You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-whatsnew.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,9 @@ This article is updated frequently to let you know what's new in the latest rele
41
41
>
42
42
> If you have any concerns or need assistance during this transition, contact support.
43
43
44
+
> [!NOTE]
45
+
> Defender for Endpoint on Linux is updated regularly. While security fixes are included as part of monthly releases, the fixes aren't always listed as a separate **Security Patch** item in these notes. If a release contains security-related updates, the updates are listed in this article under [Releases for Defender for Endpoint on Linux](#releases-for-defender-for-endpoint-on-linux) in the specific version section. For detailed information on Microsoft security updates, see the [Microsoft Security Update Guide](https://msrc.microsoft.com/update-guide).
@@ -1426,8 +1429,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
1426
1429
1427
1430
#### What's new
1428
1431
1429
-
- This version contains a security update for [CVE-2022-23278](https://msrc-blog.microsoft.com/2022/03/08/guidance-for-cve-2022-23278-spoofing-in-microsoft-defender-for-endpoint/)
1430
-
1432
+
- This version contains a security update for [CVE-2022-23278](https://www.microsoft.com/msrc/blog/2022/03/guidance-for-cve-2022-23278-spoofing-in-microsoft-defender-for-endpoint).
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/prerequisites-sensor-version-3.md
+24-1Lines changed: 24 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ This article describes the requirements for installing the Microsoft Defender fo
14
14
15
15
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
16
16
The Defender for Identity sensor v3.x:
17
-
- Requires that Defender for Endpoint is deployed
17
+
- Requires that Defender for Endpoint is deployed
18
18
- Can't be activated on a server that has a Defender for Identity sensor V2.x already deployed
19
19
- Doesn't currently support VPN integration
20
20
- Doesn't currently support ExpressRoute
@@ -62,6 +62,29 @@ The following table describes memory requirements on the server used for the Def
62
62
63
63
> [!IMPORTANT]
64
64
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
65
+
## Configure Unified Sensor to support advanced identity detections
66
+
67
+
Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability on the machine, improving security visibility and unlocking additional identity detections. Once applied, the configuration is enforced on **existing and future devices** that match the rule criteria. The tag itself is visible in the Device Inventory, providing admins with transparency and auditing capabilities.
68
+
69
+
**Steps to apply the configuration:**
70
+
71
+
1. In the **Microsoft Defender portal**, navigate to: **System > Settings > Microsoft Defender XDR > Asset Rule Management**.
72
+
2. Create a new rule.
73
+
3. In the side panel:
74
+
75
+
1. Select a **name** for the rule.
76
+
77
+
1. Set **rule conditions** using `Device name`, `Domain`, or `Device tag` to target the desired machines.
78
+
79
+
1. Ensure that the **Defender for Identity V3.x sensor** is already deployed on the selected devices.
80
+
81
+
1. Matching should primarily target **domain controllers** with the V3.x sensor installed.
82
+
83
+
1.**Add the tag**`Unified Sensor RPC Audit` to the selected devices.
84
+
85
+
1. Click **Submit** to save the rule.
86
+
87
+
Offboarding a device from this configuration can be done by **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
Copy file name to clipboardExpand all lines: defender-xdr/security-copilot-in-microsoft-365-defender.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Microsoft Copilot in Microsoft Defender
2
+
title: Microsoft Security Copilot in Microsoft Defender
3
3
description: Learn about Microsoft Security Copilot capabilities embedded in Microsoft Defender.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
@@ -26,14 +26,14 @@ appliesto:
26
26
#customer intent: As a security analyst, I want to learn about Microsoft Security Copilot capabilities embedded in Microsoft Defender so that I can use them to perform my security tasks efficiently.
27
27
---
28
28
29
-
# Microsoft Copilot in Microsoft Defender
29
+
# Microsoft Security Copilot in Microsoft Defender
> Microsoft Defender XDR provides a unified XDR experience for Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Vulnerability Management. Learn more about this pre- and post-breach defense suite in [What is Microsoft Defender XDR?](microsoft-365-defender.md)
35
35
36
-
This article provides an overview for users of Microsoft Copilot in Microsoft Defender, including steps to access, key capabilities, and links to the details of these capabilities.
36
+
This article provides an overview for users of Microsoft Security Copilot in Microsoft Defender, including steps to access, key capabilities, and links to the details of these capabilities.
37
37
38
38
## Know before you begin
39
39
@@ -46,7 +46,7 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
46
46
-[Prompting in Security Copilot](/security-copilot/prompting-security-copilot)
47
47
-[Responsible AI FAQs](responsible-ai-copilot-defender.md)
48
48
49
-
## Microsoft Copilot integration in Microsoft Defender
49
+
## Microsoft Security Copilot integration in Microsoft Defender
50
50
51
51
[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence. Copilot in Defender is available to users who have provisioned access to Security Copilot.
0 commit comments