You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Release date: **August 7, 2024** (Engine and Platform)
105
+
- Platform: **4.18.24070.5**
106
+
- Engine: **1.1.24070.3**
107
+
- Support phase: **Security and Critical Updates**
108
+
109
+
### What's new
110
+
111
+
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
112
+
- Optimized Network Protection calls to the backend that occur as a result of suspicious connection checks.
113
+
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in Defender CSP so changing this value in the console takes effect on the endpoint.
114
+
- Resolved an issue where File Evidence Location was not always captured in scenarios where the Remote Location is inaccessible.
115
+
- New event log added (5016) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
116
+
- Fixed a prioritization issue with full scans initiated from the portal that resulted in longer than expected full scan duration.
- Support phase: **Security and Critical Updates**
143
-
144
-
#### What's new
145
-
146
-
- Added an opt-out feature for Experimental Configuration Services (ECS) and One collector in the Core Service.
147
-
- Fixed an issue where occasionally exclusions deployed via Intune were not being honored when tamper protection was enabled.
148
-
- After a new engine version is released, support for older versions (N-2) will now reduce to technical support only. Engine versions older than N-2 are no longer supported.
149
-
- Improved health monitoring and telemetry for [attack surface rules](overview-attack-surface-reduction.md) exclusions.
150
-
- Updated inaccurate information in [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) regarding wildcard usage with contextual exclusions.
151
-
152
153
### Previous version updates: Technical upgrade support only
153
154
154
155
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
- Support phase: **Technical upgrade support (only)**
39
+
40
+
#### What's new
41
+
42
+
- Added an opt-out feature for Experimental Configuration Services (ECS) and One collector in the Core Service.
43
+
- Fixed an issue where occasionally exclusions deployed via Intune were not being honored when tamper protection was enabled.
44
+
- After a new engine version is released, support for older versions (N-2) will now reduce to technical support only. Engine versions older than N-2 are no longer supported.
45
+
- Improved health monitoring and telemetry for [attack surface rules](overview-attack-surface-reduction.md) exclusions.
46
+
- Updated inaccurate information in [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) regarding wildcard usage with contextual exclusions.
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-windows-multi-session-device.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,15 @@ Also, if you're using FSlogix user profiles, we recommend you follow the guidanc
128
128
129
129
#### Licensing requirements
130
130
131
-
Note on licensing: When using Windows Enterprise multi-session, depending on your requirements, you can choose to either have all users licensed through Microsoft Defender for Endpoint (per user), Windows Enterprise E5, Microsoft 365 E5 Security, or Microsoft 365 E5, or have the VM licensed through Microsoft Defender for Cloud.
131
+
When using Windows Enterprise multi-session, per our security best practices the virtual machine can be licensed through Microsoft Defender for Servers or you can choose to have all Azure Virtual Desktop virtual machine users licensed through one of the following licenses:
132
+
133
+
- Microsoft Defender for Endpoint Plan 1 or Plan 2 (per user)
134
+
- Windows Enterprise E3
135
+
- Windows Enterprise E5
136
+
- Microsoft 365 E3
137
+
- Microsoft 365 E5 Security
138
+
- Microsoft 365 E5
139
+
132
140
Licensing requirements for Microsoft Defender for Endpoint can be found at: [Licensing requirements](minimum-requirements.md#licensing-requirements).
Copy file name to clipboardExpand all lines: defender-endpoint/update-agent-mma-windows.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ A new agent was released in April 2022 for Windows Server 2012 R2 and Windows Se
70
70
- If you are, however, still using MMA for other purposes (such as Log Analytics), MMA is currently set to retire in August 2024. See [We're retiring the Log Analytics agent in Azure Monitor on 31 August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). Depending on your particular scenario, now might be a good time to upgrade to [Azure Monitoring Agent, the successor of MMA](/azure/azure-monitor/agents/azure-monitor-agent-migration).
71
71
72
72
> [!IMPORTANT]
73
-
> Devices running Windows 7 SP1, Windows 8.1, or Windows Server 2008 R2 remain dependent on MMA.
73
+
> Defender for Endpoint devices running Windows 7 SP1, Windows 8.1, or Windows Server 2008 R2 are still supported and remain dependent on MMA.
74
74
>
75
75
> Devices running Windows Server 2012 R2 or Windows Server 2016 should be upgraded to the [new, unified solution](application-deployment-via-mecm.md) so that they no longer require the use of MMA.
Copy file name to clipboardExpand all lines: defender-for-iot/get-started.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Get started with Microsoft Defender for IoT in the Defender portal
3
-
description: This article describes how to set up Microsoft Defender for IoT in the Defender portal.
