You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/ios-whatsnew.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,11 @@
2
2
title: What's new in Microsoft Defender for Endpoint on iOS
3
3
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on iOS.
4
4
ms.service: defender-endpoint
5
-
ms.author: deniseb
6
-
author: denisebmsft
5
+
ms.author: ewalsh
6
+
author: emmwalshh
7
7
ms.reviewer: sunasing; denishdonga
8
8
ms.localizationpriority: medium
9
-
ms.date: 03/14/2025
9
+
ms.date: 03/28/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -161,7 +161,7 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
161
161
## 1.1.28250101
162
162
163
163
-**Integration with Tunnel** - Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. For more information, see [Microsoft Tunnel Overview](/mem/intune/protect/microsoft-tunnel-overview).
164
-
-**Zero-touch onboard for enrolled iOS devices** enrolled through Microsoft Intune is generally available. For more information, see [Zero touch onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint).
164
+
-**Zero-touch onboard for enrolled iOS devices** enrolled through Microsoft Intune is generally available. For more information, see [Zero touch onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint).
165
165
- Bug fixes.
166
166
167
167
## 1.1.24210103
@@ -172,7 +172,7 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
172
172
## 1.1.23250104
173
173
174
174
- Performance optimizations - Test battery performance with this version and let us know your feedback.
175
-
-**Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboards for devices enrolled through Microsoft Intune has been added. For more information, see this [Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint).
175
+
-**Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboards for devices enrolled through Microsoft Intune has been added. For more information, see this [Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint).
176
176
-**Privacy Controls** - Configure privacy controls for phish alert report. For more information, see [Configure iOS features](ios-configure-features.md).
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)*| Excludes events from on-demand scans, real-time protection (RTP), and behavior monitoring (BM).|
56
56
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)*| Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
-[Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app.
112
+
-[Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app.
113
113
114
114
-[Configure Conditional Access to enforce user onboarding](android-configure.md#conditional-access-with-defender-for-endpoint-on-android): This can be applied to ensure end-users onboard to the Microsoft Defender for Endpoint app after deploying. Watch this video for a quick demo on configuring conditional access with Defender for Endpoint risk signals.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-exception.md
+10-26Lines changed: 10 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,9 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier1
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 03/04/2022
15
+
ms.date: 03/21/2025
16
16
---
17
17
18
18
# Create and view exceptions for security recommendations
@@ -39,37 +39,21 @@ Only users with "exceptions handling" permissions can manage exceptions (includi
39
39
40
40
## Create an exception
41
41
42
-
Select a security recommendation you would like to create an exception for, and then select **Exception options** and fill out the form.
42
+
Navigate to Recommendations page in the Microsoft Defender portal. By default, the page shows all recommendations filtered to all device groups. To view recommendations for a specific device group, select the device group from the filter dropdown list.
43
43
44
-

44
+
:::image type="content" alt-text="Screenshot highlighting the filter option in the Recommendations page." source="/defender/media/defender-vulnerability-management/exception-filter-small.png" lightbox="/defender/media/defender-vulnerability-management/exception-filter.png":::
45
45
46
-
### Exception by device group
47
-
48
-
Apply the exception to all current device groups or choose specific device groups. Future device groups won't be included in the exception. Device groups that already have an exception won't be displayed in the list. If you only select certain device groups, the recommendation state changes from "active" to "partial exception." The state changes to "full exception" if you select all the device groups.
49
-
50
-

51
-
52
-
#### Filtered views
53
-
54
-
If you've filtered by device group on any of the vulnerability management pages, only your filtered device groups appear as options.
46
+
Select a security recommendation you would like to create an exception for. In the pane, select **Exception options** and fill out the form.
55
47
56
-
This is the button to filter by device group on any of the vulnerabilitymanagement pages:
48
+
:::image type="content" alt-text="Screenshot highlighting Exception options in a Recommendation pane." source="/defender/media/defender-vulnerability-management/exception-button-small.png" lightbox="/defender/media/defender-vulnerability-management/exception-button.png":::
57
49
58
-

50
+
The form includes fields to identify the device groups, the justification and context, and the duration of the exception.
59
51
60
-
Exception view with filtered device groups:
61
-
62
-

63
-
64
-
#### Large number of device groups
65
-
66
-
If your organization has more than 20 device groups, select **Edit** next to the filtered device group option.
67
-
68
-

