Skip to content

Commit 65a5078

Browse files
Merge pull request #2075 from MicrosoftDocs/main
Publish main to live, 12/02/24, 3:30 PM PT
2 parents 8b93e40 + 02ba281 commit 65a5078

15 files changed

+128
-31
lines changed

CloudAppSecurityDocs/app-governance-faq.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
metadata:
33
title: Frequently asked questions about app governance
44
description: Get answers to your questions about app governance.
5+
ms.date: 05/28/2023
56

67
title: Frequently asked questions about app governance
78
summary: |

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/18/2024
18+
ms.date: 12/02/2024
1919
search.appverid: met150
2020
---
2121

@@ -528,9 +528,6 @@ Dependencies: Microsoft Defender Antivirus
528528

529529
This rule prevents malware from abusing WMI to attain persistence on a device.
530530

531-
> [!IMPORTANT]
532-
> File and folder exclusions don't apply to this attack surface reduction rule.
533-
534531
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
535532

536533
> [!NOTE]

defender-endpoint/ios-troubleshoot.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 06/19/2024
17+
ms.date: 12/02/2024
1818
---
1919

2020
# Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
@@ -28,12 +28,11 @@ ms.date: 06/19/2024
2828

2929
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
3030
31-
3231
This article provides troubleshooting information to help you address issues that might arise with Microsoft Defender for Endpoint on iOS.
3332

3433
> [!NOTE]
3534
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
36-
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
35+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for seven days, the device may be marked as inactive in the Microsoft Defender portal.
3736
3837
## Apps don't work when VPN is turned on
3938

@@ -88,12 +87,12 @@ In addition, a notification is shown on the iOS device. Tapping on the notificat
8887
> [!div class="mx-imgBorder"]
8988
> :::image type="content" source="media/ios-phish-alert.png" alt-text="The site reported as unsafe notification" lightbox="media/ios-phish-alert.png":::
9089
91-
## Device not seen on the Defender for Endpoint console after onboarding
90+
## Device not seen in the Microsoft Defender portal after onboarding
9291

93-
After onboarding, it takes few hours for device to show up in the Device inventory in the Defender for Endpoint security console. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
92+
After onboarding, it takes few hours for device to show up in the Device inventory in the Microsoft Defender portal. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
9493

9594
> [!NOTE]
96-
> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in Defender for Endpoint console is of the format <username_iPhone/iPad model>. You can also use Microsoft Entra device ID to identify the device in the Defender for Endpoint console.
95+
> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in the Microsoft Defender portal is of the format <username_iPhone/iPad*>. You can also use your Microsoft Entra device ID to identify the device in the Microsoft Defender portal.
9796
9897
## Data and Privacy
9998

defender-endpoint/linux-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: kumasumit, gopkr
88
ms.localizationpriority: medium
9-
ms.date: 11/13/2024
9+
ms.date: 12/02/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -56,7 +56,7 @@ Nov-2024 Build: 101.24092.0002 | Release version: 30.124092.0002.0
5656
<details>
5757
<summary> Oct-2024 (Build: 101.24082.0004 | Release version: 30.124082.0004.0)</summary>
5858

59-
## Sept-2024 Build: 101.24082.0004 | Release version: 30.124082.0004.0
59+
## Oct-2024 Build: 101.24082.0004 | Release version: 30.124082.0004.0
6060

6161
&ensp;Released: **October 15, 2024**<br/>
6262
&ensp;Published: **October 15, 2024**<br/>

defender-endpoint/mac-install-with-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 10/28/2024
18+
ms.date: 12/02/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -337,7 +337,7 @@ For more information, see [Set preferences for Microsoft Defender for Endpoint o
337337

338338
### Step 10: Network protection for Microsoft Defender for Endpoint on macOS
339339

340-
In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47):
340+
In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage):
341341

