Skip to content

Commit 679f539

Browse files
committed
Merge branch 'main' into Mal-chrisda
2 parents 649af6e + fb40541 commit 679f539

File tree

359 files changed

+2840
-2380
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

359 files changed

+2840
-2380
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
{:changed-files-limit 30
1+
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["defender-xdr/" "exposure-management/" "defender/" "defender-business/" "defender-vulnerability-management/" "defender-office-365/" "defender-endpoint/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

.openpublishing.redirection.defender.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,6 @@
55
"redirect_url": "/defender-xdr/advanced-hunting-overview",
66
"redirect_document_id": false
77
},
8-
{
9-
"source_path": "defender-xdr/alerts-incidents-correlation.md",
10-
"redirect_url": "/defender-xdr/incident-response-overview",
11-
"redirect_document_id": false
12-
},
138
{
149
"source_path": "defender-office-365/zero-trust-continuous-access-evaluation-microsoft-365.md",
1510
"redirect_url": "/security/zero-trust/zero-trust-continuous-access-evaluation-microsoft-365",

defender-business/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
href: trial-playbook-defender-business.md
2626
- name: Visit the Microsoft Defender portal
2727
href: mdb-get-started.md
28-
- name: Try tutorials and simulations
28+
- name: Find training and learning resources
2929
href: mdb-tutorials.md
3030
- name: Set up and configure Defender for Business
3131
items:

defender-business/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ landingContent:
5656
url: trial-playbook-defender-business.md
5757
- text: Turn on preview features
5858
url: /defender-xdr/preview
59+
- text: Find training and learning resources
60+
url: mdb-tutorials.md
5961

6062
# Card
6163
- title: Setup information

defender-business/mdb-add-users.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 06/07/2024
12+
ms.date: 06/19/2024
1313
ms.collection:
1414
- m365-security
1515
- tier1
@@ -59,8 +59,8 @@ One good way to make sure MFA is enabled for all users is by using [security def
5959

6060
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
6161

62-
> [!CAUTION]
63-
> If your organization is using Conditional Access policies, you won't be able to enable security defaults. You'll see a message that indicates you're using classic policies instead. You can use *either* security defaults *or* Conditional Access, but not both. For most organizations, security defaults offer a good level of sign-in security. But if your organization must meet more stringent requirements, you can use Conditional Access policies instead. To learn more, see the following articles:
62+
> [!NOTE]
63+
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
6464
> - [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
6565
> - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
6666
@@ -69,5 +69,6 @@ One good way to make sure MFA is enabled for all users is by using [security def
6969
## Next steps
7070

7171
- [Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
72+
7273
- [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
7374

defender-business/mdb-create-edit-device-groups.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/17/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- SMB
@@ -30,7 +30,6 @@ In Defender for Business, policies are applied to devices through certain collec
3030
- [How to view an existing device group](#view-an-existing-device-group)
3131
- [What the Add All Devices option does](#what-does-the-add-all-devices-option-do)
3232

33-
3433
## What is a device group?
3534

3635
A device group is a collection of devices that are grouped together because of certain specified criteria, such as operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. In Defender for Business, policies are applied to devices by using device groups.

defender-business/mdb-email-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/01/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- m365-security
@@ -45,7 +45,7 @@ When you set up email notifications, you can choose from two types, as described
4545
> [!TIP]
4646
> **Email notifications are not the only way your security team can find out about new alerts or vulnerabilities**.
4747
>
48-
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are others! For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they'll see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
48+
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are other methods you can use as well. For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
4949
>
5050
> Your security team can also choose **Incidents** in the navigation pane to view information. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
5151

defender-business/mdb-firewall.md

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 05/04/2023
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,10 +34,29 @@ You can use firewall protection to specify whether to allow or to block connecti
3434

3535
Depending on whether you're using the Microsoft Defender portal or Intune to manage your firewall protection, use one of the following procedures.
3636