2
+
title: Get started and set up a license for Microsoft Defender for IoT in the Defender portal
3
+
description: This article describes how to get started and set up a license got Microsoft Defender for IoT in the Defender portal.
4
4
ms.service: defender-for-iot
5
5
author: lwainstein
6
6
ms.author: lwainstein
@@ -13,7 +13,7 @@ ms.topic: how-to
13
13
14
14
Microsoft Defender for IoT in the Microsoft Defender portal allows you to analyze OT data, generate alerts, and identify network risks. This article explains how to create a trial license for Defender for IoT in the Defender portal using your Microsoft tenant.
15
15
16
-
One trial license is available per tenant. The trial license is limited to a maximum of 1,000 OT devices and lasts for 90 days. After you set up the trial license, you can access the Defender for IoT security insights available for your network.
16
+
One trial license is available per tenant. The trial license is limited to a maximum of 1,000 OT devices. After you set up the trial license, you can access the Defender for IoT security insights available for your network.
17
17
18
18
When you finish setting up the trial license, you can continue to [set up a site](set-up-sites.md) to monitor your OT devices at the production site level.
19
19
@@ -25,7 +25,7 @@ To add a trial license for Microsoft Defender for IoT:
25
25
26
26
1. Open the [Microsoft Defender for IoT - OT Site License (1000 max devices per site) Trial wizard](https://signup.microsoft.com/get-started/signup?products=d2bdd05f-4856-4569-8474-2f9ec298923b).
27
27
28
-
:::image type="content" source="media/get-started/trial-license-get-started.png" alt-text="Screenshot of the set up page for the Microsoft Defender for IoT trial license.":::
28
+
:::image type="content" source="media/get-started/trial-license-get-started.png" alt-text="Screenshot to get started and set up page for the Microsoft Defender for IoT trial license.":::
29
29
30
30
1. In the **Email** field, type the email address you want to associate with the trial license, and select **Next**.
Copy file name to clipboardExpand all lines: defender-for-iot/manage-devices-inventory.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Discover and manage devices for Microsoft Defender for IoT in the Defender portal
2
+
title: Discover and manage devices in the device inventory for Microsoft Defender for IoT in the Defender portal
3
3
description: This article describes how to discover and manage devices in the device inventory for Microsoft Defender for IoT in the Defender portal.
4
4
ms.service: defender-for-iot
5
5
author: limwainstein
@@ -10,7 +10,7 @@ ms.topic: how-to
10
10
---
11
11
12
12
# Discover and manage devices
13
-
13
+
<!-- possibly add to h1 in the device inventory-->
14
14
Microsoft Defender for IoT in the Microsoft Defender portal includes the device inventory, which helps you identify details about specific OT devices. Gathering details about your devices helps your teams proactively investigate vulnerabilities that can compromise your most critical assets. This article describes how to discover and manage your devices in the device inventory. You can filter data in the inventory, explore the inventory, investigate device details, and more.
15
15
16
16
Learn more about the benefits of OT [device discovery](device-discovery.md).
@@ -28,7 +28,7 @@ Review the [Defender for IoT prerequisites](prerequisites.md).
28
28
> [!NOTE]
29
29
>
30
30
> If you don't yet have a Defender for IoT license, the **Device inventory** page lists OT devices without security data. For example, the device name, IP, and category are visible, while the risk level isn't visible. The device inventory also displays a note at the top of the page that indicates the number of unprotected OT devices.
31
-
>
31
+
>
32
32
> In this case, [onboard Defender for IoT](get-started.md) to get security value for your OT devices.
Copy file name to clipboardExpand all lines: defender-for-iot/prerequisites.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Prerequisites for Microsoft Defender for IoT in the Defender portal
3
-
description: This article describes the prerequisites for Microsoft Defender for IoT in the Microsoft Defender portal.
2
+
title: Prerequisites for a license or setting up a site for Microsoft Defender for IoT in the Defender portal
3
+
description: This article describes the prerequisites for a license or setting up a site for Microsoft Defender for IoT in the Microsoft Defender portal.
4
4
ms.service: defender-for-iot
5
5
author: lwainstein
6
6
ms.author: lwainstein
@@ -13,7 +13,7 @@ ms.topic: get-started
13
13
14
14
Microsoft Defender for IoT in the Microsoft Defender portal monitors and secures network traffic across your operational technology (OT) networks and allows you to analyze OT data, generate alerts, identify network risks, and more.
