Skip to content

Commit 7368bf2

Browse files
authored
Merge branch 'main' into docs-editor/submissions-outlook-report-mes-1715110662
2 parents 9d612a7 + e8122dc commit 7368bf2

File tree

175 files changed

+3058
-3146
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+3058
-3146
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,11 @@
44
"source_path": "defender/advanced-hunting-overview.md",
55
"redirect_url": "/defender-xdr/advanced-hunting-overview",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-endpoint/microsoft-defender-antivirus-using-mde-security-set-mngmnt.md",
10+
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",
11+
"redirect_document_id": true
712
}
813
]
914
}

defender-endpoint/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,8 +67,8 @@
6767
href: evaluate-microsoft-defender-antivirus.md
6868
- name: Evaluate Microsoft Defender Antivirus using PowerShell
6969
href: microsoft-defender-antivirus-using-powershell.md
70-
- name: Evaluate Microsoft Defender Antivirus using MDE Security Settings Management
71-
href: microsoft-defender-antivirus-using-mde-security-set-mngmnt.md
70+
- name: Evaluate Microsoft Defender Antivirus using Group Policy
71+
href: evaluate-mdav-using-gp.md
7272
- name: Microsoft Defender for Endpoint demonstration scenarios
7373
href: defender-endpoint-demonstrations.md
7474
- name: App reputation demonstration

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ The following table lists the supported operating systems for rules that are cur
134134
| [Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | Y | Y | Y | Y |
135135
| [Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y | Y | Y | Y | Y |
136136
| [Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | Y | Y | Y | Y |
137-
| [Block Webshell creation for Servers](#block-webshell-creation-for-servers) | N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only | N |
137+
| [Block Webshell creation for Servers](#block-webshell-creation-for-servers) | N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only |
138138
| [Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y | N | N | N | N |
139139
| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
140140

defender-endpoint/auto-investigation-action-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You can use the unified Action center if you have appropriate permissions and on
5050

5151
- [Microsoft Defender XDR](/microsoft-365/security/mtp/microsoft-threat-protection)
5252
- [Defender for Endpoint](microsoft-defender-endpoint.md)
53-
- [Defender for Office 365]/defender-office-365/mdo-about
53+
- [Defender for Office 365](/defender-office-365/mdo-about)
5454
- [Defender for Business](/defender-business/mdb-overview)
5555

5656
## Using the Action center

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 11 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: linux
1616
search.appverid: met150
17-
ms.date: 05/06/2024
17+
ms.date: 05/08/2024
1818
---
1919

2020
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
@@ -39,7 +39,7 @@ To learn about other ways to deploy Microsoft Defender for Endpoint on Linux, se
3939

4040
Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment.
4141

42-
1. [Work with your Firewall, Proxy, and Networking admin](#1-work-with-your-firewall-proxy-and-networking-admin).
42+
1. [Prepare your network environment](#1-prepare-your-network-environment).
4343

4444
2. [Capture performance data from the endpoint](#2-capture-performance-data-from-the-endpoint).
4545

@@ -86,39 +86,31 @@ Learn about the general guidance on a typical Microsoft Defender for Endpoint on
8686

8787
22. [Uninstall your non-Microsoft solution](#22-uninstall-your-non-microsoft-solution).
8888

89-
## 1. Work with your Firewall, Proxy, and Networking admin
89+
## 1. Prepare your network environment
9090

91-
Work with your Firewall, Proxy, and Networking admin to add the Microsoft Defender for Endpoint URLs to the allowed list, and prevent it from being SSL inspected.
91+
Add the Microsoft Defender for Endpoint URLs and/or IP addresses to the allowed list, and prevent traffic from being SSL inspected.
9292

93-
For more information, see, [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
9493

9594
### Network connectivity of Microsoft Defender for Endpoint
9695

9796
Use the following steps to check the network connectivity of Microsoft Defender for Endpoint:
9897

99-
1. See [Allow URLs for the Microsoft Defender for Endpoint traffic](#step-1-allow-urls-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
98+
1. See [Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
10099

101100
2. If the Linux servers are behind a proxy, then set the proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
102101

103102
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
104103

105104
> [!NOTE]
106-
> It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
105+
> - It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
106+
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
107107
108-
#### Step 1: Allow URLs for the Microsoft Defender for Endpoint traffic
108+
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
109109

110-
1. Download the [Microsoft Defender for Endpoint URL list for commercial customers](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx
111-
) or the [Microsoft Defender for Endpoint URL list for Gov/GCC/DoD](https://download.microsoft.com/download/6/a/0/6a041da5-c43b-4f17-8167-79dfdc10507f/mde-urls-gov.xlsx) for a list of services and their associated URLs that your network must be able to connect.
110+
#### Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic
112111