37-
| Portal | Procedure |
38-
|:---|:---|
39-
| Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.<br/>2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.<br/>3. Select an operating system tab (such as **Windows clients**).<br/>4. Expand **Firewall** to view your list of policies.<br/>5. Select a policy to view the details. <br/><br/>To make changes or to learn more about policy settings, see the following articles:<br/>- [View or edit device policies](mdb-view-edit-create-policies.md)<br/>- [Firewall settings](mdb-firewall.md)<br/>- [Manage your custom rules for firewall policies](mdb-firewall.md) |
40-
| Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) |1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.<br/>2. Select **Endpoint security**.<br/>3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. <br/><br/>For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).|
37+
### Use the Microsoft Defender portal to view or edit firewall policies
38+
39+
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
40+
41+
2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.
42+
43+
3. Select an operating system tab (such as **Windows clients**).
44+
45+
4. Expand **Firewall** to view your list of policies.
46+
47+
5. Select a policy to view the details. To make changes or to learn more about policy settings, see the following articles:
48+
49+
- [View or edit device policies](mdb-view-edit-create-policies.md)
50+
- [Firewall settings](mdb-firewall.md)
51+
- [Manage your custom rules for firewall policies](mdb-firewall.md)
52+
53+
### Use the Intune admin center to view or edit firewall policies
54+
55+
1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.
56+
57+
2. Select **Endpoint security**.
58+
59+
3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. To get help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
4160

4261
## Manage your custom rules for firewall policies in Microsoft Defender for Business
4362

@@ -56,10 +75,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
5675
5. To create a custom rule, follow these steps:
5776

5877
1. Under **Custom rules**, choose **+ Add rule**. (You can have up to 150 custom rules.)
78+
5979
2. On the **Create new rule** flyout, specify a name and description for the rule.
80+
6081
3. Select a profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
82+
6183
4. In the **Remote address type** list, select either **IP** or **Application file path**.
84+
6285
5. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6d, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
86+
6387
6. On the **Create new rule** flyout, select **Create rule**.
6488

6589
6. On the **Configuration settings** screen, choose **Next**.
@@ -81,10 +105,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
81105
6. To edit your custom rule, follow these steps:
82106

83107
1. On the **Edit rule** flyout, review and edit the rule's name and description.
108+
84109
2. Review and if necessary, edit the rule's profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
110+
85111
3. In the **Remote address type** list, select either **IP** or **Application file path**.
112+
86113
4. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6c, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
114+
87115
5. Set **Enable rule** to **On** to make the rule active. Or, to disable the rule, set the switch to **Off**.
116+
88117
6. On the **Edit rule** flyout, select **Update rule**.
89118

90119
7. On the **Configuration settings** screen, choose **Next**.

defender-business/mdb-get-started.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 04/10/2024
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -43,7 +43,6 @@ Use the navigation bar on the left side of the screen to access your incidents,
4343
| **Partner catalog** | Lists Microsoft partners who provide technical and professional services. |
4444
| **Assets** > **Devices** | Enables you to view devices, such as computers and mobile devices that are enrolled in [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). |
4545
| **Endpoints** > **Vulnerability management** | Enables you to access your [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Provides a dashboard, recommendations, remediation activities, a software inventory, and a list of potential weaknesses within your company. |
46-
| **Endpoints** > **Tutorials** | Provides access to walkthroughs and simulations to help you learn more about how your threat protection features work. Select the **Read the walkthrough** link before attempting to get the simulation file for each tutorial. Some simulations require Office apps, such as Microsoft Word, to read the walkthrough. |
4746
| **Endpoints** > **Configuration management** > **Device configuration** | Lists your security policies by operating system and by type. To learn more about your security policies, see [View or edit policies in Defender for Business](mdb-view-edit-create-policies.md). |
4847
| **Endpoints** > **Configuration management** > **Device management reporting** | Lists devices that are onboarded to Defender for Business, along with their operating system version, sensor health state, and when they were last updated. |
4948
| **Email & collaboration** > **Policies & rules** | If your subscription includes Exchange Online Protection or Microsoft Defender for Office 365, this section is where you'll manage your security policies and settings for email and collaboration services. [Learn more about Office 365 security](/defender-office-365/mdo-about). *The standalone version of Defender for Business does not include email & collaboration policies, but Microsoft 365 Business Premium does include Exchange Online Protection and Defender for Office 365 Plan 1*. |

defender-business/mdb-lighthouse-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 09/28/2022
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,7 +34,7 @@ If you're a Microsoft Cloud Solution Provider (CSP) or Managed Service Provider
3434

3535
## Learn more about Microsoft 365 Lighthouse
3636

37-
Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users at scale.
37+
Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users for customers.
3838

3939
To learn more, see:
4040

0 commit comments

Comments
 (0)