Skip to content

Commit 6b40081

Browse files
authored
Merge pull request #1193 from MicrosoftDocs/main
Publish main to live, Wednesday 3:30PM PDT, 08/21
2 parents 940d011 + 9f87b93 commit 6b40081

23 files changed

+41
-22
lines changed

defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
66
ms.service: defender-endpoint
77
ms.subservice: ngp
88
ms.localizationpriority: medium
9-
ms.date: 08/07/2023
9+
ms.date: 08/21/2023
1010
author: siosulli
1111
ms.author: siosulli
1212
ms.topic: conceptual
@@ -29,7 +29,7 @@ search.appverid: met150
2929

3030
**Platforms**
3131

32-
- Windows
32+
- Windows Server
3333

3434
This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
3535

defender-endpoint/configure-vulnerability-email-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 06/25/2024
15+
ms.date: 08/21/2024
1616
---
1717

1818
# Configure vulnerability email notifications in Microsoft Defender for Endpoint
@@ -48,7 +48,7 @@ Create a notification rule to send an email when there are certain exploit or vu
4848

4949
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and using an account with the Security administrator or Global administrator role assigned.
5050

51-
2. In the navigation pane, go to **Settings** \> **Endpoints** \> **Email notifications** \> **Vulnerabilities**.
51+
2. In the navigation pane, go to **Settings** \> **Endpoints** \> **General** \> **Email notifications** \> **Vulnerabilities**.
5252

5353
2. Select **Add notification rule**.
5454

defender-endpoint/mac-install-with-intune.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 08/20/2024
17+
ms.date: 08/21/2024
1818
---
1919

2020
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -144,15 +144,13 @@ To configure Full Disk Access:
144144

145145
1. Under **Profile type**, select **Templates**.
146146

147-
1. Under **Template name**, select **Custom**. Then select **Create**
148-
149-
1. Select **Create**.
147+
1. Under **Template name**, select **Custom**, and then select **Create**.
150148

151-
1. On the **Basics** tab, **Name** the profile. For example, `Background_Services-prod-macOS-Default-MDE`.
149+
1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
152150

153151
1. Select **Next**.
154152

155-
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `background_services.mobileconfig`.
153+
1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
156154

157155
1. Choose a **Deployment channel** and then select **Next**.
158156

defender-endpoint/mac-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,18 @@ Microsoft Defender for Endpoint no longer supports Big Sur (11)
5353

5454
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
5555

56+
### Jul-2024 (Build: 101.24062.0009 | Release version: )
57+
58+
| Build: | **101.24062.0009** |
59+
|--------------------|-----------------------|
60+
| Release version: | 20.124062.9.0 |
61+
| Engine version: | 1.1.24050.7 |
62+
| Signature version: | 1.411.410.0 |
63+
64+
##### What's new
65+
66+
- Bug and performance fixes
67+
5668
### Jun-2024 (Build: 101.24052.0013 | Release version: 20.124052.13.0)
5769

5870
| Build: | **101.24052.0013** |

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 07/26/2024
11+
ms.date: 08/21/2024
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,6 +39,10 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## August 2024
43+
44+
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Microsoft 365 and Outlook 2021 now support the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
45+
4246
## July 2024
4347

4448
- **Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD, and Office 365 operated by 21Vianet environments**: The [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.
@@ -160,7 +164,7 @@ For more information on what's new with other Microsoft Defender security produc
160164

161165
- The new Microsoft Defender XDR role-based access control (RBAC) model, with support for Microsoft Defender for Office, is now available in public preview. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](/defender-xdr/manage-rbac).
162166

163-
- [Use the built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): Use the built-in Report button in Outlook on the web to report messages as phish, junk, and not junk.
167+
- [Use the built-in Report button on Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): Use the built-in Report button in Outlook on the web and new Outlook for Windows client to report messages as phish, junk, and not junk.
164168

165169
## October 2022
166170

defender-xdr/manage-incidents.md

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,14 @@ manager: deniseb
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
14+
- usx-security
1415
- tier1
1516
ms.custom: admindeeplinkDEFENDER
1617
ms.topic: conceptual
1718
search.appverid:
1819
- MOE150
1920
- MET150
20-
ms.date: 08/19/2024
21+
ms.date: 08/21/2024
2122
appliesto:
2223
- Microsoft Defender XDR
2324
- Microsoft Sentinel in the Microsoft Defender portal
@@ -149,7 +150,7 @@ You can also add your own comments using the comment box available within the ac
149150
> [!IMPORTANT]
150151
> Some information in this article relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
151152
>
152-
> The export incident data feature is currently available to Microsoft Defender XDR and Microsoft Defender unified security operations center (SOC) platform customers with the Microsoft Copilot for security license.
153+
> The export incident data feature is currently available to Microsoft Defender XDR and Microsoft unified security operations center (SOC) platform customers with the Microsoft Copilot for security license.
153154
154155
You can export an incident's data to PDF through the **Export incident as PDF** function and save it into PDF format. This function allows security teams to review an incident's details offline at any given time.
155156