15
15
16
-
To see how Defender for IoT can help and protect your network sign up to a free, 90 day, trial version. This article describes the prerequisites needed to set up a trial license for Microsoft Defender for IoT.
16
+
To see how Defender for IoT can help and protect your network sign up to a free trial version. This article describes the prerequisites needed to set up a trial license for Microsoft Defender for IoT.
Copy file name to clipboardExpand all lines: defender-for-iot/prioritize-vulnerabilities.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Prioritize and remediate vulnerabilities with Microsoft Defender for IoT in the Defender portal
3
-
description: This article describes how to prioritize and remediate vulnerabilities with Microsoft Defender for IoT in the Defender portal.
2
+
title: Prioritize, investigate and remediate vulnerabilities with Microsoft Defender for IoT in the Defender portal
3
+
description: This article describes how to prioritize, investigate and remediate vulnerabilities with Microsoft Defender for IoT in the Defender portal.
Copy file name to clipboardExpand all lines: defender-for-iot/set-up-sites.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Set up sites with Microsoft Defender for IoT in the Defender portal
3
-
description: This article describes how to set up a site as part of the site security feature included in Microsoft Defender for IoT in the Microsoft Defender portal.
2
+
title: Set up and create sites for site security with Microsoft Defender for IoT in the Defender portal
3
+
description: This article describes how to set up and create a site as part of the site security feature included in Microsoft Defender for IoT in the Microsoft Defender portal.
4
4
ms.service: defender-for-iot
5
5
author: limwainstein
6
6
ms.author: lwainstein
@@ -11,9 +11,9 @@ ms.topic: how-to
11
11
12
12
# Set up sites
13
13
14
-
Microsoft Defender for IoT in the Microsoft Defender portal includes the **Site security** page, which offers an overview of the security state of your entire operational technology (OT) environment. Your organization's security team can use this page to regularly monitor the security status of your production sites.
14
+
Microsoft Defender for IoT in the Microsoft Defender portal includes the **Site security** page, which offers an overview of the security state of your entire operational technology (OT) environment. Your organization's security team use this page to regularly monitor the security status of your production sites.
15
15
16
-
In this article, you learn how to set up a site in the **Site security** page.
16
+
In this article, you learn how to set up a site in the **Site security** page.
17
17
18
18
Learn more about the [site security benefits and use cases](site-security-overview.md).
19
19
@@ -39,7 +39,7 @@ To set up a site and associate the OT devices in your network to it:
39
39
-**Site description**: Describe the purpose of the site, what activities occur there, the types and number of devices used, and other important information about the site.
40
40
-**Owners**: The contact emails of any users administering the site who must be contacted when problems occur.
41
41
42
-
:::image type="content" source="media/set-up-sites/site-security-set-up-details-new.png" alt-text="Screenshot showing the details for a new site in the Site security page of Microsoft Defender for IoT in the Microsoft Defender portal.":::
42
+
:::image type="content" source="media/set-up-sites/site-security-set-up-details-new.png" alt-text="Screenshot showing the details for creating a new site in the Site security page of Microsoft Defender for IoT in the Microsoft Defender portal.":::
43
43
44
44
1. When completed, select **Next** to associate devices to the site.
45
45
@@ -74,7 +74,7 @@ Review that information for the site you want to create:
74
74
1. Review the selected OT devices. If needed, select **Edit devices** to return to the **Associate devices** screen.
75
75
1. Select **Complete**.
76
76
77
-
The site is now set up and appears in the **Site security** page.
77
+
The site is now set up and appears in the **Site security** page.
78
78
79
79
Regarding device data:
80
80
@@ -87,21 +87,21 @@ Review that information for the site you want to create:
87
87
88
88
Use a device group to make sure that the correct users have access to the site. To create a device group:
89
89
90
-
1. Select **Create device group**.
90
+
1. Select **Create device group**.
91
91
92
92
The **Settings > Endpoints > Device groups** page opens.
93
93
94
94
1. Select **Add device group** and type a device group name.
95
-
1. Select the remediation level, type a description, and select **Next**.
95
+
1. Select the remediation level, type a description, and select **Next**.
96
96
97
97
The **Devices** page opens.
98
98
99
99
1. Type the value for the **Tag** condition in the format: *Site: \<Site name\>*. For example, *Site: San Francisco*.
100
-
1. Select **Next**.
100
+
1. Select **Next**.
101
101
102
-
The **Preview devices** page opens with a list of devices in the group.
102
+
The **Preview devices** page opens with a list of devices in the group.
0 commit comments