
**Applies to:**
22-
23-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
24-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
25-
- [Microsoft Defender XDR](/defender-xdr)
2624

2725
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2826

29-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3027

3128
> [!IMPORTANT]
3229
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
@@ -54,3 +51,4 @@ Use the following steps to obtain the MSSP customer tenant ID and then use the I
5451
- [Configure alert notifications](configure-mssp-notifications.md)
5552
- [Fetch alerts from customer tenant](api/fetch-alerts-mssp.md)
5653
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
54+

defender-endpoint/admin-submissions-mde.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Submit files in Microsoft Defender for Endpoint
33
description: Learn how to use the unified submissions feature in Microsoft Defender XDR to submit suspicious emails, URLs, email attachments, and files to Microsoft for scanning.
44
search.appverid: met150
55
ms.date: 05/06/2024
6+
appliesto:
7+
- Microsoft Defender for Endpoint
68
ms.service: defender-endpoint
79
ms.author: bagol
810
author: batamig
@@ -20,12 +22,6 @@ ms.custom: FPFN
2022

2123
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2224

23-
**Applies to**
24-
25-
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806)
26-
- [Microsoft Defender XDR](/defender-xdr)
27-
28-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-usewdatp-abovefoldlink).
2925

3026
In Microsoft Defender for Endpoint, admins can use the unified submissions feature to submit files and file hashes (SHAs) to Microsoft for review. The unified submissions experience is a one-stop shop for submitting emails, URLs, email attachments, and files in one, easy-to-use submission experience. Admins can use the Microsoft Defender portal or the Microsoft Defender for Endpoint Alert page to submit suspicious files.
3127

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Advanced technologies at the core of Microsoft Defender Antivirus
33
description: Microsoft Defender Antivirus engines and advanced technologies
44
author: batamig
@@ -13,18 +13,14 @@ ms.localizationpriority: medium
1313
ms.custom: partner-contribution
1414
f1.keyboards: NOSCH
1515
audience: ITPro
16+
appliesto:
17+
- Microsoft Defender for Endpoint Plan 1
18+
- Microsoft Defender for Endpoint Plan 2
19+
- Microsoft Defender for Business
20+
- Microsoft Defender for Individuals
1621
---
17-
1822
# Advanced technologies at the core of Microsoft Defender Antivirus
1923

20-
**Applies to:**
21-
22-
- [Microsoft Defender XDR](/defender-xdr)
23-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
24-
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26-
- Microsoft Defender Antivirus
27-
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals?msockid=0f1c3b9963366db31ba02e78621b6c1e#Overview)
2824

2925
Microsoft Defender Antivirus and the multiple engines that lead to the advanced detection and prevention technologies under the hood to detect and stop a wide range of threats and attacker techniques at multiple points, as depicted in the following diagram:
3026

@@ -101,3 +97,4 @@ We focus on every industry.
10197
When you're pen-testing, you should demand where no human analysts are engaged on detect/protect, to see how the actual antivirus engine (prebreach) efficacy truly is, and a separate one where human analysts are engaged. You can add [Microsoft Defender Experts for XDR](/defender-xdr/dex-xdr-overview) a managed extended detection and response service to augment your SOC.
10298

10399
The ***continuous iterative enhancement*** each of these engines to be increasingly effective at catching the latest strains of malware and attack methods. These enhancements show up in consistent [top scores in industry tests](/defender-xdr/top-scoring-industry-tests), but more importantly, translate to [threats and malware outbreaks](https://www.microsoft.com/security/blog/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/) stopped and [more customers protected](https://www.microsoft.com/security/blog/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise/).
100+

0 commit comments

Comments
 (0)