52
+
### Exception by device group
69
53
70
-
A flyout appears where you can search and choose device groups you want included. Select the check mark icon below Search to check/uncheck all.
54
+
Apply the exception to all current device groups or choose specific device groups. Future device groups won't be included in the exception. Device groups that already have an exception won't be displayed in the list. If you only select certain device groups, the recommendation state changes from "active" to "partial exception." The state changes to "full exception" if you select all the device groups.
71
55
72
-

56
+

Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-zero-day-vulnerabilities.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,9 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier1
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 03/04/2022
15
+
ms.date: 03/21/2025
16
16
---
17
17
18
18
# Mitigate zero-day vulnerabilities
@@ -24,19 +24,19 @@ ms.date: 03/04/2022
24
24
-[Microsoft Defender XDR](/defender-xdr)
25
25
-[Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
26
26
27
-
A zero-day vulnerability is a flaw in software for which no official patch or security update has been released. A software vendor may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.
27
+
A zero-day vulnerability is a flaw in software for which no official patch or security update is available yet. A software publisher may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.
28
28
29
-
Vulnerability management will only display zero-day vulnerabilities it has information about.
29
+
Vulnerability management only displays zero-day vulnerabilities it has information about.
30
30
31
31
> [!TIP]
32
32
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
33
33
34
34
## Find information about zero-day vulnerabilities
35
35
36
-
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender portal.
36
+
Once a zero-day vulnerability is found, information about it is conveyed through the following experiences in the Microsoft Defender portal.
37
37
38
38
> [!NOTE]
39
-
> 0-day vulnerability capability is currently available only for Windows products.
39
+
> Zero-day vulnerability capability is currently available only for Windows products.
40
40
41
41
### Defender Vulnerability Management dashboard
42
42
@@ -74,17 +74,17 @@ Look for a zero-day tag for each software that has been affected by the zero-day
74
74
75
75
View clear suggestions about remediation and mitigation options, including workarounds if they exist. Filter by the "zero day" tag to only see security recommendations addressing zero-day vulnerabilities.
76
76
77
-
If there's software with a zero-day vulnerability and additional vulnerabilities to address, you'll get one recommendation about all vulnerabilities.
77
+
If there's software with a zero-day vulnerability and other vulnerabilities to address, you get one recommendation about all vulnerabilities.
78
78
79
79
:::image type="content" alt-text="Zero day example of Windows Server 2016 in the security recommendations page." source="/defender/media/defender-vulnerability-management/tvm-zero-day-security-recommendation.png" lightbox="/defender/media/defender-vulnerability-management/tvm-zero-day-security-recommendation.png":::
80
80
81
81
## Addressing zero-day vulnerabilities
82
82
83
83
Go to the security recommendation page and select a recommendation with a zero-day. A flyout will open with information about the zero-day and other vulnerabilities for that software.
84
84
85
-
There will be a link to mitigation options and workarounds if they are available. Workarounds may help reduce the risk posed by this zero-day vulnerability until a patch or security update can be deployed.
85
+
There is a link to mitigation options and workarounds if they are available. Workarounds might help reduce the risk posed by this zero-day vulnerability until a patch or security update can be deployed.
86
86
87
-
Open remediation options and choose the attention type. An "attention required" remediation option is recommended for the zero-day vulnerabilities, since an update hasn't been released yet. You won't be able to select a due date, since there's no specific action to perform. If there are older vulnerabilities for this software you wish to remediation, you can override the "attention required" remediation option and choose "update."
87
+
Open remediation options and choose the attention type. An "attention required" remediation option is recommended for the zero-day vulnerabilities, since an update is not yet available. You won't be able to select a due date, since there's no specific action to perform. If there are older vulnerabilities for this software you wish to remediation, you can override the "attention required" remediation option and choose "update."
88
88
89
89
:::image type="content" alt-text="Zero day flyout example of Windows Server 2016 in the security recommendations page." source="/defender/media/defender-vulnerability-management/tvm-zero-day-recommendation-flyout400.png" lightbox="/defender/media/defender-vulnerability-management/tvm-zero-day-recommendation-flyout400.png":::
90
90
@@ -94,7 +94,7 @@ Go to the [Remediation](tvm-remediation.md) page to view the remediation activit
94
94
95
95
## Patching zero-day vulnerabilities
96
96
97
-
When a patch is released for the zero-day, the recommendation will be changed to "Update" and a blue label next to it that says "New security update for zero day." It will no longer consider as a zero-day, the zero-day tag will be removed from all pages.
97
+
When a patch is released for the zero-day, the recommendation changes to **Update** and a blue label next to it that says **New security update for zero day.** The vulnerability is no longer considered as a zero-day and the zero-day tag is removed from all pages.
0 commit comments