113-
2. Under **Geography** column, ensure the following checkboxes are selected:
114-
- EU, or UK, or US
115-
- WW
116-
- (Blanks)
117-
118-
> [!NOTE]
119-
> You should ensure that there are no firewall or network filtering rules that would deny access to these URLs. If there are, you may need to create an allow rule specifically for them.
120-
121-
3. Work with the Firewall/Proxy/Networking admins to allow the relevant URLs.
112+
1. Go to [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
113+
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses
122114

123115
#### Step 2: Set up proxy settings
124116

defender-endpoint/configure-device-connectivity.md

Lines changed: 18 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 03/07/2024
17+
ms.date: 05/13/2024
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -27,16 +27,11 @@ ms.date: 03/07/2024
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2828
- [Microsoft Defender XDR](/defender-xdr)
2929

30-
[!Include[Prerelease information](../includes/prerelease.md)]
31-
32-
> [!NOTE]
33-
>The streamlined onboarding method is currently in public preview. Make sure to review the prerequisites to confirm requirements and supported operating systems.
34-
35-
The Microsoft Defender for Endpoint service may require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on full MDE connectivity processes, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
30+
The Microsoft Defender for Endpoint service may require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on preparing your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
3631

3732
This article describes the streamlined device connectivity method and how to onboard new devices to use a simpler deployment and management of Defender for Endpoint cloud connectivity services. For more information on migrating previously onboarded devices, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
3833

39-
To simplify network configuration and management, you now have the option of onboarding devices to Defender for Endpoint using a reduced URL set or static IP ranges. See, [streamlined URL list](https://go.microsoft.com/fwlink/?linkid=2248278)
34+
To simplify network configuration and management, you now have the option of onboarding devices to Defender for Endpoint using a reduced URL set or static IP ranges. See the [streamlined URL list](https://aka.ms/MDE-streamlined-urls).
4035

4136
The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.microsoft.com` replaces the following core Defender for Endpoint services:
4237

@@ -48,21 +43,15 @@ The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.mic
4843

4944
To support network devices without hostname resolution or wildcard support, you can alternatively configure connectivity using dedicated Defender for Endpoint static IP ranges. For more information, see [Configure connectivity using static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges).
5045

51-
5246
> [!NOTE]
53-
> The simplified connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
54-
55-
> [!IMPORTANT]
56-
> Preview limitations and known issues: <br/>
57-
> - Streamlined connectivity does not support onboarding through API (includes Microsoft Defender for Cloud and Intune).
58-
> - This onboarding method has specific prerequisites that do not apply to the standard onboarding method.
47+
> - The simplified connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48+
> - There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to *.endpoint.security.microsoft.com is and remains possible, as future services will require it. This new URL is included in all required URL lists.
5949
6050
## Consolidated services
6151

62-
The following Defender for Endpoint URLs consolidated under the streamlined domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You will need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and WNS).
63-
52+
The following Defender for Endpoint URLs consolidated under the streamlined domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You will need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and Windows Update).
6453

65-
For the updated list of required URLs, see [Download the spreadsheet here](https://go.microsoft.com/fwlink/?linkid=2248278).
54+
For the updated list of required URLs, see [Download the spreadsheet here](https://aka.ms/MDE-streamlined-urls).
6655

6756
> [!IMPORTANT]
6857
> If you are configuring using IP ranges, you will need to separately configure the EDR cyberdata service. This service is not consolidated on an IP level. See section below for more details.
@@ -107,19 +96,18 @@ Devices must meet specific prerequisites to use the streamlined connectivity met
10796

10897
**Supported Operating Systems**
10998

110-
- Windows 10 version 1809 or later
111-
- Windows 10 versions 1607, 1703, 1709, 1803 are supported on the streamlined onboarding package but require a different URL list, see [streamlined URL sheet](https://go.microsoft.com/fwlink/?linkid=2248278)
112-
- Windows 11
113-
- Windows Server 2019
114-
- Windows Server 2022
115-
- Windows Server 2012 R2, Server 2016 R2, fully updated running Defender for Endpoint modern unified solution (installation through MSI).
99+
- Windows 10 version 1809 or later. Windows 10 versions 1607, 1703, 1709, 1803 are supported on the streamlined onboarding package but require a different URL list, see [streamlined URL sheet](https://aka.ms/MDE-streamlined-urls)
100+
- Windows 11
101+
- Windows Server 2022
102+
- Windows Server 2019
103+
- Windows Server 2012 R2 or Windows Server 2016 R2, fully updated running Defender for Endpoint modern unified solution (installation through MSI).
116104
- [macOS supported versions](microsoft-defender-endpoint-mac.md) with MDE product version 101.24022.*+
117105
- [Linux supported versions](microsoft-defender-endpoint-linux.md) with MDE product version 101.24022.*+
118106

