You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .acrolinx-config.edn
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
{:changed-files-limit30
1
+
{:changed-files-limit60
2
2
:allowed-branchname-matches ["main""release-.*"]
3
-
:allowed-filename-matches ["defender-xdr/""exposure-management/""defender/""defender-business/""defender-vulnerability-management/""defender-office-365/""defender-endpoint/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3
+
:allowed-filename-matches ["defender/""defender-business/""defender-endpoint/""defender-for-cloud/""defender-for-iot/""defender-office-365/""defender-vulnerability-management/""defender-xdr/""exposure-management/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
Copy file name to clipboardExpand all lines: defender-business/mdb-add-users.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: conceptual
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 06/07/2024
12
+
ms.date: 06/19/2024
13
13
ms.collection:
14
14
- m365-security
15
15
- tier1
@@ -59,8 +59,8 @@ One good way to make sure MFA is enabled for all users is by using [security def
59
59
60
60
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
61
61
62
-
> [!CAUTION]
63
-
> If your organization is using Conditional Access policies, you won't be able to enable security defaults. You'll see a message that indicates you're using classic policies instead. You can use *either* security defaults *or* Conditional Access, but not both. For most organizations, security defaults offer a good level of sign-in security. But if your organization must meet more stringent requirements, you can use Conditional Access policies instead. To learn more, see the following articles:
62
+
> [!NOTE]
63
+
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
64
64
> -[Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
65
65
> -[Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
66
66
@@ -69,5 +69,6 @@ One good way to make sure MFA is enabled for all users is by using [security def
69
69
## Next steps
70
70
71
71
-[Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
72
+
72
73
-[Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-create-edit-device-groups.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
12
ms.reviewer: nehabha
13
-
ms.date: 05/17/2023
13
+
ms.date: 06/19/2024
14
14
f1.keywords: NOCSH
15
15
ms.collection:
16
16
- SMB
@@ -30,7 +30,6 @@ In Defender for Business, policies are applied to devices through certain collec
30
30
-[How to view an existing device group](#view-an-existing-device-group)
31
31
-[What the Add All Devices option does](#what-does-the-add-all-devices-option-do)
32
32
33
-
34
33
## What is a device group?
35
34
36
35
A device group is a collection of devices that are grouped together because of certain specified criteria, such as operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. In Defender for Business, policies are applied to devices by using device groups.
Copy file name to clipboardExpand all lines: defender-business/mdb-email-notifications.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: overview
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
12
ms.reviewer: nehabha
13
-
ms.date: 05/01/2023
13
+
ms.date: 06/19/2024
14
14
f1.keywords: NOCSH
15
15
ms.collection:
16
16
- m365-security
@@ -45,7 +45,7 @@ When you set up email notifications, you can choose from two types, as described
45
45
> [!TIP]
46
46
> **Email notifications are not the only way your security team can find out about new alerts or vulnerabilities**.
47
47
>
48
-
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are others! For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they'll see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
48
+
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are other methods you can use as well. For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
49
49
>
50
50
> Your security team can also choose **Incidents** in the navigation pane to view information. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-firewall.md
+34-5Lines changed: 34 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: overview
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 05/04/2023
12
+
ms.date: 06/19/2024
13
13
ms.reviewer: nehabha
14
14
f1.keywords: NOCSH
15
15
ms.collection:
@@ -34,10 +34,29 @@ You can use firewall protection to specify whether to allow or to block connecti
34
34
35
35
Depending on whether you're using the Microsoft Defender portal or Intune to manage your firewall protection, use one of the following procedures.
36
36
37
-
| Portal | Procedure |
38
-
|:---|:---|
39
-
| Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.<br/>2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.<br/>3. Select an operating system tab (such as **Windows clients**).<br/>4. Expand **Firewall** to view your list of policies.<br/>5. Select a policy to view the details. <br/><br/>To make changes or to learn more about policy settings, see the following articles:<br/>- [View or edit device policies](mdb-view-edit-create-policies.md)<br/>- [Firewall settings](mdb-firewall.md)<br/>- [Manage your custom rules for firewall policies](mdb-firewall.md)|
40
-
| Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) |1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.<br/>2. Select **Endpoint security**.<br/>3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. <br/><br/>For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).|
37
+
### Use the Microsoft Defender portal to view or edit firewall policies
38
+
39
+
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
40
+
41
+
2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.
