You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,7 +116,7 @@ Whenever an attack surface reduction rule is triggered, a notification is displa
116
116
117
117
Also, when certain attack surface reduction rules are triggered, alerts are generated.
118
118
119
-
Notifications and any alerts that are generated can be viewed in the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
119
+
Notifications and any alerts that are generated can be viewed in the [Microsoft Defender portal](https://security.microsoft.com).
120
120
121
121
For specific details about notification and alert functionality, see: [Per rule alert and notification details](attack-surface-reduction-rules-reference.md#per-asr-rule-alert-and-notification-details), in the article **Attack surface reduction rules reference**.
Copy file name to clipboardExpand all lines: defender-endpoint/auto-investigation-action-center.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ The following table compares the new, unified Action center to the previous Acti
42
42
|---------|---------|
43
43
|Lists pending and completed actions for devices and email in one location <br/>([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) plus [Microsoft Defender for Office 365](/defender-office-365/mdo-about)|Lists pending and completed actions for devices <br/> ([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) only) |
44
44
|Is located at:<br/>[https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)|Is located at:<br/>[https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)|
45
-
| In the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>, choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
45
+
| In the [Microsoft Defender portal](https://security.microsoft.com), choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
46
46
47
47
The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions, and provides a unified investigation experience.
48
48
@@ -57,7 +57,7 @@ You can use the unified Action center if you have appropriate permissions and on
57
57
58
58
To get to the unified Action center in the improved Microsoft Defender portal:
59
59
60
-
1. Go to the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a> and sign in.
60
+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
61
61
62
62
2. In the navigation pane, select **Action center**.
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29
29
-[Microsoft Defender XDR](/defender-xdr)
30
30
31
-
Discovery can be configured to be on standard or basic mode. Use the standard option to actively find devices in your network, which will better guarantee the discovery of endpoints and provide richer device classification.
31
+
Device discovery can be configured to be on standard or basic mode. Use the standard option to actively find devices in your network, which helps improve the discovery of endpoints and provide richer device classification.
32
32
33
-
You can customize the list of devices that are used to perform standard discovery. You can either enable standard discovery on all the onboarded devices that also support this capability (currently - Windows 10 or later and Windows Server 2019 or later devices only) or select a subset or subsets of your devices by specifying their device tags.
33
+
You can customize the list of devices that are used to perform standard discovery. You can either enable standard discovery on all the onboarded devices that also support this capability (currently for devices running Windows 10 and later, or Windows Server 2019 and later). Or, you can select a subset of devices by specifying their device tags.
34
34
35
35
## Set up device discovery
36
36
37
-
To set up device discovery, take the following configuration steps in <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
37
+
To set up device discovery, take the following configuration steps in the [Microsoft Defender portal](https://security.microsoft.com):
38
38
39
39
Navigate to **Settings** > **Device discovery**
40
40
41
-
1. If you want to configure Basic as the discovery mode to use on your onboarded devices, select **Basic** and then select **Save**
41
+
1. If you want to configure Basic as the discovery mode to use on your onboarded devices, select **Basic** and then select **Save**.
42
+
42
43
2. If you've selected to use Standard discovery, select which devices to use for active probing: all devices or on a subset by specifying their device tags, and then select **Save**
43
44
44
45
> [!NOTE]
45
46
> Standard discovery uses various PowerShell scripts to actively probe devices in the network. Those PowerShell scripts are Microsoft signed and are executed from the following location: `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps`. For example, `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\UnicastScannerV1.1.0.ps1`.
46
47
47
48
## Exclude devices from being actively probed in standard discovery
48
49
49
-
If there are devices on your network that shouldn't be actively scanned (for example, devices used as honeypots for another security tool), you can also define a list of exclusions to prevent them from being scanned. Note that devices can still be discovered using Basic discovery mode and can also be discovered through multicast discovery attempts. Those devices will be passively discovered but won't be actively probed.
50
+
If there are devices on your network that shouldn't be actively scanned (for example, devices used as honeypots for another security tool), you can also define a list of exclusions to prevent them from being scanned. Devices can still be discovered using Basic discovery mode and can also be discovered through multicast discovery attempts. Those devices are passively discovered but won't be actively probed.
50
51
51
52
You can configure the devices to exclude in the **Exclusions** page.
52
53
53
54
## Select networks to monitor
54
55
55
-
Microsoft Defender for Endpoint analyzes a network and determines if it's a corporate network that needs to be monitored or a non-corporate network that can be ignored. To identify a network as corporate, we correlate network identifiers across all tenant's clients and if most devices in the organization report that they're connected to the same network name, with the same default gateway and DHCP server address, we assume that this is a corporate network. Corporate networks are typically chosen to be monitored. However, you can override this decision by choosing to monitor non-corporate networks where onboarded devices are found.
56
+
Microsoft Defender for Endpoint analyzes a network and determines if it's a corporate network that needs to be monitored or a noncorporate network that can be ignored. To identify a network as corporate, we correlate network identifiers across all tenant's clients and if most devices in the organization report that they're connected to the same network name, with the same default gateway and DHCP server address, we assume that this is a corporate network. Corporate networks are typically chosen to be monitored. However, you can override this decision by choosing to monitor noncorporate networks where onboarded devices are found.
56
57
57
58
You can configure where device discovery can be performed by specifying which networks to monitor. When a network is monitored, device discovery can be performed on it.
58
59
59
60
A list of networks where device discovery can be performed is shown in the **Monitored networks** page.
60
61
61
62
> [!NOTE]
62
-
> The list shows networks that were identified as corporate networks. If less than 50 networks are identified as corporate networks, then list will show up to 50 networks with the most onboarded devices.
