Skip to content

Commit 731488a

Browse files
authored
Merge pull request #382 from MicrosoftDocs/main
pushing fixes live
2 parents 9463aa4 + b8123d4 commit 731488a

12 files changed

+21
-18
lines changed

defender-endpoint/auto-investigation-action-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You can use the unified Action center if you have appropriate permissions and on
5050

5151
- [Microsoft Defender XDR](/microsoft-365/security/mtp/microsoft-threat-protection)
5252
- [Defender for Endpoint](microsoft-defender-endpoint.md)
53-
- [Defender for Office 365]/defender-office-365/mdo-about
53+
- [Defender for Office 365](/defender-office-365/mdo-about)
5454
- [Defender for Business](/defender-business/mdb-overview)
5555

5656
## Using the Action center

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -85,8 +85,11 @@ In general you need to take the following steps:
8585
- Red Hat Enterprise Linux 9.x
8686
- CentOS 6.7 or higher (In preview)
8787
- CentOS 7.2 or higher
88-
- Ubuntu 16.04 LTS or higher LTS
89-
- Debian 9 - 12
88+
- Ubuntu 16.04 LTS
89+
- Ubuntu 18.04 LTS
90+
- Ubuntu 20.04 LTS
91+
- Ubuntu 22.04 LTS
92+
- Debian 9 - 12
9093
- SUSE Linux Enterprise Server 12 or higher
9194
- SUSE Linux Enterprise Server 15 or higher
9295
- Oracle Linux 7.2 or higher
@@ -105,9 +108,10 @@ In general you need to take the following steps:
105108
> MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
106109
107110
- List of supported kernel versions
108-
> [!NOTE]
109-
> Microsoft Defender for Endpoint on Red Hat Enterprise Linux and CentOS - 6.7 to 6.10 is a Kernel based solution. You must verify that the kernel version is supported before updating to a newer kernel version.
110-
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version-agnostic. With a minimal requirement for the kernel version to be at or greater than 3.10.0-327.
111+
112+
> [!NOTE]
113+
> Microsoft Defender for Endpoint on Red Hat Enterprise Linux and CentOS - 6.7 to 6.10 is a Kernel based solution. You must verify that the kernel version is supported before updating to a newer kernel version.
114+
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version-agnostic. With a minimal requirement for the kernel version to be at or greater than 3.10.0-327.
111115
112116
- The `fanotify` kernel option must be enabled
113117
- Red Hat Enterprise Linux 6 and CentOS 6:
@@ -249,5 +253,6 @@ High I/O workloads from certain applications can experience performance issues w
249253
- [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)
250254
- [Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)
251255
- [Turn on network protection for Linux](network-protection-linux.md)
256+
252257
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
253258

defender-endpoint/migrate-devices-streamlined.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier1
1414
ms.topic: how-to
1515
ms.subservice: onboard
16-
ms.date: 05/08/2024
16+
ms.date: 05/09/2024
1717
---
1818

1919
# Migrate devices to use the streamlined connectivity method
@@ -33,6 +33,7 @@ In most cases, full device offboarding isn't required when reonboarding. You can
3333
> [!IMPORTANT]
3434
> Limitations and known issues:
3535
>
36+
> - We found a back-end issue with populating the `ConnectivityType` column in the `DeviceInfo table` in advanced hunting so that you can track migration progress. We aim to resolve this issue as soon as possible.
3637
> - For device migrations (reonboarding): Offboarding is not required to switch over to streamlined connectivity method. Once the updated onboarding package is run, a full device reboot is required for Windows devices and a service restart for macOS and Linux. For more information, see the details included in this article.
3738
> - Windows 10 versions 1607, 1703, 1709, and 1803 do not support reonboarding. Offboard first and then onboard using the updated package. These versions also require a longer URL list.
3839
> - Devices running the MMA agent are not supported and must continue using the MMA onboarding method.

defender-endpoint/threat-protection-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Suspicious activities are processes running under a user context. The integratio
5858

5959
### Microsoft Defender for Office
6060

61-
[Defender for Office 365]/defender-office-365/mdo-about helps protect your organization from malware in email messages or files through Safe Links, Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Microsoft Defender for Office 365 and Microsoft Defender for Endpoint enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked.
61+
[Defender for Office 365](/defender-office-365/mdo-about) helps protect your organization from malware in email messages or files through Safe Links, Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Microsoft Defender for Office 365 and Microsoft Defender for Endpoint enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked.
6262

