Skip to content

Commit 67f0302

Browse files
authored
Merge branch 'main' into WI484156-update-screenshot-app-governance-threat-detection-remediation
2 parents d87d2d3 + 683dfed commit 67f0302

File tree

632 files changed

+1966
-1828
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

632 files changed

+1966
-1828
lines changed

CloudAppSecurityDocs/real-time-agent-protection-during-runtime.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,22 +56,22 @@ The following steps describe the Security Administrator’s required actions to
5656
- **If the connector isn’t connected:**
5757
- Under **Microsoft 365 connector**, select **Connect** or **Edit**.
5858
- Select **Microsoft Entra ID Management events** and **Microsoft 365 activities**.
59-
- Select **Connect Microsoft 365**
59+
- Select **Connect Microsoft 365**.
6060

6161
> [!IMPORTANT]
6262
> If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent. Alerts and incidents related to these actions won't show in the Microsoft Defender portal.
6363
6464
1. Make sure to collaborate with the following administrators:
6565

66-
- The **Microsoft Entra Administrator** needs to create [a Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider?branch=main&branchFallbackFrom=pr-en-us-1020#step-1-configure-microsoft-entra-application) and configure a Federated Identity Credential (FIC) using the URL provided in the Microsoft Defender portal. For more information, see: [Authorize the Microsoft Entra application with your provider of choice](/microsoft-copilot-studio/external-security-provider?branch=main&branchFallbackFrom=pr-en-us-1020#authorize-the-microsoft-entra-application-with-your-provider-of-choice).
66+
- The **Microsoft Entra Administrator** needs to create [a Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application) and configure a Federated Identity Credential (FIC) using the URL provided in the Microsoft Defender portal. For more information, see: [Authorize the Microsoft Entra application with your provider of choice](/microsoft-copilot-studio/external-security-provider#authorize-the-microsoft-entra-application-with-your-provider-of-choice).
6767

68-
- The **Power Platform Administrator** needs to enter the Application ID and URL in the Power Platform settings page. For more information see: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider?branch=main&branchFallbackFrom=pr-en-us-1020#authorize-the-microsoft-entra-application-with-your-provider-of-choice).
68+
- The **Power Platform Administrator** needs to enter the Application ID and URL in the Power Platform settings page. For more information, see: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
6969
1. Enter the App ID provided by your Power Platform administrator. The Application (client) ID, uniquely identifies your application and is used in your application's code as part of validating the security tokens it receives from the Microsoft identity platform.
7070
1. Select **Save**.
7171
1. Copy the URL provided.
7272
1. Share the URL with the Power Platform administrator.
7373

74-
:::image type="content" source="media/protect-agents-real-time/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-agents-real-time/turn-on-real-time-agent-protection.png":::
74+
:::image type="content" source="media/protect-agents-real-time/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-agents-real-time/turn-on-real-time-agent-protection.png":::
7575

7676

7777
## Related articles

defender-endpoint/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -267,20 +267,22 @@
267267
href: mde-linux-prerequisites.md
268268
- name: Choose a deployment method
269269
items:
270-
- name: Installer script based deployment
271-
href: linux-installer-script.md
272270
- name: Enabling deployment to a custom location
273271
href: linux-custom-location-installation.md
272+
- name: Installer script based deployment
273+
href: linux-installer-script.md
274274
- name: Ansible based deployment
275275
href: linux-install-with-ansible.md
276276
- name: Chef based deployment
277277
href: linux-deploy-defender-for-endpoint-with-chef.md
278278
- name: Puppet based deployment
279279
href: linux-install-with-puppet.md
280-
- name: Saltstack-based deployment
280+
- name: Saltstack based deployment
281281
href: linux-install-with-saltack.md
282282
- name: Manual deployment
283283
href: linux-install-manually.md
284+
- name: Golden image based deployment
285+
href: linux-deploy-defender-for-endpoint-using-golden-images.md
284286
- name: Direct onboarding with Defender for Cloud
285287
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
286288
- name: Configure Defender for Endpoint on Linux