63
+
> The list shows networks that were identified as corporate networks. If fewer than 50 networks are identified as corporate networks, then list shows up to 50 networks with the most onboarded devices.
63
64
64
65
The list of monitored networks is sorted based upon the total number of devices seen on the network in the last seven days.
65
66
@@ -73,19 +74,23 @@ You can apply a filter to view any of the following network discovery states:
73
74
74
75
You control where device discovery takes place. Monitored networks are where device discovery is performed and are typically corporate networks. You can also choose to ignore networks or select the initial discovery classification after modifying a state.
75
76
76
-
Choosing the initial discovery classification means applying the default system-made network monitor state. Selecting the default system-made network monitor state means that networks that were identified to be corporate, are monitored, and ones identified as non-corporate, are ignored automatically.
77
+
Choosing the initial discovery classification means to apply the default system-made network monitor state. Selecting the default system-made network monitor state means that networks that were identified to be corporate, are monitored, and ones identified as noncorporate, are ignored automatically.
77
78
78
79
1. Select **Settings > Device discovery**.
80
+
79
81
2. Select **Monitored networks**.
82
+
80
83
3. View the list of networks.
84
+
81
85
4. Select the three dots next to the network name.
86
+
82
87
5. Choose whether you want to monitor, ignore, or use the initial discovery classification.
83
88
84
-
> [!WARNING]
85
-
>
86
-
> - Choosing to monitor a network that was not identified by Microsoft Defender for Endpoint as a corporate network can cause device discovery outside of your corporate network, and may therefore detect home or other non-corporate devices.
87
-
> - Choosing to ignore a network will stop monitoring and discovering devices in that network. Devices that were already discovered won't be removed from the inventory, but will no longer be updated, and details will be retained until the data retention period of the Defender for Endpoint expires.
88
-
> - Before choosing to monitor non-corporate networks, you must ensure you have permission to do so. <br>
89
+
> [!WARNING]
90
+
>
91
+
> - Choosing to monitor a network that wasn't identified by Microsoft Defender for Endpoint as a corporate network can cause device discovery outside of your corporate network, and can, therefore, detect home or other noncorporate devices.
92
+
> - Choosing to ignore a network stops monitoring and discovering devices in that network. Devices that were already discovered won't be removed from the inventory, but are no longer updated, and details are retained until the data retention period of the Defender for Endpoint expires.
93
+
> - Before choosing to monitor non-corporate networks, you must ensure you have permission to do so. <br>
89
94
90
95
6. Confirm that you want to make the change.
91
96
@@ -118,4 +123,5 @@ DeviceInfo
118
123
119
124
-[Device discovery overview](device-discovery.md)
120
125
-[Device discovery FAQs](device-discovery-faq.md)
126
+
121
127
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-gp.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ search.appverid: met150
40
40
41
41
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
42
42
43
-
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
43
+
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
44
44
45
45
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
46
46
@@ -183,7 +183,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
183
183
> [!NOTE]
184
184
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
185
185
186
-
1. Get the offboarding package from the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
186
+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
187
187
188
188
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
189
189
@@ -220,7 +220,7 @@ With Group Policy there isn't an option to monitor deployment of policies on the
220
220
221
221
## Monitor devices using the portal
222
222
223
-
1. Go to the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
223
+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com).
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-script.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
38
38
39
39
## Onboard devices
40
40
41
-
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
41
+
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
42
42
43
43
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Device management**\>**Onboarding**.
44
44
@@ -103,7 +103,7 @@ For security reasons, the package used to offboard devices expires seven days af
103
103
> [!NOTE]
104
104
> Onboarding and offboarding policies must not be deployed on the same device at the same time. Otherwise, unpredictable collisions might occur.
105
105
106
-
1. Get the offboarding package from <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
106
+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
107
107
108
108
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Device management**\>**Offboarding**.
109
109
@@ -138,7 +138,7 @@ Monitoring can also be done directly on the portal, or by using the different de
138
138
139
139
### Monitor devices using the portal
140
140
141
-
1. Go to <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
141
+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com).
Copy file name to clipboardExpand all lines: defender-endpoint/configure-machines-asr.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ ms.date: 12/18/2023
35
35
36
36
> *Attack surface management card*
37
37
38
-
The *Attack surface management card* is an entry point to tools in <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a> that you can use to:
38
+
The *Attack surface management card* is an entry point to tools in the [Microsoft Defender portal](https://security.microsoft.com) that you can use to:
39
39
40
40
- Understand how ASR rules are currently deployed in your organization.
41
41
- Review ASR detections and identify possible incorrect detections.
@@ -50,7 +50,7 @@ Select **Go to attack surface management** \> **Reports** \> **Attack surface re
50
50
> [!NOTE]
51
51
> To access Microsoft Defender portal, you need a Microsoft 365 E3 or E5 license and an account that has certain roles on Microsoft Entra ID. [Read about required licenses and permissions](/defender-xdr/prerequisites).
52
52
53
-
For more information about ASR rule deployment in <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>, see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
53
+
For more information about ASR rule deployment in the [Microsoft Defender portal](https://security.microsoft.com), see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
Copy file name to clipboardExpand all lines: defender-endpoint/configure-machines-onboarding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ ms.date: 12/18/2023
25
25
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26
26
-[Microsoft Defender XDR](/defender-xdr)
27
27
28
-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
28
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
29
29
30
30
Each onboarded device adds an additional endpoint detection and response (EDR) sensor and increases visibility over breach activity in your network. Onboarding also ensures that a device can be checked for vulnerable components as well security configuration issues and can receive critical remediation actions during attacks.
0 commit comments