You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 11/18/2024
18
+
ms.date: 12/02/2024
19
19
search.appverid: met150
20
20
---
21
21
@@ -528,9 +528,6 @@ Dependencies: Microsoft Defender Antivirus
528
528
529
529
This rule prevents malware from abusing WMI to attain persistence on a device.
530
530
531
-
> [!IMPORTANT]
532
-
> File and folder exclusions don't apply to this attack surface reduction rule.
533
-
534
531
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-troubleshoot.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: ios
16
16
search.appverid: met150
17
-
ms.date: 06/19/2024
17
+
ms.date: 12/02/2024
18
18
---
19
19
20
20
# Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
@@ -28,12 +28,11 @@ ms.date: 06/19/2024
28
28
29
29
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
30
30
31
-
32
31
This article provides troubleshooting information to help you address issues that might arise with Microsoft Defender for Endpoint on iOS.
33
32
34
33
> [!NOTE]
35
34
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
36
-
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
35
+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for seven days, the device may be marked as inactive in the Microsoft Defender portal.
37
36
38
37
## Apps don't work when VPN is turned on
39
38
@@ -88,12 +87,12 @@ In addition, a notification is shown on the iOS device. Tapping on the notificat
88
87
> [!div class="mx-imgBorder"]
89
88
> :::image type="content" source="media/ios-phish-alert.png" alt-text="The site reported as unsafe notification" lightbox="media/ios-phish-alert.png":::
90
89
91
-
## Device not seen on the Defender for Endpoint console after onboarding
90
+
## Device not seen in the Microsoft Defender portal after onboarding
92
91
93
-
After onboarding, it takes few hours for device to show up in the Device inventory in the Defender for Endpoint security console. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
92
+
After onboarding, it takes few hours for device to show up in the Device inventory in the Microsoft Defender portal. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
94
93
95
94
> [!NOTE]
96
-
> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in Defender for Endpoint console is of the format <username_iPhone/iPad model>. You can also use Microsoft Entra device ID to identify the device in the Defender for Endpoint console.
95
+
> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in the Microsoft Defender portal is of the format <username_iPhone/iPad*>. You can also use your Microsoft Entra device ID to identify the device in the Microsoft Defender portal.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-jamfpro-policies.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,10 @@
2
2
title: Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
3
3
description: Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: denisebmsft
6
+
ms.author: deniseb
7
7
manager: deniseb
8
+
ms.reviewer: yongrhee
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
10
11
ms.collection:
@@ -14,7 +15,7 @@ ms.collection:
14
15
ms.topic: conceptual
15
16
ms.subservice: macos
16
17
search.appverid: met150
17
-
ms.date: 09/30/2024
18
+
ms.date: 12/02/2024
18
19
---
19
20
20
21
# Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
@@ -115,7 +116,7 @@ In this step, we go over *Preferences* so you can configure anti-malware and EDR
115
116
116
117
1. Follow the guidance in [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender.
117
118
118
-
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
119
+
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
Copy file name to clipboardExpand all lines: defender-endpoint/mtd.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: Microsoft Defender for Endpoint - Mobile Threat Defense
3
-
ms.reviewer: tdoucette, sunasing
3
+
ms.reviewer: tdoucette, sunasing, denishdonga
4
4
description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
5
5
ms.service: defender-endpoint
6
6
ms.subservice: onboard
7
-
ms.author: denishdonga
8
-
author: denishdonga27
7
+
ms.author: deniseb
8
+
author: denisebmsft
9
9
ms.localizationpriority: medium
10
-
ms.date: 11/15/2024
10
+
ms.date: 12/02/2024
11
11
manager: deniseb
12
12
audience: ITPro
13
13
ms.collection:
@@ -37,7 +37,7 @@ Microsoft Defender for Endpoint on Android and iOS provides the below key capabi
37
37
|Capability|Description|
38
38
|---|---|
39
39
|Web Protection|Anti-phishing, blocking unsafe network connections, and support for custom indicators for URLs and domains. (File and IP indicators aren't currently supported.)|
40
-
|Malware Protection (Android-only)|Scanning for malicious apps.|
40
+
|Malware Protection (Android-only)|Scanning for malicious apps and APK Files.|
41
41
|Jailbreak Detection (iOS-only)|Detection of jailbroken devices.|
42
42
|Microsoft Defender Vulnerability Management (MDVM) |Vulnerability assessment of onboarded mobile devices. Includes OS and Apps vulnerabilities assessment for both Android and iOS. Visit this [page](/defender-vulnerability-management/defender-vulnerability-management) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.|
43
43
|Network Protection | Protection against rogue Wi-Fi related threats and rogue certificates; ability to add to the "allow" list the root CA and private root CA certificates in Intune; establish trust with endpoints.|
0 commit comments