Skip to content

Commit 7099753

Browse files
Merge pull request #2915 from MicrosoftDocs/main
Publish main to live, 02/24/25, 3:30 PM PT
2 parents 328d3ba + 3c00ab2 commit 7099753

34 files changed

+165
-139
lines changed

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Whenever an attack surface reduction rule is triggered, a notification is displa
116116

117117
Also, when certain attack surface reduction rules are triggered, alerts are generated.
118118

119-
Notifications and any alerts that are generated can be viewed in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
119+
Notifications and any alerts that are generated can be viewed in the [Microsoft Defender portal](https://security.microsoft.com).
120120

121121
For specific details about notification and alert functionality, see: [Per rule alert and notification details](attack-surface-reduction-rules-reference.md#per-asr-rule-alert-and-notification-details), in the article **Attack surface reduction rules reference**.
122122

defender-endpoint/auto-investigation-action-center.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following table compares the new, unified Action center to the previous Acti
4242
|---------|---------|
4343
|Lists pending and completed actions for devices and email in one location <br/>([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) plus [Microsoft Defender for Office 365](/defender-office-365/mdo-about)|Lists pending and completed actions for devices <br/> ([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) only) |
4444
|Is located at:<br/>[https://security.microsoft.com/action-center](https://security.microsoft.com/action-center) |Is located at:<br/>[https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center) |
45-
| In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
45+
| In the [Microsoft Defender portal](https://security.microsoft.com), choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
4646

4747
The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions, and provides a unified investigation experience.
4848

@@ -57,7 +57,7 @@ You can use the unified Action center if you have appropriate permissions and on
5757

5858
To get to the unified Action center in the improved Microsoft Defender portal:
5959

60-
1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
60+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
6161

6262
2. In the navigation pane, select **Action center**.
6363

defender-endpoint/configure-device-discovery.md

Lines changed: 22 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure device discovery
2+
title: Configure device discovery in Defender for Endpoint
33
description: Learn how to configure device discovery in Microsoft Defender XDR using basic or standard discovery
44
ms.service: defender-endpoint
55
ms.subservice: onboard
@@ -16,10 +16,10 @@ ms.collection:
1616
ms.custom: admindeeplinkDEFENDER
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 06/19/2024
19+
ms.date: 02/24/2025
2020
---
2121

22-
# Configure device discovery
22+
# Configure device discovery in Defender for Endpoint
2323

2424
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2525

@@ -28,38 +28,39 @@ ms.date: 06/19/2024
2828
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender XDR](/defender-xdr)
3030

31-
Discovery can be configured to be on standard or basic mode. Use the standard option to actively find devices in your network, which will better guarantee the discovery of endpoints and provide richer device classification.
31+
Device discovery can be configured to be on standard or basic mode. Use the standard option to actively find devices in your network, which helps improve the discovery of endpoints and provide richer device classification.
3232

33-
You can customize the list of devices that are used to perform standard discovery. You can either enable standard discovery on all the onboarded devices that also support this capability (currently - Windows 10 or later and Windows Server 2019 or later devices only) or select a subset or subsets of your devices by specifying their device tags.
33+
You can customize the list of devices that are used to perform standard discovery. You can either enable standard discovery on all the onboarded devices that also support this capability (currently for devices running Windows 10 and later, or Windows Server 2019 and later). Or, you can select a subset of devices by specifying their device tags.
3434

3535
## Set up device discovery
3636

37-
To set up device discovery, take the following configuration steps in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
37+
To set up device discovery, take the following configuration steps in the [Microsoft Defender portal](https://security.microsoft.com):
3838

3939
Navigate to **Settings** > **Device discovery**
4040

41-
1. If you want to configure Basic as the discovery mode to use on your onboarded devices, select **Basic** and then select **Save**
41+
1. If you want to configure Basic as the discovery mode to use on your onboarded devices, select **Basic** and then select **Save**.
42+
4243
2. If you've selected to use Standard discovery, select which devices to use for active probing: all devices or on a subset by specifying their device tags, and then select **Save**
4344

