Skip to content

Commit 6262ee8

Browse files
authored
Merge pull request #1289 from MicrosoftDocs/main
Publish main to live, Friday 10:30AM PDT, 09/06/2024
2 parents e00446e + 2f5c457 commit 6262ee8

File tree

4 files changed

+11
-8
lines changed

4 files changed

+11
-8
lines changed

defender-endpoint/edr-block-mode-faqs.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
- partner-contribution
1616
ms.topic: faq
1717
ms.collection: m365-security
18-
ms.date: 04/26/2024
18+
ms.date: 09/07/2024
1919

2020
title: Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)
2121
summary: |
@@ -38,9 +38,9 @@ sections:
3838
- question: |
3939
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
4040
answer: |
41-
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
41+
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) in block mode.
4242
43-
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product.
43+
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. There is a scenario where EDR in block mode enablement might be beneficial, even when the primary antivirus solution is Microsoft Defender Antivirus. If Microsoft Defender Antivirus is misconfigured, such as if PUA protection is not enabled, EDR in block mode can automatically remediate PUA.
4444
4545
- question: |
4646
Will EDR in block mode affect a user's antivirus protection?

defender-endpoint/schedule-antivirus-scans-group-policy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: siosulli
77
ms.author: siosulli
88
ms.custom: nextgen
9-
ms.date: 03/06/2023
9+
ms.date: 09/07/2024
1010
ms.reviewer: pauhijbr, ksarens
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -80,7 +80,7 @@ For more information, see the [Manage when protection updates should be download
8080
| Location | Setting | Description | Default setting (if not configured) |
8181
|:---|:---|:---|:---|
8282
| Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never |
83-
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
83+
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) Note that if this setting is set to 0, daily quick scans do not run.| 2 a.m. |
8484

8585
## Group Policy settings for scheduling scans after protection updates
8686

@@ -97,4 +97,5 @@ For more information, see the [Manage when protection updates should be download
9797
> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
9898
> - [Configure Defender for Endpoint on Android features](android-configure.md)
9999
> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
100+
100101
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
224 KB
Loading

defender-for-iot/set-up-sites.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-for-iot
55
author: limwainstein
66
ms.author: lwainstein
77
ms.localizationpriority: medium
8-
ms.date: 06/26/2024
8+
ms.date: 08/26/2024
99
ms.topic: how-to
1010
---
1111

@@ -61,10 +61,12 @@ In this stage, you configure Defender for IoT to associate OT devices to the sit
6161

6262
Check each location, because Defender for IoT might list your OT devices in more than one suggested location. If this happens, select all of the suggested locations that include an identified OT device. You can select any number of locations. However, you can't edit the list of devices that appear at a specific location.
6363

64-
1. Review the devices and select the suggested sites to add. You might need to select more than one suggested site.
64+
1. Review the devices and select the suggested sites to associate with the site. You might need to select more than one suggested site.
6565

66-
:::image type="content" source="media/set-up-sites/site-security-associate-devices-new.png" alt-text="Screenshot showing the associate devices screen and the suggested list of OT devices per location in the site set-up page of Microsoft Defender for IoT in the Microsoft Defender portal.":::
66+
Use the **Group** column to check the ID for each suggested site. Sites with the same ID indicate that the devices are likely located at the same physical location. As these suggested sites are expected to belong to the same site, review and confirm that the devices listed are correct before making your selections and associating the suggested sites.
6767

68+
:::image type="content" source="media/set-up-sites/site-security-associate-group.png" alt-text="Screenshot showing the associate devices screen and the suggested list of OT devices per location with the Group column in the site set-up page of Microsoft Defender for IoT in the Microsoft Defender portal." lightbox="media/set-up-sites/site-security-associate-group.png":::
69+
6870
1. Select **Next** to review the site details.
6971

7072
## Review site details

0 commit comments

Comments
 (0)