119107
> [!IMPORTANT]
120108
> - **Devices running on MMA agent are not supported** on the streamlined connectivity method and will need to continue using the standard URL set (Windows 7, Windows 8.1, Windows Server 2008 R2 MMA, Server 2012 & 2016 R2 not upgraded to modern unified agent).
121109
> - Windows Server 2012 R2 and Server 2016 R2 will need to upgrade to unified agent to leverage the new method. <br/>
122-
> - Windows 10 1607, 1703, 1709, 1803 can leverage the new onboarding option but will use a longer list. For more information, see [streamlined URL sheet](https://go.microsoft.com/fwlink/?linkid=2248278).
110+
> - Windows 10 1607, 1703, 1709, 1803 can leverage the new onboarding option but will use a longer list. For more information, see the [streamlined URL sheet](https://aka.ms/MDE-streamlined-urls).
123111
124112
| Windows OS | Minimum KB Required (March 8, 2022) |
125113
|:---|:---|
@@ -140,10 +128,9 @@ The following illustration shows the streamlined connectivity process and the co
140128

141129
:::image type="content" source="media/streamlined-connectivity-process.png" alt-text="Illustration of streamlined connectivity process":::
142130

143-
144131
### Stage 1. Configure your network environment for cloud connectivity
145132

146-
Once you confirm prerequisites are met, ensure your network environment is properly configured to support the streamlined connectivity method. Using the streamlined method (preview), follow the steps outlined in [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
133+
Once you confirm prerequisites are met, ensure your network environment is properly configured to support the streamlined connectivity method. Follow the steps outlined in [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
147134

148135
Defender for Endpoint services consolidated under the simplified method should no longer be required for connectivity. However, some URLs aren't included in the consolidation.
149136

@@ -156,7 +143,7 @@ Streamlined connectivity allows you to use the following option to configure clo
156143

157144
Configure your environment to allow connections with the simplified Defender for Endpoint domain: `*.endpoint.security.microsoft.com`. For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
158145

159-
You must maintain connectivity with remaining required services listed under the [updated list](https://go.microsoft.com/fwlink/?linkid=2248278). For example, Certification Revocation List, Windows update, SmartScreen.
146+
You must maintain connectivity with remaining required services listed under the [updated list](https://aka.ms/MDE-streamlined-urls). For example, Certification Revocation List, Windows update, SmartScreen.
160147

161148
#### Option 2: Configure connectivity using static IP ranges
162149

@@ -214,7 +201,7 @@ As a supplementary check, you can also use the client analyzer to test whether a
214201
215202
### Stage 4. Apply the new onboarding package required for streamlined connectivity
216203

217-
Once you configure your network to communicate with the full list of services, you can begin onboarding devices using the streamlined method. Note that onboarding via API isn't currently supported (includes Intune & Microsoft Defender for Cloud).
204+
Once you configure your network to communicate with the full list of services, you can begin onboarding devices using the streamlined method.
218205

219206
Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and have updated the sensor and Microsoft Defender Antivirus versions.
220207

@@ -238,13 +225,12 @@ For migrating devices already onboarded to Defender for Endpoint, see [Migrating
238225

239226
:::image type="content" source="media/migrate-devices-streamlined.png" alt-text="Screenshot of onboarding page with streamlined connectivity":::
240227

241-
242-
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**).
228+
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**). For onboarding through Intune & Microsoft Defender for Cloud, you will need to activate the relevant option. Devices already onboarded will not automatically re-onboard; you will need to create a new policy in Intune, where it is recommended to first assign the policy to a set of test devices to verify connectivity is successful, before expanding the audience. Devices in Defender for Cloud can be re-onboarded using the relevant onboarding script.
243229

244230
> [!NOTE]
245231
> Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
246232
247233

248234
:::image type="content" source="media/advanced-setting-streamlined-connectivity.png" alt-text="Screenshot of advanced settings page with streamlined connectivity option":::
249235

250-
This setting sets the default onboarding package to 'streamlined' for applicable operating systems. You can still use the standard onboarding package within the onboarding page but you must specifically select it in the drop-down.
236+
This setting sets the default onboarding package to *streamlined* for applicable operating systems. You can still use the standard onboarding package within the onboarding page, but you must specifically select it in the drop-down.

0 commit comments

Comments
 (0)