6363
> [!NOTE]
6464
> Defender for Office 365 data is displayed for events within the last 30 days. For alerts, Defender for Office 365 data is displayed based on first activity time. After that, the data is no longer available in Defender for Office 365.

defender-office-365/air-user-automatic-feedback-response.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,6 @@ appliesto:
1515

1616
# Automatic user notifications for user reported phishing results in AIR
1717

18-
> [!NOTE]
19-
> The features described in this article are currently in Public Preview, aren't available in all organizations, and are subject to change.
20-
2118
In Microsoft 365 organizations with Exchange Online mailboxes, admins can configure the backend for messages that users report as malicious or not malicious in Outlook (send to Microsoft, send to a reporting mailbox, or both), and configure the various notification options for user reported messages. For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
2219

2320
In Microsoft 365 organizations with Microsoft Defender for Office 365 Plan 2, when a user reports a message as phishing, an investigation is automatically created in [automated investigation and response (AIR)](air-about.md). Admins can configure the user reported message settings to send an email notification to the user who reported the message based on the verdict from AIR. This notification is also known as _automatic feedback response_.

defender-xdr/deploy-supported-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Once you've deployed the supported services, [turn on Microsoft Defender XDR](m3
8888
- [Turn on Microsoft Defender XDR](m365d-enable.md)
8989
- [Setup guides for Microsoft Defender XDR](deploy-configure-m365-defender.md)
9090
- [Microsoft Defender for Endpoint overview](/defender-endpoint/microsoft-defender-endpoint)
91-
- [Microsoft Defender for Office 365 overview]/defender-office-365/mdo-about
91+
- [Microsoft Defender for Office 365 overview](/defender-office-365/mdo-about)
9292
- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)
9393
- [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp)
9494
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/m365d-action-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The unified Action center brings together remediation actions across Defender fo
5050
You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
5151

5252
- [Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
53-
- [Defender for Office 365]/defender-office-365/mdo-about
53+
- [Defender for Office 365](/defender-office-365/mdo-about)
5454
- [Microsoft Defender XDR](microsoft-365-defender.md)
5555

5656
> [!TIP]

defender-xdr/m365d-autoir.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ In Microsoft Defender XDR, each automated investigation correlates signals acros
8080
|:---------|:---------|
8181
|Devices (also referred to as endpoints or machines) |[Defender for Endpoint](/defender-endpoint/automated-investigations) |
8282
|On-premises Active Directory users, entity behavior, and activities |[Defender for Identity](/azure-advanced-threat-protection/what-is-atp) |
83-
|Email content (email messages that can contain files and URLs) |[Defender for Office 365]/defender-office-365/mdo-about |
83+
|Email content (email messages that can contain files and URLs) |[Defender for Office 365](/defender-office-365/mdo-about) |
8484

8585
> [!NOTE]
8686
> Not every alert triggers an automated investigation, and not every investigation results in automated remediation actions. It depends on how automated investigation and response is configured for your organization. See [Configure automated investigation and response capabilities](m365d-configure-auto-investigation-response.md).

defender-xdr/m365d-configure-auto-investigation-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Whether automated investigations run, and whether remediation actions are taken
6161

6262
## Review your security and alert policies in Office 365
6363

64-
Microsoft provides built-in [alert policies](/defender-office-365/alert-policies-defender-portal) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](/defender-office-365/air-about). Make sure your [Defender for Office 365]/defender-office-365/mdo-about features are configured correctly.
64+
Microsoft provides built-in [alert policies](/defender-office-365/alert-policies-defender-portal) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](/defender-office-365/air-about). Make sure your [Defender for Office 365](/defender-office-365/mdo-about) features are configured correctly.
6565

6666
Although certain alerts and security policies can trigger automated investigations, *no remediation actions are taken automatically for email and content*. Instead, all remediation actions for email and email content await approval by your security operations team in the [Action center](m365d-action-center.md).
6767

defender-xdr/m365d-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ Microsoft support staff can help provision or deprovision the service and relate
105105
- [Setup guides for Microsoft Defender XDR](deploy-configure-m365-defender.md)
106106
- [Microsoft Defender XDR overview](microsoft-365-defender.md)
107107
- [Microsoft Defender for Endpoint overview](/defender-endpoint/microsoft-defender-endpoint)
108-
- [Defender for Office 365 overview]/defender-office-365/mdo-about
108+
- [Defender for Office 365 overview](/defender-office-365/mdo-about)
109109
- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)
110110
- [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp)
111111
- [Microsoft Defender for Endpoint data storage](/defender-endpoint/data-storage-privacy)

0 commit comments

Comments
 (0)