defender-endpoint/access-mssp-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: Access the Microsoft Defender XDR MSSP customer portal
33
description: Access the Microsoft Defender XDR MSSP customer portal
44
ms.service: defender-endpoint
55
ms.subservice: onboard
6-
ms.author: ewalsh
7-
author: emmwalshh
6+
ms.author: bagol
7+
author: batamig
88
ms.localizationpriority: medium
9-
manager: deniseb
9+
manager: bagol
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security

defender-endpoint/address-unwanted-behaviors-mde.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Address unwanted behaviors in Microsoft Defender for Endpoint with exclusions, indicators, and other techniques
33
description: Learn how to use exclusions, indicators, and other techniques to address unwanted behaviors in Microsoft Defender for Endpoint.
4-
author: denisebmsft
5-
ms.author: deniseb
6-
manager: deniseb
4+
author: batamig
5+
ms.author: bagol
6+
manager: bagol
77
ms.date: 11/14/2024
88
ms.topic: how-to
99
ms.service: defender-endpoint

defender-endpoint/admin-submissions-mde.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Learn how to use the unified submissions feature in Microsoft Defen
44
search.appverid: met150
55
ms.date: 05/06/2024
66
ms.service: defender-endpoint
7-
ms.author: deniseb
8-
author: denisebmsft
9-
manager: deniseb
7+
ms.author: bagol
8+
author: batamig
9+
manager: bagol
1010
ms.localizationpriority: medium
1111
audience: ITPro
1212
ms.topic: how-to

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Advanced technologies at the core of Microsoft Defender Antivirus
33
description: Microsoft Defender Antivirus engines and advanced technologies
4-
author: emmwalshh
5-
ms.author: ewalsh
4+
author: batamig
5+
ms.author: bagol
66
ms.reviewer: yongrhee
7-
manager: deniseb
7+
manager: bagol
88
ms.service: defender-endpoint
99
ms.topic: overview
1010
ms.date: 01/24/2025

defender-endpoint/advanced-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Configure advanced features in Microsoft Defender for Endpoint
33
description: Turn on advanced features such as block file in Microsoft Defender for Endpoint.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: bagol
6+
author: batamig
77
ms.reviewer: yongrhee
88
ms.localizationpriority: medium
9-
manager: deniseb
9+
manager: bagol
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security

defender-endpoint/aggregated-reporting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Aggregated reporting in Microsoft Defender for Endpoint
33
description: Learn how you collect important telemetry in Microsoft Defender for Endpoint by turning on aggregated reporting.
44
ms.service: defender-endpoint
5-
ms.author: diannegali
6-
author: diannegali
5+
ms.author: bagol
6+
author: batamig
77
ms.localizationpriority: medium
8-
manager: deniseb
8+
manager: bagol
99
audience: ITPro
1010
ms.collection:
1111
- m365-security

defender-endpoint/alerts-queue-endpoint-detection-response.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ ms.reviewer:
44
description: View and manage the alerts surfaced in Microsoft Defender XDR
55
keywords:
66
ms.service: defender-endpoint
7-
ms.author: ewalsh
8-
author: emmwalshh
7+
ms.author: bagol
8+
author: batamig
99
ms.localizationpriority: medium
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security

defender-endpoint/alerts-queue.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: View and organize the Microsoft Defender for Endpoint Alerts queue
33
description: Learn about how the Microsoft Defender for Endpoint alerts queues work, and how to sort and filter lists of alerts.
44
ms.service: defender-endpoint
5-
ms.author: ewalsh
6-
author: emmwalshh
5+
ms.author: bagol
6+
author: batamig
77
ms.localizationpriority: medium
8-
manager: deniseb
8+
manager: bagol
99
audience: ITPro
1010
ms.collection:
1111
- m365-security

0 commit comments

Comments
 (0)