4445
> [!NOTE]
4546
> Standard discovery uses various PowerShell scripts to actively probe devices in the network. Those PowerShell scripts are Microsoft signed and are executed from the following location: `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps`. For example, `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\UnicastScannerV1.1.0.ps1`.
4647
4748
## Exclude devices from being actively probed in standard discovery
4849

49-
If there are devices on your network that shouldn't be actively scanned (for example, devices used as honeypots for another security tool), you can also define a list of exclusions to prevent them from being scanned. Note that devices can still be discovered using Basic discovery mode and can also be discovered through multicast discovery attempts. Those devices will be passively discovered but won't be actively probed.
50+
If there are devices on your network that shouldn't be actively scanned (for example, devices used as honeypots for another security tool), you can also define a list of exclusions to prevent them from being scanned. Devices can still be discovered using Basic discovery mode and can also be discovered through multicast discovery attempts. Those devices are passively discovered but won't be actively probed.
5051

5152
You can configure the devices to exclude in the **Exclusions** page.
5253

5354
## Select networks to monitor
5455

55-
Microsoft Defender for Endpoint analyzes a network and determines if it's a corporate network that needs to be monitored or a non-corporate network that can be ignored. To identify a network as corporate, we correlate network identifiers across all tenant's clients and if most devices in the organization report that they're connected to the same network name, with the same default gateway and DHCP server address, we assume that this is a corporate network. Corporate networks are typically chosen to be monitored. However, you can override this decision by choosing to monitor non-corporate networks where onboarded devices are found.
56+
Microsoft Defender for Endpoint analyzes a network and determines if it's a corporate network that needs to be monitored or a noncorporate network that can be ignored. To identify a network as corporate, we correlate network identifiers across all tenant's clients and if most devices in the organization report that they're connected to the same network name, with the same default gateway and DHCP server address, we assume that this is a corporate network. Corporate networks are typically chosen to be monitored. However, you can override this decision by choosing to monitor noncorporate networks where onboarded devices are found.
5657

5758
You can configure where device discovery can be performed by specifying which networks to monitor. When a network is monitored, device discovery can be performed on it.
5859

5960
A list of networks where device discovery can be performed is shown in the **Monitored networks** page.
6061

6162
> [!NOTE]
62-
> The list shows networks that were identified as corporate networks. If less than 50 networks are identified as corporate networks, then list will show up to 50 networks with the most onboarded devices.
63+
> The list shows networks that were identified as corporate networks. If fewer than 50 networks are identified as corporate networks, then list shows up to 50 networks with the most onboarded devices.
6364
6465
The list of monitored networks is sorted based upon the total number of devices seen on the network in the last seven days.
6566

@@ -73,19 +74,23 @@ You can apply a filter to view any of the following network discovery states:
7374

7475
You control where device discovery takes place. Monitored networks are where device discovery is performed and are typically corporate networks. You can also choose to ignore networks or select the initial discovery classification after modifying a state.
7576

76-
Choosing the initial discovery classification means applying the default system-made network monitor state. Selecting the default system-made network monitor state means that networks that were identified to be corporate, are monitored, and ones identified as non-corporate, are ignored automatically.
77+
Choosing the initial discovery classification means to apply the default system-made network monitor state. Selecting the default system-made network monitor state means that networks that were identified to be corporate, are monitored, and ones identified as noncorporate, are ignored automatically.
7778

7879
1. Select **Settings > Device discovery**.
80+
7981
2. Select **Monitored networks**.
82+
8083
3. View the list of networks.
84+
8185
4. Select the three dots next to the network name.
86+
8287
5. Choose whether you want to monitor, ignore, or use the initial discovery classification.
8388