42
+
43
+
3. Select an operating system tab (such as **Windows clients**).
44
+
45
+
4. Expand **Firewall** to view your list of policies.
46
+
47
+
5. Select a policy to view the details. To make changes or to learn more about policy settings, see the following articles:
48
+
49
+
-[View or edit device policies](mdb-view-edit-create-policies.md)
50
+
-[Firewall settings](mdb-firewall.md)
51
+
-[Manage your custom rules for firewall policies](mdb-firewall.md)
52
+
53
+
### Use the Intune admin center to view or edit firewall policies
54
+
55
+
1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.
56
+
57
+
2. Select **Endpoint security**.
58
+
59
+
3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. To get help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
41
60
42
61
## Manage your custom rules for firewall policies in Microsoft Defender for Business
43
62
@@ -56,10 +75,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
56
75
5. To create a custom rule, follow these steps:
57
76
58
77
1. Under **Custom rules**, choose **+ Add rule**. (You can have up to 150 custom rules.)
78
+
59
79
2. On the **Create new rule** flyout, specify a name and description for the rule.
80
+
60
81
3. Select a profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
82
+
61
83
4. In the **Remote address type** list, select either **IP** or **Application file path**.
84
+
62
85
5. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6d, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
86
+
63
87
6. On the **Create new rule** flyout, select **Create rule**.
64
88
65
89
6. On the **Configuration settings** screen, choose **Next**.
@@ -81,10 +105,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
81
105
6. To edit your custom rule, follow these steps:
82
106
83
107
1. On the **Edit rule** flyout, review and edit the rule's name and description.
108
+
84
109
2. Review and if necessary, edit the rule's profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
110
+
85
111
3. In the **Remote address type** list, select either **IP** or **Application file path**.
112
+
86
113
4. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6c, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
114
+
87
115
5. Set **Enable rule** to **On** to make the rule active. Or, to disable the rule, set the switch to **Off**.
116
+
88
117
6. On the **Edit rule** flyout, select **Update rule**.
89
118
90
119
7. On the **Configuration settings** screen, choose **Next**.
Copy file name to clipboardExpand all lines: defender-business/mdb-get-started.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: conceptual
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 04/10/2024
12
+
ms.date: 06/19/2024
13
13
ms.reviewer: nehabha
14
14
f1.keywords: NOCSH
15
15
ms.collection:
@@ -43,7 +43,6 @@ Use the navigation bar on the left side of the screen to access your incidents,
43
43
|**Partner catalog**| Lists Microsoft partners who provide technical and professional services. |
44
44
|**Assets** > **Devices**| Enables you to view devices, such as computers and mobile devices that are enrolled in [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). |
45
45
|**Endpoints** > **Vulnerability management**| Enables you to access your [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Provides a dashboard, recommendations, remediation activities, a software inventory, and a list of potential weaknesses within your company. |
46
-
|**Endpoints** > **Tutorials**| Provides access to walkthroughs and simulations to help you learn more about how your threat protection features work. Select the **Read the walkthrough** link before attempting to get the simulation file for each tutorial. Some simulations require Office apps, such as Microsoft Word, to read the walkthrough. |
47
46
|**Endpoints** > **Configuration management** > **Device configuration**| Lists your security policies by operating system and by type. To learn more about your security policies, see [View or edit policies in Defender for Business](mdb-view-edit-create-policies.md). |
48
47
|**Endpoints** > **Configuration management** > **Device management reporting**| Lists devices that are onboarded to Defender for Business, along with their operating system version, sensor health state, and when they were last updated. |
49
48
|**Email & collaboration** > **Policies & rules**| If your subscription includes Exchange Online Protection or Microsoft Defender for Office 365, this section is where you'll manage your security policies and settings for email and collaboration services. [Learn more about Office 365 security](/defender-office-365/mdo-about). *The standalone version of Defender for Business does not include email & collaboration policies, but Microsoft 365 Business Premium does include Exchange Online Protection and Defender for Office 365 Plan 1*. |
0 commit comments