Skip to content

Commit 67b877e

Browse files
authored
Merge pull request #1984 from MicrosoftDocs/main
pushing urgent fix live
2 parents d5981ab + 67a4e1b commit 67b877e

File tree

3 files changed

+15
-13
lines changed

3 files changed

+15
-13
lines changed

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -118,13 +118,13 @@ The following table lists specific products that have compatibility issues with
118118

119119
## Enable exploit protection system settings for testing
120120

121-
These Exploit Protection system settings are enabled by default on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
121+
These Exploit Protection system settings are enabled by default except for the Mandatory Address Space Layout Randomization (ASLR) on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
122122

123123
| System settings | Setting |
124124
| -------- | -------- |
125125
| Control flow guard (CFG) | Use default (On) |
126126
| Data Execution Prevention (DEP) | Use default (On) |
127-
| Force randomization for images (Mandatory ASRL) | Use default (On) |
127+
| Force randomization for images (Mandatory ASRL) | Use default (Off) |
128128
| Randomize memory allocations (Bottom-up ASRL) | Use default (On) |
129129
| High-entropy ASRL | Use default (On) |
130130
| Validate exception chains (SEHOP) | Use default (On) |
@@ -136,7 +136,7 @@ The xml sample is available below
136136
<MitigationPolicy>
137137
<SystemConfig>
138138
<DEP Enable="true" EmulateAtlThunks="false" />
139-
<ASLR ForceRelocateImages="true" RequireInfo="false" BottomUp="true" HighEntropy="true" />
139+
<ASLR ForceRelocateImages="false" RequireInfo="false" BottomUp="true" HighEntropy="true" />
140140
<ControlFlowGuard Enable="true" SuppressExports="false" />
141141
<SEHOP Enable="true" TelemetryOnly="false" />
142142
<Heap TerminateOnError="true" />

defender-xdr/microsoft-365-defender.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ Microsoft Defender XDR helps security teams protect and detect their organizatio
4343

4444
With the integrated Microsoft Defender XDR solution, security professionals can stitch together the threat signals that each of these products receive and determine the full scope and impact of the threat; how it entered the environment, what it's affected, and how it's currently impacting the organization. Microsoft Defender XDR takes automatic action to prevent or stop the attack and self-heal affected mailboxes, endpoints, and user identities.
4545

46+
> [!NOTE]
47+
> Microsoft Defender XDR correlates signals from Microsoft security products that you have licensed and provisioned access to.
48+
4649
<a name='microsoft-365-defender-protection'></a>
4750

4851
## Microsoft Defender XDR protection

defender-xdr/prerequisites.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,20 +17,21 @@ search.appverid:
1717
- MOE150
1818
- MET150
1919
ms.date: 07/18/2024
20+
appliesto:
21+
- Microsoft Defender XDR
2022
---
2123

2224
# Microsoft Defender XDR prerequisites
2325

2426
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2527

26-
27-
**Applies to:**
28-
- Microsoft Defender XDR
29-
3028
Learn about licensing and other requirements for provisioning and using [Microsoft Defender XDR](microsoft-365-defender.md).
3129

3230
## Licensing requirements
33-
Any of these licenses gives you access to Microsoft Defender XDR features via the Microsoft Defender portal without additional cost:
31+
32+
Microsoft Defender XDR natively correlates Microsoft security products' signals, providing security operations teams a single pane of glass to detect, investigate, respond, and protect your assets. These signals are dependent on the license that you have and the access provisioned to you.
33+
34+
Any of the these licenses gives you access to Microsoft Defender XDR features via the Microsoft Defender portal without additional cost:
3435

3536
- Microsoft 365 E5 or A5
3637
- Microsoft 365 E3 with the Microsoft 365 E5 Security add-on
@@ -65,10 +66,8 @@ Go to Microsoft 365 admin center ([admin.microsoft.com](https://admin.microsoft.
6566

6667
You must at least be a **security administrator** in Microsoft Entra ID to turn on Microsoft Defender XDR. For the list of roles required to use Microsoft Defender XDR and information on how access to data is regulated, read about [managing access to Microsoft Defender XDR](m365d-permissions.md).
6768

68-
>[!IMPORTANT]
69-
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
70-
71-
69+
> [!IMPORTANT]
70+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
7271
7372
## Browser requirements
7473

@@ -86,10 +85,10 @@ Currently, the Microsoft Defender for Office 365 integration into the unified Mi
8685
- Sweden
8786
- Singapore
8887

89-
9088
## Related articles
9189

9290
- [Microsoft Defender XDR overview](microsoft-365-defender.md)
9391
- [Turn on Microsoft Defender XDR](m365d-enable.md)
9492
- [Manage access and permissions](m365d-permissions.md)
93+
9594
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)