342342
1. Go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
343343

defender-endpoint/mac-jamfpro-policies.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
title: Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
33
description: Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: denisebmsft
6+
ms.author: deniseb
77
manager: deniseb
8+
ms.reviewer: yongrhee
89
ms.localizationpriority: medium
910
audience: ITPro
1011
ms.collection:
@@ -14,7 +15,7 @@ ms.collection:
1415
ms.topic: conceptual
1516
ms.subservice: macos
1617
search.appverid: met150
17-
ms.date: 09/30/2024
18+
ms.date: 12/02/2024
1819
---
1920

2021
# Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
@@ -115,7 +116,7 @@ In this step, we go over *Preferences* so you can configure anti-malware and EDR
115116

116117
1. Follow the guidance in [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender.
117118

118-
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
119+
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
119120

120121
3. Under **Select Platform**, select **macOS**.
121122

defender-endpoint/mtd.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Microsoft Defender for Endpoint - Mobile Threat Defense
3-
ms.reviewer: tdoucette, sunasing
3+
ms.reviewer: tdoucette, sunasing, denishdonga
44
description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
55
ms.service: defender-endpoint
66
ms.subservice: onboard
7-
ms.author: denishdonga
8-
author: denishdonga27
7+
ms.author: deniseb
8+
author: denisebmsft
99
ms.localizationpriority: medium
10-
ms.date: 11/15/2024
10+
ms.date: 12/02/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -37,7 +37,7 @@ Microsoft Defender for Endpoint on Android and iOS provides the below key capabi
3737
|Capability|Description|
3838
|---|---|
3939
|Web Protection|Anti-phishing, blocking unsafe network connections, and support for custom indicators for URLs and domains. (File and IP indicators aren't currently supported.)|
40-
|Malware Protection (Android-only)|Scanning for malicious apps.|
40+
|Malware Protection (Android-only)|Scanning for malicious apps and APK Files.|
4141
|Jailbreak Detection (iOS-only)|Detection of jailbroken devices.|
4242
|Microsoft Defender Vulnerability Management (MDVM) |Vulnerability assessment of onboarded mobile devices. Includes OS and Apps vulnerabilities assessment for both Android and iOS. Visit this [page](/defender-vulnerability-management/defender-vulnerability-management) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.|
4343
|Network Protection | Protection against rogue Wi-Fi related threats and rogue certificates; ability to add to the "allow" list the root CA and private root CA certificates in Intune; establish trust with endpoints.|

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 09/23/2024
16+
ms.date: 12/02/2024
1717
---
1818

1919
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -51,7 +51,7 @@ The following table gives information about the supported Microsoft Defender for
5151
|[Passive Mode](microsoft-defender-antivirus-compatibility.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
5252
|Sense detection sensor|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
5353
|Endpoint & network device discovery|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[5]</sup>|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
54-
|[Vulnerability management](/defender-vulnerability-management/defender-vulnerability-management)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
54+
|[Vulnerability management](/defender-vulnerability-management/defender-vulnerability-management)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[6]</sup>|
5555
||||||
5656
|**Response** | | | ||
5757
|[Automated Investigation & Response (AIR)](automated-investigations.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
@@ -71,6 +71,7 @@ The following table gives information about the supported Microsoft Defender for
7171

7272
<sup>[5]</sup> Endpoint & network device discovery is supported on Windows Server 2019 or later, Windows 10, and Windows 11.
7373

74+
<sup>[6]</sup> Microsoft Defender Vulnerability Management is not supported on Rocky and Alma currently.
7475
> [!NOTE]
7576
> Windows 7, 8.1, Windows Server 2008 R2 include support for the EDR sensor, and antivirus using System Center Endpoint Protection (SCEP).
7677

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@
2727
href: mail-flow-about.md
2828
- name: Microsoft Defender portal overview
2929
href: /defender-xdr/microsoft-365-defender-portal
30+
- name: Integrate non-Microsoft security services with Microsoft 365
31+
href: mdo-integrate-security-service.md
3032

3133
- name: Evaluate
3234
items:

0 commit comments

Comments
 (0)