84-
> [!WARNING]
85-
>
86-
> - Choosing to monitor a network that was not identified by Microsoft Defender for Endpoint as a corporate network can cause device discovery outside of your corporate network, and may therefore detect home or other non-corporate devices.
87-
> - Choosing to ignore a network will stop monitoring and discovering devices in that network. Devices that were already discovered won't be removed from the inventory, but will no longer be updated, and details will be retained until the data retention period of the Defender for Endpoint expires.
88-
> - Before choosing to monitor non-corporate networks, you must ensure you have permission to do so. <br>
89+
> [!WARNING]
90+
>
91+
> - Choosing to monitor a network that wasn't identified by Microsoft Defender for Endpoint as a corporate network can cause device discovery outside of your corporate network, and can, therefore, detect home or other noncorporate devices.
92+
> - Choosing to ignore a network stops monitoring and discovering devices in that network. Devices that were already discovered won't be removed from the inventory, but are no longer updated, and details are retained until the data retention period of the Defender for Endpoint expires.
93+
> - Before choosing to monitor non-corporate networks, you must ensure you have permission to do so. <br>
8994
9095
6. Confirm that you want to make the change.
9196

@@ -118,4 +123,5 @@ DeviceInfo
118123

119124
- [Device discovery overview](device-discovery.md)
120125
- [Device discovery FAQs](device-discovery-faq.md)
126+
121127
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/configure-endpoints-gp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ search.appverid: met150
4040
4141
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
4242

43-
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
43+
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
4444

4545
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
4646

@@ -183,7 +183,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
183183
> [!NOTE]
184184
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
185185
186-
1. Get the offboarding package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
186+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
187187

188188
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
189189

@@ -220,7 +220,7 @@ With Group Policy there isn't an option to monitor deployment of policies on the
220220

221221
## Monitor devices using the portal
222222

223-
1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
223+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com).
224224

225225
2. Select **Devices inventory**.
226226

defender-endpoint/configure-endpoints-sccm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ If you use Microsoft Configuration Manager current branch, see [Create an offboa
234234

235235
### Offboard devices using System Center 2012 R2 Configuration Manager
236236

237-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
237+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
238238
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
239239
1. Select Windows 10 or Windows 11 as the operating system.
240240
1. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.

defender-endpoint/configure-endpoints-script.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
3838

3939
## Onboard devices
4040

41-
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
41+
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
4242

4343
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Onboarding**.
4444

@@ -103,7 +103,7 @@ For security reasons, the package used to offboard devices expires seven days af
103103
> [!NOTE]
104104
> Onboarding and offboarding policies must not be deployed on the same device at the same time. Otherwise, unpredictable collisions might occur.
105105
106-
1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
106+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
107107

108108
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
109109

@@ -138,7 +138,7 @@ Monitoring can also be done directly on the portal, or by using the different de
138138

139139
### Monitor devices using the portal
140140

141-
1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
141+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com).
142142

143143
2. Select **Devices inventory**.
144144

defender-endpoint/configure-machines-asr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ ms.date: 12/18/2023
3535

3636
> *Attack surface management card*
3737
38-
The *Attack surface management card* is an entry point to tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> that you can use to:
38+
The *Attack surface management card* is an entry point to tools in the [Microsoft Defender portal](https://security.microsoft.com) that you can use to:
3939

4040
- Understand how ASR rules are currently deployed in your organization.
4141
- Review ASR detections and identify possible incorrect detections.
@@ -50,7 +50,7 @@ Select **Go to attack surface management** \> **Reports** \> **Attack surface re
5050
> [!NOTE]
5151
> To access Microsoft Defender portal, you need a Microsoft 365 E3 or E5 license and an account that has certain roles on Microsoft Entra ID. [Read about required licenses and permissions](/defender-xdr/prerequisites).
5252
53-
For more information about ASR rule deployment in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
53+
For more information about ASR rule deployment in the [Microsoft Defender portal](https://security.microsoft.com), see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
5454

5555
## Related topics
5656

defender-endpoint/configure-machines-onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.date: 12/18/2023
2525
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2626
- [Microsoft Defender XDR](/defender-xdr)
2727

28-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
28+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
2929
3030
Each onboarded device adds an additional endpoint detection and response (EDR) sensor and increases visibility over breach activity in your network. Onboarding also ensures that a device can be checked for vulnerable components as well security configuration issues and can receive critical remediation actions during attacks.
3131

0 commit comments

Comments
 (0)