@@ -163,30 +164,34 @@ The incident data exported includes the following information:
163164

164165
Here's an example of the exported PDF:
165166

166-
:::image type="content" source="/defender/media/incidents-queue/export-incident-results-small.png" alt-text="Screenshot of the exported PDF's first page." lightbox="/defender/media/incidents-queue/export-incident-results.png":::
167+
:::image type="content" source="/defender/media/incidents-queue/export-results-small.png" alt-text="Screenshot of the exported PDF's first page." lightbox="/defender/media/incidents-queue/export-results.png":::
167168

168169
If you have the [Copilot for Security](/security-copilot/microsoft-security-copilot) license, the exported PDF contains the following additional incident data:
169170

170171
- [Incident summary](security-copilot-m365d-incident-summary.md)
171172
- [Incident report](security-copilot-m365d-create-incident-report.md)
172173

173-
The export to PDF function is also available in the Copilot side panel of a generated incident report.
174+
The export to PDF function is also available in the Copilot side panel. When you select the **More actions** ellipsis (...) on the upper right corner of the incident report results card, you can choose **Export incident as PDF**.
174175

175176
![Screenshot of additional actions in the incident report results card.](/defender/media/incidents-queue/export-incident-more-actions1.png)
176177

177178
To generate the PDF, perform the following steps:
178179

179-
1. Open an incident page. Select the **More actions** ellipsis (...) on the upper right corner and choose **Export incident as PDF**. The function becomes grayed out while the PDF is being generated.
180+
1. Open an incident page. Select the **More actions** ellipsis (...) on the upper right corner and choose **Export incident as PDF**.
180181

181-
:::image type="content" source="/defender/media/incidents-queue/export-incident-main-small.png" alt-text="Screenshot highlighting the export incident to PDF option." lightbox="/defender/media/incidents-queue/export-incident-main.png":::
182+
:::image type="content" source="/defender/media/incidents-queue/export-ellipsis-small.png" alt-text="Screenshot highlighting the export incident to PDF option." lightbox="/defender/media/incidents-queue/export-ellipsis.png":::
182183

183-
1. A dialog box appears, indicating that the PDF is being generated. Select **Got it** to close the dialog box. Additionally, a status message indicating the current state of the download appears below the incident title. The export process may take a few minutes depending on the incident's complexity and the amount of data to be exported.
184+
1. In the dialog box that appears next, confirm the incident information that you want to include or exclude in the PDF. All incident information is selected by default. Select **Export PDF** to proceed.
184185

185-
:::image type="content" source="/defender/media/incidents-queue/export-incident-predownload-small.png" alt-text="Screenshot highlighting export message and status before download." lightbox="/defender/media/incidents-queue/export-incident-predownload.png":::
186+
:::image type="content" source="/defender/media/incidents-queue/export-options.png" alt-text="Screenshot highlighting the export incident to PDF option.":::
186187

187-
1. Once the PDF is ready, the status message indicates that the PDF is ready and another dialog box appears. Select **Download** from the dialog box to save the PDF to your device.
188+
1. A status message indicating the current state of the download appears below the incident title. The export process may take a few minutes depending on the incident's complexity and the amount of data to be exported.
188189

189-
:::image type="content" source="/defender/media/incidents-queue/export-incident-download-small.png" alt-text="Screenshot highlighting export message and status when download is available." lightbox="/defender/media/incidents-queue/export-incident-download.png":::
190+
:::image type="content" source="/defender/media/incidents-queue/export-prepare-small.png" alt-text="Screenshot highlighting export message and status before download." lightbox="/defender/media/incidents-queue/export-prepare.png":::
191+
192+
1. Another dialog box appears indicating that the PDF is ready. Select **Download** from the dialog box to save the PDF to your device. The status message below the incident title also updates to indicate that the download is available.
193+
194+
:::image type="content" source="/defender/media/incidents-queue/export-download-small.png" alt-text="Screenshot highlighting export message and status when download is available." lightbox="/defender/media/incidents-queue/export-download.png":::
190195

191196
The report is cached for a couple of minutes. The system provides the previously generated PDF if you try to export the same incident again within a short time frame. To generate a newer version of the PDF, wait for a few minutes for the cache to expire.
192197

105 KB
Loading
253 KB
Loading
62.1 KB
Loading
156 KB
Loading

0 commit comments

Comments
 (0)